PTP 820 All Outdoor User Guide 11.5
PTP 820 All Outdoor User Guide 11.5
PTP 820C/820C-HP
820S/820E
System Release 11.5
Accuracy
While reasonable efforts have been made to assure the accuracy of this document, Cambium Networks assumes
no liability resulting from any inaccuracies or omissions in this document, or from use of the information
obtained herein. Cambium reserves the right to make changes to any products described herein to improve
reliability, function, or design, and reserves the right to revise this document and to make changes from time to
time in content hereof with no obligation to notify any person of revisions or changes. Cambium does not
assume any liability arising out of the application or use of any product, software, or circuit described herein;
neither does it convey license under its patent rights or the rights of others. It is possible that this publication
may contain references to, or information about Cambium products (machines and programs), programming, or
services that are not announced in your country. Such references or information must not be construed to mean
that Cambium intends to announce such Cambium products, programming, or services in your country.
Copyrights
This document, Cambium products, and 3rd Party software products described in this document may include or
describe copyrighted Cambium and other 3rd Party supplied computer programs stored in semiconductor
memories or other media. Laws in the United States and other countries preserve for Cambium, its licensors,
and other 3rd Party supplied software certain exclusive rights for copyrighted material, including the exclusive
right to copy, reproduce in any form, distribute and make derivative works of the copyrighted material.
Accordingly, any copyrighted material of Cambium, its licensors, or the 3rd Party software supplied material
contained in the Cambium products described in this document may not be copied, reproduced, reverse
engineered, distributed, merged or modified in any manner without the express written permission of
Cambium. Furthermore, the purchase of Cambium products shall not be deemed to grant either directly or by
implication, estoppel, or otherwise, any license under the copyrights, patents or patent applications of Cambium
or other 3rd Party supplied software, except for the normal non-exclusive, royalty free license to use that arises
by operation of law in the sale of a product.
Restrictions
Software and documentation are copyrighted materials. Making unauthorized copies is prohibited by law. No
part of the software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval
system, or translated into any language or computer language, in any form or by any means, without prior
written permission of Cambium.
License Agreements
The software described in this document is the property of Cambium and its licensors. It is furnished by express
license agreement only and may be used only in accordance with the terms of such an agreement.
High Risk Materials
Cambium and its supplier(s) specifically disclaim any express or implied warranty of fitness for any high risk
activities or uses of its products including, but not limited to, the operation of nuclear facilities, aircraft
navigation or aircraft communication systems, air traffic control, life support, or weapons systems (“High Risk
Use”). Any High Risk is unauthorized, is made at your own risk and you shall be responsible for any and all
losses, damage or claims arising out of any High Risk Use.
Configuring the MSE Thresholds and Displaying the MSE PMs (CLI)...........................................................649
Configuring the XPI Thresholds and Displaying the XPI PMs (CLI)...............................................................651
Displaying ACM PMs (CLI)............................................................................................................................654
Chapter 17: Ethernet Services and Interfaces (CLI) ...................................................................................... 657
Configuring Ethernet Services (CLI).....................................................................................................................658
Ethernet Services Overview (CLI) ................................................................................................................658
General Guidelines for Provisioning Ethernet Services (CLI) .......................................................................658
Defining Services (CLI) .................................................................................................................................659
Configuring Service Points (CLI)...................................................................................................................664
Appendix A: Configuring C-VLAN CoS Preservation (CLI) ............................................................................... 677
Appendix B: Configuring C-VLAN Preservation (CLI) ..................................................................................... 678
Appendix C: Configuring S-VLAN CoS Preservation (CLI) ............................................................................... 678
Defining the MAC Address Forwarding Table for a Service (CLI).................................................................684
Setting the MRU Size and the S-VLAN Ethertype (CLI)........................................................................................688
Configuring the S-VLAN Ethertype (CLI) ......................................................................................................688
Configuring the C-VLAN Ethertype (CLI) ......................................................................................................689
Configuring the MRU (CLI) ...........................................................................................................................689
Configuring Ethernet Interfaces (CLI)..................................................................................................................689
Entering Interface View (CLI) .......................................................................................................................690
Displaying the Operational State of the Interfaces in the Unit (CLI) ...........................................................692
Viewing Interface Attributes (CLI) ...............................................................................................................692
Configuring an Interface’s Media Type (CLI) ...............................................................................................692
Configuring an Interface’s Speed and Duplex State (CLI) ............................................................................693
Configuring an Interface’s Auto Negotiation State (CLI) .............................................................................694
Configuring an Interface’s IFG (CLI) .............................................................................................................694
Configuring an Interface’s Preamble (CLI) ...................................................................................................695
Adding a Description for the Interface (CLI) ................................................................................................695
Displaying Interface Statistics (RMON) (CLI) ...............................................................................................696
Configuring Automatic State Propagation and Link Loss Forwarding (CLI).........................................................697
Viewing Ethernet PMs and Statistics (CLI) ..........................................................................................................703
Displaying RMON Statistics (CLI) .................................................................................................................703
Configuring Ethernet Port PMs and PM Thresholds (CLI) ...........................................................................704
Displaying Ethernet Port PMs (CLI) .............................................................................................................704
Clearing Ethernet Port PMs (CLI) .................................................................................................................707
Chapter 18: Quality of Service (QoS) (CLI) ................................................................................................... 740
Configuring Classification (CLI)............................................................................................................................741
Classification Overview (CLI) .......................................................................................................................741
Configuring Ingress Path Classification on a Logical Interface (CLI) ............................................................741
Configuring VLAN Classification and Override (CLI) ....................................................................................742
Configuring 802.1p Classification (CLI) ........................................................................................................743
Configuring DSCP Classification (CLI) ...........................................................................................................747
Configuring MPLS Classification (CLI) ..........................................................................................................750
List of Figures
Figure 1 Main Web EMS Page .....................................................................................................................................14
Figure 2 Displaying a Representation of the Front Panel ...........................................................................................15
Figure 3: Main Web EMS Page with Representation of Front Panel – PTP 820C and PTP 820S ..................................15
Figure 4: Main Web EMS Page with Representation of Front Panel – PTP 820C-HP ................................................15
Figure 5 Main Web EMS Page with Representation of Front Panel – PTP -820E ......................................................16
Figure 6 Main Web EMS Page with Active and Standby Tabs ....................................................................................17
Figure 7 Related Pages Drop-Down List ......................................................................................................................18
Figure 8 Unit Summary Page ......................................................................................................................................21
Figure 9 Unit Summary Page – Customizing Columns ................................................................................................21
Figure 10 Radio Summary Page ..................................................................................................................................22
Figure 11 Radio Summary Page- Customizing Columns .............................................................................................22
Figure 12: Security Summary Page ..............................................................................................................................23
Figure 13: Security Summary Page – FIPS Security Warnings......................................................................................24
Figure 14: Security Summary Page – Customizing Columns ........................................................................................25
Figure 15 Internet Protocol Properties Window ......................................................................................................105
Figure 16 Login Page .................................................................................................................................................106
Figure 17 Change User Password Page.....................................................................................................................109
Figure 18: Quick Configuration – From File Page ......................................................................................................110
Figure 19: Quick Configuration – From File Page – Configuration File Loaded .........................................................111
Figure 20 Quick Configuration – Platform Setup Page .............................................................................................112
Figure 21 Quick Configuration– Platform Setup Summary Page ..............................................................................114
Figure 22 Local Networking Configuration Page.......................................................................................................117
Figure 23 Activation Key Configuration Page ...........................................................................................................119
Figure 24 Activation Key Overview Page ..................................................................................................................121
Figure 25 Time Services Page....................................................................................................................................126
Figure 26 Interface Manager Page............................................................................................................................128
Figure 27 Interface Manager – Edit Page..................................................................................................................128
Figure 28 Multiple Selection Operation Section (Interface Manager Page) .............................................................129
Figure 29: Traffic over Management Page ................................................................................................................132
Figure 30 MRMC Symmetrical Scripts Page (ETSI) ....................................................................................................133
Figure 31 MRMC Symmetrical Scripts Page (PTP 820C) (ETSI) .................................................................................134
Figure 32 MRMC Symmetrical Scripts Page (PTP 820C) (FCC) ..................................................................................134
Figure 33 MRMC Symmetrical Scripts Page (Configuration) – PTP 820C..................................................................135
Figure 34 MRMC Symmetrical Scripts Page – Configuration – Adaptive Mode (PTP 820C) .....................................136
Figure 35 Frequency Scanner Page – PTP820E – Single Mode ..................................................................................139
Figure 36 Frequency Scanner Results – Graph Format (PTP 820E – Single Mode)....................................................141
Figure 37 Radio Parameters Page – PTP 820C/PTP 820C-HP.....................................................................................143
Figure 38 Radio Parameters Page Per Carrier – PTP 820C/PTP 820C-HP ..................................................................144
Figure 39 Radio Parameters Page Per Carrier – PTP 820C ........................................................................................149
Figure 40 Security General Configuration Page ........................................................................................................151
Figure 41: Unit Redundancy Page ..............................................................................................................................152
Figure 84: Bandwidth Notification Page (Populated with Radio BNM) .....................................................................210
Figure 85 Multi-Carrier ABC Group Page (Empty) ....................................................................................................212
Figure 86 Create ABC Group Wizard – First Page .....................................................................................................212
Figure 87 Create ABC Group Wizard – Second Page.................................................................................................213
Figure 88 Create ABC Group Wizard – Finish Page ...................................................................................................213
Figure 89 Multi-Carrier ABC Group – Edit Group Page .............................................................................................215
Figure 90 Multi Carrier ABC Group - Add/Remove Members Page ..........................................................................216
Figure 91 Multiband Operation – PTP 820E and PTP 820C/PTP 820C-HP .................................................................219
Figure 92 Multiband Operation – PT 820E and Third-Party Unit ...............................................................................220
Figure 93 Multi Carrier ABC Groups Page (Empty) ....................................................................................................221
Figure 94 Create ABC Group Wizard – Page 1 ...........................................................................................................221
Figure 95 Create ABC Group Wizard – Page 2 ...........................................................................................................222
Figure 96 Create ABC Group Wizard – Page 3 ...........................................................................................................222
Figure 97 Create ABC Group Wizard – Page 3 ...........................................................................................................223
Figure 98 Multi Carrier ABC Groups Page (Populated with Multiband Group) .........................................................224
Figure 99 Bandwidth Notification Page (Empty) .......................................................................................................224
Figure 100 Bandwidth Notification – Add Page .........................................................................................................225
Figure 101 Bandwidth Notification Page (Populated with Radio BNM) ....................................................................226
Figure 102 Multiband Cable for Use with CSFP Port .................................................................................................227
Figure 103 Multiband Configuration with Inband Management and/or SyncE via the PTP 820E .............................228
Figure 104 Multiband Configuration with Direct Inband Management to the Paired Unit ......................................229
Figure 105 Multiband Configuration with Direct Inband Management to the PTP 820C, PTP 820C-HP, or PTP 820S
............................................................................................................................................................................230
Figure 106 Create LAG Group – Page 1.....................................................................................................................233
Figure 107 Create LAG Group – Page 2.....................................................................................................................234
Figure 108 Create LAG Group – Final Page ...............................................................................................................234
Figure 109 Link Aggregation - Edit Page ...................................................................................................................235
Figure 110 Link Aggregation - Edit Page ...................................................................................................................237
Figure 111 LACP Aggregation Page ...........................................................................................................................238
Figure 112 LACP Port Staus Page ..............................................................................................................................239
Figure 113 LACP Port Status – View Page .................................................................................................................240
Figure 114 LACP Port Statistics Page ........................................................................................................................242
Figure 115 LACP Port Debug Page ............................................................................................................................243
Figure 116 XPIC Configuration Page .........................................................................................................................245
Figure 117 Logical Interfaces – Edit Page .................................................................................................................249
Figure 118 Unit Redundancy Page ............................................................................................................................250
Figure 119 Unit Redundancy Page when Redundancy Enabled ...............................................................................250
Figure 120 Interface Manager Page – Both Radio Carriers Enabled .........................................................................252
Figure 121 Standby Tab of Radio Parameters Page ..................................................................................................252
Figure 122 Unit Redundancy Page ............................................................................................................................253
Figure 123 Create Space Diversity Group- Page 1. ...................................................................................................255
Figure 124 Create Space Diversity Group- Selection Summary ................................................................................256
Figure 125 Diversity - Edit Page (Space Diversity Group) .........................................................................................256
List of Tables
Table 1 PTP 820 Web EMS Menu Hierarchy ...............................................................................................................26
Table 2 Cables for Direct CPU Connection ................................................................................................................106
Table 3 PTP 820 Web EMS Menu Hierarchy .............................................................................................................119
Table 4 Activation Key-Enabled-Features Table Parameters ....................................................................................121
Table 5 Time Services Parameters ............................................................................................................................126
Table 6 MRMC Symmetrical Scripts Page Parameters .............................................................................................137
Table 7 Available Radio Profiles for PTP 820C, PTP 820C-HP and PTP 820S.............................................................138
Table 8 Available Radio Profiles for PTP 820E ...........................................................................................................138
Table 9 System Configurations .................................................................................................................................157
Table 10 Multiband Cable for Use with CSFP Port.....................................................................................................227
Table 11 LACP Aggregation Status Parameters ........................................................................................................238
Table 12 LACP Port Status Parameters .....................................................................................................................240
Table 13 LACP Port Statistics ....................................................................................................................................242
Table 14 LACP Port Debug Statistics .........................................................................................................................243
Table 15 SNMP V3 Authentication Parameters ........................................................................................................295
Table 16 Trap Manager Parameters .........................................................................................................................297
Table 17 Versions Page Columns ..............................................................................................................................304
Table 18 Download & Install Status Parameters ......................................................................................................310
Table 19 Backup Files Page Columns ........................................................................................................................313
Table 20 Unit Parameters .........................................................................................................................................323
Table 21 SFP Inventory Parameters ...........................................................................................................................280
Table 22 SFP Digital Diagnostic Monitoring (DDM) Parameters ................................................................................281
Table 23 DDM PMs ....................................................................................................................................................282
Table 24 Radio Status Parameters............................................................................................................................288
Table 25 Remote Radio Parameters .........................................................................................................................290
Table 26: Radio Ethernet Interface Counters Fields ..................................................................................................299
Table 27 MRMC Status Parameters ..........................................................................................................................309
Table 28 MRMC PMs ................................................................................................................................................310
Table 29 Signal Level PMs.........................................................................................................................................314
Table 30 Signal Level Thresholds ..............................................................................................................................316
Table 31 Modem BER (Aggregate) PMs ....................................................................................................................317
Table 32 Modem MSE PMs.......................................................................................................................................318
Table 33 XPI PMs ......................................................................................................................................................321
Table 34 Capacity/Throughput PMs .........................................................................................................................324
Table 35 Utilization PMs ...........................................................................................................................................326
Table 36 Frame Error Rate PMs ................................................................................................................................327
Table 37 Ethernet Services Page Parameters ...........................................................................................................332
Table 38 General Service Point Attributes ...............................................................................................................337
Table 39 Attached Interface Types ...........................................................................................................................339
Table 40 Service Point Ingress Attributes .................................................................................................................340
Table 41 Service Point Egress Attributes ..................................................................................................................341
Purpose
Cambium Networks Point-To-Point (PTP) documents are intended to instruct and assist personnel in the operation,
installation and maintenance of the Cambium Networks PTP equipment and ancillary devices. It is recommended
that all personnel engaged in such activities be properly trained.
Cambium Networks disclaims all liability whatsoever, implied or express, for any risk of damage, loss or reduction
in system performance arising directly or indirectly out of the failure of the customer, or anyone acting on the
customer's behalf, to abide by the instructions, system parameters, or recommendations made in this document.
Cross references
References to external publications are shown in italics. Other cross references, emphasized in blue text in
electronic versions, are active links to the references.
This document is divided into numbered chapters that are divided into sections. Sections are not numbered, but
are individually named at the top of each page, and are listed in the table of contents.
Feedback
We appreciate feedback from the users of our documents. This includes feedback on the structure, content,
accuracy, or completeness of our documents. Send feedback to support@cambiumnetworks.com.
Reporting problems
If any problems are encountered when installing or operating this equipment, follow this procedure to investigate
and report:
1 Search this document and the software release notes of supported releases.
2 Visit the support website.
3 Ask for assistance from the Cambium Networks product supplier.
4 Gather information from affected units, such as any available diagnostic downloads.
5 Escalate the problem by emailing or telephoning support.
Hardware warranty
Cambium Networks’s standard hardware warranty is for one (1) year from date of shipment from Cambium
Networks or a Cambium distributor. Cambium Networks warrants that hardware will conform to the relevant
published specifications and will be free from material defects in material and workmanship under normal use and
service. Cambium shall within this time, at its own option, either repair or replace the defective product within
thirty (30) days of receipt of the defective product. Repaired or replaced product will be subject to the original
warranty period but not less than thirty (30) days.
To register PTP products or activate warranties, visit the support website. For warranty assistance, contact the
reseller or distributor.
Caution
Using non-Cambium parts for repair could damage the equipment or void warranty. Contact
Cambium for service and repair instructions.
Portions of Cambium equipment may be damaged from exposure to electrostatic discharge. Use
precautions to prevent damage.
Security advice
Cambium Networks systems and equipment provide security parameters that can be configured by the operator
based on their particular operating environment. Cambium recommends setting and using these parameters
following industry recognized security practices. Security aspects to be considered are protecting the
confidentiality, integrity, and availability of information and assets. Assets include the ability to communicate,
information about the nature of the communications, and information about the parties involved.
In certain instances Cambium makes specific recommendations regarding security practices, however the
implementation of these recommendations and final responsibility for the security of the system lies with the
operator of the system.
The following describes how warnings and cautions are used in this document and in all documents of the
Cambium Networks document set.
Warnings
Warnings precede instructions that contain potentially hazardous situations. Warnings are used to alert the reader
to possible hazards that could cause loss of life or physical injury. A warning has the following format:
Warning
Warning text and consequence for not following the instructions in the warning.
Cautions
Cautions precede instructions and are used when there is a possibility of damage to systems, software, or
individual items of equipment within a system. However, this damage presents no danger to personnel. A caution
has the following format:
Caution
Caution text and consequence for not following the instructions in the caution.
Notes
A note means that there is a possibility of an undesirable situation or provides additional information to help the
reader understand a topic or concept. A note has the following format:
Note
Note text.
The following information describes national or regional requirements for the disposal of Cambium Networks
supplied equipment and for the approved disposal of surplus packaging.
In EU countries
The following information is provided to enable regulatory compliance with the European Union (EU) directives
identified and any amendments made to these directives when using Cambium equipment in EU countries.
In non-EU countries
In non-EU countries, dispose of Cambium equipment and all surplus packaging in accordance with national and
regional regulations.
System Overview
Configuration Tips
This section describes common issues and how to avoid them.
Ethernet Port configuration
• The Ethernet ports of a PTP 820C and PTP 820S are not enabled by default in a new unit. You must manually
enable the Ethernet port or ports in order for the unit to process Ethernet traffic. See Enabling the Interfaces
(Interface Manager)
• For RJ-45 ports, it is recommended to enable Auto-Negotiation for both the local port and its peer in order to
obtain optimal performance.
• For SFP ports, it is recommended to disable Auto-Negotiation.
• For instructions, see Configuring Ethernet Interfaces.
SyncE Interface Configuration
• When configuring a Sync source or outgoing clock on an Ethernet interface, the Media Type of the interface
must be RJ-45 or SFP, not Auto-Type. See Synchronization.
In-Band Management
It is strongly recommended not to configure ASP on an Ethernet interface that carries in-band management traffic.
If you do need to use ASP on this interface, it is recommended to use it in ASP Management Safe (CSF) mode to
avoid loss of management in the event that ASP is triggered. See Configuring Automatic State Propagation and Link
Loss Forwarding.
When inband management is being transmitted via a LAG configuration, it is recommended to enable LACP to
overcome uni-directional failures. See Configuring a LAG Group.
If you are using 1588 Transparent Clock, make sure the Transparent Clock settings are symmetrical; that is, make
sure Transparent Clock is either enabled or disabled on both sides of the link. To avoid loss of management, make
sure to configure Transparent Clock on the remote side of the link first, then on the local side. See Configuring
1588 Transparent Clock.
To avoid loss of management when configuring Multi-Carrier ABC, make sure to add or remove members on the
remote side of the link first, then on the local side. See Configuring Multi-Carrier ABC
• In order to use in-band management with an external switch, it must be supported on the external switch.
• When configuring in-band management, be sure to tag the management traffic to avoid overflow of the CPU.
• It is strongly recommended to assign the management service (1025) a CoS of 7 to ensure that management
packets receive high priority and are not discarded in instances of network congestion. See Configuring
Ethernet Service(s).
• For instructions on configuring in-band management on the PTP 820, see Configuring in-Band Management.
Link Aggregation
• If you are configuring LAG with an external switch, the switch must support LAG. For instructions on
configuring LAG, see Configuring Link Aggregation (LAG) and LACP.
• When using IEEE 1588 PTP synchronization across a LAG link, follow the recommendations set forth in ITU-T
standard G.8275.1, Annex 6 in order to prevent PTP packets from following different paths between the
devices, which can lead to asymmetric delay. For instructions on configuring LAG, see Configuring Link
Aggregation (LAG) and LACP.
Software Upgrade
• When upgrading software via HTTP, make sure the software package is not unzipped. For instructions, see
Upgrading the Software.
Configuration Management and Backup Restoration
Configuration files can only be copied to the same PTP 820 hardware type with the same part number as the unit
from which they were originally saved. For example, a PTP 820C configuration file can only be restored to a PTP
820C with the same part number as the unit from which it was saved
In addition, PTP 820C-HP uses field-replaceable diplexer units. An PTP 820C-HP can be ordered in two parts: A
generic radio unit and a diplexer unit. The generic radio unit covers an entire frequency band. It is the diplexer
unit, which is passive, that determines the sub-band coverage for the entire integrated PTP 820C-HP unit. This
provides operators with major benefits in terms of both maintenance and deployment time.
For maintenance, the operator can reduce the number of spare radio units in its inventory because a single generic
radio unit can be used for any sub-band. This means that for a site covering four channel ranges within a single
frequency band, a single spare radio unit can be kept on hand, because that unit can be used as a spare for any of
the PTP 820C-HP nodes in the site. The diplexer units, because they are passive, are much less likely to require
replacement, so the maintenance of spare parts for the diplexer units is much less of a concern for the operator.
The use of separate generic radio units and diplexer units also enables operators to achieve a quicker system
deployment time. In the planning stage, when the frequency bands have been determined but the exact sub-band
layout is still under consideration, operators can already order all the radio units required for the frequency bands
that have been determined, and can begin ordering diplexer units for the approximate sub-bands that are
anticipated, while still determining the exact network parameters. This enables faster delivery and deployment of
the network.
PTP 820S
PTP 820S is an all-outdoor solution for backhaul sites. It provides high-performance, internetworking operating
system, and supports all common features of the PTP 820 platform in a compact, environmentally friendly
architecture.
PTP 820S supports cutting edge capacity-boosting techniques, such as QPSK to 2048 QAM and Header De-
Duplication, to offer a high capacity solution for every network topology and every site configuration. Its green,
compact, all-outdoor configuration makes PTP 820S ideal for any location.
PTP 820S includes one RJ-45 port and two SFP ports for Ethernet traffic.
Note
For instructions on using PTP 820E hardware release 1 (R1), refer to the PTP 820C, PTP 820S,
and PTP 820E User Guide Rev E, for System Release 8.2, or earlier versions.
Note
System release 11.3 cannot be used in PTP 820 Assured platforms. For PTP 820 Assured, use system
release 10.9.6 and 8.3.
Note
For optimal Web EMS performance, it is recommended to ensure that the network speed is at least
100 Kbps for most operations, and at least 5 Mbps for software download operations.
The Web-Based EMS shows the actual unit configuration and provides easy access to any interface. A wide range
of configuration, testing, and system monitoring tasks can be performed through the Web EMS.
Note
The alarms and system configuration details shown in this manual do not necessarily represent
actual parameters and values on a fully operating PTP 820 system. Some of the pages and tasks
described in this Manual may not be available to all users, based on the actual system configuration,
activation key, and other details.
Figure 3: Main Web EMS Page with Representation of Front Panel – PTP 820C and PTP 820S
Figure 4: Main Web EMS Page with Representation of Front Panel – PTP 820C-HP
Figure 5 Main Web EMS Page with Representation of Front Panel – PTP -820E
Figure 6 Main Web EMS Page with Active and Standby Tabs
Certain Web EMS pages include an additional, merged tab labelled All. The All tab includes rows for both the Active
and the Standby unit, so that you can work with both units from a single page. In merged pages, an additional
column labelled Device Role appears to indicate whether the row is from the Active or the Standby unit.
The All tab appears in the following Web EMS pages
• Interface Manager
• Radio Parameters
• Current Alarms
• Event Log
You can also set the page to refresh automatically at selected intervals. Click the arrow next to Page
Refresh Interval (Seconds) on the lower left of the page and select the automatic refresh interval
(in seconds).
You can toggle between Advanced or Basic mode by clicking Advanced and Basic in the upper left
corner or any page in the Web EMS. The default mode is Advanced mode.
This manual includes a separate chapter to guide you through PTP 820 configuration using Basic
mode, with cross-references to more detailed explanations of PTP 820 features found elsewhere in
the manual. See Configuring an PTP 820 Unit Using Basic Mode. Except in the Basic mode chapter,
references to the Web EMS menu structure and screens refer to Advanced mode except when
otherwise noted.
Note
When one or more columns are hidden, the icon turns white ( ).
Note
When one or more columns are hidden, the icon turns white ( ).
The Security Summary page gathers a number of important security-related parameters on a single page for quick
viewing. To display the Security Summary page, select Security Summary from the Web EMS main menu.
If FIPS mode is enabled, a yellow Warning icon may appear next to certain items. These items indicate fields for
which the current security settings are not appropriate for FIPS mode. Hover over an item to display a tooltip
explaining the warning.
To hide a specific section of the Radio Summary page, click the section title. To display a section that has been
hidden, click the section title again.
To customize which columns appear in a section, click next to the section title. A list of columns is displayed.
Select only the columns you want to display and click again.
Note
When one or more columns are hidden, the icon turns white ( ).
The following table shows the Web EMS menu hierarchy, with links to the sections in this document that provide
instructions for the relevant menu item.
Note
Some menu items are only available if the relevant activation key or feature is enabled.
Shelf Management > Unit Redundancy Configuring Unit Protection with HSB Radio
Protection
Management > Time Services Setting the Time and Date (Optional)
Management > Networking > Remote Configuring the Remote Unit’s IP Address
Activation Key > Activation Key Overview Displaying a List of Activation-Key-Enabled Features
Security > General > Security Log Upload Uploading the Security Log
Security > General > Configuration Log Uploading the Configuration Log
Upload
Security > X.509 Certificate > CSR Configuring X.509 CSR Certificates and HTTPS
Security > X.509 Certificate > Download & Configuring X.509 CSR Certificates and HTTPS
Install
Security > Access Control > General Configuring the General Access Control Parameters
Security > Access Control > User Profiles Configuring User Profiles
Security > Access Control > Password Configuring the Password Security Parameters
Management
Security > Access Control > Radius > Radius Configuring RADIUS
Configuration
Security > Access Control > Radius > Radius Viewing RADIUS User Permissions and Connectivity
Users
PM & Statistics > SFP Displaying SFP DDM and Inventory Information
PM & Statistics > Voltage Configuring Voltage Alarm Thresholds and Displaying
Voltage PMs
Ethernet Interface > Configuration Configuring Header De-Duplication and Frame Cut-
Through
Ethernet Interface > Counters Viewing Header De-Duplication and Frame Cut-
Through Counters
MRMC > Symmetrical Scripts > ETSI Configuring the Radio (MRMC) Script(s)
MRMC > Symmetrical Scripts > FCC Configuring the Radio (MRMC) Script(s)
Radio
MRMC > MRMC > Status Displaying MRMC Status
PM & Statistics > Counters Displaying and Clearing Defective Block Counters
PM & Statistics > MSE Displaying MSE PMs and Configuring MSE PM
Thresholds
PM & Statistics > XPI Displaying XPI PMs and Configuring XPI PM
Threshold
PM & Statistics > Traffic > Displaying Capacity and Throughput PMs
Capacity/Throughput
PM & Statistics > Traffic > Frame error rate Displaying Frame Error Rate PMs
General Configuration Setting the MRU Size and the S-VLAN Ethertype
Interfaces > ASP & LLF Configuring Automatic State Propagation and Link
Loss Forwarding
PM & Statistics > Egress CoS PM > Configuring and Displaying Queue-Level PMs
Configuration
PM & Statistics > Egress CoS PM > Egress Configuring and Displaying Queue-Level PMs
CoS PM
QoS > Classification > 802.1Q Modifying the C-VLAN 802.1Q UP and CFI Bit
Classification Table
QoS > Classification > 802.1AD Modifying the S-VLAN 802.1 UP and DEI Bit
Classification Table
QoS > Classification > DSCP Modifying the DSCP Classification Table
QoS > Classification > MPLS Modifying the MPLS EXP Bit Classification Table
QoS > Classification > MAC DA Modifying the MAC DA Classification Table
QoS > Marking > 802.1Q Modifying the 802.1Q Marking Table
QoS > Marking > 802.1AD Modifying the 802.1AD Marking Table
QoS > Shaper > Queue Profiles Configuring Queue Shaper Profiles
QoS > Shaper > Service Bundle Profiles Configuring Service Bundle Shaper Profiles
Protocols > Adaptive Bandwidth Notification Configuring Adaptive Bandwidth Notification (ABN)
Protocols > LLDP > Advanced > Configuring the General LLDP Parameters
Configuration > Parameters
Protocols > LLDP > Advanced > Configuring the LLDP Port Parameters
Configuration > Port Configuration
Protocols > LLDP > Advanced > Displaying the Unit’s Management Parameters
Configuration > Destination Address
Protocols > LLDP > Advanced > Displaying the Unit’s Management Parameters
Configuration > Management TLV
Protocols > LLDP > Advanced > Remote Displaying Peer Unit’s Management Parameters
System > Management
Protocols > LLDP > Advanced > Remote Displaying Peer Unit’s Management Parameters
System > Remote Table
Protocols > LLDP > Advanced > Local System Displaying the Local Unit’s Parameters
> Parameters
Protocols > LLDP > Advanced > Local System Displaying the Local Unit’s Parameters
> Port
Protocols > LLDP > Advanced > Local System Displaying the Local Unit’s Parameters
> Management
Protocols > LLDP > Advanced > Statistic > Displaying LLDP Statistics
General
Protocols > LLDP > Advanced > Statistic > Displaying LLDP Statistics
Port TX
Protocols > LLDP > Advanced > Statistic > Displaying LLDP Statistics
Port RX
Protocols > SOAM > MD Configuring Service OAM (SOAM) Fault Management
(FM)
Protocols > SOAM > MA/MEG Configuring Service OAM (SOAM) Fault Management
(FM)
Protocols > SOAM > MEP Configuring Service OAM (SOAM) Fault Management
(FM)
Protocols > LACP > Aggregation Displaying LACP Aggregation Status Parameters
Protocols > LACP > Port > Status Displaying LACP Port Status Parameters
Protocols > LACP > Port > Statistics Displaying LACP Port Statistics
Protocols > LACP > Port > Debug Displaying LACP Port Debug Statistics
Interfaces > Groups > LAG Configuring Link Aggregation (LAG) and LACP
1588 > Boundary Clock > Clock Parameters > Not relevant for these products
Default
1588 > Boundary Clock > Clock Parameters > Not relevant for these products
Advanced
1588 > Boundary Clock > Port Parameters Not relevant for these products
1588 > Boundary Clock > Port Statistics Not relevant for these products
PIPE > Single Carrier > 1+0 Configuring a 1+0 Link Using the Quick Configuration
Wizard
PIPE > Single Carrier > 1+0 (Repeater) Configuring a 1+0 (Repeater) Link Using the Quick
Configuration Wizard
Quick PIPE > Single Carrier > 2 X (1 + 0) Configuring a 2 x (1+0) Link Using the Quick
Configur- Configuration Wizard
ation PIPE > Multi Carrier ABC > 2 + 0 Configuring a 2+0 Multi-Carrier ABC Link Using the
Quick Configuration Wizard
PIPE > Multi Carrier ABC > Multiband Configuring a Multiband (Enhanced Multi-Carrier
ABC) Link Using the Quick Configuration Wizard
Before connection over the radio hop is established, it is of high importance that you assign the PTP 820 unit a
dedicated IP address, according to an IP plan for the total network. See Changing the Management IP Address.
By default, a new PTP 820 unit has the following IP settings:
• IP address: 192.168.1.1
• Subnet mask: 255.255.255.0
Caution
If the connection over the link is established with identical IP addresses, an IP address conflict will
occur and remote connection may be lost.
Establishing a Connection
Connect the PTP 820 unit to a PC by means of a Twisted Pair cable. The cable is connected to the MGT port on
the PTP 820 and to the LAN port on the PC. Refer to the Installation Guide for the type of unit you are connecting for
cable connection instructions.
PC Setup
To obtain contact between the PC and the PTP 820 unit, it is necessary to configure an IP address on the PC within the
same subnet as the PTP 820 unit. The default PTP 820 IP address is 192.168.1.1. Set the PC address to e.g.
192.168.1.10 and subnet mask to 255.255.255.0. Note the initial settings before changing.
Note
The PTP 820 IP address, as well as the password, should be changed before operating the system. See
Changing the Management IP Address and Changing Your Password. In Basic mode, select Platform >
IP Configuration to change the unit’s IP address. To change your password, click on the upper left of
any Web EMS screen and Select Change Your
.
1. Select Control Panel > All Control Panel Items > Network and Sharing Center.
2. Click Change the adapter settings.
3. Select Local Area Connection > Properties > Internet Protocol Version 4 (TCP/IP), and set the following
parameters:
o IP address: 192.168.1.10
o Subnet mask 255.255.255.0
o No default gateway
4. Click OK to apply the settings.
Logging on
PTP 820C and PTP 820S N000082L062A PTP 820C MIMO or Prot management
ODU spltr
PTP 820C, PTP 820C-HP, and PTP 820_MIMO_Prot_ mng_spltr CABLE,RJ45M TO 2xRJ45F, 1.0M, WITH
PTP 820S GLANDS, UV PROTECTED
For PTP 820E R2H, as an alternative to the proprietary cable described above, you can use a cable with the following
pinouts:
P1 WIRE P2
2 3
TWISTED PAIR 1
8 6
14 1
TWISTED PAIR 2
20 2
For PTP 820E ESP, as an alternative to the proprietary cable described above, you can use a cable with the following
pinouts:
P1 WIRE P2
14 3
TWISTED PAIR 1
16 6
18 1
TWISTED PAIR 2
20 2
Note
In the event that you fail to connect using 192.0.2.1, use 192.0.2.2 instead.
2. Connect Channel 2 of the cable to the MGT port on the PTP 820
o PTP 820C, PTP 820C-HP, and PTP 820S: The MGT port on the PTP 820 unit.
o PTP 820E: The EXT port on the PTP 820 unit.
3. Connect the single end of the cable to the LAN port on the PC.
4. Verify that the MGT port LED is orange. (When a connection is established using Channel 1 of the cable, the LED
on the MGT port is green.)
5. The system will prompt you for a user name and password (see Figure 13).
6. Enter the default user name and password:
o User Name: admin
o Password: admin
7. Click Apply.
8. After a connection is established, you can view or configure the unit's IP address using the Web EMS. See
Changing the Management IP Address.
It is recommended to change your default Admin password as soon as you have logged into the system.
In addition to the Admin password, there is an additional password protected user account, “root user”, which is
configured in the system. The root user password and instructions for changing this password are available from
Cambium Networks Customer Support. It is strongly recommended to change this password.
To change your password , click on the upper left of any Web EMS screen and select Change Your
Password.
In Advanced mode, you can also change your password as follows:
1. Select Platform > Security > Access Control > Change Password. The Change User Password page opens.
Figure 23 Change User Password Page
2. In the Old password field, enter the current password. For example, upon initial login, enter the default password
(admin).
3. In the New password field, enter a new password. If Enforce Password Strength is activated (see Configuring the
Password Security Parameters), the password must meet the following criteria:
o Password length must be at least eight characters.
o Password must include characters of at least three of the following character types:
lower case letters, upper case letters, digits, and special characters. For purposes of
meeting this requirement, upper case letters at the beginning of the password and
digits at the end of the password are not counted.
o A password cannot be repeated within five changes of the password.
4. Click Apply.
PTP 820 units can be configured from the Web EMS in a single step by applying a pre-defined configuration file. A pre-
defined configuration file can be prepared for multiple PTP 820 units, with the relevant configuration details specified
and differentiated per-unit.
Pre-defined configuration files can include all the parameters necessary to configure basic links, including:
• Platform parameters:
o ETSI to ANSI conversion
o General unit parameters, such as unit name, location, and contact person
o Activation Key (or Demo mode) configuration
o IP configuration (IPv4 and IPv6)
o NTP configuration
o Basic SNMP Parameters (Enable/Disable, Read and Write Communities)
o Time services configuration
• Interface configuration:
o Radio
o Ethernet
o LAG
o Radio protection
o Multi-Carrier ABC groups
• Advanced radio configuration
o XPIC
o MIMO
• Services configuration
o Management
o Point-to-Point
o Multipoint
The pre-defined configuration file is generated by Cambium Global Services and provided as a service.
The pre-defined configuration file must be compatible with the Release version the PTP 820 device is running.
Configuration files created for Release 9.2 cannot be used with later Release versions. Configuration files must also be
compatible with the type of PTP 820 device. For example, a configuration file created for PTP 820C cannot be applied
to an PTP 820G device.
For further information on the creation of pre-defined configurations, consult your Cambium Networks
representative.
You can apply a pre-defined configuration file from Advanced mode or Basic mode.
To apply a pre-defined configuration file:
1. Select Quick Configuration > From File. The Quick Configuration – From File page opens.
Figure 25: Quick Configuration – From File Page – Configuration File Loaded
3. In the Device List field, select the PTP 820 unit you are configuring.
Note:
Although the configuration file may contain parameters for multiple types of devices, only
devices of the same product type as the unit you are configuring are displayed in this field.
Note:
If the pre-defined configuration file included a new IP address for the unit, make sure to
configure an IP address on the PC or laptop you are using to perform the configuration within
the same subnet as the PTP 820 unit’s new IP address.
The Platform Setup page in the Web EMS centralizes the main configurable items from several Web EMS pages in a
single location:
• Unit Parameters (Name, Contact Person, Location, Longitude, and Latitude)
• IPv4 Address, Subnet Mask, and Default Gateway
• NTP Enable/Disable
• Demo Activation Key Enable/Disable
• SNMP Parameters
These items enable you to configure the basic platform parameters quickly, in a single Web EMS page. Combined with
the quick link configuration wizards, this enables you to configure a new link in the field quickly and efficiently, to the
point where the link is up and functioning and any necessary advanced configurations can be performed remotely
without the need to physically access the PTP 820 unit.
To use the Platform Setup page:
1. Select Quick Configuration > Platform Setup. The Quick Configuration – Platform Setup page opens.
Figure 26 Quick Configuration – Platform Setup Page
2. The Unit Parameters section is optional. For details on each field, see Configuring Unit Parameters.
3. In the IPv4 Address section, configure the unit’s management IP address, subnet mask, and, optionally, a default
gateway. If you want to use an IPv6 address, see Changing the Management IP Address.
4. In the Date & Time section, you can enable Network Time Protocol (NTP). NTP distributes Coordinated Universal
Time (UTC) throughout the system, using a jitter buffer to neutralize the effects of variable latency.
If you select Enable, the NTP version and NTP server IP address fields are also displayed, enabling you to
configure the NTP parameters. For details on these fields, see Configuring NTP.
5. In the Activation Key section, you can enable or disable Demo mode in the Demo admin field. Demo mode
enables all features for 60 days. When demo mode expires, the most recent valid activation key goes into effect.
The 60-day period is only counted when the system is powered up. 10 days before demo mode expires, an alarm
is raised indicating that demo mode is about to expire.
If you set Demo admin to Disable, the Activation Key field is displayed. Enter a valid activation key in this field.
For a full explanation of activation keys, see Configuring the Activation Key.
6. In the SNMP Parameters section, you can set whether to enable or disable SNMP monitoring in the Admin field,
and set the SNMP Read Community and SNMP Write Community. For a full explanation of SNMP parameters, see
Configuring SNMP.
7. Click Finish. The Selection Summary page opens. To go back and change any of the parameters, click Back. To
implement the new parameters, click Submit.
Mate Management Access enables the use of in-band management for nodes that use two PTP 820C or PTP 820C-HP
units (4x4 MIMO, 2+2 XPIC, and 4+0 Multi-Carrier ABC), where traffic comes from an external switch operating in LAG
mode. When Mate Management Access is enabled, the two units exchange incoming management packets, ensuring
that all management data is received by both units.
Mate Management Access must be configured via the CLI. For instructions, see Mate Management Access (IP
Forwarding) (CLI) on page 570.
You can configure in-band management in order to manage the unit remotely via its radio and/or Ethernet interfaces.
Note
Before configuring in-band management, it is recommended to review the configuration
recommendations for in-band management listed in Configuration Tips.
To use in-band management for nodes that utilize two PTP 820C or PTP 820C-HP units (4x4 MIMO,
2x2 XPIC, and 4+0 Multi-Carrier ABC), you must first configure Mate Management Access (IP
Forwarding). For instructions, see Mate Management Access (IP Forwarding) (CLI).
To use in-band management for nodes that utilize two PTP 820C units (4x4 MIMO, 2x2 XPIC, and 4+0 Multi-Carrier
ABC), you must first configure Mate Management Access (IP Forwarding). For instructions, see on page 115.
Each PTP 820C or PTP 820C-HP unit includes a pre-defined management service with Service ID 257. The
management service is a multipoint service that connects the two local management ports and the network element
host CPU in a single service. In order to enable in-band management, you must add at least one service point to the
management service, in the direction of the remote site or sites from which you want to access the unit for
management.
Note
In order to use in-band management, it must be supported on the external switch.
Related Topics:
• Defining the IP Protocol Version for Initiating Communications
• Configuring the Remote Unit’s IP Address
To change the management IP address of the local unit:
1. Select Platform > Management > Networking > Local. The Local Networking Configuration page opens.
2. Optionally, in the Description field, enter descriptive information about the unit.
3. In the IP address field, enter an IP address for the unit. You can enter the address in IPv4 format in this field,
and/or in IPv6 format in the IPv6 Address field. The unit will receive communications whether they are sent to its
IPv4 address or its IPv6 address.
4. In the Subnet mask field, enter the subnet mask.
5. Optionally, in the Default gateway field, enter the default gateway address.
6. Optionally, in the IPv6 Address field, enter an IPv6 address for the unit. You can enter the address in IPv6 format
in this field, and/or in IPv4 format in the IP Address field. The unit will receive communications whether they are
sent to its IPv4 address or its IPv6 address.
7. If you entered an IPv6 address, enter the IPv6 prefix length in the IPv6 Prefix-Length field.
8. Optionally, if you entered an IPv6 address, enter the default gateway in IPv6 format in the Default Gateway IPv6
field.
9. Click Apply.
Note
To obtain an activation key cipher, you may need to provide the unit’s serial number. You can display
the serial number in the Web EMS Inventory page. See Displaying Unit Inventory.
Each required feature and capacity should be purchased with an appropriate activation key. It is not permitted to
enable features that are not covered by a valid activation key. In the event that the activation-key-enabled capacity
and feature set is exceeded, an Activation Key Violation alarm occurs and the Web EMS displays a yellow background
and an activation key violation warning. After a 48-hour grace period, all other alarms are hidden until the capacity
and features in use are brought within the activation key’s capacity and feature set.
In order to clear the alarm, you must configure the system to comply with the activation key that has been loaded in
the system. The system automatically checks the configuration to ensure that it complies with the activation-key-
enabled features and capacities. If no violation is detected, the alarm is cleared.
When entering sanction state, the system configuration remains unchanged, even after power cycles. However, the
alarms remain hidden until an appropriate activation key is entered or the features and capacities are re-configured
to be within the parameters of the current activation key.
A demo activation key is available that enables all features for 60 days. When the demo activation key expires, the
most recent valid activation key goes into effect. The 60-day period is only counted when the system is powered up.
10 days before the demo activation key expires, an alarm is raised indicating that the demo activation key is about to
expire.
Parameter Definition
Date code Displays a date code used for validation of the current activation key
cipher.
Violation runtime counter In the event of an Activation Key Violation alarm, this field displays
(hours) the number of hours remaining in the 48-hour activation key
violation grace period.
Sanction state If an Activation Key Violation alarm has occurred, and the 48-hour
activation key violation grace period has expired without the system
having been brought into conformance with the activation-key-
enabled capacity and feature set, Yes appears in this field to indicate
that the system is in an Activation Key Violation sanction state. All
other alarms are hidden until the capacity and features in use are
brought within the activation-key-enabled capacity and feature set.
If the activation key cipher is not legal (e.g., a typing mistake or an invalid serial number), an Activation Key Loading
Failure event is sent to the Event Log. When a legal activation key cipher is entered, an Activation Key Loaded
Successfully event is sent to the Event Log.
Note
Activation key reclaim is only available for PTP 820 devices running system release 9.2 or later.
Where the customer has purchased upgrade activation keys, credit is given for the full feature or capacity, not for
each individual upgrade. For example, if the customer purchased two capacity activation keys for 300M and later
purchased one upgrade activation key to 350M, credit is given as if the customer had purchased one activation key
for 350M and one activation key for 300M.
For instructions on how to reclaim an activation key, refer to the User Guide for the Activation Key Management
System, Rev A.15 or later, Chapter 7, Reclaiming an Activation Key.
Note
To display this information in Basic mode, select Platform > Activation
Key and click Show Activation Key Overivew at the bottom of the Activation Key page.
The Activation Key Overview page displays the activation-key-enabled features and capacities for the PTP 820, and
indicates the activation key status of each feature according to the activation key currently implemented in the unit.
Note
Some of the features listed in the Activation Key Overview page may not be supported in the
currently installed software version. For details on feature support, refer to the Release Notes or
Technical Description for the PTP 820 product and System release you are using.
Parameter Definition
Activation key-enabled Indicates whether the feature is allowed under the activation key
feature credit that is currently installed in the unit.
Activation key violation Indicates whether the system configuration violates the currently
status installed activation key with respect to this feature.
Ethernet OAM – Fault Management Enables Connectivity Fault Management (FM) per
Y.1731 (CET mode only).
Ethernet OAM – Performance Monitoring Not relevant in the current systems release.
IEEE 1588 Ordinary Clock (quantity) Not relevant in the current system release.
FE traffic ports (quantity) Displays the number of FE traffic ports allowed under
the current activation key.
GbE traffic ports (quantity) Displays the number of GbE traffic ports allowed under
the current activation key.
ACM (quantity) Displays the number of radio carriers that are allowed
to use ACM under the current activation key. Only
elevant for PTP 820E devices.
Narrow CHBW 1.75MHz script (quantity) Not relevant for all-outdoor devices.
Header De-Duplication (quantity) Displays the number of radio carriers that are allowed
to use Header De-Duplication.
XPIC (quantity) Displays the number of radio carriers that are allowed
to use XPIC. Each carrier in the XPIC pair requires an
XPIC activation key.
Multi-Carrier ABC (quantity) Displays the number of radio carriers that are allowed
to use Multi-Carrier ABC. Each carrier in the Multi-
Carrier ABC group requires a Multi-Carrier ABC
activation key.
AFR 1+0 (quantity) Enables the use of Advanced Frequency Reuse (AFR).
For an AFR 1+0- configuration, two activation keys are
required for the hub site (one per carrier) and one
activation key is required for each tail site.
Payload Encryption AES-256 (quantity) Displays the number of radio carriers that can use of
AES-256 encryption Note that:
If no AES activation key is configured for the unit and
the user attempts to enable AES on a radio carrier, in
addition to an Activation Key Violation alarm the
feature will remain inactive and no encryption will be
performed.
After entering an AES activation key, the user must
reset the unit before AES can be activated. Unit reset is
only necessary for the first AES activation key. If AES
activation keys are acquired later for additional radio
carriers, unit reset is not necessary.
Second core activation Enables the use of the second core on an PTP 820C.
Second core activation for HP Enables the use of the second core on an PTP 820C-
HP.
RFU port activation key Not relevant in the current system release.
Radio capacity level 1 Displays the number of radio carriers for which there is
permission to use up to 10 Mbps. This is the default
level, so every radio carrier on the device has this
capacity level.
Radio capacity level 2 Displays the number of radio carriers for which there is
permission to use up to 50 Mbps.
Radio capacity level 3 Displays the number of radio carriers for which there is
permission to use up to 100 Mbps.
Radio capacity level 4 Displays the number of radio carriers for which there is
permission to use up to 150 Mbps.
Radio capacity level 5 Displays the number of radio carriers for which there is
permission to use up to 200 Mbps.
Radio capacity level 6 Displays the number of radio carriers for which there is
permission to use up to 225 Mbps.
Radio capacity level 7 Displays the number of radio carriers for which there is
permission to use up to 250 Mbps.
Radio capacity level 8 Displays the number of radio carriers for which there is
permission to use up to 300 Mbps.
Radio capacity level 9 Displays the number of radio carriers for which there is
permission to use up to 350 Mbps.
Radio capacity level 10 Displays the number of radio carriers for which there is
permission to use up to 400 Mbps.
Radio capacity level 11 Displays the number of radio carriers for which there is
permission to use up to 450 Mbps.
Radio capacity level 12 Displays the number of radio carriers for which there is
permission to use up to 500 Mbps.
Radio capacity level 13 Displays the number of radio carriers for which there is
permission to use up to 650 Mbps.
Radio capacity level 14 Displays the number of radio carriers for which there is
permission to use up to 1000 Mbps.
Radio capacity level 15 Displays the number of radio carriers for which there is
permission to use up to 1600 Mbps.
Radio capacity level 16 Displays the number of radio carriers for which there is
permission to use up to 2000 Mbps.
Auto State Propagation and LLF Enables the use of Link Loss Forwarding (LLF) with
Automatic State Propagation (ASP). Without the
activation key, only one LLF ID can be configured. This
means that only one ASP pair can be configured per
radio interface or radio group.
Enhanced Multi-Carrier ABC (quantity) Enables the configuration and use of a Multiband
(Enhanced Multi-Carrier ABC) link. Two activation keys
are required per Multiband node, on the PTP 820E.
One of these activation keys is for the radio port, the
other is for the Ethernet port carrying traffic to the unit
paired with the PTP 820E. No activation key is required
for the unit paired with the PTP 820E.
Related Topics:
• Configuring NTP
PTP 820 uses the Universal Time Coordinated (UTC) standard for time and date configuration. UTC is a more updated
and accurate method of date coordination than the earlier date standard, Greenwich Mean Time (GMT).
Every PTP 820 unit holds the UTC offset and daylight savings time information for the location of the unit. Each
management unit presenting the information uses its own UTC offset to present the information in the correct time.
Note
If the unit is powered down, the time and date are saved for 96 hours (four days). If the unit remains
powered down for longer, the time and date may need to be reconfigured.
1. To display and configure the UTC parameters:Select Platform > Management > Time Services in Advanced
mode or Platform > Time Services in Basic mode.. The Time Services page opens.
Parameter Definition
Date & Time UTC Date and Time The UTC date and time.
Configuration
Local Current Date and Read-only. The calculated local date and time, based
Time on the local clock, Universal Time Coordinated (UTC),
and Daylight Savings Time (DST) configurations.
Parameter Definition
Offset from GMT UTC Offset Hours The required hours offset (positive or negative)
relative to GMT. This is used to offset the clock
relative to GMT, according to the global meridian
location.
Daylight Saving Start Month The month when Daylight Savings Time begins.
Time
Day The date in the month when Daylight Savings Time
begins.
Daylight Saving End Month The month when Daylight Savings Time ends.
Time
Day The date in the month when Daylight Savings Time
ends.
DST Offset (Hours) The required offset, in hours, for Daylight Savings
Time. Only positive offset is supported.
By default:
• Ethernet traffic interfaces are disabled and must be manually enabled.
• The Ethernet management interface is enabled.
• Radio interfaces are enabled.
Note
PTP 820S units have a single radio interface.
3. In the Admin status field, select Up to enable the interface or Down to disable the interface.
4. Click Apply, then Close.
3. Click Apply.
Note
The Operational Status field displays the current, actual operational state of the interface (Up or
Down).
The management ports of PTP 820E can be used for traffic as well as management and (except for PTP
820E ESE) PoE. This increases the number of available Ethernet traffic ports for these devices and
enables customers to configure setups in which a single cable is used to carry management, power,
and traffic from the customer equipment to the PTP 820 device.
The following are the relevant ports:
• PTP 820E:
◦ ESP and ESS – Port 1 (Management/PoE/Traffic)
◦ ESE – Port 3 (Management/Traffic)
In most respects, these ports can be used like other Ethernet traffic ports, including:
• Support for Auto Negotiation
• Support for synchronization
• Support for LLDP
• Support for Y.1731 CFM-SOAM
• Support for RMON
Because this interface is used for management, a management service (Service ID 257) and service point
(Service Point ID 1) are configured on the interface and cannot be removed.
A Policer (Policer ID 251) is attached to this service point and cannot be edited or removed.
In order to ensure that the port can be used for traffic services, the Attached Interface Type of the
management service point can be modified from its default value of dot1q untagged.
Leaving the management service point as Untagged will result in untagged data traffic being classified
into the management service. This should be avoided.
The management service point can be changed to dot1q with a specific C-VLAN, or to s-tag or QinQ,
giving you the flexibility to configure services on the interface according to the expected user traffic.
See Editing a Service Point.
Specifically, it is recommended to perform the following service configuration changes:
• Change the VLAN encapsulation of the management service point from
Untagged to a specific VLAN.
• Configure a PIPE service point for data traffic on the management port. This service
point should be untagged (e.g., dot1q-untagged or Bundle-C with “Untagged” as
the C-VLAN encapsulation).
Note
As long as the management service point is configured as dot1q- Untagged, you will be unable to
configure the PIPE service point.
Be very careful when reconfiguring this service point to ensure continued management access. Make
sure that if you change the management service point’s VLAN tagging, management traffic is then
tagged with the same VLAN as the management service point.
.
The following limitations exist for these ports:
• Cannot belong to LAG groups
• Do not support MSTP and G.8032
• Automatic State Propagation can only be used in CSF mode
Phn 3963 013v000
Page 130
Chapter 2: Getting Started PTP 820E Management Interface
To use the PTP 820E management port for traffic, you should perform the following configurations:
• An egress Service Bundle Shaper (Shaper ID 256) is also attached to this service
point. This Shaper cannot be edited, but it can and must be either detached or
disabled on the port in order for the port to support 1G traffic. See Assigning a
Service Bundle Shaper Profile to a Service Bundle.
• Change the port speed from its default value of 100 Mbps to 1 Gbps. See
Configuring Ethernet Interfaces.
• Enable the LOC alarm (Alarm ID 401) for the management port. By default, this alarm
is disabled on the management port and must be manually enabled when using the
port for traffic.
Related Topics:
• Displaying MRMC Status
Multi-Rate Multi-Constellation (MRMC) radio scripts define how the radio utilizes its available capacity. Each script
is a pre-defined collection of configuration settings that specify the radio’s transmit and receive levels, link
modulation, channel spacing, and bit rate. Scripts apply uniform transmit and receive rates that remain constant
regardless of environmental impact on radio operation.
Note
The list of available scripts reflects activation-key-enabled features. Only scripts within your
activation-key-enabled capacity will be displayed.
To display the MRMC scripts and their basic parameters and select a script:
1. Select one of the following, depending on the regulatory framework in which you are operating:
o To display ETSI scripts, select Radio > MRMC > Symmetrical Scripts > ETSI.
o To display ANSI (FCC) scripts, select Radio > MRMC > Symmetrical Scripts > FCC.
The MRMC Symmetrical Scripts page opens. For a description of the parameters displayed in the MRMC
Symmetrical Scripts page, see Configuring the Radio (MRMC) Scripts (s).
Note
PTP 820S and PTP 820E units do not support XPIC or MIMO. For detailed information on the exact
scripts and profiles available per unit type, channel, and configuration, refer to the Release Notes for
the System Release version you are using.
2. In the Select Radio Interface field, select the slot for which you want to configure the script.
Note
This step is only applicable for PTP 820C and PTP 820C-HP units.
3. Select the script you want to assign to the radio. The currently-assigned script is marked by a check mark
(Script ID 1504 in the image above).
4. Click Configure Script. A separate MRMC Symmetrical Scripts page opens similar to the page shown below.
5. In the MRMC Script operational mode field, select the ACM mode: Fixed or Adaptive.
o Fixed ACM mode applies constant Tx and Rx rates. However, unlike regular scripts,
with a Fixed ACM script you can specify a maximum profile to inhibit inefficient
transmission levels.
o In Adaptive ACM mode, Tx and Rx rates are dynamic. An ACM-enabled radio system
automatically chooses which profile to use according to the channel fading
conditions. If you select Adaptive, two fields are displayed enabling you to select
minimum and maximum ACM profiles.
Figure 40 MRMC Symmetrical Scripts Page – Configuration – Adaptive Mode (PTP 820C)
Note
Refer to Configuring the Radio (MRMC) Scrips(s) for a list of available radio profiles.
7. Click Apply.
Note
Changing the script resets the radio interface and affects traffic. Changing the maximum or minimum
profile does not reset the radio interface.
Configuring the Radio (MRMC) Scrips(s) describes the MRMC Symmetrical Scripts page parameters.
Parameter Definition
Modulation Script Indicates whether the script supports Adaptive Coding Modulation (ACM). In
ACM mode, a range of profiles determines Tx and Rx rates. This enables the
radio to modify its transmit and receive levels in response to environmental
conditions.
Multi-Carrier PTP 820C and PTP 820C-HP only. Indicates the Multi-Carrier status of the
script (XPIC, MIMO, or Single-Carrier).
Symmetry Indicates that the script is symmetrical (Normal). Only symmetrical scripts are
supported in the current release.
Standard Indicates whether the script is compatible with ETSI or FCC (ANSI) standards,
or both.
MRMC Script profile Fixed ACM mode only: The profile in which the system will operate.
MRMC Script maximum The maximum profile for the script. For example, if you select a maximum
profile profile of 5, the system will not climb above profile 5, even if channel fading
conditions allow it.
MRMC Script minimum Adaptive ACM mode only: The minimum profile for the script. For example, if
profile you select a minimum profile of 3, the system will not go below profile 3
regardless of the channel fading conditions. The minimum profile cannot be
greater than the maximum profile, but it can be equal to it.
Radio Profiles
Table 7 lists the available radio profiles for PTP 820C, PTP 820C-HP, and PTP 820S. Table 17 lists
the available radio profiles for PTP 820E.
Note
For detailed information on the exact profiles available per unit type, channel, and configuration,
refer to the Release Notes for the software version you are using.
Table 7 Available Radio Profiles for PTP 820C, PTP 820C-HP and PTP 820S
Parameter Definition
Profile 0 QPSK
Profile 1 8 QAM
Profile 2 16 QAM
Profile 3 32 QAM
Profile 4 64 QAM
Parameter Definition
Profile 0 BPSK
Profile 1 QPSK
Profile 2 8 QAM
Profile 3 16 QAM
Profile 4 32 QAM
Profile 5 64 QAM
To facilitate optimal operation in frequency scenarios, PTP 820E include a frequency scanner that enables you to
scan a defined frequency range and determine the current interference level for each channel.
The frequency scanner can be used both in the initial provisioning of the link and at any time after the link has
been provisioned. The scanner determines the interference level for each RX channel. Using this information, you
can select the channels with the least interference, and configure the unit’s frequency accordingly.
When the frequency scan begins, the unit stops receiving traffic until the scan is complete. This means the link is
effectively down while the frequency scanner is operating. Once the frequency scan operation has been
completed, either at the end of a Single Mode scan or by user action in the case of a Continuous scan, the link is
automatically restored at the same frequency settings as before the scan.
Note:
The frequency scanner does not automatically change the link’s frequency settings. These
settings must be changed manually. The frequency scanner simply provides information you can
use in determining the proper frequency configuration.
2. Enter a range for the scan (in MHz) by entering the lower frequency of the range in the Start Frequency
field and the upper frequency of the range in the Stop Frequency field. The range of permissible values is:
o For PTP 820E : 81000-86000 MHz on the high side and 71000-76000 MHz on the low side
Note:
When running the Frequency Scanner on the remote side of a link using in-band management,
make sure to run the Frequency Scanner in Single mode, not Continuous mode. Since the link is
down during the scan, management to the remote site is lost, so that if the scan is run in
Continuous mode, it will not be possible to de-activate the Frequency Scanner.
o Minimum RSL (dBm) – In Continuous Mode, the lowest RSL value measured for the scanned
channel. In Single Mode, the same as the RSL Sample Value.
o Maximum RSL (dBm) – In Continuous Mode, the highest RSL value measured for the scanned
channel. In Single Mode, the same as the RSL Sample Value.
Figure 42 Frequency Scanner Results – Graph Format (PTP 820E – Single Mode)
Note:
Even if you are using the default frequencies, it is mandatory to actually
configure the frequencies.
Note:
If you are using the default values and did not change any other parameters
on the Radio Parameters page, the Apply button will be grayed out. To
activate the Apply button, change any parameter on the page, then change it
back to the desired value.
Note:
This page is only available in Advanced mode. However, the basic radio
parameters can also be configured during link configuration with a Quick
Configuration wizard. See Configuring a Link Using the Quick Configuration
Wizard. You can also configure the basic radio parameters in Basic mode by
selecting Interfaces > Interface Manager, selecting a radio interface, and
clicking Radio Parameters.
o For multi-carrier units, the Radio Parameters page initially displays a table.
o For single-carrier units, a page appears, similar to Error! Reference source not found.36.
For
multi-carrier units, select the carrier in the Radio table and click Edit. A separate Radio Parameters page opens.
The page is essentially identical to the PTP 820S and PTP 820E page, except for the addition of a Radio location
parameter.
c. Click Apply. The system automatically calculates and displays the frequency separation in the TX to RX
frequency separation (MHz) field, based on the configured TX and RX frequencies.
d. Optionally, select Set also remote unit to apply the frequency settings to the remote unit as well as
the local unit.
Note:
If the carrier belongs to a 4x4 MIMO group, an ASD group, an AFR group, or
an XPIC group, you must disable the group before changing the TX or RX
frequency.
For PTP 820E , a frequency scanner is available to scan the frequency range
covered by the currently configured MRMC script and determine the current
interference level for each channel. This enables you to select the best
channel in accordance with current interference levels.
Note:
The voltage at the RSL port is 1.XX where XX is the RSL level. For example:
1.59V means an RSL of -59 dBm. Note that the voltage measured at the RSL
port is not accurate and should be used only as an aid).
Note that the voltage measured at the RSL port is not accurate and should be
used only as an aid)
.
c. To mute the TX output of the radio carrier, select Unmute in the TX Mute field. To unmute the TX
output of the radio carrier, select Off. To configure a timed mute, select Mute with Timer.
If you select Mute with Timer, an additional field appears: Mute timeout (minutes). This field
defines a timer for the mute, in minutes (1-1440). When the timer expires, the mute
automatically ends. This provides a fail-safe mechanism for maintenance operations that
eliminates the possibility of accidently leaving the radio muted after the maintenance has been
completed. By default, the timer is 10 minutes.
Note:
In contrast to an ordinary mute, a timed mute is not persistent. This means that if the
unit is reset, the radio is not muted when the unit comes back online, even if the timer
had not expired. Also, in unit and radio protection configurations, a timed mute is not
copied to the mate unit or radio, and no mismatch alarm is raised if a timed mute is
configured on only one radio in the protection pair.
e. In the Link ID field, enter a unique link identifier from 1 to 65535. The Link ID identifies the link, in
order to distinguish it from other links. If the Link ID is not the same at both sides of the link, a Link ID
Mismatch alarm is raised. If Link ID Mismatch Security is enabled, traffic is also blocked on the link.
See Enabling Link ID Mismatch Security.
f. In the RSL degradation alarm admin field, select Enable if you want the unit to generate an alarm in
the event that the RSL falls beneath the threshold defined in the RSL degradation threshold field. The
range of values is -99 to 0. By default, the alarm is disabled, with a default degradation threshold
of -68 dBm. The RSL degradation alarm is alarm ID 1610, Radio Receive Signal Level is below the
configured threshold.
g. The alarm is cleared when the RSL goes above the configured threshold. The alarm is masked if the
radio interface is disabled, the radio does not exist, or a communication-failure alarm (Alarm ID
#1703) is raised.
h. In the Adaptive TX power admin field, select Enable if you wish the PTP 820 to automatically adjust
power levels on the fly in order to optimize the available capacity at every modulation point. See
Error! Reference source not found..
Note:
The RSL Connector Source field is used in dual-carrier systems to switch between one
carrier and the other when measuring RSL at the BNC connector.
You can configure the unit to block all Ethernet traffic over the radio link in the event of a Link ID mismatch by
enabling Link ID Mismatch Security. When Link ID Mismatch Security is enabled and a Link ID mismatch occurs:
• All Ethernet traffic over the link is blocked.
When planning ACM-based radio links, the radio planner attempts to apply the lowest transmit power that will
perform satisfactorily at the highest level of modulation. During fade conditions requiring a modulation drop, most
radio systems cannot increase transmit power to compensate for the signal degradation, resulting in a deeper
reduction in capacity. The PTP 820 is capable of adjusting power on the fly, and optimizing the available capacity at
every modulation point.
To enable ACM with adaptive transmit power:
1. Select Radio > Radio Parameters. The Radio Parameters page opens.
o For multi-carrier units, the Radio Parameters page initially displays a table as shown
in Figure 26.
o For single-carrier units and units, a page appears, similar to Figure 27 (which shows a
PTP 820C page).
2. For multi-carrier units, select the carrier in the Radio table (see Figure 26) and click Edit. A separate Radio
Parameters page opens. The page is essentially identical to the Single-carrier page, except for the addition of a
Radio location parameter.
3. In the Adaptive TX power admin field, select Enable. The AdaptiveTX power operational status field should
now indicate Up to indicate that the feature is fully functional.
Note
Adaptive TX Power only operates when the MRMC script is configured to Adaptive mode. If the script
is configured to Fixed mode (or Adaptive mode with the Minimum and Maximum Profile set to the
same value), you can set Adaptive TX Power to Enable, but the Adaptive TX power operational
status field will indicate Down.
Note
This feature is only relevant for PTP 820C, PTP 820C-HP, and PTP 820S units.
FIPS 140-2 compliance is only available with the PTP 820 Assured platform.
The PTP 820 Assured Platform is supported by System release 8.3 and 10.9.6. It is not supported by
System release 11.1.
PTP 820C, PTP 820C-HP, and PTP 820S can be configured to be FIPS 140-2-compliant in specific hardware and
software configurations, as described in this section.
Note
To display the part numbers of the hardware components of your PTP 820 unit, see Displaying Unit
Inventory.
Unit redundancy configurations can be configured to be FIPS 140-2-compliant. This requires encryption of the
protection link between the two units. See Encrypting the External Protection Link.
A Special labels must be affixed to a FIPS-compliant PTP 820C or PTP 820S unit. These labels are tamper-evident
and must be applied in such a way that it is not possible to remove the diplexer unit from the radio unit without
also removing a label and leaving evidence that the label was tampered with. This label must be replaced if the SM
card is replaced. Replacement labels can be ordered from Cambium Networks, part number BS-0341-2. Tamper-
evident labels should be inspected for integrity at least once every six months. For further details, refer to the PTP
820C Installation Guide or the PTP 820S Installation Guide.
The Import/Export security settings field determines whether security configurations are included in configuration
backup files. To enhance unit security, it is recommended to select Enable in this field, so that security
configurations will not be included in backup files. When you are finished, click Apply.
In the FIPS admin configuration field, select Enable.
2 Click Apply.
Note
Changing the FIPS configuration causes a unit reset.
Note
You can use the following CLI command to display a list of mismatched parameters:
root> platform management protection show mismatch details
• Configure a new pre-shared key on the active unit. To configure a protection key:
o Verify that the web interface protocol for accessing the unit is configured to HTTPS. See
Configuring X.509 CSR Certificates and HTTPS.
o Select Platform > Unit Redundancy. The Unit Redundancy page opens.
o In the Protection Pre-Shared Key field, enter a 32-character key. The key must be exactly 32
characters.
o Click Apply. The key is automatically copied to the standby unit.
Note
Communication with the standby unit may be lost for a few seconds while the key is being copied.
To clear the user-defined protection pre-shared key and restore it to its default value, enter the following CLI
command in root view:
root> platform management protection clear pre-shared-key
At this point in the configuration process, you should configure any interface groups that need to be set up
according to your network plan. For details on available grouping and other configuration options, as well as
configuration instructions, see System Configurations.
In order to pass traffic through the PTP 820, you must configure Ethernet traffic services. For configuration
instructions, see Configuring Ethernet Service(s).
Note
Multi-Carrier ABC, XPIC, MIMO, and Space Diversity are only supported with PTP 820C. HSB radio
protection is only supported with PTP 820C and PTP 820S
System Configurations
This section lists the basic system configurations and the PTP 820 product types that support them, as well as links to
configuration instructions.
Link Aggregation (LAG) PTP 820C/S Configuring Link Aggregation (LAG) and LACP
HSB Radio Protection PTP 820C/S/C- Configuring Unit Protection with HSB Radio
HP
1+1 HSB with Space PTP 820C Configuring 1+1 HSB with Space Diversity
Diversity
MIMO and Space Diversity PTP 820C Configuring MIMO and Space Diversity
ASD 2+0 (XPIC) PTP 820C Configuring Advanced Space Diversity (ASD)
PTP 820C-HP
AFR 1+0 PTP 820C (hub Configuring Advanced Frequency Reuse (AFR)
site or tail
site)
PTP 820S (tail
site only)
PTP 820C/PTP 820C-HP in PTP 820C/C- Operating a PTP 820C in Single Radio Carrier Mode
Single Radio Carrier Mode HP
Device View
Device View is similar to the Chassis Configuration page in Advanced mode. From Device view, you can perform the
following actions:
• Reset the unit. See Performing a Hard (Cold) Reset.
• Set the unit to its default factory configuration settings. See Setting the Unit to the Factory Default
Configuration.
Unit Summary
The Unit Summary page gathers the unit parameters, current alarms, and unit inventory information on a single page
for quick viewing. For details, see The Unit Summary Page.
Quick Configuration
The Quick Configuration menu includes two options for quick configuration of an PTP 820 unit:
• From System Release – Enables you apply a pre-defined configuration file that was created using System
Release. See Applying a Pre-Defined Configuration File.
• PIPE Wizards – Opens sub-menus from which you can access a collection of Quick Configuration wizards, that
guide you through the process of configuring most types of PTP 820 links, from simple 1+0 links to more
complex Multi-Carrier ABC and Multiband links. For a full description of these wizards and step-by-step
instructions for using each wizard, see Configuring a Link Using the Quick Configuration Wizard.
Platform
From the Platform menu, you can access pages that enable you to configure the unit, including:
• Unit Parameters Page – Display and configure unit information, such as unit name and description, language,
measurement format, and unit temperature and voltage input.
• Software Versions & Upgrade Page – Display the current System release version and perform software
upgrades.
• Time Services Page – Configure the unit’s time and date settings.
• IP Configuration Page – Configure the unit’s IP address and enable or disable in-band management.
• Activation Key Page – Configure the unit’s activation key and display current activation key coverage.
• Security Pages – Configure unit acess settings, including protocols for accessing the unit, login parameters,
users, SNMP settings, and password settings.
IP Configuration Page
In the IP Configuration page, you can configure the unit’s IP address and related parameters. You can also enable or
disable in-band management.
For an explanation of IP configuration, see Changing the Management IP Address. For an explanation of in-band
management, see Configuring In-Band Management.
Security Pages
From the Security menu, you can access pages that enable you to configure the unit, including:
• General Parameters Page – Enable and disable import and export of security settings, configure the session
timeout, and configure a login banner.
• Protocols Page – Configure the HTTP type, Telnet blocking, and SNMP parameters.
• Access Control Page – Configure users and login settings.
Protocols Page
In the Protocols page, you can configure the HTTP type, Telnet blocking, and SNMP parameters. For more details
about these settings, see Quick Security Configuration – Protocols Page.
To configure user profiles, click Access Control User Profiles. The Access Control User Profiles page opens. For details,
see Configuring User Profiles.
Figure 58: Basic Mode – Security – Access Control User Profiles Page
Interfaces
From the Interfaces menu, you can select Interface Manager to display the Interface Manager page.
From the Interface Manager page,you can perform the following interface configurations:
Enable and disable interfaces – select the interface and click Interface Admin. See Enabling the Interfaces (Interface
Manager).
Configure the radio parameters of a radio interace – select the interface and click Radio Parameters. See Configuring
the Radio Parameters.
Configure the MRMC script of a radio interace – select the interface and click
Radio MRMC. See Configuring the Radio (MRMC) Script(s).
Display status parameters of a radio interace – select the interface and click
Radio Status. See Viewing the Radio Status and Settings.
Configure the physical parameters of an Ethernet interace – select the interface and click Physical Interface. See
Configuring Ethernet Interfaces.
Configure the basic ingress classification parameters of an interace – select the interface and click Basic QoS. See
Configuring Ingress Path Classification on a Logical Interface.
Services
The Services menu enables you to create Ethernet services.
To configure Ethernet services, click Ethernet Services. For information about configuring Ethernet services, see
Configuring Ethernet Service(s).
Faults
The Faults menu includes options to display current alarms and the event log.
To display current alarms, click Current Alarms. For information about alarms, see
Viewing Current Alarms.
To display the event log, click Event Log. For information about the event log, see
Viewing and Saving the Event Log.
Performance Monitoring
From the Performance Monitoring menu, you can access pages that display important information about link
performance, including:
• RMON
• Signal Level
• MSE
• MRMC
• Capacity/Throughput
• Utilization
• Frame Error Rate
RMON
To display RMON statistics, click RMON. For further information, see Viewing Ethernet PMs and Statistics.
Signal Level
To display Signal Level PMs and define Signal Level PM thresholds, click Signal Level. For further information, see
Displaying Signal Level PMs and Configuring Signal Level PM Thresholds.
MSE
To display MSE PMs and define MSE PM thresholds, click MSE. For further information, see Displaying MSE PMs and
Configuring MSE PM Thresholds.
MRMC
You can display the minimum and maximum ACM profile and the minimum and maximum bitrate (throughput) per
15-minute or daily intervals. You can also define two ACM profile thresholds for each radio carrier, and display the
number of seconds per interval that the radio’s ACM profile was below each of these thresholds.
To display ACM profile PMs and define ACM profile thresholds, click MRMC. For further information, see Displaying
MRMC PMs and Configuring ACM Profile Thresholds.
Capacity/Throughput
To display capacity and throughput PMs and define capacity and throughput thresholds, click Capacity/Throughput.
For further information, see Displaying Capacity and Throughput PMs.
Utilization
To display utilization PMs and define utilization thresholds, click Utilization. For further information, see Displaying
Frame Error Rate PMs.
Radio Loopback
To perform radio loopback, the radio must be set to its maximum TX power. For reliable loopback results, the
loopback should performed with the modulation at 1024 QAM or lower.To perform radio loopback, click
Radio Loopback. For further information, see
Performing Radio Loopback.
Unit InfoYou can generate a Unit Information file, which includes technical data about the unit. This file can be
uploaded and forwarded to customer support, at their request, to help in analyzing issues that may occur.
You can upload the Unit Information file using HTTP, HTTPS, FTP, or SFTP.
For troubleshooting, it is important that an updated configuration file
be included in User Info files that are sent to customer support. To ensure that an up-to-date configuration
file is included, it is recommended to back up the unit’s configuration before generating the Unit Info file.
To generate a Unit Information file, click Create & Export Unit Info. For further information, see Uploading Unit
Info.
Configuration Management
You can import and export PTP 820 configuration files. This enables you to copy the system configuration to
multiple PTP 820 units. You can also backup and save configuration files. Importing and exporting configuration
files can be done using HTTP, HTTPS, FTP, or SFTP.
Basic mode combines the actions required to perform configuration management into a single Web EMS page. To
display this page, click Configuration Management. For further information, see Backing Up and Restoring
Configurations.
Note
1+0 Repeater links and Multi-Carrier ABC are only available for PTP 820C dual-carrier units.
• Multiband – Configures a link that bundles E-Band and microwave radios in a single group that is shared with
an Ethernet interface. A Multiband link uses an PTP 820E and an PTP 820C, PTP 820C-HP, PTP 820S, or third-
party microwave unit. The Multiband group is only configured on the PTP 820E unit. See Configuring a
Multiband (Enhanced Multi-Carrier ABC) Link Using the Quick Configuration Wizard.
Because the Quick Configuration wizard creates Pipe links, you cannot add an interface to a link using the Quick
Configuration wizard if any service points are attached to the interface prior to configuring the link. See Deleting a
Service Point.
2 In the Pipe Type field, select the Attached Interface type for the service that will connect the radio and
Ethernet interfaces. Options are:
o s-tag – All VLANs and untagged frames are classified into the service.
o dot1q - All C-VLANs and untagged frames are classified into the service.
Note
For a full explanation of Ethernet Services, service types, and attached interface types, see
Configuring Ethernet Service(s).
3 In the Ethernet Interface field, select an Ethernet interface or LAG for the link for the link.
Note
To create a LAG, click Create LAG. The Create LAG Group page opens. For instructions on creating
LAG groups, see Configuring Link Aggregation (LAG) and LACP.
5 In the Radio Interface field, select a radio interface for the link.
6 Click Next. Page 3 of the 1+0 Quick Configuration wizard opens.
7 In the TX Frequency (MHz) field, set the transmission radio frequency in MHz.
8 In the RX Frequency (MHz) field, set the received radio frequency in MHz.
Note
If the carrier belongs to a 4x4 MIMO group, an ASD group, an AFR group, or an XPIC group, you must
disable the group before changing the TX or RX frequency.
For PTP 820E a frequency scanner is available to scan the frequency range covered by the currently
configured MRMC script and determine the current interference level for each channel. This enables
you to select the best channel in accordance with current interference levels. See Running the
Frequency Scanner (PTP 820E).
9 In the TX Level (dBm) field, enter the desired TX signal level (TSL). The range of values depends on the
frequency and RFU type.
10 To mute the TX output of the RFU, select On in the TX mute field. To unmute the TX output of the RFU, select
Off.
21 Click Next. of the 1+0 Quick Configuration wizard opens.
12 In the Script ID field, select the MRMC script you want to assign to the radio. For a full explanation of
choosing an MRMC script, see Configuring the Radio (MRMC) Script(s).
13 In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
o Fixed ACM mode applies constant TX and RX rates. However, unlike regular scripts,
with a Fixed ACM script you can specify a maximum profile to inhibit inefficient
transmission levels.
o In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled radio system
automatically chooses which profile to use according to the channel fading
conditions.
14 Do one of the following:
o If you selected Fixed in the Operational Mode field, the next field is Profile. Select
the ACM profile for the radio in the Profile field.
o If you selected Adaptive in the Operational Mode field, the following two fields are
displayed:
- Maximum Profile: Enter the maximum profile for the script. See Configuring the Radio (MRMC)
Script(s).
- Minimum Profile: Enter the minimum profile for the script. See Configuring the Radio (MRMC)
Script(s).
15 Click Next. Page 5 of the 1+0 Quick Configuration wizard opens.
16 In the In Band Management field, select Yes to configure in-band management, or No if you do not need in-
band management. If you select Yes, the Management VLAN field appears.
17 If you selected Yes in the In Band Management field, select the management VLAN in the Management
VLAN field.
Note
You can only select Untagged if you are not using IP Forwarding. If you select Untagged and
you want to configure IP Forwarding later, you will first have to change Untagged to a specific
VLAN. See Mate Management Access (IP Forwarding) (CLI).
18 If you want to use the Ethernet interface as well as the radio interface for in-band management, select In
Band includes Ethernet interface.
19 Click Finish. Page 5 of the 1+0 Quick Configuration wizard opens. This page displays the parameters you have
selected for the link.
3 To complete configuration of the link, click Submit. If you want to go back and change any of the parameters,
click Back. After you click Submit, the unit is reset.
2 In the Radio #1 Interface field, select the first radio interface for the link.
3 Click Next. Page 2 of the 1+0 Repeater Quick Configuration wizard opens.
4 In the Radio #2 Interface field, select the second radio interface for the link.
5 In the Pipe Type field, select the Attached Interface type for the service that will connect the radios. Options
are:
o s-tag – All S-VLANs and untagged frames are classified into the service
o dot1q - – All C-VLANs and untagged frames are classified into the service.
Note
For a full explanation of Ethernet Services, service types, and attached interface types, see
Configuring Ethernet Service(s).
6 Click Next. Page 3 of the 1+0 Repeater Quick Configuration wizard opens.
Note
For PTP 820E a frequency scanner is available to scan the frequency range covered by the currently
configured MRMC script and determine the current interference level for each channel. This enables
you to select the best channel in accordance with current interference levels. See Running the
Frequency Scanner (PTP 820E).
III. In the TX Level (dBm) field, enter the desired TX signal level (TSL). The range of values
depends on the frequency and RFU type.
IV. To mute the TX output of the radio, select Mute in the TX mute field. To unmute the TX
output of the radio, select Unmute.
8 Click Next. Page 4 of the 1+0 Repeater Quick Configuration wizard opens.
11 In the In Band Management field, select Yes to configure in-band management, or No if you do not need in-
band management. If you select Yes, the Management VLAN field appears.
12 If you selected Yes in the In Band Management field, select the management VLAN in the Management
VLAN field. Management will be available through both radio interfaces.
Note
You can only select Untagged if you are not using IP Forwarding. If you select Untagged and you want
to configure IP Forwarding later, you will first have to change Untagged to a specific VLAN. See Mate
Management Access (IP Forwarding) (CLI).
13 Click Finish. Page 6 of the 1+0 Repeater Quick Configuration wizard opens. This page displays the parameters
you have selected for the link.
14 To complete configuration of the link, click Submit. If you want to go back and change any of the parameters,
click Back. After you click Submit, the unit is reset.
2. In the First PIPE Type field, select the Attached Interface type for the service that will connect the first
Ethernet interface and the first radio interface. Options are:
◦ s-tag – All S-VLANs and untagged frames are classified into the service.
◦ dot1q – All C-VLANs and untagged frames are classified into the service.
Note
For a full explanation of Ethernet Services, service types, and attached interface types, see
Configuring Ethernet Service(s).
3. In the Ethernet Interface field, select the Ethernet interface or a LAG that will send and receive traffic to and
from the first radio interface.
Note
To create a LAG, click Create LAG. The Create LAG Group page opens. For instructions on
creating LAG groups, see Configuring Link Aggregation (LAG) and LACP.
5. In the First Radio Interface field, select the radio interface for the first link.
6. Click Next. Page 3 of the 2 X (1 + 0) Quick Configuration wizard opens.
7. In the Second PIPE Type field, select the Attached Interface type for the service that will connect the second
Ethernet interface and the second radio interface. Options are:
◦ s-tag – All S-VLANs and untagged frames are classified into the service.
◦ dot1q – All C-VLANs and untagged frames are classified into the service.
Note
For a full explanation of Ethernet Services, service types, and attached interface types, see
Configuring Ethernet Service(s)
8. In the Ethernet Interface field, select an Ethernet interface or a LAG that will send and receive traffic to and
from the second radio interface.
Note
To create a LAG, click Create LAG. The Create LAG Group page opens. For instructions on
creating LAG groups, see Configuring Link Aggregation (LAG) and LACP.
10. In the Second Radio Interface field, select the radio interface for the second link.
11. Click Next. Page 5 of the 2 X (1 + 0) Quick Configuration wizard opens.
12. If you want to set up an XPIC configuration, select XPIC. For full instructions on configuring XPIC, including
antenna alignment instructions, see Configuring XPIC.
14. You can configure the basic radio parameters for each interface. If you selected XPIC in the Radio XPIC
Configuration page, configure the parameters for the group rather than the individual interfaces.
15. For each radio interface or XPIC group, configure the following radio parameters.
i In the TX Frequency (MHz) field, set the transmission radio frequency in MHz.
ii In the RX Frequency (MHz) field, set the received radio frequency in MHz.
iii In the TX Level (dBm) field, enter the desired TX signal level (TSL). The range of values depends on the
frequency and RFU type.
iv To mute the TX output of the radio, select Mute in the TX mute field. To unmute the TX output of the radio,
select Unmute.
16. Click Next. Page 7 of the 2 X (1 + 0) Quick Configuration wizard opens.
17. You can configure the MRMC script parameters for each interface. For an XPIC group, configure the
parameters for the group rather than the individual interfaces.
18. For each interface or XPIC group, configure the following MRMC script parameters.
i In the Script ID field, select the MRMC script you want to assign to the radio or XPIC group. For a full
explanation of choosing an MRMC script, see Configuring the Radio (MRMC) Script(s).
ii In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
◦ Fixed ACM mode applies constant TX and RX rates. However, unlike
regular scripts, with a Fixed ACM script you can specify a maximum profile
to inhibit inefficient transmission levels.
◦ In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled
radio system automatically chooses which profile to use according to the
channel fading conditions.
iii Do one of the following:
◦ If you selected Fixed in the Operational Mode field, the next field is Profile.
Select the ACM profile in the Profile field.
◦ If you selected Adaptive in the Operational Mode field, the following two
fields are displayed:
◦ Maximum profile – Enter the maximum profile for the script. See
Configuring the Radio (MRMC) Script(s).
◦ Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
19. Click Next. Page 8 of the 2 X (1 + 0) Quick Configuration wizard opens.
20. In the First In Band Management field, select Yes to configure in-band management for the first 1+0 link, or
No if you do not need in-band management for this link. If you select Yes, the Management VLAN field
appears.
21. If you selected Yes in the In Band Management field, select the management VLAN in the Management VLAN
field.
Note
You can only select Untagged if you are not using IP Forwarding. If you select Untagged and
you want to configure IP Forwarding later, you will first have to change Untagged to a specific
VLAN. See Mate Management Access (IP Forwarding) (CLI)
22. If you want to use the Ethernet interface as well as the radio interface for in-band management, select In
Band includes Ethernet interface.
23. Click Next. Page 9 of the 2 X (1 + 0) Quick Configuration wizard opens.
24. In the Second In Band Management field, select Yes to configure in-band management for the second 1+0
link, or No if you do not need in-band management for this link. If you select Yes, the Management VLAN field
appears.
25. If you selected Yes in the In Band Management field, select the management VLAN in the Management VLAN
field.
Note
You can only select Untagged if you are not using IP Forwarding. If you select Untagged and
you want to configure IP Forwarding later, you will first have to change Untagged to a specific
VLAN. See Mate Management Access (IP Forwarding) (CLI)
26. If you want to use the Ethernet interface as well as the radio interface for in-band management, select In
Band includes Ethernet interface.
27. Click Finish. The Summary page opens. This page displays the parameters you have selected for the group.
28. To complete configuration of the links, click Submit. If you want to go back and change any of the parameters,
click Back. After you click Submit, the unit is reset.
1 In the Ethernet Interface field, select an Ethernet interface or a LAG for the group.
Note
To create a LAG, click Create LAG. The Create LAG Group page opens. For instructions on creating
LAG groups, see Configuring Link Aggregation (LAG) and LACP.
2 In the Radio #1 Interface field, select the first radio interface for the group.
Note
The Number of Radio Interfaces field is read-only.
3 In the Pipe Type field, select the Attached Interface type for the service that will connect the radio and
Ethernet interfaces. Options are:
o s-tag – All S-VLANs and untagged frames are classified into the service.
o dot1q – All C-VLANs and untagged frames are classified into the service.
Note
For a full explanation of Ethernet Services, service types, and attached interface types, see
Configuring Ethernet Service(s).
Figure 105 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio #2 Selection Page
5 In the Radio #2 Interface field, select the second radio interface for the group.
6 Click Next. The Radio XPIC Configuration page opens. If you want to set up an XPIC configuration, select the
radio pair. For full instructions on configuring XPIC, including antenna alignment instructions, see
Configuring XPIC.
Figure 106 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio XPIC Configuration Page
7 Click Next. The Radio Parameters Configuration page opens. You can configure the basic radio parameters
for each interface. If you selected XPIC in the Radio XPIC Configuration page, you configure the parameters
for the group rather than the individual interfaces.
Figure 107 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters Configuration Page
Figure 108 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio Parameters Configuration Page (XPIC)
8 For each interface or XPIC group, configure the following radio parameters.
I. In the TX Frequency (MHz) field, set the transmission radio frequency in MHz.
II. In the RX Frequency (MHz) field, set the received radio frequency in MHz.
Note
For PTP 820E a frequency scanner is available to scan the frequency range covered by the
currently configured MRMC script and determine the current interference level for each
channel. This enables you to select the best channel in accordance with current interference
levels. See Running the Frequency Scanner (PTP 820E).
III. In the TX Level (dBm) field, enter the desired TX signal level (TSL). The range of values depends on the
frequency and RFU type.
IV. To mute the TX output of the Radio, select Mute in the TX mute field. To unmute the TX output of the
Radio, select Unmute.
9 Click Next. The Radio MRMC Script Configuration page opens. You can configure the MRMC script
parameters for each interface. For an XPIC group, you configure the parameters for the group rather than
the individual interfaces.
Figure 109 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script Configuration Page
Figure 110 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Radio MRMC Script Configuration Page - XPIC
10 For each interface or XPIC group, configure the following MRMC script parameters:
I. In the Script ID field, select the MRMC script you want to assign to the radio or XPIC group. For a full
explanation of choosing an MRMC script, see Configuring the Radio (MRMC) Script(s).
II. In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
o Fixed ACM mode applies constant TX and RX rates. However, unlike regular scripts, with a Fixed
ACM script you can specify a maximum profile to inhibit inefficient transmission levels.
o In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled radio system automatically
chooses which profile to use according to the channel fading conditions.
III. Do one of the following:
o If you selected Fixed in the Operational Mode field, the next field is Profile. Select the ACM profile
in the Profile field.
o If you selected Adaptive in the Operational Mode field, the following fields are displayed:
- Maximum Profile: Enter the maximum profile for the script. See Configuring the Radio
(MRMC) Script(s).
- Maximum Profile: Enter the maximum profile for the script. See Configuring the Radio
(MRMC) Script(s).
11 Click Next. The Management Configuration page opens.
Figure 111 2 + 0 Multi Carrier ABC Quick Configuration Wizard – Management Configuration Page
12 In the In Band Management field, select Yes to configure in-band management, or No if you do not need in-
band management. If you select Yes, the Management VLAN field appears.
13 If you selected Yes in the In Band Management field, select the management VLAN in the Management
VLAN field.
Note
You can only select Untagged if you are not using IP Forwarding. If you select Untagged and
you want to configure IP Forwarding later, you will first have to change Untagged to a specific
VLAN. See Mate Management Access (IP Forwarding) (CLI).
14 If you want to use the Ethernet interface as well as the radio interface for in-band management, select In
Band includes Ethernet interface.
15 Click Finish. The Summary page opens. This page displays the parameters you have selected for the group.
Figure 112 2 + 0 Multi Carrier ABC Quick Configuration Wizard –Summary Page
16 To complete configuration of the Multi-Carrier ABC group, click Submit. If you want to go back and change
any of the parameters, click Back. After you click Submit, the unit is reset.
5 In the Pipe Type field, select the Attached Interface type for the service that will connect the radio and
Ethernet interfaces. Options are:
◦ s-tag – All S-VLANs and untagged frames are classified into the service.
◦ dot1q – All C-VLANs and untagged frames are classified into the service.
Note
For a full explanation of Ethernet Services, service types, and attached interface types, see
Configuring Ethernet Service(s).
6 In the Ethernet Interface field, select the port connected to the external switch. This should be Ethernet: Slot
1, Port 1.
7 In the Radio #1 Interface field, select Radio: Slot 2, Port 1.
8 Click Next. Page 2 of the Multiband Quick Configuration wizard opens.
10 In the Maximum Bandwidth (Mbps) field, select the maximum traffic that the PTP 820E will pass to the paired
unit.
◦ When using Fixed ACM mode, set this parameter to the actual rate you
want the paired unit to broadcast.
◦ When using Adaptive ACM mode, set this parameter to the maximum of
the paired unit’s capacity.
The default value is 1000 Mbps.
Note
The Maximum Bandwidth represents the L1 capacity of the radio link connected to the Ethernet
member. The actual bandwidth that will be available for traffic is less due to overhead.
When using a third-party radio as the paired unit, it is particularly important to set this
parameter properly in order to ensure optimal performance. Failure to properly set this
parameter may lead to frequent pauses as the queue fills up during low capacity periods,
such as when weather conditions cause the ACM profile to drop.
11 Click Next. Page 3 of the Multiband Quick Configuration wizard opens.
14 In the Script ID field, select the MRMC script you want to assign to the radio or XPIC group. For a full
explanation of choosing an MRMC script, see Configuring the Radio (MRMC) Script(s).
15 In the Operational Mode field, select the ACM mode: Fixed or Adaptive.
◦ Fixed ACM mode applies constant TX and RX rates. However, unlike
regular scripts, with a Fixed ACM script you can specify a maximum profile
to inhibit inefficient transmission levels.
◦ In Adaptive ACM mode, TX and RX rates are dynamic. An ACM-enabled
radio system automatically chooses which profile to use according to the
channel fading conditions.
16 Do one of the following:
◦ If you selected Fixed in the Operational Mode field, the next field is Profile.
Select the ACM profile in the Profile field.
◦ If you selected Adaptive in the Operational Mode field, the following two
fields are displayed:
◦ Maximum profile – Enter the maximum profile for the script. See
Configuring the Radio (MRMC) Script(s).
◦ Minimum profile – Enter the minimum profile for the script. See
Configuring the Radio (MRMC) Script(s).
18 In the In Band Management field, select Yes to configure in-band management, or No if you do not need in-
band management. If you select Yes, the Management VLAN field appears.
19 If you selected Yes in the In Band Management field, select the management VLAN in the Management VLAN
field.
Note
You can only select Untagged if you are not using IP Forwarding. If you select Untagged and
you want to configure IP Forwarding later, you will first have to change Untagged to a specific
VLAN. See Mate Management Access (IP Forwarding) (CLI).
20 If you want to use the Ethernet interface as well as the radio interface for in-band management, select In Band
includes Ethernet interface.
Note
If you want to manage the via the PTP 820E, refer to the instructions in Inband Management via
the PTP 820E.
21 Click Finish. The Summary page opens. This page displays the parameters you have selected for the group.
22 To complete configuration of the Multiband group on the PTP 820E, click Submit. If you want to go back and
change any of the parameters, click Back. After you click Submit, the unit is reset.
Note
After adding Eth2 to the Multiband group, an alarm is raised (Alarm 1794). This alarm is cleared
when the unit is reset.
After configuring the Multiband group on the PTP 820E, you must perform the following configurations on the PTP
820C, PTP 820C-HP, or PTP 820S:
1 Configure a Pipe service between the Ethernet port connected to the PTP 820E and the radio or Multi-Carrier
ABC group. See Configuring Ethernet Service(s).
Note
If the paired unit is an PTP 820C, PTP 820C-HP, PTP 820S, or third-party microwave radio, the service
must be a Pipe service.
2 Configure Automatic State Propagation with ASP trigger by remote fault enabled. See Configuring Automatic
State Propagation and Link Loss Forwarding.
3 Configure Bandwidth Notification:
i Select Ethernet > Protocols > Bandwidth Notification. The Bandwidth Notification page opens.
iii In the Name field, select a descriptive name. In the Protocol Type field, select Radio BNM.
iv In the Name field, select a descriptive name.
v In the Admin field, select Up.
vi In the Monitored Interface field, select the interface or group connected to the PTP 820E.
Vii In the TX VLAN Type field, select the VLAN type that will be used in bandwidth notification
messages. Options are:
◦ C-Vlan
◦ S-Vlan
vii In the TX VLAN field, select the VLAN to be used in bandwidth notification
Note
You should configure the same VLAN encapsulation as the radio service point attached to the service
for the Multiband group. For example, if the service point on the radio interface is C-Vlan 20, select
C-Vlan in the TX VLAN Type field and 20 in the TX VLAN field.
vii Click Apply. The configuration is added to the Bandwidth Notification page with the Protocol Type Radio
BNM.
This section provides instructions for configuring links, link groups, and protection manually, using Advanced
mode.
Most link configurations can be configured using Quick Configuration wizards, and it is recommended to do so
whenever possible. See Configuring a Link Using the Quick Configuration Wizard.
Note
This option is only relevant for PTP 820C and PTP 820C-HP units.
2. Click Create Group. The first page of the Create ABC Group wizard opens.
3. Optionally, enter a descriptive name for the group in the Group Name field.
4. In the Minimum bandwidth field, select Enable to enable Minimum Bandwidth Override or Disable to disable
Minimum Bandwidth Override.
5. In the Minimum bandwidth threshold field, enter the minimum bandwidth override threshold (in Mbps). The
threshold can be between 0 – 20000 Mbps, with a resolution of 1 Mbps. If the group’s bandwidth capacity falls
beneath this threshold, the group is automatically placed in Down state until the bandwidth capacity exceeds
this threshold.
Note
For an explanation of Multi-Carrier ABC Minimum Bandwidth Override, see Configuring the Multi-
Carrier ABC Minimum Bandwidth Override Option.
6. Click Next. The next page of the Create Group wizard opens.
Note
Although you may select the Radio members in any order you wish, ABC configuration will not
succeed unless Radio slot 2 port 1 is selected first and Radio slot 2 port 2 is selected second.
8. Click Next. The next page of the Create Group wizard opens.
9. In the Member 2 field, select a radio interface.
10. Click Next. A summary page opens.
11. Click Submit, A message appears indicating whether or not the operation was successful.
12. Click Close to close the Create Group wizard. You must click Submit before clicking Close, or the selections you
made will be discarded and the process cancelled.
Note
When using in-band management, management is lost in the event of radio failure and returns when
the radio link is restored.
The minimum bandwidth threshold is based on the capacity of the Multi-Carrier ABC group, not the
combined capacities of the group’s members. The group’s aggregated capacity is displayed in the
Multi-Carrier ABC Group – Edit Group page (Figure 63).
You can configure Multi-Carrier ABC Minimum Bandwidth Override when creating the group. See Configuring a
Multi-Carrier ABC Group.
To configure Multi-Carrier ABC Minimum Bandwidth Override after the group has been created:
1. Select the group in the Multi-Carrier ABC table and click Edit Group. The Edit Group page opens.
2. In the Minimum bandwidth field, select Enable to enable Minimum Bandwidth Override or Disable to disable
Minimum Bandwidth Override.
3. In the Minimum bandwidth threshold field, enter the minimum bandwidth override threshold (in Mbps). If
the group’s bandwidth capacity falls beneath this threshold, the group is automatically placed in Down state
until the bandwidth capacity exceeds this threshold.
4. Click Apply.
Note
Although you may select the Radio members in any order you wish, member removal will not
succeed unless Radio slot 2 port 1 is removed first and Radio slot 2 port 2 is removed second.
3. Click Apply.
4. Repeat these steps to remove additional members from the group.
Multiband Overview
Multiband bundles E-Band and microwave radios in a single group that is shared with an Ethernet interface. This
provides an Ethernet link over the radio with capacity of up to 2.5 Gbps. A Multiband link is highly resilient because
the microwave link acts, in effect, as a backup for the E-Band link.
In the event of radio failure in one device, the other device continues to operate to the extent of its available
capacity. Thus, operators benefit from both the high capacity of E-Band and the high reliability of microwave.
Notes:
LLDP is not supported between Eth2 of the PTP 820E and Eth2 of the IP 20C, PTP 820C-HP, or
PTP 820S in Multiband configurations.
Multiband with version 10.5 is not compatible over the link with Multiband using earlier
versions, and Multiband with version 10.7 and higher is not compatible over the link with
Multiband using earlier versions. Therefore, when upgrading the software on a Multiband link to
10.5 or to 10.7 or higher from an earlier version, make sure to upgrade the remote unit first
when using inband management to avoid loss of management.
Multiband Operation
A Multiband node consists of an PTP 820E unit and an PTP 820C, PTP 820C-HP, or PTP 820S unit or a third-party
microwave radio.
Note
Multiband is also supported with PTP 850E. For more information and configuration instructions, refer
to the User Guide for PTP 850E, System Release 10.9.5 or higher.
In a Multiband configuration, all traffic enters the node via the 10G port on the PTP 820E (Eth1). Traffic is passed to
a Multiband group that includes Eth2 and the radio carrier.
The unit paired with the PTP 820E acts as a pipe. When traffic is passed from the PTP 820E to the paired unit, it is
transmitted via Eth2 on the PTP 820E to either a single radio carrier or 2+0 Multi-Carrier ABC group, and
transmitted. To ensure a smooth traffic flow, certain configurations must be performed on the paired unit.
When the PTP 820E is paired with an PTP 820 microwave unit, the following must be configured on the PTP 820
microwave unit:
• A service must be configured between the Ethernet port connected to the PTP 820E and the radio or
Multi-Carrier ABC group being used for the Multiband link.
Note:
If the paired unit is an PTP 820C, PTP 820C-HP, PTP 820S, or third-party microwave radio, the
service must be a Pipe service.
• Automatic State Propagation, with ASP trigger by remote fault enabled.
• Radio BNM.
When the PTP 820E is paired with a third-party unit, the following must be configured on the third-party unit:
• The unit’s switching mechanism must be set to Pipe mode and a Pipe service must be configured between
the Ethernet port connected to the PTP 820E and the paired unit’s radio or radio group.
• Automatic State Propagation must be enabled.
• 802.3X Flow Control must be enabled.
A Pipe service must be configured between the Ethernet port connected to the PTP 820E and the paired unit’s
radio or radio group.
Note:
The latency differential between the PTP 820E and the paired unit cannot be more than 1.6 ms.
That means that under all foreseeable conditions, such as a high ACM profile on one unit and a
low ACM profile on the other unit, there should be no more than a 1.6 ms difference between
the latency of the two radio carriers in the Multiband link.
Illustrates Multiband operation with an PTP 820E and PTP 820C or PTP 820C-HP. Error! Reference source not
found. illustrates a configuration that includes synchronization and management of the PTP 820C/PTP 820C-HP via
the PTP 820E. Both of these items are optional, and requires an optical cable between Eth3 on the PTP 820E and
Eth3 on the PTP 820C/PTP 820C-HP, as described in the following sections.
Figure 128 Multiband Operation – PTP 820E and PTP 820C/PTP 820C-HP
This figure illustrates Multiband operation with an PTP 820E paired with a third-party radio. It also illustrates a
configuration that includes synchronization and management of the third-party unit via the PTP 820E.
Synchronization via the PTP 820E requires an optical cable between Eth3 on the PTP 820E and an Ethernet port on
the third-party unit, as described in the following sections.
Multiband Configuration
To configure a Multiband node:
1. Connect the external switch to the Eth1 port on the PTP 820E.
2. Connect the Eth2 port on the PTP 820E to the paired unit. When the paired unit is an PTP 820C, PTP 820C-
HP, or PTP 820S, use the Eth2 port on the PTP 820C, PTP 820C-HP, or PTP 820S.
3. Verify that no service points are configured on the Eth2 port of the PTP 820E. If there are service points
on Eth2, remove them. See Deleting a Service Point.
4. Set Eth2 on the PTP 820E to Admin – Down. See Enabling the Interfaces (Interface Manager).
5. On the PTP 820E, configure a Multiband group that includes Eth2 and the radio:
a. Select Radio > Groups > Multi-Carrier ABC. The Multi Carrier ABC Groups page opens.
b. Click Create Group. Page 1 of the Create ABC Group wizard opens.
c. In the Group ID field, select Enhanced Multi Carrier ABC (Group #1).
d. Optionally, in the Group Name field, enter a descriptive name for the group.
e. Click Next. Page 2 of the Create ABC Group wizard opens.
h. In the Member #2 field under Member Selection, select Ethernet: Slot 1, Port 2.
i. In the Member #2 field under Maximum Bandwidth (Mbps), select the maximum traffic that the
PTP 820E will pass to the paired unit.
• When using Fixed ACM mode, set this parameter to the actual rate you want the paired
unit to broadcast.
• When using Adaptive ACM mode, set this parameter to the maximum of the paired
unit’s capacity. The default value is 1000 Mbps.
Note:
The Maximum Bandwidth represents the L1 capacity of the radio link connected to the Ethernet
member. The actual bandwidth that will be available for traffic is less due to overhead.
When using a third-party radio as the paired unit, it is particularly important to set this
parameter properly in order to ensure optimal performance. Failure to properly set this
parameter may lead to frequent pauses as the queue fills up during low capacity periods, such as
when weather conditions cause the ACM profile to drop.
j. Click Finish. The Selection Summary page of the Create ABC Group wizard opens.
k. Click Submit. The group is added to the Multi Carrier ABC page.
Figure 135 Multi Carrier ABC Groups Page (Populated with Multiband Group)
Note:
After adding Eth2 to the Multiband group, an alarm is raised (Alarm 1794). This
alarm is cleared when the unit is reset.
6. On the paired unit, configure a Pipe service between the port receiving traffic from the PTP 820E and the
radio or Multi-Carrier ABC group. See Configuring Ethernet Service(s).
7. On the paired unit, configure Automatic State Propagation with ASP trigger by remote fault enabled. See
Error! Reference source not found..
8. If the paired unit is an PTP 820C, PTP 820C-HP, or PTP 820S, configure Radio BNM:
Note:
If the paired unit is a third-party radio, enable 802.3X Flow Control.
a. Select Ethernet > Protocols > Bandwidth Notification. The Bandwidth Notification page opens.
Multiband Management
The PTP 820E unit in a Multiband configuration can be managed normally, as in any other configuration. For in-
band management of the PTP 820E, configure the management service on the PTP 820E Multiband group. See
Error! Reference source not found..
The following options are available for managing the paired unit in a Multiband configuration:
• Inband management via the PTP 820E
• Inband management directly from the external switch
• Out-of-Band management
On the PTP 820E, a CSFP module must be used for Port 2 in order to utilize both Eth2 and Eth3.
When the paired unit is an PTP 820C, PTP 820C-HP, or PTP 820S, Eth2 and Eth3 on the PTP 820C, PTP 820C-HP, or
PTP 820S must use BiDi SFP modules.
Figure 140 Multiband Configuration with Inband Management and/or SyncE via the PTP 820E
A management service must be defined between the management port of the PTP 820E and Eth3 on the PTP 820E.
This transmits management to the paired unit. See Error! Reference source not found..
Note: To avoid loops, in-band management must not be configured on the slave unit.
Figure 141 Multiband Configuration with Direct Inband Management to the Paired Unit
Out-of-Band Management
The PTP 820 microwave radio can be managed by means of a TP cable connected to the MGT port on the PTP 820
and to the LAN port on a PC or laptop.
In this scenario, the PTP 820E is managed by connecting the PC or laptop used for management to the PoE Injector,
which provides transfers power and management to the MGT/PoE port of the PTP 820E.
Figure 142 Multiband Configuration with Direct Inband Management to the PTP 820C, PTP 820C-HP, or PTP 820S
Note:
When a third-party unit is paired with the PTP 820E, it is a prerequisite that the third-party radio unit
support SyncE and, if required, 1588 Transparent Clock in order to provide synchronization for the
Multiband node.
In Release 11.3, synchronization for the paired unit requires an optical cable between port Eth3 on the PTP 820E
and Eth3 on the PTP 820C, PTP 820C-HP, or PTP 820S or a free Ethernet port on the third-party radio. In this
configuration, Port 2 on the PTP 820E must be used as a CSFP port. The paired unit must have at least two 1G SFP
ports on the paired unit. For PTP 820C, PTP 820C-HP, or PTP 820S, this means an ESS hardware version is required.
Eth2 and Eth3 on the PTP 820C, PTP 820C-HP, or PTP 820S must use BiDi SFP modules.
The cable fits into the single gland on the PTP 820E in order to connect to both Eth2 and Eth3. On the other side of
the cable, the cable is split so that a separate cable can be inserted into the gland for each of the Ethernet ports on
the paired unit. This is the same cable and the same setup used for inband management via the PTP 820E. For
details, see Inband Management via the PTP 820E.
To configure SyncE on a Multiband node:
1. On the PTP 820E, configure three synchronization sources: Eth1, the radio, and Eth3. Do not configure Eth2 as
a synchronization source.
2. On the paired unit, configure two synchronization sources: the Ethernet port receiving synchronization from
the PTP 820E, and the radio. When using Multi-Carrier ABC, configure both radios as synchronization sources.
In ring configurations, configure priority order in the direction of traffic on the ring.
Link aggregation (LAG) enables you to group several physical Ethernet or radio interfaces into a single logical
interface bound to a single MAC address. This logical interface is known as a LAG group. Traffic sent to the
interfaces in a LAG group is distributed by means of a load balancing function. PTP 820 uses a distribution function
of up to Layer 4 in order to generate the most efficient distribution among the LAG physical ports.
This section explains how to configure LAG and includes the following topics:
• LAG Overview
• Configuring Link Aggregation (LAG) and LACP
• Enabling and Disabling LAG Group Shutdown in Case of Degradation Event
• Configuring Enhanced LAG Distribution
• Deleting a LAG Group
• Displaying LACP Parameters and Statistics
LAG Overview
LAG can be used to provide redundancy for Ethernet interfaces, both on the same PTP 820 unit (line protection)
and on separate units (line protection and equipment protection). LAGs can also be used to provide redundancy
for radio links.
LAG can also be used to aggregate several interfaces in order to create a wider (aggregate) link. For example, LAG
can be used to create a 4 Gbps channel.
You can create up to four LAG groups. The following restrictions exist with respect to LAG groups:
• Only physical interfaces (including radio interfaces), not logical interfaces, can belong to a LAG group.
• Interfaces can only be added to the LAG group if no services or service points are attached to the interface.
• Any classification rules defined for the interface are overridden by the classification rules defined for the LAG
group.
• When removing an interface from a LAG group, the removed interface is assigned the default interface values.
There are no restrictions on the number of interfaces that can be included in a LAG. It is recommended, but not
required, that each interface in the LAG have the same parameters (e.g., speed, duplex mode).
The LAG page lists all LAG groups configured on the unit.
Note
To add or remove an Ethernet interface to a LAG group, the interface must be in an administrative
state of “down”. This restriction does not apply to radio interfaces. For instructions on setting the
administrative state of an interface, see Enabling the Interfaces (Interface Manager).
PTP 820 supports LACP, which expands the capabilities of static LAG and provides interoperability with third-party
equipment that uses LACP. LACP improves the communication between LAG members. This improves error
detection capabilities in situations such as improper LAG configuration or improper cabling. It also enables the LAG
to detect uni-directional failure and remove the link from the LAG, preventing packet loss.
When LACP is enabled, the device sends LACPDUs to the LAG members on the other side of the link every 30
seconds. If a LAG member fails to respond to three consecutive LACPDUs, the LAG member is temporarily removed
from the LAG. This is known as a long timeout, with the total timeout adding up to the time it takes to send three
LACPDUs (90 seconds). The device continues to send LACPDUs, and the member is restored to the LAG as soon as
it responds to an LACPDU.
LACP is enabled as part of the LAG configuration process. It should only be used if the LAG is in a link with another
LACP-enabled LAG.
Note
LACP is not supported with unit protection. For unit protection, a special, limited implementation is
configured on the logical interface level. See Error! Reference source not found..
LACP can only be used with Ethernet interfaces.
LACP cannot be used with Enhanced LAG Distribution or with the LAG Group Shutdown in Case of
Degradation Event feature.
3. In the Group ID field, select a LAG Group ID. Only LAG IDs that are not already assigned to a LAG group appear
in the dropdown list.
4. In the LACP field, select Enable to enable LACP on the LAG or Disable to disable LACP on the LAG. The default
value is Disable.
5. In the Member 1 field, select an interface to assign to the LAG group. Only interfaces not already assigned to a
LAG group appear in the dropdown list.
6. Click Next. A new Create LAG Group page opens.
7. In the Member 2 field, select an additional interface to assign to the LAG Group.
8. To add additional interfaces to the LAG group, repeat steps 5 and 6.
9. When you have finished adding interfaces to the LAG group, click Finish. A new Create LAG Group page opens
displaying all the interfaces you have selected to include in the LAG group.
10. Click Submit. If all the interfaces meet the criteria listed above, a message appears that the LAG group has
been successfully created. If not, a message appears indicating that the LAG group was not created and giving
the reason.
1. Select Ethernet > Interfaces > Groups > LAG. The LAG page opens.
2. Select the LAG group you want to edit in the Link Aggregation table.
3. Click Edit underneath the Link Aggregation table. The Link Aggregation - Edit page opens.
Note
When removing an interface from a LAG group, the removed interface is assigned the default
interface values.
For information about the LAG degrade field, see Enabling and Disabling LAG Group Shutdown in
Case of Degradation Event .
A LAG group can be configured to be automatically closed in the event of LAG degradation. This option is used if
you want traffic from the switch to be re-routed during such time as the link is providing less than a certain
capacity.
By default, the LAG group shutdown in case of degradation event option is disabled. When enabled, the LAG is
automatically closed in the event that any one or more ports in the LAG fail. When all ports in the LAG are again
operational, the LAG is automatically re-opened.
Note
Failure of a port in the LAG also triggers a lag-degraded alarm, Alarm ID 100.
To enable or disable the LAG group shutdown in case of degradation event option:
1. Select Ethernet > Interfaces > Groups > LAG to open the LAG page.
2. Select the LAG group in the Link Aggregation table.
3. Click Edit underneath the Link Aggregation table. The Link Aggregation - Edit page opens (Figure 83).
4. In the LAG degrade field, select Enable to enable the LAG group shutdown in case of degradation event option
or Disable to disable the LAG group shutdown in case of degradation event option.
5. Click Apply.
Note
Enhanced LAG distribution is only available for LAG groups that consist of exactly two interfaces. It
cannot be used with LACP.
3. In the Distribution Function field, select a pre-set distribution scheme, from 1 to 10. It is recommended to
experiment with the various schemes, monitoring the TX byte count fields for each interface to determine the
efficiency of each distribution scheme for the link. The default distribution scheme is 1. The default LAG
distribution pattern is 1.
4. To clear the TX byte counts, select Clear on read for one or both interfaces. The byte counts will be cleared
when you close the LAG Distribution Function (DF) page or click Refresh.
Note
This counter will also be cleared for the members of the LAG in the Port RMON Statistics page.
Note
PTP 820 does not support any LACP write parameters.
2. The LACP Port Status page displays the major port status parameters, per port. To display all the available
LACP port status parameters, select a port and click View. The LACP Port Status – View page is displayed.
Actor Port Priority The priority value assigned to this Aggregation Port.
Actor Administrative Key The current administrative value of the Key for the Aggregation Port.
Actor Administrative The administrative values of the Actor’s state as transmitted by the Actor
State via LACPDUs.
Actor Operational Key The current operational value of the Key for the Aggregation Port.
Actor Operational State The current operational values of the Actor’s state as transmitted by the
Actor via LACPDUs.
Partner Operational Key The current operational value of the Key for the protocol Partner.
Partner Operational The current values of Actor State in the most recently received LACPDU
State transmitted by the protocol Partner.
Partner Operational The MAC Address value representing the current value of the
System ID Aggregation Port’s protocol Partner’s System ID.
Partner Operational The operational value of priority associated with the Partner’s System ID.
System Priority
Partner Operational Port The operational port number assigned to this Aggregation port by the
Aggregation port’s port Partner.
Partner Operational Port The Priority value assigned to this Aggregation port by the Partner.
Priority
Partner Administrative The current administrative value of the Key for the protocol Partner.
Key
Partner Administrative The current administrative value of Actor state for the protocol Partner.
State
Partner Administrative The MAC Address value representing the administrative value of the
System ID Aggregation Port’s Protocol partner’s System ID.
Partner Administrative The administrative priority value associated with the Partner’s System ID.
System Priority
Partner Administrative The current administrative value of the port number for the protocol
Port partner.
Partner Administrative The current administrative value of the port priority for the protocol
Port Priority partner.
Configuring XPIC
Note
This option is only relevant for PTP 820C units.
XPIC Overview
Cross Polarization Interference Canceller (XPIC) is a feature that enables two radio carriers to use the same
frequency with a polarity separation between them. Since they will never be completely orthogonal, some signal
cancelation is required.
In addition, XPIC includes an automatic recovery mechanism that ensures that if one carrier fails, or a false signal is
received, the mate carrier will not be affected. This mechanism also ensures that both carriers will be operational,
after the failure is cleared.
To configure and enable XPIC, first configure the carriers and then perform antenna alignment, as described below.
For 2+2 XPIC using an external switch operating in LAG mode, Mate Management Access enables users to manage
both units via in-band management. See Mate Management Access (IP Forwarding) (CLI).
Note
XPIC support is indicated by an X in the script name. For example, mdN_A2828X_111_1205 is an
XPIC-enabled script. mdN_A2828N_130_100 is not an XPIC-enabled script. For a list of XPIC support-
enabled scripts, refer to the most recent PTP 820C Release Notes.
3. In the XPIC page, create an XPIC group that consists of the two RMCs that will be in the XPIC group. See
Creating an XPIC Group.
2. In the XPIC Configuration page, select Enable in the Admin state field and click Apply.
To disable XPIC, select Disable in the Admin state field and click Apply.
Note
To measure the second carrier, leave the Voltmeter connected to the BNC connector. In the Radio
Parameters page of the Web EMS, change the RSL Connector Source field from PHYS1 to PHYS2 (or 2
to 1). The BNC connector will now measure RSL from the other carrier.
4. The XPI should be between 25dB and 30dB. If it is not, you should adjust the OMT assembly on the back of
the antenna at one side of the link until you achieve the highest XPI, which should be no less than 25dB. Adjust the
OMT very slowly in a right-left direction. OMT adjustment requires very fine movements and it may take several
minutes to achieve the best possible XPI.
Note
As an extra step, to check the veracity of the initial measurements, you can mute the first carrier and
unmute the second carrier on the upper PTP 820C units on both sides of the link. Then measure the
RSL of the second carrier link (the “RSLwanted”), measure the RSL of the first carrier (the
“RSLunwanted”) and determine the XPI. The XPI should match the XPI with the second carriers
muted.
5. Unmute all the carriers and check the RSL levels of all the carriers on both sides of the link. The RSL of the
horizontal carrier of the local unit should match the RSL of the vertical carrier of the remote unit, within ±2dB.
The RSL of the vertical carrier of the local unit should match the RSL of the horizontal carrier of the remote unit,
within ±2dB.
6. For a 2x2 configuration, repeat StepsError! Reference source not found. through Error! Reference source not
found. for the lower PTP 820C units.
7. Check the XPI levels of all the carriers on both sides of the link. All the carriers should have approximately the
same XPI value. Do not adjust the XPI at the remote side of the link, as this may cause the XPI at the local side
of the link to deteriorate.
Note
In some cases, the XPI might not exceed the required 25dB minimum due to adverse atmospheric
conditions. If you believe this to be the case, you can leave the configuration at the lower values, but
be sure to monitor the XPI to make sure it subsequently exceeds 25dB. A normal XPI level in clear sky
conditions is between 25 and 30dB.
This section explains how to configure unit protection, including HSB radio protection and Ethernet interface
protection, and includes the following topics:
• Unit Protection Overview
• Configuring Ethernet Interface Protection
• Configuring 2+2 HSB Protection on a PTP 820C Unit
• Viewing the Configuration of the Standby unit
• Editing Standby Unit Settings
• Viewing Link and Protection Status and Activity
• Manually Switching to the Standby Unit
• Disabling Automatic Switchover to the Standby Unit
• Disabling Unit Protection
• Configuring 1+1 HSB Unit Protection with Space Diversity
Note
For instructions on configuring 1+1 unit protection with Space Diversity.
Note
For FIPS configurations, the external protection link must be encrypted using IPsec. This encrypts all IP
packets that pass between the management ports of the two PTP 820 units. For instructions, see
Encrypting the External Protection Link.
Note
PTP 820 supports a special LACP implementation for purposes of line protection only. This LACP
implementation is configured on the logical interface level, as described below. Regular LACP is
configured as part of the LAG configuration, and is not supported with unit redundancy. See
Configuring Link Aggregation (LAG) and LACP.
2 Connect one port on the external switch to an Ethernet port on the active PTP 820, and the other port on
the external switch to an Ethernet port on the standby PTP 820.
3 Enable LACP on the Ethernet interface connected to the external switch on the active PTP 820:
i Select Ethernet > Interfaces > Logical Interfaces. The Logical Interfaces page opens .
ii Select the interface and click Edit. The Logical Interfaces – Edit page opens.
iii. Establish a management connection to one of the units. You can select either unit; once you enable
Protection Administration, the system will determine which unit becomes the Active unit.
2. Select Platform > Management > Unit Redundancy. The Unit Redundancy (HSB Protection) page opens.
In addition, almost every Web EMS page will now include two tabs on top of the main section of the page:
o Active – Enables you to configure the Active unit.
o Standby – In most cases, this tab is read-only and enables you to display Standby unit
parameters. Even when a switchover occurs, the unit displayed in the Web EMS is
always the currently Active unit.
Note
The parameters that are editable on the Standby tab are described in Editing Standby Unit Settings.
Note
While the system is performing the copy-to-mate operation, a temporary loss of management
connection will occur.
To keep the Standby unit up-to-date, after any change to the configuration of the Active unit click Copy to Mate to
copy the configuration to the Standby unit.
If you change the configuration of the Active unit but do not perform Copy to Mate, a Configuration
Mismatch alarm appears in the Faults > Current Alarms page.
Note
You can use the following CLI command to display a list of mismatched parameters:
root> platform management protection show mismatch details
• Setting synchronization settings – Refer to the SyncE Regenerator page (see Configuring the SyncE
Regenerator).
Note
This feature is only relevant to PTP 820C. it can be used with all PTP 820 hardware versions.
A 1+1 HSB-SD configuration utilizes two PTP 820C units on each side of the link, with both radio carriers activated.
The PTP 820C units are combined and connected to the primary and diversity antennas via a dual coupler and two
flexible waveguides.
Radio carrier 2 is muted on each unit. On the receiving side, the signals are combined in the active unit to produce
a single, optimized signal. The link is protected via external protection, so that if a protection switchover occurs,
the standby unit becomes the active unit, and the link continues to function with full space diversity.
To configure a 1+1 HSB link with Space Diversity:
1. For one PTP 820 unit, select radio > Groups > Diversity. The Diversity page opens.
2. Click Create Group. The Create Diversity Group page opens.
Note
The identity of the active and standby units is not determined until unit protection is configured.
11. Configure Unit Protection, according to the instructions in Configuring Unit Protection with HSB Radio
Protection (External Protection).
12. On the active PTP 820 unit, mute the transmitter of radio carrier 2. For instructions, see configuring the radio
parameters.
13. Perform Copy to Mate. See Step 5 in configuring HSB Radio Protection.
Note
It is crucial to ensure that the port connected to the Diversity antenna is muted in each PTP 820 unit.
If you perform Copy to Mate after configuring unit protection, as indicated above, the mute
configuration will be copied to the standby unit. If you mute the interface before configuring unit
protection, you must make sure to manually mute the interface on both PTP 820 units. Otherwise,
configuring unit protection will override the mute configuration.
Note
This feature is only relevant for PTP 820C units.
This section describes how to configure MIMO and space diversity, and include the following topics:
• MIMO and Space Diversity Overview
• Configuring a MIMO Link
• Creating a MIMO or Space Diversity Group
• Enabling/Disabling a MIMO or Space Diversity Group
• Setting the Role of a MIMO or Space Diversity Group
• Resetting MIMO
• Viewing MMI and XPI Levels
• Deleting a MIMO or Space Diversity Group
Line-of-Sight (LoS) Multiple Input Multiple Output (MIMO) achieves spatial multiplexing by creating an artificial
phase de-correlation by deliberate antenna distance at each site in deterministic constant distance. At each site in
a LoS MIMO configuration, data to be transmitted over the radio link is split into two bit streams (MIMO 2x2) or
four bit streams (MIMO 4x4). These bit streams are transmitted via two antennas. In MIMO 2x2, the antennas use
a single polarization. In MIMO 4x4, each antenna uses dual polarization. The phase difference caused by the
antenna separation enables the receiver to distinguish between the streams.
PTP 820C supports both MIMO 2x2 and MIMO 4x4. For a full explanation of MIMO support in PTP 820C, refer to
the PTP 820C Technical Description.
For 4x4 MIMO using an external switch operating in LAG mode, Mate Management Access enables users to
manage both units via in-band management. See Mate Management Access (IP Forwarding) (CLI).
For PTP 820C 2E2SX hardware models, if you try to apply a 4x4 MIMO or 2+2 Space Diversity configuration while
P4 is assigned one or more service points, ASP or LLF instances, or a LAG group or Sync source is configured on P4,
the configuration will fail and an error message will be generated. Also, the Admin status of the port must be set to
Down before applying the 4x4 MIMO or 2+2 Space Diversity configuration. See Enabling the Interfaces (Interface
Manager).
The same hardware configurations can also be used to implement BBS Space Diversity. PTP 820C supports 1+0, 2+0
and 2+2 Space Diversity. For a full explanation of Space Diversity support in PTP 820C, refer to the PTP 820C
Technical Description.
Note
Only one MIMO or Space Diversity group can be created per PTP 820C unit. All MRMC scripts that
support MIMO also support Space Diversity.
Notes: Only one MIMO or Space Diversity group can be created per PTP 820C or PTP 820C-HP
unit. All MRMC scripts that support MIMO also support Space Diversity.
For 4x4 MIMO links, versions 10.5 and higher are not interoperable with earlier versions. If you
are upgrading from an earlier version with an existing 4x4 MIMO link, you must follow the
procedure in Upgrading a 4x4 MIMO Link from an Earlier Version to release 10.5 or Higher.
Important Note: You must download the new software package to all four units before beginning
the upgrade process. All four units in the 4x4 MIMO link must use the same Release build and
version.
Upgrade Procedure – Option 1
1. Upgrade the remote Slave unit.
2. Upgrade the remote Master unit.
3. Upgrade the local Slave unit.
ii Click Create Group. The AMCC Group – Select Group Parameters page opens.
viii Click Next. The AMCC Group – Select MRMC Parameters page opens.
ix Select Set MRMC Script, and configure the Script ID, Operational mode, Maximum profile, and Minimum
profile. For an explanation of these fields, see Configuring the Radio (MRMC) Script(s). Make sure the script
you select supports MIMO.
Notes:
For a list of available scripts, including an indication of which scripts support MIMO, refer to
the Release Notes for the release you are using.
x Click Finish. The AMCC Group – Selection Summary page opens. Note that the second radio
carrier is automatically added to the group, with the same Member Role and MRMC script as
you defined for the first radio carrier you added to the group.
xi Click Submit to configure the group. If you changed the MRMC script from the script that had previously
been configured, or if you set the Group Admin Status to Enable, the unit is reset.
Figure 168: Advanced Multi Carrier Configuration Page (Populated – 4x4 MIMO Group)
1 Verify that the MMI levels are appropriate. See Viewing MMI Levels.
2 Configure LAG on the two Ethernet ports of the external switches connected to the PTP 820 units on both sides
of the link.
3 Configure Automatic State Propagation with ASP trigger by remote fault enabled on the MIMO group in all
four PTP 820 units that make up the link. See Configuring Automatic State Propagation and Link Loss
Forwarding.
Note: The last two steps are crucial to ensure that the link continues to function via the
MIMO resiliency mechanism in the event of a hardware failure scenario.
4x4 MIMO link.
EXT REF
Eth1
Carrier 1
GbE Port
Source Eth3/
Carrier 2
OMT
EXT
Sharing Cable
MIMO
MGT/
Group ASP – Remote
PROT
Fault Trigger
MIMO Sharing Enabled
External Cable
Master IP-20
LAG
Switch
ASP – Remote
Eth1 Fault Trigger
Enabled
Carrier 1
Eth3/
GbE Port EXT
Carrier 2
OMT
MIMO Signaling
Cable MGT/ MIMO
PROT
Group
EXT REF
Slave IP-20
6 After creating the group, you must enable the group in the MIMO - Edit page:
i From the MIMO page, select the group from the table and click Edit Group. The MIMO - Edit page opens
3 In the Group Type field, select one of the following according to your desired system configuration:
◦ 1+0 Space Diversity
◦ 2+0 Space Diversity
4 Click Next. The Create Diversity Group page is updated and displays your system configuration.
6 After creating the group, you must enable the group and, for 2+0 groups, set the unit’s role (Master or Slave) in
the Diversity - Edit page.
i From the Diversity page, select the group from the table and click Edit Group. The Diversity - Edit page
opens.
2. Mute all remote transmitters except the same polarization interferer and measure the local RSL2 (RSL_Int).
The MMI is equal to RSL_Wanted – RSL_Int
To view MMI Levels for a 4x4 MIMO group:
1 Select Radio > Groups> AMCC. The Advanced Multi Carrier Configuration page opens.
2 Select the 4x4 MIMO group from the table.
3 Click Edit Members. The AMCC Group - Edit Members page opens.
The MIMO - Edit Members page provides the following information for each radio carrier in the MIMO group:
• MMI – MIMO Mate Interference. MMI represents the difference between the RSL1 and the RSL2 of the
remote Master and Slave transmitters with the same polarization. The nominal range is 0. The range should be
from -3 dB to +3 dB.
This parameter is not relevant for 1+0 Space Diversity (as indicated by a value of -99).
Note
When the MIMO or Space Diversity group is disabled, the system is automatically reset.
Note
This feature is only relevant for PTP 820C and PTP 820C-HP.
This section describes how to configure Advanced Space Diversity (ASD), and includes the following topics:
• ASD Overview
• Configuring an ASD Link
• Viewing ASD Status
• Deleting an ASD Group
ASD Overview
ASD uses a combination of BBC Space Diversity and beam forming technology to increase system gain and reduce
the effects of fading and multipath. ASD is implemented as an asymmetrical link with three antennas and three
PTP 820C or PTP 820C-HP units, as shown in Error! Reference source not found..
• In one direction, two transmitters transmit to one receiver. ASD increases system gain in this direction by
6 dB.
• In the other direction, transmissions from one transmitter are received by two receivers. This is a simple
case of Space Diversity, and provides a 3 dB increase in system gain.
Master Master
Network RF Network
Switch Eth Port
Processor
Modem 1
Chain V +6dB V RF Chain Modem 1
Processor Eth Port Switch
OMT f1 f1 OMT
Modem 2 RF Chain H H RF Chain Modem 2
+3dB
Communications
Source Sharing
Data Sharing
Protection
Network
Processor
Modem 1 RF Chain V
OMT f1
Modem 2 RF Chain H
Slave
The ability to implement space diversity with only three PTP 820 units and three antennas is made possible by the
use of standard space diversity in one direction and a phase-synchronized beam-forming mechanism in the other
direction. Each PTP 820C or PTP 820C-HP unit is installed in a 2+0 XPIC configuration, with an OMT as the
mediation device and a dual-polarization antenna. Alignment is performed using an XPIC script. Following
alignment, the ASD groups are configured and a special ASD script (28 MHz or 56 MHz) is applied to each of the
three ASD groups.
• MRMC Script 1951 – 28 MHz
Site 1 Site 2
+3dB +6dB
f1 f1
f1
The data path from Site 1 to Site 2 includes the same TX signals being sent from the main and diversity radios at
Site 1 (RX diversity). PTP 820 uses beam forming technology to achieve optimal reception by the PTP 820C or PTP
820C-HP unit at Site 2. This quadruples the signal’s strength, adding 6dB in system gain and resilience to selective
fading.
The data path from Site 2 to Site 1 is similar to that of a standard space diversity configuration. The signal
transmitted from Site 2 is received by the main and diversity antennas at Site 1 (RX diversity). These signals are
combined using Baseband Combining (BBC). This adds 3dB in system gain since the signal practically doubles its
level as it is received in a phase-synchronized manner by two receivers.
Note
Make sure to set the same MRMC parameters for all the radio carriers in the ASD link. For ASD, the
scripts must be set to Adaptive mode.
5. Mute both carriers on the Slave unit. See Configuring the Radio Parameters.
6. Align the antenna of the Master unit to the antenna at Site 2 until you achieve a steady link at the RSL that
is expected according to the site plan, at 2048 QAM.
7. Unmute the carriers of the Slave unit and mute both carriers on the Master unit. See Configuring the
Radio Parameters.
8. Align the antenna of the Slave unit to the antenna at Site 2 until you achieve a steady link at the RSL that
is expected according to the site plan, at 2048 QAM.
9. Unmute the carriers of the Master unit. At this point, all of the carriers in the ASD link should be unmuted.
10. Configure ASD on each unit:
a. Select Radio > Groups> AMCC. The Advanced Multi Carrier Configuration page opens.
b. Click Create Group. The AMCC Group – Select Group Parameters page opens.
Note
After you select one of the ASD options in the Group Type field, ASD 2+0 will be displayed in the
Group Subtype field.
d. In the Group Admin Status field, select Enable.
e. Click Next. The next page of the AMCC Group – Select Members Parameters page opens.
Note
Make sure to set the same MRMC parameters for all the radio carriers in the ASD link. Refer to
Configuring the Radio (MRMC) Script(s) for a list of available radio profiles.
Figure 184 Advanced Multi Carrier Configuration Page – Populated with ASD Group
Note
No unit reset takes place when the group is created.
3 In the Group Admin Status field, select Disable, then Apply. At this point, a system reset takes place.
4 Once the unit comes back online, return to the Advanced Multi Carrier Configuration page opens, select the
group, and click Delete. The group is deleted.
AFR Overview
AFR works in conjunction with ACM to enable links to achieve high modulations and high capacities despite the
presence of adjacent links transmitting at the same frequency. By mitigating the effects of side lobe interference
(SLI) completely, or nearly completely, AFR can reduce adjacent link interference to levels that enable links that
would otherwise be limited to QPSK modulation to transmit at modulations of up to 2048 QAM. This enables the
placement of links that would otherwise be impractical due to high interference.
In an AFR 1+0 configuration, a dual-modem PTP 820C unit is deployed at the hub site and two PTP 820C or PTP
820S units are deployed in two tail sites. Each carrier at the hub site is known as an “aggregator.”
The hub site utilizes a single PTP 820C unit with two radio carriers. Each carrier is in a link, via its own directional
antenna, with a tail site that consists of a PTP 820C or PTP 820S unit.
One hub site cannot have more than two tail sites. Also, a hub site cannot be a tail site for another AFR hub site.
Note
The links should be located so as to ensure that the two data streams do not cross.
For information about planning links with AFR, contact Cambium support.
• Hub Site – Install a single PTP 820C unit with two antennas using a PTP 820C Dual Core kit, as described in
Section 6.12 of the PTP 820C Installation Guide, 2x2 LoS MIMO Direct Mount.
• Tail Sites – Install a 1+0 PTP 820C or PTP 820S configuration.
Before performing the software configuration for AFR, you must set up and align the two links as individual 1+0
links. Use Script 1801 for the alignment, but do not enable AFR before aligning the links.
When aligning Link A, mute both sides of Link B. When you are finished aligning Link A, mute both sides of Link A,
unmute both sides of Link B, and align link B. When you are finished aligning Link B, unmute both sides of both
links.
Note
AFR is not supported with ATPC. ATPC should be disabled before configuring AFR. See Configuring
ATPC and ATPC Override Timer.
Perform the following steps for each site in the AFR configuration.
• If you are performing the configuration locally at the Hub site and each Tail site, the order in which you
configure the sites does not matter.
• If you are performing the configuration for all three sites remotely from the Hub Site, you must configure the
sites in the following order:
o Tail Site 1
o Tail Site 2
o Hub Site
After you configure AFR on the Tails Sites, the link between the Hub Site and the Tail Sites will be lost. The links will
be restored after you configure AFR on the Hub site and the Hub site comes back up after unit reset.
6. Select Radio > Groups > AMCC. The Advanced Multi Carrier Configuration page opens.
1 Click Create Group. The AMCC Group – Select Group Parameters page opens.
Figure 190 AMCC Group – Select Group Parameters Page (Hub Site)
Figure 191 AMCC Group – Select Group Parameters Page (Tail Site)
Note
Script 1801 is a 28/30 MHz script, with a maximum ACM profile of 10 (2048 QAM). For additional
details, refer to the relevant Release Notes or product Technical Description.
8 In the MRMC Script maximum profile field, select the maximum ACM profile for the links.
9 Click Finish. This page displays the parameters you have selected for the link.
10 Click Submit. The unit is automatically reset. Once AFR has been configured on the Hub site and both Tail sites,
the configuration is complete.
2 Select the group and click Edit Group. The AMCC Group – Edit page opens.
If you wish to operate a PTP 820C unit in single radio carrier mode, you must perform the following steps:
1. Verify that XPIC is disabled. See Configuring XPIC.
2. Disable Multi-Carrier ABC, as described.
3. Disable one of the two radio interfaces, as described in Enabling the Interfaces (Interface Manager).
4. Mute the disabled radio interface, as described in Configuring the Radio Parameters.
You can specify which IP protocol the unit will use when initiating communications, such as downloading software,
sending traps, pinging, or exporting configurations. The options are IPv4 or IPv6.
To set the IP protocol version of the local unit:
1. Select Platform > Management > Networking > Local. The Local Networking Configuration page opens.
Figure 195 Local Networking Configuration Page
2. In the IP address Family field, select the IP protocol the unit will use when initiating communications. The options
are IPv4 or IPv6.
Figure 197 Remote Networking Configuration Page – PTP 820S and PTP 820E
2. For multi-carrier units, select the carrier in the Radio table (see Figure 126) and click Edit. A separate Remote IP
Configuration page opens. The page is identical to the single-carrier page.
Figure 198 Remote IP Configuration Page Per Carrier – PTP 820C and PTP 820C-HP
3. In the Remote IP address field, enter an IP address for the remote unit. You can enter the address in IPv4 format
in this field, and/or in IPv6 format in the IPv6 Address field. The remote unit will receive communications
whether they are sent to its IPv4 address or its IPv6 address.
4. In the Remote Subnet mask field, enter the subnet mask of the remote radio.
5. Optionally, in the Remote default gateway field, enter the default gateway address for the remote radio.
6. Optionally, in the Remote IPv6 Address field, enter an IPv6 address for the remote unit. You can enter the
address in IPv6 format in this field, and/or in IPv4 format in the IP Address field. The unit will receive
communications whether they are sent to its IPv4 address or its IPv6 address.
7. If you entered an IPv6 address, enter the IPv6 prefix length in the Remote IPv6 Prefix-Length field.
8. Optionally, if you entered an IPv6 address, enter the default gateway in IPv6 format in the Remote default
Gateway IPv6 field.
9. Click Apply.
Configuration SNMP
PTP 820 products support SNMP v1, V2c, and v3. You can set community strings for access to PTP 820 units.
PTP 820 products support the following MIBs:
• RFC-1213 (MIB II).
• RMON MIB.
• Proprietary MIB.
Access to the unit is provided by making use of the community and context fields in SNMPv1 and SNMPv2c/SNMPv3,
respectively.
To configure SNMP:
1. Select Platform > Management > SNMP > SNMP Parameters. The SNMP Parameters page opens.
Figure 199 SNMP Parameters Page
2. In the Admin field, select Enable to enable SNMP monitoring, or Disable to disable SNMP monitoring.
Note
The Operational Status field indicates whether SNMP monitoring is currently active (Up) or inactive
(Down).
3. In the SNMP Read Community field, enter the community string for the SNMP read community.
4. In the SNMP Write Community field, enter the community string for the SNMP write community
5. In the SNMP Trap Version field, select V1, V2, or V3 to specify the SNMP version.
Note
The SNMP MIB Version field displays the current SNMP MIB version the unit is using.
6. In the V1V2 Blocked field, select Yes if you want to block SNMPv1 and SNMPv2 access so that only SNMPv3
access will be enabled.
Note
Additional security parameters can be configured in the Quick
Configuration Security Protocols page. See Quick Security Configuration – Protocols Page, Step 4.
7. Click Apply.
If you are using SNMPv3, you must also configure SNMPv3 users. SNMPv3 security parameters are configured per
SNMPv3 user.
To add an SNMP user:
1. Select Platform > Management SNMP > V3 Users. The V3 Users page opens.
Parameter Definition
Encryption (Privacy) Mode Select an encryption (privacy) protocol for the user.
Options are:
• None
• DES
• AES
Access Mode Select an access permission level for the user. Options
are:
• Read Write User
• Read Only User
You can configure trap forwarding parameters by editing the Trap Managers table. Each line in the Trap Managers
table displays the setup for a manager defined in the system.
To configure trap managers:
1. Select Platform > Management SNMP > Trap Managers. The Trap Managers page opens.
Figure 202 Trap Managers Page
2. Select a trap manager and click Edit. The Trap Managers Edit page opens.
3. Configure the trap manager parameters, as described in Table 15 Trap Manager Parameters.
4. Click Apply, then Close.
Parameter Definition
IPv4 Address If the IP address family is configured to be IPv4, enter the destination IPv4
address. Traps will be sent to this IP address. See Defining the IP Protocol
Version for Initiating Communications.
IPv6 Address If the IP address family is configured to be IPv6, enter the destination IPv6
address. Traps will be sent to this IP address. See Defining the IP Protocol
Version for Initiating Communications.
Community • Enter the community string for the SNMP read community.
Port • Enter the number of the port through which traps will be sent.
Heartbeat Period • Enter the interval, in minutes, between each heartbeat trap.
CLLI • Enter a Common Language Location Identifier (CLLI). The CLLI is free
text that will be sent with the trap. You can enter up to 100
characters.
Parameter Definition
V3 User Name If the SNMP Trap version selected in Figure 129 SNMP Parameters
Page page is V3, enter the name of a V3 user defined in the system.
To view or define a V3 user, use the Figure 130 V3 Users Page page.
Note: Make sure that an identical V3 user is also defined on the
manager's side.
Several tasks, such as software upgrade (except when performed using HTTP or HTTPS) and configuration backup,
export, and import, require the use of FTP or SFTP. The PTP 820 can function as an FTP or SFTP client. If you wish to
use FTP/SFTP, you must install FTP/SFTP server software on the PC or laptop you are using.
Note
For FTP, it is recommended to use FileZilla_Server software that can be downloaded from the web
(freeware).
For SFTP, it is recommended to use SolarWinds SFTP/SFCP server (freeware).
If you are using IPv6 to perform the operation, make sure to use FileZilla version 0.9.38 or higher to
ensure IPv6 support. If you are using another type of FTP or SFTP server, make sure the application
version supports IPv6.
2. Create a shared FTP/SFTP folder on the PC or laptop you are using to perform the FTP/SFTP operation (for
example, C:\FTPServer).
3. In the FTP/SFTP server, set up the permissions for the shared FTP/SFTP folder. For example, in FileZilla Server:
I. From the Edit menu, select Users.
II. In the Users window, select Shared folders.
III. Underneath the Shared folders section, click Add and browse for your shared FTP folder.
IV. Select the folder and click OK.
V. In the Shared folders section, select your shared FTP folder.
VI. In the Files and Directories sections, select all of the permissions.
VII. Click Set as home directory to make the Shared folder the root directory for your FTP server
VIII. Click OK to close the Users window.
Edit the File transfer port number for FTP and or SFTP and click Apply.
PTP 820 software and firmware releases are provided in a single bundle that includes software and firmware for all
components in the system. Software is first downloaded to the system, then installed. After installation, a reset is
automatically performed on all components whose software was upgraded.
Note
Make sure to use the original System Release software file, without any modification. Otherwise the
software download process will fail.
3. To display more detailed information about software component versions, select Show Detailed Information. The
Software Versions table opens in the Versions page. For a description of the information provided in the Software
Versions table, see Table 27: Software Versions Table Columns.
Parameter Definition
Downloaded Version The version, if any, that has been downloaded from the server but not yet
installed. Upon installation, this version will become the Installed Version.
Reset Type The level of reset required by the component in order for the Installed
Version to become the Active Version. A cold (hard) reset powers down
and powers back up the component. A warm (soft) reset simply reboots
the software or firmware in the component.
Note
When downloading an older version, all files in the bundle may be downloaded, including files that
are already installed.
Software bundles can be downloaded via HTTP, HTTPS, FTP or SFTP. After the software download is complete, you
can initiate the installation.
Note
Before performing a software upgrade, it is important to verify that the system date and time are
correct. See Setting the Time and Date (Optional).
When upgrading a node with unit protection, upgrade the standby unit first, followed by the active
unit.
Note
For HTTPS and SFTP downloads, be aware that only certain ciphers are supported in some operation
modes. For a list of supported ciphers, including an indication of which ciphers are supported in
HTTPS strong mode and FIPS mode, refer to Annex A – Supported Ciphers for Secured Communication
Protocols in the Release Notes for the product and version you are using.
Note
HTTP and HTTPS can only be used to download files for System release 9.5 and later. If there is a
requirement to downgrade from System release 9.5 or higher to an earlier version using HTTP or
HTTPS, contact Cambium Customer Support for assistance.
When downloading software via FTP or SFTP, the PTP 820 functions as an FTP or SFTP client. You must install FTP or
SFTP server software on the PC or laptop you are using to perform the software upgrade. For details, see Installing
and Configuring an FTP or SFTP Server.
Figure 208 Download & Install Page – HTTP/ HTTPS Download – No File Selected
3. Select HTTP
4. Click Choose File. A browser window opens.
5. Navigate to the directory in which the software file is located and selected the file. The selected file must be a ZIP
file.
6. Click Open. The file name of the selected file appears in the File Name field.
Figure 209 Download & Install page – HTTP/ HTTPS Download – File Selected
7. Click Download. The download begins. You can view the status of the download in the Download Status field.
Note
To Discontinue the download process, Click Abort.
8. Once the download has been completed, verify that the version you want to install has been downloaded. You
can check the downloaded version for each component by viewing the Downloaded Version column in the
Versions page. See Viewing Current Software versions.
7. In the File Transfer Protocol field, select the file transfer protocol you want to use (FTP or SFTP).
8. In the User name field, enter the user name you configured in the FTP server.
9. In the User password field, enter the password you configured in the FTP server. If you did not configure a
password for your FTP/SFTP user, simply leave this field blank.
10. If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
FTP/SFTP server in the Server IPv4 address field. See Defining the IP Protocol Version for Initiating
Communications.
11. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
FTP/SFTP server in the Server IPv6 Address field. See Defining the IP Protocol Version for Initiating
Communications.
12. In the Path field, enter the directory path from which you are downloading the files. Enter the path relative to
the FTP user's home directory, not the absolute path. If the location is the home directory, it should be left
empty. If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is
"C:\", this parameter can be left empty or populated with "//".
13. Click Apply to save your settings, and Close to close the FTP Parameters page.
14. Click Download. The download begins. You can view the status of the download in the Download Status field of
the Download & Install page. See Table 17 Download & Install Status Parameters.
15. Once the download has been completed, verify that the version you want to install has been downloaded. You
can check the downloaded version for each component by viewing the Downloaded Version column in the
Versions page. See Viewing Current Software Versions.
Note
If upgrading from version 7.9 or earlier:
Before you proceed to install the software, repeat the download process even if Download Success is
displayed in the Download status field, until the unit displays the message No new software modules
found.
In case of failure, wait at least 30 minutes and repeat the software download.
Installing Software
Note
For Instructions on how to configure a timed installation, see Configuring a Timed Installation.
To Install software:
1. Download the software version you want to install. See Downloading and installing Software.
2. Select Platform > Software > Download & Install. The Download & Install page opens. (Figure 140).
3. Click Install. The installation begins. You can view the status of the installation in the Download & Install - Status
Parameters section of the Download & Install Download & Install page. See Table 17 Download & Install Status
Parameters.
Upon completion of the installation, the system performs an automatic reset.
Note
• DO NOT reboot the unit during the software installation process. As soon as the process is
successfully completed, the unit will reboot itself.
• Sometimes the installation process can take up to 30 minutes.
• Only in the event that software installation was not successfully finished and more than 30
minutes have passed can the unit be rebooted..
Parameter Definition
Download status The status of any pending software download. Possible values are:
• Ready – The default value, which appears when no download is in progress.
• Verifying download files – The system is verifying the files to be downloaded.
• Download in progress – The download files have been verified, and the
download is in progress.
If an error occurs during the download, an appropriate error message is displayed
in this field.
When the download is complete, one of the following status indications appears:
• Download Success
• Download Failure
• All components already found in the system
When the system is reset, the Download Status returns to Ready.
Install status The status of any pending software installation. Possible values are:
• Ready – The default value, which appears when no installation is in progress.
• Verifying installation files – The system is verifying the files to be installed.
• Installation in progress – The installation files have been verified, and the
installation is in progress.
If an error occurs during the installation, an appropriate error message is displayed
in this field.
When the installation is complete, one of the following status indications appears:
• Installation Success
• Installation Partial Success
• Installation Failure
• incomplete-sw-version
When the system is reset, the Installation Status returns to Ready.
6. In the Software management timer field, enter the amount of time, in hours and minutes, you want to defer the
installation. For example, inFigure 116, the timer is set for two hours after the timer was configured (02:00).
You can import and export PTP 820 configuration files. This enables you to copy the system configuration to multiple
PTP 820 units. You can also backup and save configuration files.
Configuration files can only be copied between units of the same type, i.e., PTP 820C to PTP 820C, PTP 820C-HP
to PTP 820C-HP, PTP 820E to PTP 820E and PTP 820S to PTP 820S.
This section includes:
• Configuration Management Overview
• Viewing Current Backup Files
• Setting the Configuration Management Parameters
• Exporting a Configuration File
• Importing a Configuration File
• Deleting a Configuration File
• Backing Up the Current Configuration
• Restoring a Saved Configuration
• Editing CLI Scripts
Parameter Definition
Original system type The type of unit from which the backup configuration file was created.
Software version The software version of the unit from which the backup configuration file
was created.
Time of creation The time and date on which the configuration file was created.
Original IP address The IP address of the unit from which the configuration file was created.
System ID The System ID, if any, of the unit from which the configuration file was
created. This is taken from the Name field in the Unit Parameters page.
See Configuring Unit Parameters.
10. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
FTP server in the IPv6 Server Address field. See Defining the IP Protocol Version for Initiating Communications.
11. In the Path field, enter the location of the file you are downloading or uploading. If the location is the root shared
folder, it should be left empty. If the location is a sub-folder under the root shared folder, specify the folder
name. If the shared folder is "C:\", this parameter can be left empty or populated with "//".
12. In the FileName field, enter the name of the file you are importing, or the name you want to give the file you are
exporting.
Note
You must add the suffix .zip to the file name. Otherwise, the file import may fail. You can export the
file using any name, then add the suffix .zip manually.
13. Click Apply, then Close, to save the FTP parameters and return to the Configuration Management page
14. In the File number field, select from three system restore points:
o When you import a configuration file, the file is saved to the selected restore point, and
overwrites whichever file was previously held in that restore point.
o When you export a configuration file, the file is exported from the selected restore
point.
o When you back up the current configuration, the backup configuration file is saved to
the selected restore point, and overwrites whichever file was previously held in that
restore point.
o When you restore a configuration, the configuration file in the selected restore point is
the file that is restored.
Note
The Timed installation field is reserved for future use.
3. In the File Number field, select the restore point from which you want to export the file.
Note
The Timed installation field is reserved for future use.
4. Click Export. The export begins. You can view the status of the export in the File Transfer status field in the
Export/Import file status section. Possible values are:
o Ready – The default value, which appears when no import or export is in progress.
o File-in-Transfer – The file export is in progress.
o If an error occurs during the import or export, an appropriate error message is displayed
in this field.
When the import or export is complete, one of the following status indications appears:
o Succeeded
o Failure
The next time the system is reset, the File Transfer status field returns to Ready.
Note
The Timed installation field is reserved for future use.
o If an error occurs during the import or export, an appropriate error message is displayed
in this field.
When the import or export is complete, one of the following status indications appears:
o Succeeded
o Failure
The next time the system is reset, the File Transfer status field returns to Ready.
After importing the configuration file, you can apply the configuration by restoring the file from the restore point to
which you saved it. See Restoring a Saved Configuration.
Importing a Configuration File Via FTP or SFTP
To import a configuration file using FTP or SFTP:
1. Verify that you have followed all the steps in Setting the FTP/SFTP Configuration Management Parameters.
2. Select Platform > Configuration > Configuration Management. The Configuration Management page opens
(Figure 184).
3. Select FTP.
4. In the File Number field, select the restore point to which you want to import the file. The imported file will be
saved to the selected restore point, and will overwrite whatever file was previously held in that restore point.
5. Click Apply to save your settings.
6. Click Import. The import begins. You can view the status of the import in the File Transfer status field in the
Export/Import file status section. Possible values are:
◦ Ready – The default value, which appears when no import or export is in
progress.
◦ File-in-Transfer – The file import is in progress.
If an error occurs during the import or export, an appropriate error message is displayed in this
fieldWhen the import or export is complete, one of the following status indications appears:
• Succeeded
• Failure
The next time the system is reset, the File Transfer status field returns to Ready.
After importing the configuration file, you can apply the configuration by restoring the file from the restore point to
which you saved it. See Restoring a Saved Configuration.
1. Select Platform > Configuration > Configuration Management. The Configuration Management page opens
(Figure 145).
2. In the File Number field, select the restore point to which you want to back up the file. If another configuration
file is already saved to that restore point, it will be overwritten by the file you back up.
3. Click Backup. The backup begins. You can view the status of the backup in the Backup file creation status field.
Possible values in the status field are:
o Ready – The default value, which appears when no backup is in progress.
o Generating file – The system is verifying the files to be backed up.
If an error occurs during the backup, an appropriate error message is displayed in this field.
When the backup is complete, one of the following status indications appears:
o Succeeded
o Failure
The next time the system is reset, the Backup file creation status field returns to Ready.
Note
While a configuration restoration is taking place, no user can make any changes to the configuration.
All system configuration parameters are read-only during the configuration restoration.
Note
If any specific command in the CLI script requires reset, the unit is reset when that that command is
executed. During initialization following the reset, execution of the CLI script continues from the
following command.
You can restore the unit to its factory default configuration, while retaining the unit’s IP address settings and logs.
To restore the factory default settings:
1 Select Platform > Shelf Management > Chassis Configuration. The Chassis
Configuration page opens.
Note
This page is only available in Advanced mode. A limited version,
without the drag-and-drop functionality, is available in Basic view by selecting Device View.
1. Click Set to Factory Default. The unit is restored to its factory default settings. This does not change the unit's IP
address.
2. Click Reset.
3. A prompt appears asking if you want to proceed with the reset. Click Yes to initiate the reset.
The unit is reset.
Parameter Definition
Name A name for the unit (optional). This name appears at the top of every
Web EMS page.
Description Descriptive information about the unit. This information is used for
debugging, and should include information such as the chassis type.
System up time The time since the system was last reinitialized.
Contact person The name of the person to be contacted if and when a problem with the
system occurs (optional).
Parameter Definition
Measurement format The type of measurement you want the system to use: Metric or
Imperial.
Unit Temperature The current temperature of the unit. If the unit temperature goes lower
than -40°C or higher than 90°C, the unit raises an extreme temperature
alarm (Alarm ID 25). This alarm is cleared when the unit temperature rises
above -37°C or goes below 87°C.
Voltage input (Volt) The voltage input of the unit. If the voltage exceeds 60V, the unit raises a
high voltage alarm (Alarm ID 27). This alarm is cleared when the voltage
goes lower than 58V. If the voltage goes lower than 32V, the unit raises a
low voltage alarm (Alarm ID 26). This alarm is cleared when the voltage
rises above 34V.
User Comment A free text field for any information you want to record (up to 500
characters)
Configuring NTP
PTP 820 supports Network Time Protocol (NTP). NTP distributes Coordinated Universal Time (UTC) throughout the
system, using a jitter buffer to neutralize the effects of variable latency.
You can configure up to four NTP servers. Each server can be configured using IPv4 or IPv6. When multiple servers are
configured, the unit chooses the best server according to the implementation of Version 4.2.6p1 of the NTPD
(Network Time Protocol Daemon). The servers are continually polled. The polling interval is determined by the NTPD,
to achieve maximum accuracy consistent with minimum network overhead.
To view and configure the NTP Parameters:
1. Select Platform > Management > NTP Configuration. The NTP Configuration page opens.
2 Select a row in the NTP Configuration table and click Edit. The NTP Configuration Edit
page opens.
Note: For each NTP server, you can define an IPv4 address or an IPv6
address but not both.
4 In the NTP server IPv4 address or NTP server IPv6 address field, enter the IP address of the
NTP server.
5 Click Apply. Once you click Apply, the NTP Status Parameters appear. Table 31
describes the NTP Status Parameters.
Parameter Definition
Lock status Indicates the NTP status of the unit. Possible values are:
• LOCK – The NTP client is locked on a remote server.
• LOCAL – The NTP client is locked on the local system clock
(free running clock).
• CANDIDATE – The server is next in line to be selected if the
currently locked server is discarded.
• N/A – The NTP client is not locked on any clock or NTP is
disabled.
IPv4 address The IPv4 address of the NTP server (if configured).
IPv6 address The IPv6 address of the NTP server (if configured).
Refid The NTP client time server.
Static and dynamic monitoring is available for SFP modules, including all SFP, SFP+, and CSFP modules used in
Ethernet and MIMO ports in PTP 820 all-outdoor products.
Dynamic monitoring (DDM) PMs are also available.
The following alarms are available in connection with SFP DDM and inventory monitoring. The polling interval for
these alarms is one minute.
• Alarm #803- SFP port RX power level is too low.
• Alarm #804 – SFP port RX power level is too high.
• Alarm #805- SFP port TX power level is too low.
• Alarm #806 – SFP port TX power level is too high.
These alarms are based on thresholds defined by the SFP module vendor, which are static. They also display the
actual RX or TX values as of the time when the alarm was raised, which are dynamic. The dynamic values are not
changed as long as the alarm is still raised. They are only updated if the alarm is cleared, then raised again.
If there is no signal on the interface, a Loss of Carrier alarm (LOC) is raised, and this alarm masks the DDM alarms.
2 In the SFP Transceiver field, select the SFP interface about which you want to display information.
Note: In a 2E2SX PTP 820C unit, P4 is displayed as Ethernet: Slot 1, Port 4 when used as a
traffic port, and Extension: Slot 1, Port 1 when used as an Extension port in MIMO and Space
Diversity configurations.
Parameter Description
Link Length SM Fiber (km) The maximum length of the cable (in km) for single mode fiber
cables.
Link Length OM1 Fiber (m) The maximum length of the cable (in meters) for OM1 multi-
mode fiber cables.
Link Length OM2 Fiber (m) The maximum length of the cable (in meters) for OM2 multi-
mode fiber cables.
Link Length OM3 Fiber (m) The maximum length of the cable (in meters) for OM3 multi-
mode fiber cables.
2 In the Interface field, select the interface for which you want to display PMs.
Note: In a 2E2SX PTP 820C unit, P4 is displayed as Ethernet: Slot 1, Port 4 when used as a
traffic port, and Extension: Slot 1, Port 1 when used as an Extension port in MIMO and
Space Diversity configurations.
Note: No entries are displayed if the SFP device does not support DDM, or if the Admin
status of the interface is Down.
DDM PMs are not persistent, which means they are not saved in the event of unit reset. RX and TX power levels
are collected five times per 15-minute interval. 15-minute PM data is saved for 24 hours. 24-hour PM data, which
is updated every 15 minutes, is saved for 30 days.
Error! Reference source not found. describes the DDM PMs.
Parameter Definition
Avg RX Power (dBm) The average RX power during the interval (dBm).
Min TX Power (dBm) The minimum TX power during the interval (dBm).
Max TX Power (dBm) The maximum TX power during the interval (dBm).
Avg TX Power (dBm) The average TX power during the interval (dBm).
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. An x in the column indicates that the values are not
reliable. Possible causes are (i) an LOC alarm, (ii) changing the Admin status
of the interface, or (iii) unit reset.
You can define a login banner of up to 2,000 bytes. This banner will appear every time a user establishes a
connection with the Web EMS. The banner appears before the login prompt, so that users will always see the login
banner and must manually close the banner before logging in to the Web EMS.
To define a login banner:
1 Select Platform > Management > Login Banner. The Login Banner page opens.
You can configure the radios and display the radio parameters in the Radio Parameters page.
Note
For instructions how to configure the radio parameters, see Configuring the Radio Parameters.
2. For multi-carrier units, select the carrier in the Radio table (see Figure 155) and click Edit. A separate Radio
Parameters page opens. The page is essentially identical to the single-carrier page, except for the addition of a
Radio location parameter.
Figure 227 Radio Parameters Page Per Carrier – PTP 820C/PTP 820C-HP
Table 24 lists and describes the parameters in the Radio table of the PTP 820C or PTP 820C-HP Radio Parameters
page and the Status parameters section of the Radio Parameters configuration page.
Parameter Definition
XPIC Support Indicates whether the carrier is operating in XPIC mode. For instructions
on configuring XPIC, refer to Configuring XPIC.
Note: Only relevant for PTP 820C units.
Radio Interface Indicates whether the carrier is operational (Up) or not operational
operational status (Down).
Operational TX Level The actual TX signal level (TSL) of the carrier (in dBm).
(dBm)
RX Level (dBm) The actual measured RX signal level (RSL) of the carrier (in dBm).
Modem MSE (dB) The MSE (Mean Square Error) of the RX signal, measured in dB. A value of
0 means that the modem is not locked.
Modem XPI (dB) The XPI (Cross Polarization Interference) level, measured in dB.
Note: Only relevant for PTP 820C units.
Defective Blocks The number of defective radio blocks that have been counted. Click Clear
Counter to reset this counter.
You can view and configure the parameters of the carrier or carriers at the remote side of the link in the Remote
Radio Parameters page.
To display the remote radio parameters:
1. Select Radio > Remote Radio Parameters. The Remote Radio Parameters page opens.
o For multi-carrier units, the Radio Parameters page initially displays a table as shown
in Figure 157.
o For single-carrier units, the page appears as shown in Figure 158
Figure 229 Remote Radio Parameters Page – PTP 820S /PTP 820E
2. For multi-carrier units, select the carrier in the Remote Radio table (see Figure 157) and click Edit. A separate
Remote Radio Parameters page opens. The page is identical to the single-carrier page.
Figure 230: Remote Radio Parameters Page Per Carrier – PTP 820C
3. Configure the remote radio parameters. For a description of these parameters, see Table 25 Remote Radio
Parameters.
4. Click Apply.
You can also reset the remote unit from the Remote Radio Parameters – Edit page:
To reset the remote unit, click Reset Remote Unit.
Parameter Definition
Remote Radio Location Read-only. Identifies the location of the remote radio.
Local Remote Channel Read-only. The operational status of the active (in a protection
Operational Status configuration) remote channel.
Remote Receiver Signal Read-only. The Rx level of the remote radio, in dBm.
Level
Parameter Definition
Remote Most Severe Read-only. The level of the most severe alarm currently active on the
Alarm remote unit.
Remote Unit Link ID Edit page only. Identifies the link, in order to distinguish it from other
links. Enter a unique identifier from 1 to 65535.
Remote Tx Output Level The remote unit's Tx output level, if the remote unit has been configured
to operate at a fixed Tx level (in dBm).
Remote Radio Mute To mute the TX output of the remote radio, select On. To unmute the TX
output of the remote radio, select Off.
ATPC is a closed-loop mechanism by which each carrier changes the TX power according to the indication received
across the link, in order to achieve a desired RSL on the other side of the link.
With ATPC, if the radio increases its TX power up to the configured TX power, it can lead to a period of sustained
transmission at maximum power, resulting in unacceptable interference with other systems.
In order to minimize interference, PTP 820C and PTP 820S provide an ATPC override mechanism. If ATPC override
is enabled, a timer begins whenever ATPC raises the TX power to its maximum. When the timer expires, the radio
enters ATPC override state. In ATPC override state, the radio transmits no higher than the pre-determined ATPC
override TX level, and an ATPC override alarm is raised. The radio remains in ATPC override state until the ATPC
override state is manually cancelled by the user (or until the unit is reset). The radio then returns to normal ATPC
operation.
In a configuration with unit protection, the ATPC override state is propagated to the standby unit in the event of
switchover.
Note
When canceling an ATPC override state, you should ensure that the underlying problem has been
corrected. Otherwise, ATPC may be overridden again.
You cannot use ATPC in MIMO mode. See Configuring MIMO and Space Diversity
1 For multi-carrier units, select the carrier you wish to configure in the ATPC
table (see Figure 160) and click Edit. A separate ATPC –Edit page opens. The
page is essentially identical to the single-carrier page.
Figure 232 ATPC – Edit Page per Carrier – PTP 820C/PTP 820C-HP
2. In the ATPC Admin field, select Enable to enable ATPC or Disable to disable ATPC.
3. Click Apply. If you selected ATPC -Admin – Enable, the Reference RX Level (dBm) and ATPC Override Admin
fields are now displayed.
4. In the Reference RX Level (dBm) field, enter a number between -70 and -30 as the reference value for the
ATPC mechanism. When ATPC is enabled, it adjusts the TX power dynamically to preserve this RSL level. The
range of values depends on the frequency, MRMC script, and RFU type.
5. In the ATPC Override Admin field, select Enable to enable ATPC override or Disable to disable ATPC override.
You can only enable ATPC override if ATPC itself is enabled.
Note
Make sure to set an appropriate value in the Override Timeout field before enabling ATPC override.
Failure to do so can lead to unexpected reduction of the TX power with corresponding loss of
capacity if TX override is enabled with the timer set to a lower-than-desired value.
6. Click Apply. If you selected ATPC Override Admin – Enable, the ATPC Override State, Override TX Level, and
ATPC Override Admin fields are now displayed.
7. In the Override TX Level field, select the TX power, in dBm, to be used when the unit is in an ATPC override
state. The range of values depends on the frequency, MRMC script, and RFU type.
8. In the Override Timeout field, select the amount of time, in seconds, the timer counts from the moment the
radio reaches its maximum configured TX power until ATPC override goes into effect. You can select from 0 to
1800 seconds.
9. In the Remote ATPC Admin field, select Enable to enable ATPC or Disable to disable ATPC on the remote radio
carrier.
10. Click Apply. If you selected Remote ATPC Admin – Enable, the Remote Reference RX Level (dBm) field is now
displayed.
11. In the Remote Reference RX Level (dBm) field, enter a number between -70 and -30 as the reference value for
the ATPC mechanism on the remote radio carrier.
12. Click Apply.
To cancel an ATPC override state on the local unit, click Cancel Override.
Note
ForPTP 820E Header De-Duplication is available for all channels except 500 MHz. Make sure to disable
Header De-Duplication before selecting a 500 MHz MRMC script
Header De-Duplication enables operators to significantly improve Ethernet throughout over the radio link without
affecting user traffic. Header De-Duplication can be configured to operate on various layers of the protocol stack,
saving bandwidth by reducing unnecessary header overhead. Header De-duplication is also sometimes known as
header compression.
Note
The Header De-Duplication configuration must be identical on both sides of the link.
Using the Frame Cut-Through feature, frames assigned to queues with 4th priority pre-empt frames already in
transmission over the radio from other queues. Transmission of the pre-empted frames is resumed after the
cut -through with no capacity loss or re-transmission required.
Note
If Frame Cut-Through is used together with 1588 Transparent Clock, the 1588 packets must be given
a CoS that is not assigned to the fourth priority queue.
Figure 233 Radio Ethernet Interface Configuration Page – PTP 820C/PTP 820C-HP
Note
The Header De-duplication type column in the Main page and the Header De-duplication type field
in the Edit page are not operational. To monitor the Header De-Duplication setting and status, use
the Header De-duplication mode and Header De-duplication operational state columns and fields.
2. For multi-carrier units, select the carrier in the Radio Ethernet and Compression table (see Figure 162) and
click Edit. A separate Radio Ethernet Interface Configuration page opens. The page is essentially identical to
the single-carrier page.
3. Click Edit. The Radio Ethernet Interface Configuration – Edit page opens.
Figure 234 Radio Ethernet Interface Configuration – Edit Page Per Carrier – PTP 820C/PTP 820C-HP
4. In the Cut through mode field, select Yes to enable Frame Cut-Through or No to disable Frame Cut-Through.
5. In the Header Compression mode field, select from the following options:
o Disabled – Header De-Duplication is disabled.
o Layer2 – Header De-Duplication operates on the Ethernet level.
o MPLS – Header De-Duplication operates on the Ethernet and MPLS levels.
o Layer3 – Header De-Duplication operates on the Ethernet and IP levels.
o Layer4 – Header De-Duplication operates on all supported layers up to Layer 4.
o Tunnel – Header De-Duplication operates on Layer 2, Layer 3, and on the Tunnel
layer for packets carrying GTP or GRE frames.
o Tunnel-Layer3 – Header De-Duplication operates on Layer 2, Layer 3, and on the
Tunnel and T-3 layers for packets carrying GTP or GRE frames.
o Tunnel-Layer4 – Header De-Duplication operates on Layer 2, Layer 3, and on the
Tunnel, T-3, and T-4 layers for packets carrying GTP or GRE frames.
6. Click Apply, then Close
Note
The Utilization threshold field is not applicable.
Figure 235 Radio Ethernet Interface Counters Page – PTP 820C/PTP 820C-HP
2. For multi-carrier units, select the carrier in the Header Compression Counters table (Figure 164) and
click View. A separate Radio Ethernet Interface Configuration page opens. The page is essentially identical to
the Single-carrier page.
Figure 237 Radio Ethernet Interface Counters Page Per Carrier – PTP 820C/PTP 820C-HP
Table 26 lists and describes the fields in the Radio Ethernet Interface Counters page.
Parameter Definition
TX compressed bytes Bytes on the TX side that were compressed by Header De-Duplication.
Parameter Definition
TX frames compressed by Frames on the TX side that were compressed by Header De-Duplication.
enhanced HC
TX learning frames The number of frames that have been used to learn unique data flows.
Once a particular flow type has been learned, subsequent frames with
that flow type are compressed by Header De-Duplication.
TX frames not compressed Frames on the TX side that were not compressed due to exclusion rules.
due to excluding rule Note: The use of exclusion rules for Header De-Duplication is planned for
future release.
TX frames not compressed Frames on the TX side that were not compressed for reasons other than
due to other reasons the use of exclusion rules.
TX number of active flows The number of Header De-Duplication flows that are active on the TX
side.
Port RX good bytes The number of good bytes received on the port since the last time the
Radio Ethernet Interface counters were cleared.
Port RX good frames The number of good frames received on the port since the last time the
Radio Ethernet Interface counters were cleared.
Port TX total bytes The number of bytes transmitted since the last time the Radio Ethernet
Interface counters were cleared.
Port TX frames The number of frames transmitted since the last time the Radio Ethernet
Interface counters were cleared.
Port TX idle bytes The number of idle bytes transmitted since the last time the Radio
Ethernet Interface counters were cleared.
TX frames The number of frames that have been transmitted via Frame Cut-Through
since the last time the Radio Ethernet Interface counters were cleared.
Note
In order for the AES activation key to become active, you must reset the unit after configuring a valid
AES activation key. Until the unit is reset, an alarm will be present if you enable AES. This is not the
case for other activation keys.
PTP 820C and PTP 820S support AES-256 payload encryption. AES is enabled and configured separately for each
radio carrier.
PTP 820 uses a dual-key encryption mechanism for AES:
• The user provides a master key. The master key can also be generated by the system upon user command. The
master key is a 32-byte symmetric encryption key. The same master key must be manually configured on both
ends of the encrypted link.
• The session key is a 32-byte symmetric encryption key used to encrypt the actual data. Each link uses two
session keys, one for each direction. For each direction, the session key is generated by the transmit side unit
and propagated automatically, via a Key Exchange Protocol, to the other side of the link. The Key Exchange
Protocol exchanges session keys by encrypting them with the master key, using the AES-256 encryption
algorithm. Session keys are regenerated at user-configured intervals.
The first KEP exchange that takes place after a new master key is configured causes traffic to be blocked for up to
one minute, until the Crypto Validation State becomes Valid. Subsequent KEP exchanges that take place when a
session key expires do not affect traffic. KEP exchanges have no effect upon ACM, RSL, and MSE.
To configure payload encryption:
1. Verify that both the local and remote units are running with no alarms. If any alarm is present, take corrective
actions to clear the alarms before proceeding.
2. If the link is using in-band management, identify which unit is local and which unit is remote from the
management point of view.
3. In a protected link, enable protection lockout, first on the remote and then on the local unit. See Disabling
Automatic Switchover to the Standby Unit.
4. On the remote unit, select Radio > Payload Encryption. The Payload Encryption page opens.
o For multi-carrier units, the Payload Encryption page initially displays a table as shown in Figure 167
Payload Encryption Page
o For PTP 820S units, a page appears, similar to Figure 168(which shows in PTP 820C/PTP 820C-HP
page).
5. Select the carrier you want to configure and click Edit. The Payload Encryption – Edit page opens.
You must use the same master key on both sides of the link. This means that if you generate a master key
automatically on one side of the link, you must copy that key and for use on the other side of the link. Once
payload encryption has been enabled on both sides of the link, the Key Exchange Protocol periodically verifies that
both ends of the link have the same master key. If a mismatch is detected, an alarm is raised and traffic
transmission is stopped for the mismatched carrier at both sides of the link. The link becomes non-valid and traffic
stops being forwarded.
When you enter a master key, or when the master key is automatically generated, the key is hidden behind dots.
To copy the master key, you must display the key. To display the master key, click Show Key. A new Master key
field appears, displaying the master key. You can copy the key to the clipboard from this field.
Figure 240 Payload Encryption – Edit Page with Master Key Displayed
Note
The Session Key Period must be the same on both sides of the link.
Note
The Crypto Validation State field indicates whether the interface is functioning properly, with AES-256
encryption. In order for this field to display Valid, both the interface itself and AES-256 encryption
must be enabled, the hardware must be in place and functioning properly, initialization must be
finished, and AES-256 encryption must be functioning properly, with no loopback on the interface.
10. Enable payload encryption on the local unit by following the procedure described in Step 9 Verify that on both
the local and remote active units, the link status returns to Up and user traffic is restored. In links using in-
band management, verify also that in-band management returns.
11. In a protected link, perform copy-to-mate, first on the remote and then on the local unit. See Step 5 in
Configuring HSB Radio Protection. After the copy-to-mate operation, wait for both standby units to re-boot
and verify that there are no alarms.
Note
The standby unit may have a payload encryption failure alarm for up to about one minute after the
unit is up and running.
12. In a protected link, remove the protection lockout, first on the remote and then on the local unit. See
Disabling Automatic Switchover to the Standby Unit.
13. Verify that there are no alarms on the link.
Note
Any time payload encryption fails, the Operational status of the link is Down until payload encryption
is successfully restored.
Note
The Radio > PM & Statistics > Diversity and Radio > PM & Statistics > Combined pages are reserved
for future use.
2. In the Excessive BER admin field, select Enable to enable excessive BER administration or Disable to disable
excessive BER administration. Excessive BER administration determines whether or not excessive BER is
propagated as a fault and considered a system event. For example, if excessive BER administration is enabled,
excessive BER can trigger a protection switchover and can cause a synchronization source to go into a failure
status. Excessive BER administration is enabled or disabled for the entire unit rather than for specific radios.
3. In the Thresholds table, select the radio for which you want to configure thresholds.
4. Click Edit. The Radio BER Thresholds – Edit page opens.
5. In the Excessive BER Threshold field, select the level above which an excessive BER alarm is issued for errors
detected over the radio link. The range values is 1e-3 to 1e-10.
6. In the Signal Degrade BER Threshold field, select the level above which a Signal Degrade alarm is issued for
errors detected over the radio link. The range values is 1e-6 to 1e-15.
7. Click Apply, then Close.
Note
To display the same parameters for an individual radio in a separate page, select the radio in the
MRMC script status table and click Edit. You can configure Adaptive TX Power from the MRMC Status
– Edit page. See Enabling ACM with Adaptive Transmit Power.
Parameter Definition
Radio Location Identifies the carrier (Slot 2, port 1 or Slot 2, port 2).
Note: Only relevant for PTP 820C and PTP 820C-HP units.
2. For the PTP 820C and PTP 820C-HP, In the Port field, select the port that holds the radio for which you want to
display PMs.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
MRMC PM table and click View.
2. For each radio carrier, you can enter define two thresholds. In the MRMC PM Threshold 1 column, select the
higher profile threshold. In the MRMC PM Threshold 2 column, select the lower profile threshold. The default
value for each threshold is Profile 0.
3. Click Apply, then Close.
Parameter Definition
PM Interval The length of the interval for which the PMs were measured (15 Minutes
or 24 Hours).
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min profile Displays the minimum ACM profile that was measured during the
interval.
Max profile Displays the maximum ACM profile that was measured during the
interval.
Min bitrate Displays the minimum total radio throughput (Mbps) delivered during the
interval.
Max bitrate Displays the maximum total radio throughput (Mbps) delivered during
the interval.
Seconds above Threshold Displays the number of seconds the radio was above both ACM profile
1 thresholds during the interval.
Seconds below Threshold Displays the number of seconds the radio was below ACM profile
1 threshold 1 during the interval.
Seconds below Threshold Displays the number of seconds the radio was below ACM profile
2 threshold 2 during the interval.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
2. For Multi-carrier units, you can select the carrier in the Radio table (see Figure 174) and click View to display a
page for that carrier. A separate Counters page opens.
2. For the PTP 820C and PTP 820C-HP, in the Interface field, select the radio for which you want to display PMs.
3. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
Table 29 describes the Signal Level PMs.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the RF
PM table and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Max TSL (dBm) The maximum TSL (Transmit Signal Level) that was measured during the
interval.
Min TSL (dBm) The minimum TSL (Transmit Signal Level) that was measured during the
interval.
Max RSL (dBm) The maximum RSL (Received Signal Level) that was measured during the
interval.
Parameter Definition
Min RSL (dBm) The minimum RSL (Received Signal Level) that was measured during the
interval.
TSL exceed threshold The number of seconds the measured TSL exceeded the threshold during
seconds the interval. TSL thresholds are configured in the Radio Thresholds page.
See Configuring BER Thresholds and Displaying Current BER
RSL exceed threshold1 The number of seconds the measured RSL exceeded RSL threshold 1
seconds during the interval. RSL thresholds are configured in the Radio Thresholds
page. See Configuring BER Thresholds and Displaying Current BER.
RSL exceed threshold2 The number of seconds the measured RSL exceeded RSL threshold 2
seconds during the interval. RSL thresholds are configured in the Radio Thresholds
page. See Configuring BER Thresholds and Displaying Current BER
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
To set the Signal Level PM thresholds, click Thresholds. The Signal Level Thresholds Configuration – Edit Page
opens. Set the thresholds, described in Table 30, and click Apply.
Parameter Definition
RX Level Threshold 1 Specify the threshold for counting exceeded seconds if the RSL is below
(dBm) this level.
RX Level Threshold 2 Specify a second threshold for counting exceeded seconds if the RSL is
(dBm) below this level.
TX Level Threshold (dBm) Specify the threshold for counting exceeded seconds if the TSL is below
this level.
2. For the PTP 820C and PTP 820C-HP, in the Interface field, select the radio for which you want to display PMs.
3. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
Table 31 describes the Modem BER (Aggregate) PMs.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
Modem BER PM table and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
SES Displays the number of severe error seconds in the measuring interval.
UAS Displays the Unavailable Seconds value of the measured interval. The
value can be between 0 and 900 seconds (15 minutes).
BBE Displays the number of background block errors during the measured
interval.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
2. For the PTP 820C and PTP 820C-HP, in the Interface field, select the radio for which you want to display PMs.
3. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
Table 32 describes the Modem MSE PMs.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
Modem MSE PM table and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min MSE (dB) Displays the minimum MSE in dB, measured during the interval. A 0 in
this field and an X in the Integrity field may also indicate that the modem
was unlocked during the entire interval.
Parameter Definition
Max MSE (dB) Displays the maximum MSE in dB, measured during the interval. A 0 in
this field and an X in the Integrity field may also indicate that the modem
was unlocked.
Exceed threshold seconds Displays the number of seconds the MSE exceeded the MSE PM threshold
during the interval. The MSE PM is configured in the Radio Thresholds
page. See Configuring BER Thresholds AND Displaying Cureent BER.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time. An X and a 0 value in the Max MSE field may also
indicate that the modem was unlocked.
To set the Modem MSE PM thresholds, click Thresholds. The Modem MSE Thresholds Configuration– Edit Page
opens. For each radio, specify the modem MSE (Mean Square Error) threshold for calculating MSE Exceed
Threshold seconds, and click Apply.
Note
The XPI page only appears if XPIC is configured on the unit.
4. In the Interface field, select the radio for which you want to display PMs.
5. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
Modem XPI PM table and click View.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Min XPI (dB) The minimum XPI level that was measured during the interval.
Max XPI (dB) The maximum XPI level that was measured during the interval.
XPI below threshold The number of seconds the measured XPI level was below the threshold
seconds during the interval.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
To set the XPI PM thresholds, click Thresholds. The XPI Thresholds Configuration– Edit Page opens. For each radio,
specify the modem XPI threshold for calculating XPI Exceed Threshold seconds, and click Apply.
Figure 255 XPI Thresholds Configuration – Edit Page
2. For the PTP 820C and PTP 820C-HP, in the Port field, select the port that holds the radio for which you want to
display PMs.
3. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
To set the thresholds for capacity and throughput PMs:
1. Select Threshold. The Ethernet Radio Capacity & Throughput Threshold page opens.
o
2. Enter the capacity and throughput thresholds you want, in Mbps. The range of values is 0 to 4294967295. The
default value for is 1000.
3. Click Apply, then Close.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
PM table and click View.
Parameter Definition
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak capacity (Mbps) Displays the highest L1 bandwidth, in Mbps, sent through the selected
radio during the measured time interval.
Average capacity (Mbps) Displays the average L1 bandwidth, in Mbps, during the measured time
interval.
Seconds exceeding Displays the number of seconds during the measured time interval during
Threshold which the L1 bandwidth exceeded the configured capacity threshold.
Peak throughput (Mbps) Displays the highest throughput, in Mbps, that occurred for the selected
radio during the measured time interval.
Average throughput Displays the average throughput, in Mbps, for the selected radio during
(Mbps) the measured time interval.
Seconds exceeding Displays the number of seconds during the measured time interval during
Threshold which the throughput exceeded the configured throughput threshold.
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
2. For the PTP 820C and PTP 820C-HP, in the Port field, select the port that holds the radio for which you want to
display PMs.
3. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
1 2For each radio and Multi-Carrier ABC group, you can enter three thresholds, in % (1-100).
Utilization Threshold 1 should be the highest and Utilization Threshold 3 should be the lowest. The
default value for each threshold is 0.
3 Click Apply, then Close
Table 35 describes the capacity and throughput PMs.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
PM table and click View.
Parameter Definition
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak utilization (%) Indicates the highest utilization of the radio capacity that occurred for the
selected radio or group during the measured time interval.
Average utilization (%) Indicates the average utilization of the radio capacity for the selected
radio or group during the measured time interval.
Seconds exceeding Displays the number of seconds during the measured time interval during
Threshold which the L1 bandwidth exceeded the configured utilization threshold.
Seconds exceeding Displays the number of seconds during the measured time interval during
Threshold 2 which the L1 bandwidth exceeded Threshold 2.
Seconds exceeding Displays the number of seconds during the measured time interval during
Threshold 3 which the L1 bandwidth exceeded Threshold 3 (the lowest threshold).
Seconds below Threshold 3 Displays the number of seconds during the measured time interval during
which the L1 bandwidth was less than Threshold 3 (the lowest threshold).
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
2. For the PTP 820C and PTP 820C-HP, in the Port field, select the port that holds the radio for which you want to
display PMs.
3. In the Interval Type field:
o To display reports in 15-minute intervals, select 15 minutes.
o To display reports in daily intervals, select 24 hours.
Note
To display the same parameters for a specific interval in a separate page, select the interval in the
PM table and click View.
Parameter Definition
Time interval index For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
FER Displays the frame error rate (%) during the measured time interval.
Parameter Definition
Integrity Indicates whether the values received at the time and date of the
measured interval are reliable. An x in the column indicates that the
values are not reliable due to a possible power surge or power failure that
occurred at that time.
Note
You can use the management service for in-band management. For instructions on configuring in-
band management, see Configuring In-Band Management.
A service point is a logical entity attached to a physical or logical interface. Service points define the movement of
frames through the service. Each service point includes both ingress and egress attributes. A Point-to-Point or
Multipoint service can hold up to 32 service points. A Management service can hold up 30 service points.
For a more detailed overview of PTP 820's service-oriented Ethernet switching engine, refer to the Technical
Description for the PTP 820 product type you are using.
• Use the same Service ID for all service fragments along the path of the service.
• Do not re-use the same Service ID within the same region. A region is defined as consisting of all PTP 820
devices having Ethernet connectivity between them.
• Use meaningful EVC IDs.
• Give the same EVC ID (service name) to all service fragments along the path of the service.
• Do not reuse the same EVC ID within the same region.
It is recommended to follow these guidelines for creating service points:
• Always use SNP service points on NNI ports and SAP service points on UNI ports.
• For each logical interface associated with a specific service, there should never be more than a single service
point.
• The transport VLAN ID should be unique per service within a single region. That is, no two services should use
the same transport VLAN ID.
Parameter Definition
EVC ID The Ethernet Virtual Connection (EVC) ID. This parameter does not affect
the network element’s behavior, but is used by the NMS for topology
management.
EVC description The Ethernet Virtual Connection (EVC) description. This parameter does
not affect the network element’s behavior, but is used by the NMS for
topology management.
3. In the Service ID field, select a unique ID for the service. You can choose any unused value from 1 to 4095.
Once you have added the service, you cannot change the Service ID. Service ID 1025 is reserved for a
pre-defined management service.
4. In the Service Type field, select the service type:
o MP – Multipoint
o MNG – Management
o P2P – Point-to-Point
5. Optionally, in the EVC ID field, enter an Ethernet Virtual Connection (EVC) ID (up to 20 characters). This
parameter does not affect the network element’s behavior, but is used by the NMS for topology management.
6. Optionally, in the EVC Description field, enter a text description of the service (up to 64 characters). This
parameter does not affect the network element’s behavior, but is used by the NMS for topology management.
7. In the Admin field, select one of the following options:
o Operational - The service is functional.
o Reserved - The service is disabled until this parameter is changed to Operational. In
this mode, the service occupies system resources but is unable to receive and
transmit data.
8. In the MAC table size field, enter the maximum MAC address table size for the service. The MAC address table
is a source MAC address learning table used to forward frames from one service point to another. You can
select a value from 16 to 131,072, in multiples of 16. This maximum only applies to dynamic, not static, MAC
address table entries.
Note
Additional configuration of the MAC address table can be performed via the CLI. See Defining the
MAC Address Forwarding Table for a Service.
9. In the Default CoS field, enter a default Class of Service (CoS) value (0-7). This value is assigned to frames at
the service level if CoS Mode is set to Default-CoS. Otherwise, this value is not used, and frames retain
whatever CoS value they were assigned at the service point or logical interface level.
10. In the CoS Mode field, select one of the following options. This parameter determines whether or not frames
passing through the service have their CoS modified at the service level. The CoS determines the priority
queue to which frames are assigned.
o Default CoS – Frames passing through the service are assigned the default CoS
defined above. This CoS value overrides whatever CoS may have been assigned at the
service point or interface level.
o Preserve-SP-COS-Decision – The CoS of frames passing through the service is not
modified by the service's default CoS.
11. Click Apply, then Close to close the Ethernet Services - Add page.
12. Add service points. You must add service points to the service in order for the service to carry traffic. See
Configuring Service Points.
Editing a Service
To edit a service:
1. Select Ethernet > Services. The Ethernet Services page opens (Figure 189).
2. Select the service in the Service Configuration Table.
3. In the Ethernet Services page, click Edit. The Ethernet Services - Edit page opens.
4. This page is identical to the Ethernet Services - Add page (Figure 190). You can edit any parameter that can be
configured in the Add page, except the Service ID.
Deleting a Service
Before deleting a service, you must first delete any service points attached to the service.
To delete a service:
1. Delete all service points attached to the service you wish to delete, as described in Deleting a Service Point.
2. Select Ethernet > Services. The Ethernet Services page opens (Figure 189).
3. Select the service in the Ethernet Service Configuration Table.
4. Click Delete. The service is deleted.
1. Select Ethernet > Services. The Ethernet Services page opens (Figure 189).
2. Select the services in the Ethernet Services Configuration table, or select all the services by selecting the check
box in the top row.
o To enable the selected services, in the Multiple Selection Operation section
underneath the Ethernet Services Configuration Table, select Operational and click
Apply.
o To disable the selected services, in the Multiple Selection Operation section
underneath the Ethernet Services Configuration Table, select Reserved and click
Apply.
o To delete the selected services, select Delete underneath the Ethernet Services
Configuration Table. Before deleting a service, you must delete any service points
attached to the service, as described in Deleting a Service Point.
Note
When setting multiple services to Reserve state, make sure to avoid setting the management service
to Reserve state.
When setting multiple services to Reserve state, make sure to avoid setting the management service to Reserve
state
• Attaching VLANs
You can choose to display the following sets of attributes by selecting the appropriate button above the SP
Attributes table:
Parameter Definition
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint
services, the range of values is 1-32. For Management services, the range
of values is 1-30.
When adding a service point, you can select a service point ID from the
available options in the Service point ID drop-down list in the Ethernet
Service Points – Add page. Once you have added the service point, you
cannot change the service point ID.
Service point name A descriptive name for the service point (optional). The Service Point
Name can be up to 20 characters.
Parameter Definition
Interface location The physical or logical interface on which the service point is located.
Once you have added the service point, you cannot change this
parameter.
Attached interface type The encapsulation type (Ethertype) for frames entering the service point.
Once you have added the service point, you cannot change this
parameter.
The Attached Interface Type determines which frames enter the service
via this service point, based on the frame’s VLAN tagging. Since more than
one service point may be associated with a single interface, frames are
assigned to the earliest defined service point in case of conflict.
For a list of available Attached Interface Types, the types of frames to
which each one applies, and the service point types for which each one is
available, see Table 39.
C-Vlan encapsulation The C-VLAN classified into the service point. Options are 1-4094,
Untagged, or N.A. (Not Applicable). Once you have added the service
point, you cannot change this parameter.
If you selected Bundle-C in the Attached Interface Type field, select
Untagged or N.A. You can then add multiple C-VLANs via the Attach
VLAN option. See Attaching VLANs.
Parameter Definition
S-Vlan encapsulation The S-VLAN classified into the service point. Options are 1-4094,
Untagged, or N.A. (Not Applicable). Once you have added the service
point, you cannot change this parameter.
If you selected Bundle-S in the Attached Interface Type field, select the S-
VLAN value to classify into the service point (1-4094), or select Untagged.
You can then add multiple C-VLANs via the Attach VLAN option. See
Attaching VLANs.
s-tag A single S-VLAN is classified into the service SNP, PIPE, and MNG
point.
Parameter Definition
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint
services, the range of values is 1-32. For Management services, the range
of values is 1-30.
Service point name A descriptive name for the service point (optional). The Service Point
Name can be up to 20 characters.
Learning admin Determines whether MAC address learning for incoming frames is
enabled (Enable) or disabled (Disable). When enabled, the service point
learns the source MAC addresses of incoming frames and adds them to a
MAC address forwarding table.
Allow flooding Determines whether incoming frames with unknown MAC addresses are
forwarded to other service points via flooding. Select Allow to allow
flooding or Disable to disable flooding.
Allow broadcast Indicates whether frames with a broadcast destination MAC address are
allowed to ingress the service via this service point. Select Allow to allow
broadcast or Disable to disable broadcast.
Parameter Definition
CoS Mode Indicates how the service point handles the CoS of frames that pass
through the service point. Options are:
• Default CoS – The service point re-defines the CoS of frames that pass
through the service point, according to the Default CoS (below). This
decision can be overwritten on the service level.
• Interface-Decision – The service point preserves the CoS decision
made at the interface level. The decision can still be overwritten at
the service level.
• MAC DA - The service point checks each frame against a list of user-
defined MAC DAs. If there is a match, the service point applies to the
frame the CoS and Color defined for that MAC DA. If there is no
match, the service point preserves the CoS decision made at the
interface level. See Classification Overview.
Note: For Bundle-S and Bundle-C service points, if Cos Overwrite
Valid is set to True, the CoS and Color defined in the Attached VLAN
page has priority over the interface decision, but not over a MAC DA
match.
Default CoS The default CoS. If the CoS Mode is sp-def-cos, this is the CoS assigned to
frames that pass through the service point. This decision can be
overwritten at the service level. Possible values are 0 to 7.
Parameter Definition
Service point ID This ID is unique within the service. For Point-to-Point and Multipoint
services, the range of values is 1-32. For Management services, the range
of values is 1-30.
Service point name A descriptive name for the service point (optional). The Service Point
Name can be up to 20 characters.
C-Vlan CoS preservation Determines whether the original C-VLAN CoS value is preserved or
restored for frames egressing from the service point.
• If C-VLAN CoS preservation is enabled, the C-VLAN CoS value of
frames egressing the service point is the same as the value when the
frame entered the service.
• If C-VLAN CoS preservation is disabled, the C-VLAN CoS value of
frames egressing the service point is set at whatever value might
have been re-assigned by the interface, service point, or service, or
whatever value results from marking (see Marking admin, below).
C-Vlan preservation Determines whether the original C-VLAN ID is preserved or restored for
frames egressing from the service point.
• If C-VLAN preservation is enabled, the C-VLAN ID of frames egressing
the service point is the same as the C-VLAN ID when the frame
entered the service.
• If C-VLAN preservation is disabled, the C-VLAN ID of frames egressing
the service point is set at whatever value might have been re-
assigned by the interface, service point, or service, or whatever value
results from marking (see Marking admin, below).
S-Vlan CoS preservation Determines whether the original S-VLAN CoS value is preserved or
restored for frames egressing from the service point.
If S-VLAN CoS preservation is enabled, the S-VLAN CoS value of frames
egressing the service point is the same as the value when the frame
entered the service.
If S-VLAN CoS preservation is disabled, the C-VLAN CoS value of frames
egressing the service point is set at whatever value might have been
re-assigned by the interface, service point, or service, or whatever value
results from marking
Parameter Definition
Marking admin Determines whether re-marking of the outer VLAN (C-VLAN or S-VLAN) of
tagged frames that pass through the service point is enabled.
If Marking admin is set to Enable, and CoS preservation for the relevant
outer VLAN is set to Disable, the SAP re-marks the C-VLAN or S-VLAN
802.1p UP bits of egress frames according to the calculated CoS and
Color, and the user-configurable 802.1Q and 802.1AD marking tables. You
can configure these tables by selecting Ethernet > QoS > Marking from
the menu on the left side of the Web EMS.
If Marking admin and CoS preservation for the relevant outer VLAN are
both set to Enable, re-marking is not performed.
If Marking admin and CoS preservation for the relevant outer VLAN are
both set to Disable, re-marking is applied, but only according to the
values defined for Green frames in the 802.1Q and 802.1AD marking
tables.
Service Bundle ID This can be used to assign one of the available service bundles from the
H-QoS hierarchy queues to the service point. This enables you to
personalize the QoS egress path. Permitted values are 1-63.
6. Configure the service point attributes, as described in Table 38, Table 40, and Table 41.
Note
Optionally, you can select from a list of pre-defined service point options in the Pre defined options
field at the top of the Ethernet Service Points - Add page. The system automatically populates the
remaining service point parameters according to the system-defined parameters. However, you can
manually change these parameter values. The pre-defined options are customized to the type of
service to which you are adding the service point.
Attaching VLANs
When the Attached Interface Type for a service point is set to Bundle-C or Bundle-S, you can add multiple C-VLANs
to the service point.
To add multiple C-VLANs:
1. Select Ethernet > Services. The Ethernet Services page opens (Figure 189).
2. Select the relevant service in the Ethernet Services Configuration table.
3. Click Service Points. The Ethernet Service Points page opens (Figure 192).
4. Select the relevant service point in the Ethernet Services Points – General SP Attributes table.
5. Click Attached VLAN. The Attached VLAN List page opens.
Parameter Definition
Interface Location Read-only. The physical or logical interface on which the service point is
located.
Service ID Read-only. The ID of the service to which the service point belongs.
C-Vlan Encapsulation Select the C-VLAN you want to add to the service point.
Parameter Definition
CoS Overwrite Valid If you want to assign a specific CoS and Color to frames with the C-VLAN
or S-VLAN defined in the C-VLAN Encapsulation field, select true. This CoS
and Color values defined below override the CoS and Color decisions
made at the interface level. However, if the service point or service are
configured to apply their own CoS and Color decisions, those decisions
override the decision made here.
CoS Value If CoS Overwrite Valid is set to true, the CoS value defined in this field is
applied to frames with the C-VLAN defined in the C-VLAN Encapsulation
field. This CoS overrides the CoS decision made at the interface level.
However, if the service point or service are configured to apply their own
CoS, that decision overrides the decision made here.
If CoS Overwrite Valid is set to false, this parameter has no effect.
Color If CoS Overwrite Valid is set to true, the Color value defined in this field is
applied to frames with the C-VLAN defined in the C-VLAN Encapsulation
field. This Color overrides the Color decision made at the interface level.
However, if the service point or service are configured to apply their own
Color, that decision overrides the decision made here.
If CoS Overwrite Valid is set to false, this parameter has no effect.
To edit a VLAN Classification table entry, select the entry in the VLAN Classification table and click Edit. You can
edit all the fields that can be configured in the Attached VLAN List – Add page, except the C-VLAN Encapsulation
field.
To delete a VLAN Classification table entry, select the entry in the VLAN Classification table and click Delete.
To configure the size of the MRU (Maximum Receive Unit) and the S-VLAN Ethertype:
1. Select Ethernet > General Configuration. The Ethernet General Configuration page opens.
2. In the MRU field, enter the global size (in bytes) of the Maximum Receive Unit (MRU). Permitted values are 64
to 9612. The default value is 2000. Frames that are larger than the global MRU will be discarded.
3. In the S VLAN Ether type field, select the S-VLAN Ethertype. This defines the ethertype recognized by the
system as the S-VLAN ethertype. Options are: 0x8100, 0x88A8, 0x9100, and 0x9200. The default value is
0x88A8.
Note
The C-VLAN Ethertype is set at 0x8100 and cannot be modified.
4. Click Apply.
Related Topics:
• Enabling the Interfaces (Interface Manager)
• Performing Ethernet Loopback
• Configuring Ethernet Service(s)
• Quality of Service (QoS)
The PTP 820’s switching fabric distinguishes between physical interfaces and logical interfaces. Physical and logical
interfaces serve different purposes in the switching fabric. In some cases, a physical interface corresponds to a
logical interface on a one-to-one basis. For some features, such as LAG, a group of physical interfaces can be joined
into a single logical interface.
The basic interface characteristics, such as media type, port speed, duplex, and auto-negotiation, are configured
for the physical interface via the Physical Interfaces page. Ethernet services, QoS, and OAM characteristics are
configured on the logical interface level.
To configure the physical interface parameters:
1. Select Ethernet > Interfaces > Physical Interfaces. The Physical Interfaces page opens.
Note
Ethernet: Slot 1, Port 4 is only used for P4 on an IP-20C 2E2SX unit
when used as a traffic port. When P4 is used as an Extension port, it is not displayed at all.
2. Select the interface you want to configure and click Edit. The Physical Interfaces - Edit page opens.
5. In the Speed field, select the maximum speed of the interface. In Mbps Options are:
o Ethernet RJ-45 interfaces –100 and 1000.
o Ethernet SFP interfaces – Only 1000is supported.
o Ethernet SFP+ interfaces (PTP 820E R2H ESP models only) – Only
o 1000 and 10000 are supported.
o Radio interfaces – The parameter is read-only and set by the system to 1000FD.
Note
To use an SFP+ interface in 10G mode, the third-party switch must be running Pause Frame Flow
Control, as defined in IEEE 802.3x. It is also recommended to configure shapers on the third-party
switch so as to limit the packet flow from the switch to the PTP 820E unit to 2.5 Gbps.
After changing the speed of an SFP+ interface, you must reset the unit in order for the change to take
effect.
When an SFP interface is configured for 100 Mbps, the link must be symmetric, i.e., the same
interface speed must be configured on both sides of the link.
7. In the Duplex field, select the interface's duplex setting (Full-Duplex or Half-Duplex). Only Full-Duplex is
available in this release.
8. Click Apply, then Close.
Table 43 describes the status parameters that appear in the Physical Interfaces page.
Table 43 Physical Interface Status Parameters
Parameter Definition
Operational Status Indicates whether the interface is currently operational (Up) or non-
operational (Down).
Admin Status Indicates whether the interface is currently enabled (Up) or disabled
(Down). You can enable or disable an interface from the Interface
Manager page. See Enabling the Interfaces (Interface Manager).
Actual port speed Displays the actual speed of the interface for the link as agreed by the
two sides of the link after the auto negotiation process.
Actual port duplex Displays the actual duplex status of the interface for the link as agreed by
the two sides of the link after the auto negotiation process.
Automatic state propagation enables propagation of radio failures back to the Ethernet port. You can also
configure Automatic State Propagation to close the Ethernet port based on a radio failure at the remote carrier.
Automatic state propagation is configured as pairs of interfaces. Each interface pair includes one Monitored
Interface and one Controlled Interface. You can create multiple pairs using the same monitored interface and
multiple controlled interfaces.
The Monitored Interface is a radio interface, or a radio protection or Multi-Carrier ABC group. The Controlled
Interface is an Ethernet interface or LAG. An Ethernet interface can only be assigned to one Monitored interface.
Each Controlled Interface is assigned an LLF ID. If ASP trigger by remote fault is enabled on the remote side of the
link, the ASP state of the Controlled Interface is propagated to the Controlled Interface with the same LLF ID at the
remote side of the link. This means if ASP is triggered locally, it is propagated to the remote side of the link, but
only to Controlled Interfaces with LLF IDs that match the LLF IDs of the affected Controlled Interfaces on the local
side of the link.
Note
LLF requires an activation key (SL-LLF). Without this activation key, only LLF ID 1 is available. See
Configuring the Activation Key.
A trigger delay time can be configured, so that when a triggering event takes place, the ASP mechanism does not
propagate the event until this delay time has elapsed. A trigger delay from 0 to 10,000 ms can be set per LLD ID.
The delay time must be configured via CLI. See Configuring Automatic State Propogation and Link Loss Forwarding
(CLI).
It is recommended to configure both ends of the link to the same Automatic State Propagation configuration.
To configure an Automatic State Propagation interface pair:
1. Select Ethernet > Interfaces > Automatic State Propagation. The Automatic State Propagation page opens.
Figure 273 Automatic State Propagation Page
3. In the Controlled Ethernet interface field, select an interface that will be disabled upon failure of the
Monitored Radio Interface, defined below.
4. In the Monitored Radio interface field, select the Monitored Radio Interface. The Controlled Ethernet
Interface, defined above, is disabled upon a failure indication on the Monitored Radio Interface.
5. In the ASP admin field, select Enable to enable Automatic State Propagation on the interface pair, or Disable
to disable Automatic State Propagation on the pair.
6. Optionally, in theASP trigger by remote fault field, select Enable if you want to configure the system to disable
the Controlled Ethernet Interface upon a radio failure at the remote side of the link from the Monitored Radio
Interface. ASP events will only be propagated to Controlled Interfaces with LLF IDs that match LLF IDs of
affected Controlled Interfaces at the other side of the link.
7. Optionally, in the ASP management Safe mode admin field, select Enable or Disable to enable or disable
management Safe mode. In management Safe mode, the ASP mechanism does not physically shut down the
Controlled Interface when ASP is triggered. Instead, the ASP mechanism sends a failure indication message.
This message is used to propagate the failure indication to external equipment.
Note
CSF mode must be enabled when ASP is configured on the
management port of an PTP 820E
When ASP Management Safe mode (CSF) is configured, the peer unit must be configured to
receive CSF PDUs. CSF receive must be enabled in order for G.8032 ERPI topology changes to
be initiated upon receipt of a CSF PDU. This must be configured via the CLI. For details, see
Configuring Receipt of CSF PDUs (CLI).
8. In the ASP LLF ID field, select an ID for Link Loss Forwarding (LLF). When ASP trigger by remote fault is set to
Enable, ASP events at the other side of the link are propagated to Controlled Interfaces with LLF IDs that
match the LLF IDs of affected Controlled Interfaces at the other side of the link. LLF IDs are unique per
Monitored Interface. That is, if LLF ID 1 has been used for a Controlled Interface that is grouped with radio
interface 1, that ID cannot be used again for another Controlled Interface grouped fixed radio interface 1.
However, it can be used for Controlled Interface grouped with radio interface 2. You can select an LLF ID
between 1 and 30.
9. Repeat this procedure to assign additional Controlled Interfaces to the Monitored Interface, or to set up
additional ASP pair with other interfaces. Controlled Interfaces can only be assigned to one ASP pair.
Monitored Interfaces can be assigned to multiple ASP pairs.
To edit an Automatic State Propagation interface pair:
1. Select the interface pair in the Automatic state propagation configuration table.
2. Click Edit. The Automatic State Propagation – Edit page opens. The Edit page is similar to the Add page (Figure
202), but the Controlled Ethernet Interface and Monitored Radio Interface parameters are read-only.
To delete an Automatic State Propagation interface pair:
1. Select the interface pair in the Automatic state propagation configuration table.
2. Click Delete. The interface pair is removed from the Automatic state propagation configuration table.
To delete multiple interface pairs:
1. Select the interface pairs in the Automatic state propagation configuration table or select all the interfaces by
selecting the check box in the top row.
2. Click Delete. The interface pairs are removed from the Automatic state propagation configuration table.
PTP 820 stores and displays statistics in accordance with RMON and RMON2 standards. You can display various
peak TX and RX rates (per second) and average TX and RX rates (per second), both in bytes and in packets, for each
measured time interval. You can also display the number of seconds in the interval during which TX and RX rates
exceeded the configured threshold.
This section includes:
• RMON Statistics
• Egress CoS Statistics
• Port TX Statistics
• Port RX Statistics
RMON Statistics
To view and reset RMON statistics:
1. Select Ethernet > PM & Statistics > RMON. The RMON page opens.
• To clear the statistics, click Clear All at the bottom of the page.
• To refresh the statistics, click Refresh at the bottom of the page.
Each column in the RMON page displays RMON statistics for one of the unit’s interfaces. To hide or display
columns:
1. In the header row, select the arrow next to any of the columns.
2. Select Columns.
3. Mark the interfaces you want to display and clear the interfaces you do not want to display.
Note
Transmitted bits per second are not supported in the current release.
Note
Service Bundles are bundles of queues, grouped together in order to configure common egress
characteristics for specific services. In the current release, only Service Bundle 1 is supported.
By default, the egress CoS statistics are cumulative. That is, they are not automatically cleared. You can set each
individual CoS number to be cleared whenever the Egress CoS Statistics page is opened by changing the Clear on
read value to Yes.
3. To change the clear on read value, select the CoS number in the CoS queue index column and click Edit. The
Egress CoS Statistics – Edit page opens.
4. In the Clear on read field, select Yes to have statistics for the CoS value cleared every time you open the page.
5. Click Apply.
Port TX Statistics
The Ethernet Port TX PM report page displays PMs that measure various peak transmission rates (per second) and
average transmission rates (per second), both in bytes and in packets, for each measured time interval.
The page also displays the number of seconds in the interval during which transmission rates exceeded the
configured threshold.
This section includes:
• Displaying Ethernet Port TX PMs
• Enabling or Disabling Gathering of Port TX PM Statistics per Interface
• Setting the Ethernet Port TX Threshold
2. In the Interface field, select the interface for which you want to display PMs.
3. In the Interval Type field:
o To display reports for the past 24 hours, in 15 minute intervals, select 15 minutes.
o To display reports for the past month, in daily intervals, select 24 hours.
Table 44 describes the Ethernet TX port PMs.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak... Average... bytes... Various peak transmission rates (per second) and average transmission
Packets... rates (per second), both in bytes and in packets, for each measured time
interval.
TX bytes Layer 1 exceed The number of seconds the TX bytes exceeded the specified threshold
threshold (sec) during the interval. For instructions on setting the threshold, see Setting
the Ethernet Port TX Threshold.
Invalid data flag Indicates whether the values received during the measured interval are
valid. An x in the column indicates that the values are not valid (for
example, because of a power surge or power failure that occurred during
the interval).
Port RX Statistics
The Ethernet Port RX PM report page displays PMs that measure various peak transmission rates (per second) and
average RX rates (per second), both in bytes and in packets, for each measured time interval.
The page also displays the number of seconds in the interval during which RX rates exceeded the configured
threshold.
This section includes:
• Displaying Ethernet Port RX PMs
• Enabling or Disabling Gathering of Port RX PM Statistics per Interface
• Setting the Ethernet Port RX Threshold
2. In the Interface field, select the interface for which you want to display PMs.
3. In the Interval Type field:
o To display reports for the past 24 hours, in 15 minute intervals, select 15 minutes.
o To display reports for the past month, in daily intervals, select 24 hours.
Table 45 describes the Ethernet RX port PMs.
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Peak... Average... bytes... Various peak transmission rates (per second) and average RX rates (per
Packets... second), both in bytes and in packets, for each measured time interval.
RX bytes Layer 1 exceed The number of seconds the RX bytes exceeded the specified threshold
threshold (sec) during the interval. For instructions on setting the threshold, see Setting
the Ethernet Port RX Threshold.
Invalid data flag Indicates whether the values received during the measured interval are
valid. An x in the column indicates that the values are not valid (for
example, because of a power surge or power failure that occurred during
the interval).
Note
You can display QoS egress statistics, but only via CLI. For information, see Displaying Egress Statistics
(CLI).
QoS Overview
Quality of Service (QoS) deals with the way frames are handled within the switching fabric. QoS is required in order to
deal with many different network scenarios, such as traffic congestion, packet availability, and delay restrictions.
PTP 820’s personalized QoS enables operators to handle a wide and diverse range of scenarios. PTP 820’s smart QoS
mechanism operates from the frame’s ingress into the switching fabric until the moment the frame egresses via the
destination port.
QoS capability is very important due to the diverse topologies that exist in today’s network scenarios. These can
include, for example, streams from two different ports that egress via single port, or a port-to-port connection that
holds hundreds of services. In each topology, a customized approach to handling QoS will provide the best results.
Figure 213 shows the basic flow of PTP 820’s QoS mechanism. Traffic ingresses (left to right) via the Ethernet or radio
interfaces, on the “ingress path.” Based on the services model, the system determines how to route the traffic. Traffic
is then directed to the most appropriate output queue via the “egress path.”
Egress
Ingress
Marker
Rate Limit (Optional)
GE/Radio Port Classifier
(Policing) Queue Scheduler/
Manager Shaper
Port GE/Radio
(Optional)
Standard QoS/ H-QoS
Egress
Ingress CET/Pipe Marker
Rate Limit Services (Optional)
GE/Radio Port Classifier
(Policing) Queue Scheduler/
Manager Shaper
Port GE/Radio
(Optional)
Standard QoS/ H-QoS
• Marker – This mechanism provides the ability to modify priority bits in frames based on the calculated CoS and
Color.
For a more detailed description of QoS in the PTP 820, refer to the Technical Description for the PTP 820 product type
you are using.
Configuring Classification
Classification Overview
PTP 820 supports a hierarchical classification mechanism. The classification mechanism examines incoming frames
and determines their CoS and Color. The benefit of hierarchical classification is that it provides the ability to “zoom
in” or “zoom out”, enabling classification at higher or lower levels of the hierarchy. The nature of each traffic stream
defines which level of the hierarchical classifier to apply, or whether to use several levels of the classification
hierarchy in parallel.
Classification takes place on the logical interface level according to the following priorities:
• VLAN ID (CLI-only – see Configuring VLAN Classification and Override (CLI))
• 802.1p bits
• DSCP bits
• MPLS EXP field
• Default interface CoS
PTP 820 performs the classification on each frame ingressing the system via the logical interface. Classification is
performed step by step from the highest priority to the lowest priority classification method. Once a match is found,
the classifier determines the CoS and Color decision for the frame for the logical interface-level.
For example, if the frame is an untagged IP Ethernet frame, a match will not be found until the third priority level
(DSCP). The CoS and Color values defined for the frame’s DSCP value will be applied to the frame.
You can disable some of these classification methods by configuring them as un-trusted. For example, if 802.1p
classification is configured as un-trusted for a specific interface, the classification mechanism does not perform
classification by UP bits. This is useful, for example, if classification is based on DSCP priority bits.
If no match is found at the logical interface level, the default CoS is applied to incoming frames at this level. In this
case, the Color of the frame is assumed to be Green.
Classification may also be performed by Destination MAC Address (MAC DA) at the service point level. When MAC DA
classification is enabled on a service point, the classification mechanism checks each frame ingressing the interface on
which the service point is defined against a list of user-defined MAC DAs. If there is a match, the mechanism applies
to the frame the CoS and Color defined for that MAC DA. Classification by MAC DA overrides the other classification
criteria at the service point level.
Up to 64 MAC addresses can be defined per device, including four predefined MAC addresses. You can assign each of
these MAC addresses a CoS value and a Color.
The following MAC addresses are predefined, with a high priority (CoS=7, Color=Green). You can edit or delete these
MAC addresses:
• 09:00:2B:00:00:04
• 09:00:2B:00:00:05
• 01:80:C2:00:00:14
• 01:80:C2:00:00:15
These are protocol MAC addresses used to transport IS-IS frames as defined in ISO 9542 and ISO/IEC 10589.
2. Select the interface you want to configure and click Edit. The Logical Interfaces - Edit page opens.
Note
The Ingress byte compensation and Egress byte compensation fields are described in Configuring
the Ingress and Egress Byte Compensation.
Parameter Definition
Trust VLAN UP bits Select the interface's trust mode for user priority (UP) bits:
Trust – The interface performs QoS and color classification according to
UP and CFI/DEI bits according to user-configurable tables for 802.1q UP
bits (C-VLAN frames) or 802.1AD UP bits (S-VLAN frames). VLAN UP bit
classification has priority over DSCP and MPLS classification, so that if a
match is found with the UP bit of the ingressing frame, DSCP values and
MPLS bits are not considered.
Un-Trust – The interface does not consider 802.1 UP bits during
classification.
Parameter Definition
Trust MPLS Select the interface's trust mode for MPLS bits:
Trust – The interface performs QoS and color classification according to a
user-configurable table for MPLS EXP to CoS and color classification.
Un-Trust – The interface does not consider MPLS bits during
classification.
Default port CoS Select the default CoS value for frames passing through the interface (0 to
7). This value can be overwritten on the service point and service level.
2. Select the row you want to modify and click Edit. The 802.1Q Classification – Edit page opens.
1. Select Ethernet > QoS > Classification > 802.1AD. The 802.1AD Classification page opens.
2. Select the row you want to modify and click Edit. The 802.1AD Classification - Edit page opens.
Figure 291 802.1Q Classification - Edit Page
2. Select the row you want to modify and click Edit. The DSCP Classification - Edit page opens.
3. In the DSCP field, select the DSCP value you want to add. The Binary field is automatically adjusted to display the
binary representation of the DSCP value you selected.
2. Select the row you want to modify and click Edit. The MPLS Classification - Edit page opens.
Note
Policing on the service point level, and the service point and CoS level, is planned for future release.
PTP 820's policer mechanism is based on a dual leaky bucket mechanism (TrTCM). The policers can change a
frame’s color and CoS settings based on CIR/EIR + CBS/EBS, which makes the policer mechanism a key tool for
implementing bandwidth profiles and enabling operators to meet strict SLA requirements.
The output of the policers is a suggested color for the inspected frame. Based on this color, the queue
management mechanism decides whether to drop the frame or to pass it to the queue.
3. Configure the profile’s parameters. See Table 47 Policer Profile Parameters for a description of the policer
profile parameters.
4. Click Apply, then Close.
Parameter Definition
Profile ID A unique ID for the policer profile. You can choose from any unused value
from 1 to 250. Once you have added the profile, you cannot change the
Profile ID.
CIR Enter the Committed Information Rate (CIR) for the policer, in bits per
second. Permitted values are 0, or 64,000 through 1,000,000,000 bps. If
the value is 0, all incoming CIR traffic is dropped.
CBS Enter the Committed Burst Rate (CBR) for the policer, in Kbytes.
Permitted values are 0 through 8192 Kbytes.
EIR Enter the Excess Information Rate (EIR) for the policer, in bits per second.
Permitted values are 0, or 64,000 through 1,000,000,000 bps. If the value
is 0, all incoming EIR traffic is dropped.
EBS Enter the Excess Burst Rate (EBR) for the policer, in Kbytes. Permitted
values are 0 through 8192 Kbytes.
Color mode Select how the policer treats packets that ingress with a CFI or DEI field
set to 1 (yellow). Options are:
Color Aware – All packets that ingress with a CFI/DEI field set to 1
(yellow) are treated as EIR packets, even if credits remain in the CIR
bucket.
Color Blind – All ingress packets are treated as green regardless of their
CFI/DEI value. A color-blind policer discards any former color decisions.
Coupling flag Select Enable or Disable. When enabled, frames that ingress as yellow
may be converted to green when there are no available yellow credits in
the EIR bucket. Coupling Flag is only relevant in Color Aware mode.
For a logical interface, you can assign policers to the following traffic flows:
• Unicast Policer
• Multicast Policer
• Broadcast Policer
• Ethertype Policers
4. In the Unicast admin field, select Enable to enable policing on unicast traffic flows from the logical interface,
or Disable to disable policing on unicast traffic flows from the logical interface.
5. Click Apply.
4. In the Policer profile field, select a profile from the policer profiles defined in the system. The Policer profile
drop-down list includes the ID and description of all defined profiles.
5. In the Multicast admin field, select Enable to enable policing on multicast traffic flows from the logical
interface, or Disable to disable policing on multicast traffic flows from the logical interface.
6. Click Apply.
2. Select the interface in the Ethernet Logical Port Configuration table and click Policers. The Policers page
opens. By default, the Policers page opens to the Unicast Policer table (Figure 229).
3. Select Broadcast Policer. The Broadcast Policer table appears.
Figure 304 Logical Interfaces – Policers Page – Broadcast Policer
4. In the Policer profile field, select a profile from the policer profiles defined in the system. The Policer profile
drop-down list includes the ID and description of all defined profiles.
5. In the Broadcast admin field, select Enable to enable policing on broadcast traffic flows from the logical
interface, or Disable to disable policing on broadcast traffic flows from the logical interface.
6. Click Apply.
4. In the Ethertype 1 profile field, select a profile from the policer profiles defined in the system. The Ethertype 1
profile drop-down list includes the ID and description of all defined profiles.
5. In the Ethertype 1 user value field, enter the Ethertype value to which you want to apply this policer. The field
length is 4 nibbles (for example, 0x0806 - ARP).
6. In the Ethertype 1 admin field, select Enable to enable policing on the logical interface for the specified
ethertype, or Disable to disable policing on the logical interface for the specified ethertype.
7. Click Apply.
8. To assign policers to additional Ethertypes, select Ethertype type 2 Policer and Ethertype type 3 Policer and
repeat the steps above.
Configuring Marking
This section includes:
• Marking Overview
• Enabling Marking
• Modifying the 802.1Q Marking Table
• Modifying the 802.1AD Marking Table
Marking Overview
When enabled, PTP 820's marking mechanism modifies each frame’s 802.1p UP bit and CFI/DEI bits according to
the classifier decision. The CFI/DEI (color) field is modified according to the classifier and policer decision. The color
is first determined by a classifier and may be later overwritten by a policer. Green color is represented by a CFI/DEI
value of 0, and Yellow color is represented by a CFI/DEI value of 1. Marking is performed on egress frames that are
VLAN-tagged.
The marking is performed according to global mapping tables that describe the 802.1p UP bits and the CFI bits (for
C-VLAN tags) or DEI bits (for S VLAN tags). The marking bit in the service point egress attributes determines
whether the frame is marked as green or according to the calculated color.
Note
The calculated color is sent to the queue manager regardless of whether the marking bit is set.
Enabling Marking
Marking is enabled and disabled on the service point level. See 3. Ethernet Service Points – Egress Attributes.
1. Select Ethernet > QoS > Marking > 802.1Q. The 802.1Q Marking page opens. Each row in the 802.1Q Marking
page represents a CoS and color combination.
2. Select the row you want to modify and click Edit. The 802.1Q Marking - Edit page opens.
2. Select the row you want to modify and click Edit. The 802.1AD Marking - Edit page opens.
Configuring WRED
WRED Overview
Weighted Random Early Detection (WRED) enables differentiation between higher and lower priority traffic based
on CoS. You can define up to 30 WRED profiles. Each profile contains a green traffic curve and a yellow traffic
curve. This curve describes the probability of randomly dropping frames as a function of queue occupancy.
The system also includes two pre-defined read-only profiles. These profiles are assigned profile IDs 31 and 32.
• Profile number 31 defines a tail-drop curve and is configured with the following values:
o 100% Yellow traffic drop after 64kbytes occupancy.
o 100% Green traffic drop after 128kbytes occupancy.
o Yellow maximum drop is 100%
o Green maximum drop is 100%
• Profile number 32 defines a profile in which all will be dropped. It is for internal use and should not be applied
to traffic.
A WRED profile can be assigned to each queue. The WRED profile assigned to the queue determines whether or
not to drop incoming packets according to the occupancy of the queue. As the queue occupancy grows, the
probability of dropping each incoming frame increases as well. As a consequence, statistically more TCP flows will
be restrained before traffic congestion occurs.
2. Click ADD. The WRED Profile - Add page opens, with default values displayed.
3. In the WRED Profile ID field, select a unique ID to identify the profile. Permitted values are 1-30.
4. In the Green curve min point field, enter the minimum throughput of green packets for queues with this
profile, in Kbytes (0-8192). When this value is reached, the system begins dropping green packets in the
queue.
5. In the Green curve max point field, enter the maximum throughput of green packets for queues with this
profile, in Kbytes (0-8192). When this value is reached, all green packets in the queue are dropped.
6. In the Green curve max drop ratio field, enter the maximum percentage (1-100) of dropped green packets for
queues with this profile.
7. In the Yellow curve min point field, enter the minimum throughput of yellow packets for queues with this
profile, in Kbytes (0-8192). When this value is reached, the system begins dropping yellow packets in the
queue.
8. In the Yellow curve max point field, enter the maximum throughput of yellow packets for queues with this
profile, in Kbytes (0-8192). After this value is reached, all yellow packets in the queue are dropped.
9. In the Yellow curve max drop ratio field, enter the maximum percentage (1-100) of dropped yellow packets
for queues with this profile.
10. Click Apply, then Close.
Note
Service Bundles are bundles of queues, grouped together in order to configure common egress
characteristics for specific services. In the current release, only Service Bundle 1 is supported.
4. Select a CoS Queue ID and click Edit. The Logical Interfaces – WRED – Edit page opens.
5. In the Profile ID field, select the WRED profile you want to assign to the selected queue.
6. Click Apply, then Close.
Note
Egress shaping on the interface level is planned for future release.
2. Click Add. The Queue Shaper – Add page opens, with default values displayed.
3. In the Profile ID field, select a unique ID to identify the profile. Permitted values are 1-31.
4. Optionally, in the Description field, enter a description of the profile.
5. In the CIR field, enter the Committed Information Rate (CIR) assigned to the profile, in bits per second.
Permitted values are:
o 16,000 - 32,000,000 bps, with granularity of 16,000.
o 32,000,000 - 131,008,000 bps, with granularity of 64,000.
6. Click Apply, then Close.
2. Select the profile you want to edit and click Edit. The Queue Shaper Profile – Edit page opens. This page is
similar to the Queue Shaper Profile – Add page (Figure 242). You can edit any parameter except the Profile ID.
3. Modify the profile.
4. Click Apply, then Close.
2. Click Add. The Service Bundle Shaper Profile – Add page opens, with default values displayed.
3. In the Profile ID field, select a unique ID to identify the profile. Permitted values are 1-31.
4. Optionally, in the Description field, enter a description of the profile.
5. In the CIR field, enter the Committed Information Rate (CIR) assigned to the profile, in bits per second.
Permitted values are:
o 0 – 32,000,000 bps, with granularity of 16,000.
o 32,000,000 – 1,000,000,000 bps, with granularity of 64,000.
6. In the PIR field, enter the Peak Information Rate (PIR) assigned to the profile, in bits per second. Permitted
values are:
o 16,000 – 32,000,000 bps, with granularity of 16,000.
o 32,000,000 – 1,000,000,000 bps, with granularity of 64,000.
7. Click Apply, then Close.
3. Click Add. The Egress Queue Shaper Configuration – Add page opens.
Figure 319 Logical Interfaces – Egress Queue Shaper Configuration – Add Page
Note
In this release, only one service bundle (Service Bundle ID 1) is supported.
4. In the CoS queue ID field, select the CoS queue ID of the queue to which you want to assign the shaper.
Queues are numbered according to CoS value, from 0 to 7.
5. In the Profile ID field, select from a list of configured queue shaper profiles. See Configuring Queue Shaper
Profiles.
6. In the Shaper Admin field, select Enable to enable egress queue shaping for the selected queue, or Disable to
disable egress queue shaping for the selected queue.
7. Click Apply, then Close.
To assign a different queue shaper profile to a queue:
1. Select Ethernet > Interfaces > Logical Interfaces. The Logical Interfaces page opens (Figure 214).
2. Select an interface in the Ethernet Logical Port Configuration table and click Shaper. The Logical Interfaces –
Shaper page opens, with the Egress Queue Shaper Configuration table open by default (Figure 245).
3. Select an interface in the Ethernet Logical Port Configuration table and click Shaper. The Logical Interfaces –
Shaper page opens, with the Egress Queue Shaper Configuration table open by default (Figure 245).
4. Select the row you want to edit and click Edit. The Egress Queue Shaper Configuration – Edit page opens. This
page is similar to the Egress Queue Shaper Configuration – Add page (Figure 246).
5. To assign a different egress queue shaper profile, select the profile in the Profile ID field.
6. To enable or disable egress queue shaping for the selected queue, select Enable to enable egress queue
shaping for the queue, or Disable to disable egress queue shaping for the queue.
7. Click Apply, then Close.
4. Click Add. The Egress Service Bundle Shaper Configuration – Add page opens.
Figure 321 Logical Interfaces – Egress Service Bundle Shaper Configuration – Add Page
Note
In this release, only one service bundle (Service Bundle ID 1) is supported.
5. In the Profile ID field, select from a list of configured service bundle shaper profiles. See Configuring Service
Bundle Shaper Profiles.
6. In the Shaper Admin field, select Enable to enable egress service bundle shaping, or Disable to disable egress
service bundle shaping.
7. Click Apply, then Close.
To assign a different service bundle shaper profile:
1. Select Ethernet > Interfaces > Logical Interfaces. The Logical Interfaces page opens (Figure 214).
2. Select an interface in the Ethernet Logical Port Configuration table and click Shaper. The Logical Interfaces –
Shaper page opens, with the Egress Queue Shaper Configuration table open by default (Figure 245).
3. Select Egress Service Bundle Shaper. The Egress Service Bundle Shaper Configuration table appears (Figure
247). All service bundle shaper profiles defined in the system are listed in the table.
4. Select the row you want to edit and click Edit. The Egress Service Bundle Shaper Configuration – Edit page
opens. This page is similar to the Egress Service Bundle Shaper Configuration – Add page (Figure 248).
5. To assign a different egress queue shaper profile, select the profile in the Profile ID field.
6. To enable or disable egress service bundle shaping, select Enable or Disable.
7. Click Apply, then Close.
Configuring Scheduling
Scheduling Overview
Scheduling determines the priority among the queues. PTP 820 provides a unique hierarchical scheduling model
that includes four priorities, with Weighted Fair Queuing (WFQ) within each priority, and shaping per port and per
queue.
The scheduler scans the queues and determines which queue is ready to transmit. If more than one queue is ready
to transmit, the scheduler determines which queue transmits first based on:
• Queue Priority – A queue with higher priority is served before lower-priority queues.
• Weighted Fair Queuing (WFQ) – If two or more queues have the same priority and are ready to transmit, the
scheduler transmits frames from the queues based on a WFQ algorithm that determines the ratio of frames
per queue based on a predefined weight assigned to each queue.
2. Click Add. The Scheduler Priority Profile – Add page opens, with default values displayed.
4. For each CoS value, enter the Green priority, from 4 (highest) to 1 (lowest) (1-4). This priority is applied to
Green frames with that CoS egressing a queue to which the profile is assigned.
5. Optionally, you can enter a description of up to 20 characters in the field to the right of each CoS value.
6. Click Apply, then Close.
Note
The Yellow priority values are assigned automatically by the system.
2. Click Add. The Scheduler WFQ Profile – Add page opens, with default values displayed.
3. In the Profile ID field, select a unique Profile ID between 2 and 7. Profile ID 1 is used for a pre-defined WFQ
profile.
4. For each CoS value, enter the weight for that CoS, from 1 to 20.
5. Click Apply, then Close.
1. Select the profiles in the Scheduler WFQ Profiles page or select all the profiles by selecting the check box in
the top row.
2. Click Delete. The profiles are deleted.
3. In the Profile ID field, select from a list of configured scheduling priority profiles. See Configuring Priority
Profiles.
4. Click Apply, then Close.
4. In the Profile ID field, select from a list of configured scheduling priority profiles. See Configuring WFQ Profiles.
5. Click Apply, then Close.
PTP 820 devices support advanced traffic PMs per CoS queue and service bundle. For each logical interface, you
can configure thresholds for Green and Yellow traffic per queue. You can then display the following PMs for 15-
minute and 24-hour intervals, per queue and color:
• Maximum bytes passed per second
• Minimum bytes passed per second
• Average bytes passed per second
• Maximum bytes dropped per second
• Minimum bytes dropped per second
• Average bytes dropped per second
• Maximum packets passed per second
• Minimum packets passed per second
• Average packets passed per second
• Maximum packets dropped per second
• Minimum packets dropped per second
• Average packets dropped per second
• Seconds bytes per second were over the configured threshold per interval
These PMs are available for any type of logical interface, including groups. To activate collection of these PMs, the
user must add a PM collection rule on a logical interface and service bundle and set the relevant thresholds per
CoS and Color. When the PM is configured on a group, queue traffic PMs are recorded for the group and not for
the individual interfaces that belong to the group.
One collection rule is available per interface.
PMs for queue traffic are saved for 30 days, after which they are removed from the database. It is important to
note that they are not persistent, which means they are not saved in the event of unit reset.
Configuring G.8032
• This section includes:
• G.8032 Overview
• Configuring the Destination MAC Address
• Adding ERPIs
• Configuring the RPL Owner
• Configuring Timers
• Viewing the ERPI Configuration and Status Parameters
• Viewing ERPI State Information
• Initiating a Manual or Forced Switch and Clearing the Switch or Initiating Reversion
• Blocking or Unblocking R-APS Messages on a Service Point
• Viewing ERPI Statistics
G.8032 Overview
Note
P2P services are not affected by G.8032, and continue to traverse ports that are blocked by G.8032.
ERPS, as defined in the G.8032 ITU standard, is currently the most advanced ring protection protocol, providing
convergence times of sub-50ms. ERPS prevents loops in an Ethernet ring by guaranteeing that at any time, traffic can
flow on all except one link in the ring. This link is called the Ring Protection Link (RPL). Under normal conditions, the
RPL is blocked, i.e., not used for traffic. One designated Ethernet Ring Node, the RPL Owner Node, is responsible for
blocking traffic at one end of the RPL. When an Ethernet ring failure occurs, the RPL Owner unblocks its end of the
RPL, allowing the RPL to be used for traffic. The other Ethernet Ring Node adjacent to the RPL, the RPL Neighbor
Node, may also participate in blocking or unblocking its end of the RPL. A number of ERP instances (ERPIs) can be
created on the same ring.
For a more detailed description of G.8032 in the PTP 820C, refer to the Technical Description for the product you are
using.
• In the G8032 destination MAC address field, enter the destination MAC address for PDUs generated by the node.
• Click Apply.
Note
The G.8032 Node ID field displays the base MAC address for the node. This field is read-only.
Adding ERPIs
You can configure up to 16 Ethernet Ring Protection instances (ERPIs). Each ERPI is associated with an Ethernet
service defined in the system.
Note
Before adding an ERPI to an Ethernet service, the service must be mapped to an MSTP instance. See
Mapping Ethernet Services to MSTP instances (MSTIs).
To add an ERPI:
• Select Ethernet > Protocols > G.8032 > ERPI Attribute. The G.8032 ERPI Attribute page opens.
• In the ERPI ID field, select an available ID. The ERPI ID is a unique ID that identifies the ERPI.
• Optionally, in the ERPI Name field, enter a descriptive name for the ERPI.
• In the Type field, select the type of ERPI, based on the type of ring:
◦ Ring: A Ring is an Ethernet ring that is connected on two ports (East and West service points) to an
interconnection node.
◦ Sub-ring: A Sub-Ring is an Ethernet ring which is connected to another ring or network through the use of
interconnection nodes (East and West service points). On their own, the Sub-Ring links do not form a closed
physical loop. A closed loop may be formed by the sub-ring links and the link between interconnection nodes
that is controlled by other ring or network.
◦ Ring with sub-ring: The ERPI includes both a ring, with East and West service points, and a connection to a
sub-ring using a Sub-Ring service point.
• In the Service ID field, select the ID of the Ethernet service to which the ERPI belongs.
• Optionally, in the MEG Level field, select the Maintenance Entity Group (MEG) level used for R-APS messages
sent in the ERPI (0-7).
• Click Next. The second page of the Add G.8032 ERPI Attribute wizard opens.
• In the West ERPI port (SP) field, select the first endpoint for the ERPI. This can be any service point that has been
configured for the service.
Note
Service points on the PTP 820 side of the link must have a single, determinate VLAN. This means the
service point type must be dot1q, s-tag, or QinQ. On the customer side, any service point type can be
used.
• Click Next. The third page of the Add G.8032 ERPI Attribute wizard opens.
• In the East ERPI port (SP) field, select the second endpoint for the ERPI. This can be any service point that has
been configured for the service.
• Click Next:
Phn 3963 013v000
Page 419
Chapter 8: Ethernet Protocols Configuring and Displaying Queue-Level PMs
• If the Type is Ring or Sub-ring, the Submit page opens. Go to Step 15.
• If the Type is Ring with sub-ring, the fourth page of the Add G.8032 ERPI Attribute wizard opens.
Figure 336: G.8032 ERPI Attribute Wizard – Page 4
• In the Sub Ring port (SP) field, select the service point that connects the Ring with the Sub-Ring. This can be any
service point that has been configured for the service.
• Click Next. The Submit page opens.
• Verify that the parameters of the ERPI are correct and click Submit.
• In the RPL Owner field, select the service point you want to configure as RPL Owner.
• Click Apply, then Close.
Configuring Timers
• You can configure timers per ERPI to control the ERPI's switching and convergence parameters. The following
timers are available:
• Wait to Restore (WTR) Timer – Defines a minimum time the system waits after signal failure is recovered before
reverting to idle state, when the RPL can again be blocked.
• Guard Time – The guard time is the minimum time the system waits after recovery from a signal failure before
accepting new R-APS messages. The Guard Time should be greater than the maximum expected forwarding delay
for which one R-APS message circles around the ring.
Note
The Guard Time is used to prevent Ethernet ring nodes from acting upon outdated R-APS messages
and prevents the possibility of forming a closed loop.
• Hold-Off Time – Determines the time period from failure detection to response. It is used to coordinate between
recovery mechanisms (which mechanism takes place first).
• To configure the ERPI timers:
• Select Ethernet > Protocols > G.8032 > ERPI Attribute. The G.8032 ERPI Attribute page opens (Figure 300).
• Select the ERPI and click Edit. The ERPI Attribute – Edit page opens (Figure 306).
• In the ERPI WTR field, enter the Wait to Restore (WTR) timer (in minutes).
• In the ERPI Guard Time field, enter the ERPI guard time (in msec). You must enter a multiple of 10.
• In the ERPI Holdoff Time field, enter the ERPI hold-off time (in msec). You must enter a multiple of 100.
• Click Apply, then Close.
Instance ID Read-only. The MSTI to which the Ethernet service is mapped. See
Mapping Ethernet Services to MSTP instances (MSTIs).
West ERPI Port (SP) Read-only. The interface to which the west ERPI service point
belongs.
East ERPI Port (SP) Read-only. The interface to which the east ERPI service point belongs.
Sub Ring Port (SP) Read-only. The interface to which the service point that connects the
Ring with the Sub-Ring belongs.
ERPI Protocol Version Read-only. The ERPI (G.8032) protocol version currently being used
in the unit.
RPL Owner The RPL Owner Node is a node in the ERPI that is responsible for
blocking traffic at one end of the ERPI. See Configuring the RPL
Owner.
Virtual Channel VLAN Read-only. The VLAN of the virtual channel. If the value is 0, there is
no virtual channel.
MEG Level The Maintenance Entity Group (MEG) level used for R-APS messages
sent in the ERPI.
Last Local State Describes the current local state input to the ERPI state machine.
Last Remote State Indicates the last event received from the other end of the link.
Last HP Request Indicates the last high-priority event.
Last Change Timestamp Indicates the time of the last ring state transition.
• Table 61 lists and describes the parameters in the ERPI Attribute – State page.
R-APS Channel Forwarding Indicates whether the service point is forwarding R-APS
State messages.
ERPI Data Forwarding State Indicates whether the service point is in unblocked (forwarding)
state.
RPL Blocking State Only relevant if the ERPI to which the service point belongs is
the RPL owner. Indicates whether the service point is in blocked
state.
ERPI Port Defect State Indicates whether the service point is in Signal Fail (SF) or
Signal Defect (SD) state.
Note: Support for Signal Defect state is planned for future
release.
• Initiating a Manual or Forced Switch and Clearing the Switch or Initiating Reversion
• You can initiate a manual or forced switch, clear the switch, and initiate reversion, from the G.8032 ERPI Attribute – State page:
• Select Ethernet > Protocols > G.8032 > ERPI Attribute. The G.8032 ERPI Attribute page opens (Figure 300).
• Slect the ERPI and click State. The ERPI Attribute – State page opens (Figure 307).
• Select the service point on which you want to perform the operation.
• To initiate a forced switch, click Force Switch.
• To initiate a manual switch, click Manual Switch.
• To clear a forced or manual switch, click Clear. You can also click Clear to trigger convergence prior to the expiration of the
relevant timer.
Table 62 lists and describes the statistics shown in the ERPI Attribute – Statistics page.
Transmitted SF PDU The number of R-APS Signal Fail (SF) frames that have been
transmitted via the service point.
Transmitted NR PDU The number of R-APS No Request (NR) frames that have been
transmitted via the service point.
Transmitted RB PDU The number of R-APS RPL Blocked (RB) frames that have been
transmitted via the service point.
Transmitted FS PDU The number of R-APS Force Switched (FS) frames that have been
transmitted via the service point.
Transmitted MS PDU The number of R-APS Manual Switched (MS) frames that have been
transmitted via the service point.
Received Invalid R-APS The number of R-APS frames with an invalid format that have been
Frames received via the service point.
Received SF PDU The number of R-APS Signal Fail (SF) frames that have been
received via the service point.
Received NR PDU The number of R-APS No Request (NR) frames that have been
received via the service point.
Received RB PDU The number of R-APS RPL Blocked (RB) frames that have been
received via the service point.
Received SD PDU The number of R-APS Signal Degrade (SD) frames that have been
received via the service point.
Received FS PDU The number of R-APS Forced Switch (FS) frames that have been
received via the service point.
Received MS PDU The number of R-APS Manual Switch (MS) frames that have been
received via the service point.
Configuring MSTP
This section includes:
• MSTP Overview
• Mapping Ethernet Services to MSTP instances (MSTIs)
• Configuring the MSTP Bridge Parameters
• Configuring the MSTP Port Parameters
MSTP Overview
Note
P2P services are not affected by MSTP, and continue to traverse ports that are blocked by MSTP.
MSTP, as defined in IEEE 802.1q, provides full connectivity for frames assigned to any given VLAN throughout a
bridged LAN consisting of arbitrarily interconnected bridges.
With MSTP, an independent multiple spanning tree instance (MSTI) is configured for each group of services, and only
one path is made available (unblocked) per spanning tree instance. This prevents network loops and provides load
balancing capability. It also enables operators to differentiate among Ethernet services by mapping them to different,
specific MSTIs. The maximum number of MSTIs is configurable, from 2 to 16.
MSTP is an extension of, and is backwards compatible with, Rapid Spanning Tree Protocol (RSTP).
PTP 820F, and PTP 820G support MSTP according to the following IEEE standards:
• 802.1q
• 802.1ad amendment (Q-in-Q)
• 802.1ah (TE instance)
For a more detailed description of MSTP support in the PTP 820C, refer to the Technical Description for the product
you are using.
Note
Ethernet service-to-MSTI mapping is also a prerequisite to configuring G.8032. See Configuring
G.8032.
• In the Instance ID field, enter a number between 0 and 16, or 4095. A service mapped to MSTI 4095 is never
blocked by any protocol.
• Click Apply.
• By default, all Ethernet services are mapped to MSTI 0, which represents the CIST (Common Instance Spanning
Tree).
• In the MSTP Enable field, select True to enable MSTP on the unit. To disable MSTP, select False.
◦ Enabling MSTP starts the protocol and sets all ports in all MSTP instances to Blocking state. Convergence
upon enabling the protocol generally takes less than two seconds.
◦ Disabling MSTP stops the MSTP protocol from running and sets all ports in all MSTP instances to Forwarding
state.
• In the Number of Instances (excluding CIST) field, select the number of Multiple Spanning Tree instances (MSTIs).
Possible values are 1-16. This number does not include the Common and Internal Spanning Tree (CIST).
Note
Changing the Number of Instances causes the MSTP stack to reset.
• In the MSTP BPDU Destination MAC field, select the destination MAC address of BPDUs generated in the unit.
Options are:
◦ Customer – The destination MAC address of BPDUs is 0x0180-C200-0000. Provider BPDUs are either
tunneled or discarded.
◦ Provider – The destination MAC address of BPDUs is 0x0180-C200-0008. Customer BPDUs are either
tunneled or discarded.
• In the MSTP SD Handling field, select how MSTP handles Signal Degrade (SD) failures. Options are:
◦ Ignored – Signal Degrade (SD) failures are ignored in MSTP.
◦ Same as SF – SD failures trigger a topology change.
Note
SD handling is planned for future release.
• Click Apply.
To reset the MSTP stack, click Reset Protocol.
Parameter Definition
STP Time Since Last TC The time that has elapsed (in cs) since the last time the bridge
entity detected a topology change.
STP Number of Topology The total number of topology changes that have been detected
Changes by this bridge since the management entity was last reset or
initialized.
Note: Discontinuities in the value of this counter can occur
upon reinitialization of the management system.
STP Designated Root The Bridge ID of the spanning tree root, as determined by MSTP
in this node. This value is used as the Root ID in all configuration
BPDUs originated by this node.
STP Root Cost The cost of the path to the root as seen from this bridge.
STP Root Port The port number of the port that offers the lowest cost path
from this bridge to the external root bridge
STP Max Age The maximum age (in cs) of MSTP information learned from the
network on any port before the information is discarded.
Note: This field displays the value actually being used by the
bridge, in contrast to the STP Bridge Max Age parameter
described below, which is user-configurable and which
represents the value that this and all other bridges use if and
when this bridge becomes the root.
STP Forward Delay The speed at which ports change their spanning state when
moving towards the Forwarding state. This value determines
how long the port stays in Listening state and Learning state.
This value is also used when a topology change has been
detected and is underway for purposes of aging all dynamic
entries in the filtering database.
Note: This field displays the value actually being used by the
bridge, in contrast to the STP Bridge Forward Delay parameter
described below, which is user-configurable and which
represents the value that this and all other bridges use if and
when this bridge becomes the root.
STP Version The STP version the bridge is currently running (MSTP).
Parameter Definition
STP Priority Select a value as the writeable portion of the Bridge ID. This value
constitutes the first two octets of the Bridge ID. Possible values are
0-61440, in steps of 4096
STP Hold Time Select a value (in cs) as the interval length during which no more
than two configuration bridge PDUs will be transmitted by this
node. Possible values are 10-100.
STP Bridge Max Age Select a value (in cs) that all bridges will use, when this bridge is the
root, as the maximum age of MSTP information learned from the
network on any port before the information is discarded.
Options are 600-4000 cs.
STP Bridge Forward Delay Select a value (in cs) that all bridges will use, when this bridge is the
root, as the speed at which ports change their spanning state when
moving towards the Forwarding state. This value determines how
long the port stays in Listening state and Learning state. This value
is also used when a topology change has been detected and is
underway for purposes of aging all dynamic entries in the filtering
database. Options are 400-3000 cs.
STP Bridge Hello Time Select the value (in cs) that all bridges will use, when this bridge is
the root, as the Hello Time. The Hello Time determines how often
the switch broadcasts its hello message to other switches, and is the
same for all MSTIs. Options are 100-1000 cs.
• In the CIST Max Hops field, select the value that all bridges will use, when this bridge is the root, as the maximum
number of hops allowed for a BPDU within a region before it is discarded. Options are 6-40.
• Click Apply.
Table 56 lists and describes the status parameters in the MSTP Bridge CIST page.
CIST Regional Root ID The Bridge ID of the current CIST regional root.
CIST Path Cost The CIST path cost from the transmitting bridge to the CIST regional
root. If the transmitting bridge is the CIST regional root, the value of
this parameter may be 0.
• To view all the bridge parameters of an MSTI and/or configure its bridge priority, select the MSTI and click Edit.
• To view all the bridge parameters of an MSTI and/or configure its bridge priority, select the MSTI and click Edit.
• In the MSTI Bridge Priority field, enter the MSTI writeable portion of the Bridge ID. Possible values are 0-61440, in
steps of 4096.
• Click Apply, then Close.
Table 57 lists and describes the status parameters in the MSTP Bridge MSTI page.
MSTI Topology Change in Indicates whether a topology change is currently in progress on any
Progress port in the MSTI.
MSTI Time Since Last TC The number of centi-seconds that have elapsed since the last time
the bridge identified a topology change for a port in the MSTI.
Note
A service mapped to MSTI 4095 is never blocked by any protocol.
• Select an interface and click Edit. The MSTP Port Spanning Tree – Edit page opens.
• In the STP Port Priority field, select the CIST port priority of the interface. You can select values from 0-240, in multiples of 16.
STP Interface Location The slot number and port number of the port.
STP Port State The port's current state, as defined by application of STP. The port's state
controls the action the port takes upon receipt of a frame.
Possible values are:
Forwarding – The port sends and receives traffic normally.
Blocking – The port does not send or receive traffic, but does receive
BPDUs.
Learning – The port receives traffic but does not forward the traffic. The
port learns the source MAC addresses of incoming frames.
Listening – The port monitors BPDUs, but does not forward traffic and does
not learn the source MAC addresses of incoming frames.
Disabled – The port is disabled (not by MSTP).
STP Port Designated Cost The CIST Path Cost of the segment connected to this port. This value is
compared to the root path cost in received BPDUs.
STP Port Designated The CIST Bridge ID of the bridge that this port considers to be the
Bridge designated bridge for this port's segment.
• Select an interface and click Edit. The MSTP Port CIST – Edit page opens.
• In the CIST Port Admin Path Cost field, enter an assigned value for the contribution of this port to the path cost of
paths towards the spanning tree root.
Note
Changing the value of this parameter is considered to be a topology change by the MSTP mechanism.
• In the CIST Port Edge Admin field, select the port's administrative edge port parameter, for the CIST.
• In the CIST MAC enabled field, select the port's MAC Enabled parameter. A value of True indicates that
administratively, the MAC is set as if it were connected to a point-to-point LAN. Options are:
• Force True – The MAC is treated as if it is connected to a point-to-point LAN, regardless of any indications to the
contrary that are generated by the MAC entity.
• Force False –The MAC is treated as if it is connected to a non-point-to- point LAN, regardless of any indications to
the contrary that are generated by the MAC entity.
• Automatic – The MAC Enabled parameter is set to True if the MAC is connected to a point-to-point or full-duplex
LAN. The MAC Enabled parameter is set to False if the MAC is connected to a non-point-to-point and half-duplex
LAN.
CIST Port Edge Oper Indicates whether or not the port is operating as an Edge port. Possible
State values are:
True – The port is operating as an Edge port, which means it does not
process the BPDUs that it receives.
False – The port is operating as a non-Edge port, which means it
processes the BPDUs that it receives.
If CIST Port Edge Admin is set to True, the system automatically
determines its operational Edge port state.
CIST Port Role The port's current role in the CIST. Transient port roles may be:
Blocking – The port does not send or receive traffic, but does
receive BPDUs.
Learning – The port receives traffic but does not forward the traffic. The
port learns the source MAC addresses of incoming frames.
Listening – The port monitors BPDUs, but does not forward traffic and
does not learn the source MAC addresses of incoming frames.
Final port roles may be:
Disabled – The port is in Operational - Down state and is not included in
the MSTP calculation.
Designated – The port is in Operational - Up state and has been
designated to forward traffic.
Root – The port is forwarding traffic towards the root bridge.
Alternate – The port is not forwarding traffic (blocked) but can become
a Designated port after MSTP calculation.
CIST Port CIST Regional The Bridge ID of the current CIST Regional Root.
Route ID
CIST Port CIST Path Cost The CIST path cost from the transmitting bridge to the CIST regional
root. If the transmitting bridge is the CIST regional root, the value of this
parameter will be 0.
CIST Port Hello Time The port's Hello Time timer parameter value, for the CIST (in cs).
CIST Port Protocol The current value of the mcheck variable for the port.
Migration
Parameter Definition
Note: Migration support is planned for future release.
CIST Port MAC Oper State The current state of the port's MAC operational parameter. True
indicates the MAC is operational.
CIST Port Uptime The number of seconds that have elapsed since the port was last reset
or initialized.
• To view the parameters for a specific MSTI-port combination in a separate window and modify several of the
parameters, select the row with the MSTI- port combination you want to view and/or modify and click Edit. The
MSTP Port MSTI – Edit page opens.
• In the MSTI Port Priority field, select the port's Priority parameter value for the MSTI, i.e., the priority field for the
Port ID for the MSTI. You can select values from 0-240, in multiples of 16.
Note
Changing the value of this parameter is considered to be a topology change by the MSTP
mechanism.
• In the MSTI Port Path Cost field, select the port's Path Cost parameter value for the MSTI.
Note
Changing the value of this parameter may cause re-initialization of the MSTI for which the parameter
is changed. No other MSTI is affected.
Parameter Definition
MSTI Port Designated The Regional Root ID component of the port's Port Priority vector for the
Root MSTI.
MSTI Port Designated The Internal Root Path Cost component of the port's MSTI port priority
Cost vector, for the MSTI.
MSTI Port Designated The Designated Bridge ID component of the port's MSTI port priority vector.
Bridge
MSTI Port Role The port's current role in the MSTI. Transient port roles may be:
Blocking – The port does not send or receive traffic, but does receive BPDUs.
Learning – The port receives traffic but does not forward the traffic. The port
learns the source MAC addresses of incoming frames.
Listening – The port monitors BPDUs, but does not forward traffic and does
not learn the source MAC addresses of incoming frames.
Final port roles may be:
Disabled – The port is in Operational - Down state and is not included in the
MSTP calculation.
Designated – The port is in Operational - Up state and has been designated to
forward traffic.
Root – The port is forwarding traffic towards the root bridge.
Alternate – The port is not forwarding traffic (blocked) but can become a
Designated port after MSTP calculation.
Master – The port is forwarding traffic towards the CIST root bridge.
MSTI Port Uptime The port's uptime parameter value for the MSTI. This is the number of
seconds that have elapsed since the port was last reset or initialized.
Received Configuration BPDU The number of configuration BPDUs received since the last counter reset.
Received RST BPDU The number of Rapid Spanning Tree (RST) BPDUs received since the last counter
reset.
Received MST BPDU The number of Multiple Spanning Tree (MST) BPDUs received since the last counter
reset.
Transmitted TCN BPDU The number of Topology Change Notifications (TCNs) transmitted since the last
counter reset.
Transmitted Configuration The number of configuration BPDUs transmitted since the last counter reset.
BPDU
Transmitted RST BPDU The number of Rapid Spanning Tree (RST) BPDUs transmitted since the last counter
reset.
Transmitted MST BPDU The number of Multiple Spanning Tree (MST) BPDUs transmitted since the last
counter reset.
BN)
This section includes:
• ETH-BN Overview
• Adding an ETH-BN entity
• Editing an ETH-BN Entity
• Deleting an ETH-BN Entity
• Viewing the Statistics for an ETH-BN Entity
ETH-BN Overview
Ethernet Bandwidth Notification (ETH-BN) is defined by the Y.1731 OAM standard. The purpose of ETH-BN is to inform
the L2 or L3 customer switch of the capacity of the radio link in transmit direction. This enables the switch to respond to
fluctuations in the radio link by, for example, reconfiguring the shaper on the egress port facing the radio link or
rerouting traffic to other egress ports.
Once ETH-BN is enabled, the radio unit reports bandwidth information to upstream third-party switches. The ETH-BN
entity creates a logical relationship between a radio interface, called the Monitored Interface, and an Ethernet interface,
called the Control Interface. When bandwidth degrades from the nominal value in the Monitored Interface, messages
relaying the actual bandwidth values (BNM frames) are periodically sent over the Control Interface. Once the bandwidth
returns to its nominal level, BNM messages are no longer sent. Optionally, the device can be configured to send BNM
frames even when bandwidth is at its nominal level.
The Monitored Interface can be a single radio interface, a Multi-Carrier ABC group, a Multiband group, or a radio LAG. To
be used as a Monitored Interface, the LAG must consist of radio interfaces only.
The Control Interface can be a single Ethernet interface or an Ethernet LAG. To be used as a Control Interface, the LAG
must consist of Ethernet interfaces only.
Note
ETH-BN cannot be used with HSB protection groups.
When the Control Interface is a LAG, EBN messages are only sent to the first active member of the LAG.
When used with PTP 820C, PTP 820S, and PTP 820C-HP unit redundancy, the reported bandwidth may
be inaccurate when switchover is in effect.
The same radio interface can be configured as a Monitored Interface for multiple EBN instances. However, an Ethernet
interface can only be configured as a Control Interface for a single EBN instance.
9 In the Tx VLAN field, specify the VLAN on which messages are transmitted.
Options are:
◦ Untagged.
◦ 1 – 4090.
Note
The CoS of the VLAN is automatically set to 7.
10 In the Is Always Sent field, specify whether periodic BNM frames should be sent
even when there is no bandwidth degradation in the monitored interface:
◦ True – BNM frames are always sent, even when the bandwidth is at its
nominal value.
◦ False – BNM frames are only sent when the current bandwidth is lower than
the nominal bandwidth (default value).
11 In the Tx Period field, specify how often messages are transmitted when Is Always
Sent is set to True or, if not, when bandwidth is below the nominal value. Options
are:
◦ One second
◦ Ten seconds (default)
◦ Sixty seconds
12 In the Holdoff Time field, specify the amount of time (in seconds) the system waits
when bandwidth degradation occurs, before transmitting a message. If the bandwidth
is below the nominal value when the holdoff period ends, the system starts
transmitting messages. Options are 0-10. The default value is 10.
Note
If the bandwidth fluctuates before the Holdoff Time expires, and is
lower than the nominal bandwidth when the Holdoff Time expires, the first BNM frame sent
when the timer expires gives the lowest bandwidth that was recorded while the timer was
running.
Subsequent BNM frames are sent with the actual current bandwidth.
Parameter Definition
Nominal BW The maximum radio TX bitrate achievable with the current radio configuration.
Current BW The current radio TX bitrate.
Parameter Definition
7 In the Tx Period field, specify how often messages are transmitted when bandwidth is below the nominal value.
Options are:
◦ 4 – One second.
◦ 5 – Ten seconds.
◦ 6 – One minute.
8 In the Holdoff Time field, specify the amount of time the system waits when bandwidth degradation occurs,
before transmitting a message. If the bandwidth is below the nominal value when the holdoff period ends, the
system starts transmitting messages.
9 In the Monitoring Interval field, select the interval for which a weighted average of the bandwidth readings is
calculated.
10 Click Apply, then Close.
Table 48 describes the status (read-only) fields in the ABN Configuration and Status table.
Parameter Definition
Current BW The weighted average of the bandwidth readings taken during the last
Monitoring Interval.
Parameter Definition
Tx Messages Counter The number of bandwidth messages transmitted since the counter was
last reset.
Holdoff State The Holdoff state of the monitored link. Options are:
Off – Holdoff time measurement has not been started.
Counting – Holdoff time measurement has started but the timeout has
not elapsed yet.
On – Holdoff measurement time has ended and the current bandwidth is
still below the nominal value.
Holdoff Start Time (mSec) The Holdoff start time for the last event.
Configuring LLDP
LLDP Overview
Link Layer Discovery Protocol (LLDP) is a vendor-neutral layer 2 protocol that can be used by a network element
attached to a specific LAN segment to advertise its identity and capabilities and to receive identity and capacity
information from physically adjacent layer 2 peers. LLDP is a part of the IEEE 802.1AB – 2005 standard that enables
automatic network connectivity discovery by means of a port identity information exchange between each port
and its peer. Each port periodically sends and also expects to receive frames called Link Layer Discovery Protocol
Data Units (LLDPDU). LLDPDUs contain information in TLV format about port identity, such as MAC address and
IP address.
LLDP is used to send notifications to the NMS, based on data of the local unit and data gathered from peer
systems. These notifications enable the NMS to build an accurate network topology.
Table 50 describes the LLDP remote system management parameters. These parameters are read-only.
Parameter Definition
Management Address The octet string used to identify the management address component
associated with the remote system.
Address Sub Type The type of management address identifier encoding used in the
associated LLDP Agent Remote Management Address.
Note
The management IP address advertised by the local element depends on the IP protocol (IPv4 or
IPv6) configured for the unit. See Defining the IP Protocol Version for Initiating Communications.
To display and configure the general LLDP parameters for the unit:
1. Select Ethernet > Protocols > LLDP > Advanced > Configuration > Parameters. The LLDP Configuration
Parameters page opens.
Parameter Definition
Max TX Credit Displays the maximum number of consecutive LLDPDUs that can be
transmitted at any one time. In this release, the Max TX Credit is set at 5.
Fast TX Interval (Seconds) Displays, in seconds, the interval at which LLDP frames are transmitted
during fast transmission periods, such as when the unit detects a new
peer. In this release, the Fast TX Interval is set at 1.
Fast TX The initial value used to initialize the variable which determines the
number of transmissions that are made during fast transmission periods.
In this release, the Fast TX No. is set at 4.
Parameter Definition
Reinit Delay (Seconds) Defines the minimum time, in seconds, the system waits after the LLDP
Admin status becomes Disabled until it will process a request to
reinitialize LLDP. For instructions on disabling or enabling LLDP on a port,
see Configuring the LLDP Port Parameters.
In this release, the Reinit Delay is set at 2.
Parameter Definition
TX Interval (Seconds) Defines the interval, in seconds, at which LLDP frames are transmitted.
You can select a value from 5 to 32768. The default value is 30.
Hold Multiplier Defines the time-to-live (TTL) multiplier. The TTL determines the length of
time LLDP frames are retained by the receiving device. The TTL is
determined by multiplying the TX Interval by the Hold Multiplier.
You can select a value from 2 to 10. The default value is 4.
2. Select an interface and click Edit. The LLDP Port Configuration - Edit page opens.
3. In the Admin field, select from the following options to define how the LLDP protocol operates for this port:
o TX Only – LLDP agent transmits LLDP frames on this port but does not update
information about its peer.
o RX Only – LLDP agent receives but does not transmit LLDP frames on this port.
o TX and RX – LLDP agent transmits and receives LLDP frames on this port (default
value).
o Disabled – LLDP agent does not transmit or receive LLDP frames on this port.
4. In the Notification Enable field, select from the following options to define, on a per agent basis, whether or
not notifications from the agent to the NMS are enabled:
o True – The agent sends a Topology Change trap to the NMS whenever the system
information received from the peer changes.
o False – Notifications to the NMS are disabled (default value).
5. Click Apply, then Close.
Table 53 lists and describes the status parameters in the LLDP Port Configuration page.
Parameter Definition
Destination Address The destination address of the LLDP agent associated with this port.
TLV TX Indicates which of the unit's capabilities is transmitted by the LLDP agent
for the port:
• PortDesc – The LLDP agent transmits Port Description TLVs.
• SysName – The LLDP agent transmits System Name TLVs.
• SysDesc – The LLDP agent transmits System Description TLVs.
• SysCap – The LLDP agent transmits System Capabilities TLVs.
To displays the MAC address associated with the unit for purposes of LLDP transmissions:
1. Select Ethernet > Protocols > LLDP > Advanced > Configuration > Management TLV. The LLDP Management
TLV Configuration page opens.
Table 54 lists and describes the status parameters in the LLDP Management TLV Configuration page.
Parameter Definition
Destination Address Defines the MAC address associated with the port for purposes of LLDP
transmissions.
Address Subtype Defines the type of the management address identifier encoding used for
the Management Address.
Table 55 describes the LLDP remote system management parameters. These parameters are read-only.
Parameter Definition
Management Address The octet string used to identify the management address component
associated with the remote system.
Address Sub Type The type of management address identifier encoding used in the
associated LLDP Agent Remote Management Address.
Remote ID An arbitrary local integer value used by this agent to identify a particular
connection instance, unique only for the indicated remote system.
To display unit parameter information received via LLDP from the unit's nearest neighbor (peer):
1. Select Ethernet > Protocols > LLDP > Advanced > Remote System > Remote Table. The LLDP Remote System
Table page opens.
Table 56 describes the parameters in the LLDP Remote System Table page. These parameters are read-only.
Parameter Definition
Remote ID An arbitrary local integer value used by this agent to identify a particular
connection instance, unique only for the indicated peer.
Remote Chassis ID An octet string used to identify the peer's hardware unit
Chassis ID Subtype The type of encoding used to identify the peer's hardware unit
Remote Port An octet string used to identify the port component associated with the
remote system.
Port Sub type The type of port identifier encoding used in the peer's Port ID.
Table 57 describes the parameters in the LLDP Local System Parameters page. These parameters are read-only.
Parameter Definition
System Name The system name included in TLVs transmitted by the LLDP agent, as
defined in the Name field of the Unit Parameters page. See Configuring
Unit Parameters.
System Description The system description included in TLVs transmitted by the LLDP agent, as
defined in the Description field of the Unit Parameters page. See
Configuring Unit Parameters.
Parameter Definition
Chassis ID SubType The type of encoding used to identify the local unit. In this release, this
parameter is always set to MAC Address.
Capabilities Supported A bitmap value used to identify which system capabilities are supported
on the local system, as included in TLVs transmitted by the LLDP agent.
The bitmap is defined by the following parameters:
0 – other
1 – repeater
2 – bridge
3 – wlanAccessPoint
4 – router
5 – telephone
6 – docsisCableDevice
7 – stationOnly
8 – cVLANComponent
9 – sVLANComponent
10 – twoPortMACRelay
Capabilities Enabled A bitmap value used to identify which system capabilities are enabled on
the local system, as included in TLVs transmitted by the LLDP agent.
The bitmap is defined by the following parameters:
0 – other
1 – repeater
2 – bridge
3 – wlanAccessPoint
4 – router
5 – telephone
6 – docsisCableDevice
7 – stationOnly
8 – cVLANComponent
9 – sVLANComponent
10 – twoPortMACRelay
Table 58 describes the parameters in the LLDP Local System Port page. These parameters are read-only.
Parameter Definition
Port Sub Type The type of encoding used to identify the port in LLDP transmissions. In
this release, this parameter is always set to MAC Address.
Table 59 describes the parameters in the LLDP Local System Management page. These parameters are read-only.
Parameter Definition
Parameter Definition
Parameter Definition
Last Change Time The time of the most recent change in the remote unit, as reported via
LLDP.
Parameter Definition
Inserts The number of times the information from the remote system has
changed.
Deletes The number of times the information from the remote system has been
deleted.
Ageouts The number of times the information from the remote system has been
deleted from the local unit's database because the information's TTL has
expired.
The RX Ageouts counter in the Port RX page is similar to this counter, but
is for specific ports rather than the entire unit.
Parameter Definition
Interface Location The index value used to identify the port in LLDP transmissions.
Destination Address The LLDP MAC address associated with this entry.
Total Frames The number of LLDP frames transmitted by the LLDP agent on this port to
the destination MAC address.
Errored Length Frames The number of LLDPDU Length Errors recorded for this port and
destination MAC address.
If the set of TLVs that is selected in the LLDP local system MIB by network
management would result in an LLDPDU that violates LLDPDU length
restrictions, then the No. of Length Error statistic is incremented by 1,
and an LLDPDU is sent containing the mandatory TLVs plus as many of the
optional TLVs in the set as will fit in the remaining LLDPDU length.
Parameter Definition
Interface Location The index value used to identify the port in LLDP transmissions.
Destination Address The LLDP MAC address associated with this entry.
Parameter Definition
Total Discarded The number of LLDP frames received by the LLDP agent on this port, and
then discarded for any reason. This counter can provide an indication that
LLDP header formatting problems may exist with the local LLDP agent in
the sending system or that LLDPDU validation problems may exist with
the local LLDP agent in the receiving system.
Invalid Frames The number of invalid LLDP frames received by the LLDP agent on this
port while the agent is enabled.
Valid Frames The number of valid LLDP frames received by the LLDP agent on this port.
Discarded TLVs The number of LLDP TLVs discarded for any reason by the LLDP agent on
this port.
Unrecognized TLVs The number of LLDP TLVs received on the given port that are not
recognized by LLDP agent.
Ageouts The number of age-outs that occurred on the port. An age-out is the
number of times the complete set of information advertised by the
remote system has been deleted from the unit's database because the
information timeliness interval has expired.
This counter is similar to the LLDP No. of Ageouts counter in the LLDP
Statistic page, except that it is per port rather than for the entire unit.
This counter is set to zero during agent initialization. This counter is
incremented only once when the complete set of information is
invalidated (aged out) from all related tables on a particular port. Partial
ageing is not allowed.
Chapter 9: Synchronization
This section includes:
• Configuring the SyncE Regenerator
• Configuring the Sync Source
• Configuring the Outgoing Clock and SSM Messages
• Configuring 1588 Transparent Clock
Note
For PTP 820E R2H ESP, SyncE Regenerator is planned for future release.
In SyncE PRC pipe regenerator mode, frequency is transported between two interfaces through the radio link.
With the system acting as a simple link, no distribution mechanism is necessary, resulting in improved frequency
distribution performance with PRC quality and a simplified configuration.
Note
SyncE Regenerator currently supports only a single pipe configuration. It cannot be used together with
1588 Transparent Clock.
Note
By default, the Sync mode is set to Automatic. To display the current Sync mode, enter the following
command in root view:
root> platform sync mode show
2. In the Web EMS, select Sync > SyncE Regenerator. The SyncE Regenerator page opens.
3. Click Add underneath the Pipe Configurations Table. The Pipe Configuration - Add window opens.
Note
One of the Sync Interfaces must be a Radio interface and the other must be an Ethernet interface. If
the two interfaces are the same type, the operation will fail.
Only one radio port is available for PTP 820S unit.
6. Click Apply.
Note
To configure a sync source on which the sync source Quality parameter must be set according to
ANSI specifications and you must change the ETSI/ANSI mode to ANSI before configuring the sync
source. See Changing the ETSI/ANSI Mode (CLI).
Frequency signals can be taken by the system from Ethernet and radio interfaces.
The reference frequency may also be conveyed to external equipment through different interfaces. For
instructions how to configure the outgoing clock, see Configuring the Outgoing Clock and SSM Messages.
Frequency is distributed by configuring the following parameters in each node:
• System Synchronization Sources – These are the interfaces from which the frequency is taken and distributed
to other interfaces. Up to 16 sources can be configured in each node. A revertive timer can be configured. For
each interface, you must configure:
o Priority (1-16) – No two synchronization sources can have the same priority.
o Quality – The quality level applied to the selected synchronization source. This
enables the system to select the source with the highest quality as the current
synchronization source.
• Each unit determines the current active clock reference source interface:
o The interface with the highest available quality is selected.
o From among interfaces with identical quality, the interface with the highest priority is
selected.
When configuring the Sync source, the Sync mode must be set to its default setting of automatic. To display the
current Sync mode, enter the following CLI command in root view:
root> platform sync mode show
If the Sync mode is set to pipe, you must set it to automatic by entering the following CLI command in root view:
root> platform sync mode set automatic
When configuring an Ethernet interface as a Sync source, the Media Type of the interface must be RJ45 or SFP, not
Auto-Type. To view and configure the Media Type of an Ethernet interface, see Configuring Ethernet Interfaces.
Parameter Definition
System Reference Quality The quality of the current synchronization source interface. A value of
DNU indicates that no synchronization source interfaces are currently
defined.
Current Active Sync Source The currently active system synchronization source interface.
Sync Clock Unit Status The status of the unit’s Sync E mechanism.
Sync Interface Quality Displays the quality level assigned to this synchronization source. This
enables the system to select the source with the highest quality as the
current synchronization source.
If the Sync Interface Quality is set to Automatic, the quality is
determined by the received SSMs. If no valid SSM messages are received
or in case of interface failure (such as LOS, LOC, LOF), the quality becomes
"Failure." SSM must be enabled on the remote interface in order for the
interface to receive SSM messages. For instructions how to enable SSM,
see Configuring the Outgoing Clock and SSM Messages.
Sync Interface Priority Displays the priority assigned to this synchronization source.
Sync Interface Quality Displays the current actual synchronization quality of the interface.
Status
2 In the Sync Interface field, select the interface you want to define as a synchronization source. You can
select from the following interface types:
o Ethernet interfaces
o Radio interface
Note
In order to select an Ethernet interface, you must first specify the media type for this interface. See
Configuring Ethernet Interfaces.
3 In the Sync Interface Quality field, select the quality level applied to the selected synchronization source.
This enables the system to select the source with the highest quality as the current synchronization
source.
o If the Sync Interface Quality is set to Automatic, the quality is determined by the received SSMs. If no
valid SSM messages are received or in case of interface failure (such as LOS, LOC, LOF), the quality
becomes Failure. SSM must be enabled on the remote interface in order for the interface to receive
SSM messages. For instructions how to enable SSM, see Configuring the Outgoing Clock and SSM
Messages.
o If the Sync Interface Quality is set to a fixed value, then the quality status becomes Failure upon
interface failure (such as LOS, LOC, LOF).
4 In the Sync Interface Priority field, select the priority of this synchronization source relative to other
synchronization sources configured in the unit (1-16). You cannot assign the same priority to more than
one synchronization source. Once a priority value has been assigned, it no longer appears in the Sync
Interface Priority dropdown list.
5 Click Apply, then Close.
In the Outgoing Clock page, you can view and configure the following synchronization settings per interface:
• The interface's clock source (outgoing clock).
• For radio interfaces, the synchronization radio channel (used for interoperability).
• SSM message administration.
In order to provide topological resiliency for synchronization transfer, PTP 820C implements the passing of SSM
messages over the radio interfaces. SSM timing in PTP 820C complies with ITU-T G.781.
In addition, the SSM mechanism provides reference source resiliency, since a network may have more than one
source clock. The following are the principles of operation:
• At all times, each source interface has a “quality status” which is determined as follows:
o If quality is configured as fixed, then the quality status becomes “failure” upon
interface failure (such as LOS, LOC, LOF).
o If quality is automatic, then the quality is determined by the received SSMs. If no
valid SSM messages are received or in case of interface failure (such as LOS, LOC,
LOF), the quality becomes "failure.
• Each unit holds a parameter which indicates the quality of its reference clock. This is the quality of the current
synchronization source interface.
• The reference source quality is transmitted through SSM messages to all relevant radio interfaces.
• In order to prevent loops, an SSM with quality “Do Not Use” is sent from the active source interface (both
radio and Ethernet)
In order for an interface to transmit SSM messages, SSM must be enabled on the interface. By default, SSM is
disabled on all interfaces.
When configuring the outgoing clock and SSM administration, the Sync mode must be set to its default setting of
automatic. To display the current Sync mode, enter the following CLI command in root view:
root> platform sync mode show
If the Sync mode is set to pipe, you must set it to automatic by entering the following CLI command in root view:
root> platform sync mode set automatic
To configure the outgoing clock on an Ethernet interface, the Media Type of the interface must be RJ45 or SFP, not
Auto-Type. To view and configure the Media Type of an Ethernet interface, see Configuring Ethernet Interfaces.
To view and configure the synchronization parameters of the unit’s interfaces:
1 Select Sync > Outgoing Clock. The Outgoing Clock page opens.
2 Select
the interface you want to configure and click Edit. The Outgoing Clock – Edit page opens.
Figure 382 Outgoing Clock – Edit Page
3 In the Outgoing clock source field, select the interface's synchronization source. Options are:
o Local Clock – The interface uses its internal clock as its synchronization source.
o System Clock – Default value. The interface uses the system clock as its synchronization source.
o Source Interface – Reserved for future use.
o Time Loop – Reserved for future use.
4 In Sync Radio Channel field, use the default value of 0.
5 In the SSM Admin field, select On or Off to enable or disable SSM for the interface. By default, SSM is
disabled on all interfaces.
Note
1588 Transparent Clock is supported by PTP 820C and PTP 820S.
PTP 820 uses 1588v2-compliant Transparent Clock to counter the effects of delay variation. Transparent Clock
measures and adjusts for delay variation, enabling the PTP 820 to guarantee ultra-low PDV.
A Transparent Clock node resides between a master and a slave node, and updates the timestamps of PTP packets
passing from the master to the slave to compensate for delay, enabling the terminating clock in the slave node to
remove the delay accrued in the Transparent Clock node. The Transparent Clock node is itself neither a master nor
a slave node, but rather, serves as a bridge between master and slave nodes.
Note that in release 11.1:
• 1588 TC is not supported when Master-Slave communication is using the IPv6 transport layer.
• 1588 TC cannot be used on 1+1 HSB links.
• 1588 TC cannot be used with 2 x 1+0 (East-West) configurations
• 1588 TC is not supported with Frame Cut-Through.
Note
Make sure to enable Transparent clock on the remote side of the link before enabling it on the local
side.
10. Select a radio interface or Multi-Carrier ABC group and click Edit. The 1588 Transparent Clock – Edit page
opens.
11. In the Port direction field, select Upstream or Downstream. This field must be set to different values on two
sides of the link so that if local side is set to Upstream, then the remote side of the link must be set to
Downstream and vice versa. Otherwise than the mentioned configuration, it does not matter how this field is
set.
12. Click Apply, then Close.
13. 1588 packets should be mapped to CoS 7. By default, 1588 packets are not mapped to any CoS. To map 1588
packets to CoS 7, you must disable CoS preservation for 1588 packets. This must be performed via CLI, using
the following command:
root> ethernet generalcfg ptp-tc cos-preserve set admin disable
14. To map 1588 packets to CoS 7, enter the following command:
root> ethernet generalcfg ptp-tc cos-preserve cos value 7
After you enter these commands, 1588 packets will automatically be mapped to CoS 7.
Note
If necessary, you can use the ethernet generalcfg ptp-tc cos-preserve cos value
command to map a different CoS value (0-7) to 1588 packets, but it is recommended to map 1588
packets to CoS 7.
To disable Transparent Clock synchronization:
1 Select Sync > 1588 > General Configuration. The 1588 – General Configuration page opens (Figure 320).
2 In the 1588 PTP field, select Disable.
3 Click Apply.
Note
Disabling 1588 PTP disables both Transparent Clock and Boundary Clock, and can drastically affect
time synchronization performance in the entire network.
Note
Another security feature, HTTPS cipher hardening, can be configured via CLI. For instructions, see
Configuring HTTPS Cipher Hardening (CLI)
PTP 820 devices support SDN, with NETCONF/YANG capabilities. This enables PTP 820 devices to be
managed via SDN using Cambium Networks SDN controller, SDN Master. NETCONF must be enabled
via CLI. See Enabling NETCONF (CLI).
Related topics:
• Changing Your Password
• Operating in FIPS Mode
• Configuring AES-256 Payload Encryption
The Web EMS provides a set of Quick Configuration pages that enable you to quickly configure the unit’s access
and security parameters. This section describes these pages, with cross references to the sections in which each
parameter is described in depth.
Note
The Quick Security Configuration pages are only available in system release 10.9.6 and higher.
Note
T FIPS and AES-256 are not supported with PTP 820E.
4 Select Quick Configuration > Security > General Parameters. The Quick Configuration Security General
Parameters page opens.
5 In the FIPS Mode Admin field, you can enable or disable FIPS mode. For details, see Operating in FIPS Mode.
Note
Only certain system release versions support FIPS mode. These versions include system release
8.3 and 10.9.6.
6 The Import/Export security settings field determines whether security configurations are included in
configuration backup files. If you select Enable, security configurations will not be included in backup files.
7 In the Session timeout field, you can configure a session timeout, in minutes, from 1 to 60 minutes. The default
session timeout is 10 minutes. For details, see Configuring the Session Timeout.
8 In the Login Banner Text field, you can define a login banner of up to 2,000 bytes. This banner will appear every
time a user establishes a connection with the Web EMS. The banner appears before the login prompt, so that
users will always see the login banner and must manually close the banner before logging in to the Web EMS.
For details, see Defining a Login Banner.
9 In the Radio Payload Encryption area, select an interface and click Edit to define AES-256 payload encryption.
For details, see Configuring AES-256 Payload Encryption.
2 In the HTTP protocol field, you can determine the web interface protocol for accessing the unit (HTTP or
HTTPS). By default, the web interface protocol is HTTP. For details, see Enabling HTTPS (CLI).
Note
After changing the HTTP protocol, management is lost. To restore management, simply refresh
the page.
3 In the Telnet Admin field, you can block or enable telnet access to the unit. By default, telnet access is enabled.
For details, see Blocking Telnet Access.
4 In the SNMP Parameters area, you can configure the unit’s SNMP parameters. For details, see Configuring
SNMP.
In addition, you can configure the following parameters only in the Quick Configuration Security Protocols
page:
i In the Block SNMP from Write Security Parameters field, select Yes if you want to block SNMP from writing
security parameters.
ii In the Block SNMP from Read Security Parameters field, select Yes if you want to block SNMP from reading
security parameters.
5 When you are finished editing the parameters described above, click Apply.
6 In the SNMP V3 Users are, you can click Add to add SNMP V3 users. For details, see Configuring SNMP.
2 In the Login & Password Management area, you can configure enhanced security requirements for user
passwords and for logging into the unit. For details, see Configuring the General Access Control Parameters and
Configuring the Password Security Parameters.
3 When you are finished editing the login and password parameters, click Apply.
4 In the User Accounts area, you can configure individual users:
• To add a user, click Add.
• To edit an existing user, select the user in the User Accounts table and click Edit.
For details, see Configuring Users.
5 To configure user profiles, click Access Control User Profiles. For details, see Configuring User Profiles.
Figure 389: Quick Configuration Security RSA Key & Certificate Page
2 In the RSA Key Download Status area, you can download and install an RSA key. For details, see Downloading
and Installing an RSA Key.
3 In the Download Certification Status area, you can download and install a CSR file. For details, see Configuring
X.509 CSR Certificates and HTTPS.
To avoid unauthorized login to the system, PTP 820 automatically blocks users upon a configurable number of
failed login attempts. You can also configure PTP 820 to block users that have not logged into the unit for a defined
number of days.
To configure the blocking criteria:
1. Select Platform > Security > Access Control > General. The Access Control General Configuration page opens.
2. In the Failure login attempts to block user field, select the number of failed login attempts that will trigger
blocking. If a user attempts to login to the system with incorrect credentials this number of times
consecutively, the user will temporarily be prevented from logging into the system for the time period defined
in the Blocking period field. Valid values are 1-10. The default value is 3.
3. In the Blocking period (Minutes) field, enter the length of time, in minutes, that a user is prevented from
logging into the system after the defined number of failed login attempts. Valid values are 1-60. The default
value is 5.
4. In the Unused account period for blocking (Days) field, you can configure a number of days after which a user
is prevented from logging into the system if the user has not logged in for the configured number of days.
Valid values are 0, or 30-90. If you enter 0, this feature is disabled. The default value is 0.
5. Click Apply.
Once a user is blocked, you can unblock the user from the User Accounts page. To unblock a user:
1. Select Platform > Security > Access Control > User Accounts. The Access Control User Accounts page opens
(Figure 291).
2. Select the user and click Edit. The Access Control User Accounts - Edit page opens.
2. In the Enforce password strength field, select Yes or No. When Yes is selected:
o Password length must be at least eight characters.
o Password must include characters of at least three of the following character types:
lower case letters, upper case letters, digits, and special characters. For purposes of
meeting this requirement, upper case letters at the beginning of the password and
digits at the end of the password are not counted.
o The last five password you used cannot be reused.
3. In the Password change for first login field, select Yes or No. When Yes is selected, the system requires the
user to change his or her password the first time the user logs in.
4. In the Password aging (Days) field, select the number of days that user passwords will remain valid from the
first time the user logs into the system. You can enter 20-90, or No Aging. If you select No Aging, password
aging is disabled and passwords remain valid indefinitely.
5. Click Apply.
By default, there is a 10 minute session timeout. If you do not perform any activity on the system for the period of
time defined as the session timeout, the user session times out and you will have to log in to the system again.
To modify the session timeout:
1. Select Platform > Security > Protocols Control. The Protocols Control page opens.
2. In the Session timeout (Minutes) field, select a session timeout, in minutes, from 1 to 60.
3. Click Apply.
Configuring Users
2. Click Add. The Access Control User Profiles - Add page opens.
3. In the Profile field, enter a name for the profile. The profile name can include up to 49 characters. Once you
have created the user profile, you cannot change its name.
Note
The Usage counter field displays the number of users to whom the user profile is assigned.
4. In the Permitted access channels row, select the access channels the user will be permitted to use to access
the system.
5. For each functionality group, select one of these options for write level and read level. All users with this
profile will be assigned these access levels:
o None
o Normal
o Advanced
6. Click Apply, then Close.
To view a user profile, click + next to the profile you want to view.
To edit a user profile, select the profile and click Edit. You can edit all of the profile parameters except the profile
name.
To delete a user profile, select the profile and click Delete.
Note
You cannot delete a user profile if the profile is assigned to any users.
Configuring Users
You can configure up to 2,000 users. Each user has a user name, password, and user profile. The user profile
defines a set of read and write permission levels per functionality group. See Configuring User Profiles.
To add a new user:
1. Select Platform > Security > Access Control > User Accounts. The Access Control User Accounts page opens.
2. Click Add. The Access Control User Profiles - Add page opens.
3. In the User name field, enter a user name for the user. The user name can be up to 32 characters.
4. In the Profile field, select a User Profile. The User Profile defines the user’s access levels for functionality
groups in the system. See Configuring User Profiles.
5. In the Password field, enter a password for the user. If Enforce Password Strength is activated (see
Configuring the Password Security Parameters), the password must meet the following criteria:
o Password length must be at least eight characters.
o Password must include characters of at least three of the following character types:
lower case letters, upper case letters, digits, and special characters. For purposes of
meeting this requirement, upper case letters at the beginning of the password and
digits at the end of the password are not counted.
o The last five passwords you used cannot be reused.
6. In the Blocked field, you can block or unblock the user. Selecting Yes blocks the user. You can use this option
to block a user temporarily, without deleting the user from the system. If you set this option to Yes while the
user is logged into the system, the user will be automatically logged out of the system within 30 seconds.
Note
Users can also be blocked by the system automatically. You can unblock the user by selecting No in
the Blocked field. See Configuring the General Access Control Parameters.
7. Optionally, in the Expiration date field, you can configure the user to remain active only until a defined date.
After that date, the user automatically becomes inactive. To set an expiration date, click the calendar icon and
select a date, or enter a date in the format dd-mm-yyyy. The latest date that can be configured is 30-12-2037
Note
If no expiration date is configured, the user account will expire five years after the date configured on
the unit.
In addition to the configurable parameters described above, the Access Control User Accounts page displays the
following information for each user:
o Login Status – Indicates whether the user is currently logged into the system.
o Last Logout – The date and time the user most recently logged out of the system.
To edit a user’s account details, select the user and click Edit. You can edit all of the user account parameters
except the User name and password.
To add a user, click Add.
To delete a user, select the user and click Delete.
Configuring RADIUS
RADIUS Overview
The RADIUS protocol provides centralized user management services. PTP 820 supports RADIUS server and
provides a RADIUS client for authentication and authorization. When RADIUS is enabled, a user attempting to log
into the system from any access channel (CLI, WEB, NMS) is not authenticated locally. Instead, the user’s
credentials are sent to a centralized standard RADIUS server which indicates to the PTP 820 whether the user is
known, and which privilege is to be given to the user.
The following RADIUS servers are supported:
• FreeRADIUS
• RADIUS on Windows Server (IAS)
o Windows Server 2008
You can define up to two Radius servers. If you define two, one serves as the primary server and the other as the
secondary server.
Note
When the Protocol is changed, all active sessions are terminated when you click Apply.
4. In the IPV4 address field, enter the IP address of the RADIUS server.
5. In the Port field, enter the port ID of the RADIUS protocol in the RADIUS server.
6. In the Retries field, enter the number of times the unit will try to communicate with the RADIUS server before
declaring the server to be unreachable.
7. In the Timeout field, enter the timeout (in seconds) that the agent will wait in each communication with the
selected RADIUS server before retrying if no response is received.
8. In the Secret field, enter the shared secret of the RADIUS server. The string must be between 22-128
characters long.
9. Click Apply, then Close.
In addition to the configurable parameters described above, the Remote Access Control Configuration page
displays the following information for each RADIUS server:
• Server Id – The server ID of the Radius server:
o 1 – The primary Radius server.
o 2 – The secondary Radius server.
• Connectivity Status – The connectivity status of the Radius server in the last attempted connection:
o True – The last connection attempt succeeded.
o False – The last connection attempt failed.
For each of the six functional groups (Ethernet, Management, Radio, Security, Sync, TDM), the page displays the
Read access level (None, Regular, or Advanced), and the Write access level (None, Regular, or Advanced).
Note
These RADIUS servers are third-party software. The instructions provided in this section are
illustrative only and are provided for the convenience of PTP 820 users. For exact and up-to-date
instructions, we urge you to rely on the documentation provided with the RADIUS server you are
using. Ceragon is not responsible for syntax changes or variations in different GNU distributions.
• Radius_Advanced
• Radius_Normal
• Radius_Viewer
Figure 402 Server Manager – Creating User Groups
3. In the Device Properties – General tab, make sure to select Password never expires. If you leave the default
setting (User must change password at next logon), authentication may fail.
Figure 406 Create Network Policy – Specify Name and Connection Type
4 Click Next.
5 In the Specify Conditions window, click Add.
6 In the Select Condition window that appears, select the User Groups condition and click Add.
Figure 408 Create Network Policy – User Group added to Policy’s Conditions
13 In the Specify Access Permission window that appears, select the Access Granted option.
14 Click Next.
15 In the Configure Authentication Methods window that appears, make sure only the Unencrypted
Authentication (PAP, SPAP) option is selected.
ii Select the Vendor Specific checkbox and click Add under the Attributes table.
22 In the Configure VSA (RFC Compliant) window that appears, configure 13 attributes as follows:
i For Vendor-assigned attribute number from 21 till 32, select Decimal in the Attribute format field. These
twelve attributes define the Read access level (None, Regular, or Advanced), and the Write access level
(None, Regular, or Advanced) for each of the six functional groups (Ethernet, Management, Radio,
Security, Sync, TDM). Therefore, in the Attribute value field enter the value corresponding to the access
level you wish to permit to members of the group whose policy you are configuring, where:
• 2 = Advanced
• 1 = Regular
• 0 = None
Thus for example, enter 2 for all twelve attributes if you are configuring a policy for
the Radius_Advanced group. This gives Advanced read permissions and Advanced
write permissions, for all six functional groups, to the members of the
Radius_Advanced group.
Figure 417 Create Network Policy – Configuring Vendor-Specific Attribute Information
ii For Vendor-assigned attribute number 50, select Decimal in the Attribute format field. The Attribute
value of this attribute defines the access channel(s) permitted to members of the group whose policy you
are configuring. The Attribute value is the sum of the values corresponding to the access channels you
wish to permit, where the value for each access channel is:
• none=0
• serial=1
• telnet=2
• ssh=4
• web=8
• nms=16
• snmp=32
• snmpV3=64
Thus for example, enter 127 to allow access from all channels:
Serial + Telnet + SSH + Web + NMS + SNMP +SNMPv3;
26 Reset the Network Policy Server (NPS) by stopping and starting the NPS service as follows:
i Right click the NPS (Local) node, and select Stop NPS Service.
ii Right click the NPS (Local) node, and select Start NPS Service.
security-ro = advanced,
security-wo = advanced,
mng-ro = advanced,
mng-wo = advanced,
radio-ro = advanced,
radio-wo = advanced,
tdm-ro = advanced,
tdm-wo = advanced,
eth-ro = advanced,
eth-wo = advanced,
sync-ro = advanced,
sync-wo = advanced,
access_channel = u1accesschannel,
fall-through = yes
security-ro = regular,
security-wo = regular,
mng-ro = regular,
mng-wo = regular,
radio-ro = regular,
radio-wo = regular,
tdm-ro = regular,
tdm-wo = regular,
eth-ro = regular,
eth-wo = regular,
sync-ro = regular,
sync-wo = regular,
access_channel = u2accesschannel,
fall-through = yes
security-ro = none,
security-wo = none,
mng-ro = none,
mng-wo = none,
radio-ro = none,
radio-wo = none,
tdm-ro = none,
tdm-wo = none,
eth-ro = none,
eth-wo = none,
sync-ro = none,
sync-wo = none,
access_channel = u3accesschannel,
fall-through = yes
2 Save the changes in the /etc/raddb/users file.
### serial 1
### telnet 2
### ssh 4
### web 8
### nms 16
### snmp 32
### snmpV3 64
For example:
• The value 127 denotes permission to access the device from all channels:
Serial + Telnet + SSH + Web + NMS + SNMP +SNMPv3
• The value 24 indicates permission to access the device only from the Web + NMS channels.
client 192.168.1.118 {
secret = default_not_applicable
Keep in mind:
o The secret must be between 22 and 128 characters long. Note down the secret
because you will need to enter the same value in the Secret field of the Radius
Configuration – Edit page (Figure 294).
o The shortname is not mandatory, but should be added, and should be different for
each RADIUS client.
2 Save the changes to the /etc/raddb/clients.conf file.
Note
Make sure to use absolute path mode if the target file is located in a different directory. For
example:
$INCLUDE ../share/freeradius/dictionary.cambium)
Note
To check the logs each time a user connects to the server, enter:
radius –X &
The web interface protocol for accessing PTP 820 can be configured to HTTP (default) or HTTPS. It cannot be set to
both at the same time.
Before setting the protocol to HTTPS, you must:
1. Create and upload a CSR file. See Generating a Certificate Signing Request (CSR) File.
2. Download the certificate to the PTP 820 and install the certificate. See Downloading a Certificate.
3. Enable HTTPS. This must be performed via CLI. See Enabling HTTPS (CLI).
When uploading a CSR and downloading a certificate, the PTP 820 functions as an SFTP client. You must install
SFTP server software on the PC or laptop you are using to perform the upload or download. For details, see
Installing and Configuring an FTP or SFTP Server.
Note
For these operations, SFTP must be used.
2. In the Common Name field, enter the fully–qualified domain name for your web server. You must enter the
exact domain name.
3. In the Organization field, enter the exact legal name of your organization. Do not abbreviate.
4. In the Organization Unit field, enter the division of the organization that handles the certificate.
5. In the Locality field, enter the city in which the organization is legally located.
6. In the State field, enter the state, province, or region in which the organization is located. Do not abbreviate.
7. In the Country field, enter the two-letter ISO abbreviation for your country (e.g., US).
8. In the Email field, enter an e-mail address that can be used to contact your organization.
9. In the File Format field, select the PEM or DER to determine the file format.
Note
In this version, only PEM is supported.
12. In the Username field, enter the user name you configured in the SFTP server.
13. In the Password field, enter the password you configured in the SFTP server. If you did not configure a
password for your SFTP user, simply leave this field blank.
14. In the Path field, enter the directory path to which you are uploading the CSR. Enter the path relative to the
SFTP user's home directory, not the absolute path. If the location is the home directory, it should be left
empty. If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is
"C:\", this parameter can be left empty or populated with "//".
15. In the File name field, enter the name you want to give to the exported CSR.
16. If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
SFTP server in the Server IPV4 address field. See Defining the IP Protocol Version for Initiating
Communications.
17. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
SFTP server in the Server IPv6 address field. See Defining the IP Protocol Version for Initiating
Communications.
18. Click Apply, then Close, to save the FTP parameters and return to the Security Log Upload page.
19. Click Generate & Upload. The file is generated and uploaded.
The CSR Status field displays the status of any pending CSR generation and upload. Possible values are:
o Ready – The default value, which appears when CSR generation and upload is in
progress.
o File-in-transfer – The upload operation is in progress.
o Success – The file has been successfully uploaded.
o Failure – The file was not successfully uploaded.
The CSR Percentage field displays the progress of any current CSR upload operation.
Downloading a Certificate
To download a certificate:
1. Select Platform > Security > X.509 Certificate > Download & Install. The Security Certification Download and
Install page opens.
Figure 423 FTP Parameters Page (Security Certification Download & Install)
3. In the User name for logging field, enter the user name you configured in the SFTP server.
4. In the User password to server field, enter the password you configured in the SFTP server. If you did not
configure a password for your SFTP user, simply leave this field blank.
5. In the Path field, enter the directory path from which you are uploading the certificate. Enter the path relative
to the SFTP user’s home directory, not the absolute path. If the location is the home directory, it should be left
empty. If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is
"C:\", this parameter can be left empty or populated with "//".
6. In the File Name field, enter the certificate’s file name in the SFTP server.
7. If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
SFTP server in the Server IPV4 address field. See Defining the IP Protocol Version for Initiating
Communications.
8. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
SFTP server in the Server IPv6 address field. See Defining the IP Protocol Version for Initiating
Communications.
9. Click Apply to save your settings.
10. Click Download. The certificate is downloaded.
11. Click Install. The certificate is installed on the PTP 820.
Enabling HTTPS
By default, HTTP is used by PTP 820 as its web interface protocol.
To enable HTTPS instead of HTTP:
1. Select Platform > Security > Protocols Control. The Protocols Control page
2. opens (Figure 370).
3. In the HTTP protocol field, select HTTPS.
4. Click Apply.
Note
Make sure you have installed a valid certificate in the PTP 820 before changing the web interface
protocol to HTTPS. Failure to do this may prevent users from accessing the Web EMS.
PTP 820 devices support RSA keys for communication using HTTPS and SSH protocol. The PTP 820 device comes
with randomly generated default private and public RSA keys. However, you can replace the private key with a
customer-defined private key. The corresponding RSA public key will be generated based on this private key. The
file must be in PEM format. Supported RSA private key sizes are 2048, 4096, and 8192.
The following is an example of a valid RSA private key file:
-----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC+7jRmt27yF4xDh5Pc8w4ikvXUu32BI0eOyELmeUB
nEeIHbCOXD3upi8+ZnH51Q+8hzgoSqXgEYFgZMoF/sXCrO2yf62UJ5ohj3zadhx/7585zoGwHtYz1S62hsa4+cdAl/i1Vbc
6CoUBh5642XYje+Q+q1XJtObed884eaQcXUFLlBipYKvVx2kuelymansE91WJU+UjFlc3aiQG8qsSgW5Ar6wet0pXkP2V
demo//QAXXjcTqqMBuizrlhlcvi+OKYFl9kSh21ZqSgjvK3cfAssCJBIY5d6t6bVkX9p2gjo/IPnErjAv7W6lZoemotb5KAeSHe
R1sYTw17/xIpM7AgMBAAECggEAAwliLKQMOq4kh/UXD/OPAlPDXyp1jjaTw8dBm811OG5wttzXGrxJ+OIFX5Rn79Db
HnbayCiJL8tMe2dx5yhY+hA247roX3ua0w57cuPxnp21izc+S0fC7H/TTM1jpRCbATparuTRMlitinZshJGA73Lsod3v36GE
Xxm/6dHnz/drCs2F4NdHWpjMAAG/1CiBwut8jNkJUwa78Ivk3JF+XRoZ0txN2mIybQxxzjuNXqZbNO6H3Ua2u1iYyD+
McfgOWCCUfSnstGRhFg0OsQuqj6d74qKVQWaukEH91SVZHEoqX6DgpKy4INZBxORZmlTNmadwNhw5O7rvFxZ205u
4gQKBgQDT5bXvc0Ok+Ypm2xnIbu2GFjxNYwYhR3TvHPy14NIO5Q9I/uDqwrSL1igzalr6EbZyLu8cDXa4aybrzCyBfPeG8
9Qq+a6J3JR/RwJndLyjV4h5CT8Zy4O/wjgTrP3Rhq7LAbWgLjSarafLgruHTcnOifhkK7MK7Fr+xi2IJfOKQQKBgQDmq1eY
NzlMPlATESlsfbkcL49jSsu70kYg0g5Iol6+bVPo9K7mopICtWC/fwdNlUAfO+vr/231YUfSo7YNEDNNRoT/NwvqqtAYxZaI
UdIQxhMywF9jjYBBuq6+f/7+dwDfNBtMb2q7hceTdk6yZ8/MehCkvSwOBmP+lq0FwTmmewKBgQClxmj31G1ve+rTX
UZmkKIy7OJwiLAbCRRqnXr3r9Om43151i2QfJNTc1AwKVzTl1ftLNrUT5Q541qnzyxigaoFYmzy0jPCl1d128/9sE6EW87
hImLDg3ynYQMOIaDRc1T8bXHyxzNQb9t+U+DykeD4POifNbD1MsRd3h1xDn/iAQKBgHmKpukJkCNgYgjp7g3AYR084i
zLaHZa4aDBjc0v4QQtzxzccJwN5SmQMJ42bL6wecz7YeBEAshcrd+La42Oj7mUAtgHRTwtLOEgm6TQmANGmy8OtjRa
hs4bc5/lCZNDWS5C4m9v9alBYFuO5wCSOqffWY20L9Zj/6RR+HEj0yCpAoGAHwrbRqPVZtZptFuNsCq130dtmqI7HFQ
Alqrc5DwP7YSsznE6biHfLUw891xu0vmevALrCaoeOMaidugohgiorSJO4qk7I3XN3pUJhPYqbhtdCVnBI2Fm9pr3V/SHG
vrl1NW92cXObeQ2UEBiKPOyQKfOBlbac707u0HqaTu+/ts=
-----END PRIVATE KEY-----
Figure 424: RSA Key Download & Install Page (HTTP Selected)
2 Select HTTP to download the file via HTTP/HTTPS or FTP to download the file via SFTP.
Note
It is strongly recommended not to use HTTP to download RSA key files.
Note
To discontinue the download process, click Abort.
Figure 425: RSA Key Download & Install Page (FTP Selected)
4 The File Transfer Protocol field is read-only and displays SFTP. RSA key files cannot be downloaded to an PTP
820 device using FTP.
5 In the Username field, enter the user name you configured in the SFTP server.
6 In the Password field, enter the password you configured in the SFTP server. If you did not configure a
password for your SFTP user, simply leave this field blank.
7 In the Path field, enter the directory path from which you are downloading the file. Enter the path relative to
the SFTP user's home directory, not the absolute path. If the location is the home directory, it should be left
empty. If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is
"C:\", this parameter can be left empty or populated with "//"..
8 If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
SFTP server in the Server IPv4 address field.
9 If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
SFTP server in the Server IPv6 address field.
10 Click Apply to save your settings.
11 In the RSA Key Download & Install page, click Download. The download begins. You can view the status of the
download in the Download Status field. See Table 75.
12 Once the download has been completed, click Install to install the RSA key file. You can view the status of the
installation in the Install Status field. See Table 75.
Note
To discontinue the download process, click Abort.
Install Status The status of any pending installation. Possible values are:
• Success
• Failed
2 In the Telnet Admin field, select Disable to block telnet access. By default, telnet access is enabled (Enable).
3 Click Apply.
The security log is an internal system file which records all changes performed to any security feature, as well as all
security related events.
When uploading the security log, the PTP 820 functions as an FTP or SFTP client. You must install FTP or SFTP
server software on the PC or laptop you are using to perform the import or export. For details, see Installing and
Configuring an FTP or SFTP Server.
To upload the security log:
1. Install and configure an FTP server on the PC or laptop you are using to perform the upload. See Installing and
Configuring an FTP or SFTP Server.
2. Select Platform > Security > General > Security Log Upload. The Security Log Upload page opens.
4. In the Username field, enter the user name you configured in the FTP server.
5. In the Password field, enter the password you configured in the FTP server. If you did not configure a
password for your FTP user, simply leave this field blank.
6. If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
FTP server in the Server IPV4 address field. See Defining the IP Protocol Version for Initiating Communications.
7. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
FTP server in the Server IPv6 address field. See Defining the IP Protocol Version for Initiating Communications.
8. In the Path field, enter the directory path to which you are uploading the files. Enter the path relative to the
FTP user's home directory, not the absolute path. If the location is the home directory, it should be left
empty. If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is
"C:\", this parameter can be left empty or populated with "//".
9. In the File name field, enter the name you want to give to the exported security log.
Note
The directory path and fie name, together, cannot be more than:
If the IP address family is configured to be IPv4: 236 characters
If the IP address family is configured to be IPv6: 220 characters
10. Click Apply, then Close to save the FTP parameters and return to the Security Log Upload page.
11. Click Upload. The upload begins.
The File transfer operation status field displays the status of any pending security log upload. Possible values are:
o Ready – The default value, which appears when no file transfer is in progress.
o File-in-transfer – The upload operation is in progress.
o Success – The file has been successfully uploaded.
o Failure – The file was not successfully uploaded.
The Process percentage field displays the progress of any current security log upload operation.
The configuration log lists actions performed by users to configure the system. This file is mostly used for security,
to identify suspicious user actions. It can also be used for troubleshooting.
When uploading the configuration log, the PTP 820 functions as an FTP or SFTP client. You must install FTP or SFTP
server software on the PC or laptop you are using to perform the upload. For details, see Installing and Configuring
an FTP or SFTP Server.
To upload the configuration log:
1. Install and configure an FTP server on the PC or laptop you are using to perform the upload. See Installing and
Configuring an FTP or SFTP Server.
2. Select Platform > Security > General > Configuration Log Upload. The Configuration Log Upload page opens.
4. In the Username field, enter the user name you configured in the FTP server.
5. In the Password field, enter the password you configured in the FTP server. If you did not configure a
password for your FTP user, simply leave this field blank.
6. If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
FTP server in the Server IPV4 address field. See Defining the IP Protocol Version for Initiating Communications.
7. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
FTP server in the Server IPv6 address field. See Defining the IP Protocol Version for Initiating Communications.
8. In the Path field, enter the directory path to which you are uploading the files. Enter the path relative to the
FTP user's home directory, not the absolute path. If the location is the home directory, it should be left empty.
If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is "C:\",
this parameter can be left empty or populated with "//".
9. In the File Name field, enter the name you want to give to the exported configuration log.
Note
The directory path and fie name, together, cannot be more than:
If the IP address family is configured to be IPv4: 236 characters
If the IP address family is configured to be IPv6: 220 characters
10. Click Apply, and Close to save the FTP parameters and return to the Configuration Log Upload page.
11. Click Upload. The upload begins.
The File transfer operation status field displays the status of any pending configuration log upload. Possible values
are:
o Ready – The default value, which appears when no file transfer is in progress.
Note
CW mode, used to transmit a single or dual frequency tones for debugging purposes, can be
configured using the CLI. See Working in CW Mode (Single or Dual Tone) (CLI).
You can configure a 30-second wait time after an alarm is cleared in the system before the alarm is
actually reported as being cleared. This prevents traps flooding the NMS in the event that some
external condition causes the alarm to be raised and cleared continuously. By default, the timeout
for trap generation is disabled. It can be enabled and disabled via CLI. See Configuring a Timeout for
Trap Generation (CLI).
2. To view more detailed information about an alarm, click + at the beginning of the row or select the alarm and
click View.
Figure 433 Current Alarms - View Page
Parameter Definition
Sequence Number (#) A unique sequence number assigned to the alarm by the system.
Severity The severity of the alarm. In the Current Alarms table, the severity is
indicated by a symbol. You can display a textual description of the
severity by holding the cursor over the symbol.
Note: You can edit the severity of alarm types in the Alarm
Configuration page. See Editing Alarm Text and Severity.
User Text Additional text that has been added to the system-defined description of
the alarm by users.
Note: You can add user text to alarms in the Alarm Configuration page.
See Editing Alarm Text and Severity.
Probable Cause This field only appears in the Current Alarms - View page. One or more
possible causes of the alarm, to be used for troubleshooting.
Corrective Actions This field only appears in the Current Alarms - View page. One or more
possible corrective actions to be taken in troubleshooting the alarm.
The Alarm Statistics page displays the number of current alarms per severity level for each module, interface, and
virtual interface (such as Multi-Carrier ABC groups) in the unit. Only modules and interfaces for which one or more
alarms are currently raised are listed in the Alarm Statistics page.
The Event Log displays a list of current and historical events and information about each event.
To display the Event Log:
1. Select Faults > Event Log. The Event Log opens. For a description of the information provided in the Event Log,
see Table 65 Event Log Information.
Figure 435 Event Log
2. To export the Event Log to a CSV file, click Export to CSV in the lower right corner of the Event Log page.
Parameter Definition
Sequence Number (#) A unique sequence number assigned to the event by the system.
Severity The severity of the event. In the Event Log table, the severity is indicated
by a symbol. You can display a textual description of the severity by
holding the cursor over the symbol.
Note: You can edit the severity of event types in the Alarm
Configuration page. See Editing Alarm Text and Severity.
State Indicates whether the event is currently raised or has been cleared.
User Text Additional text that has been added to the system-defined description of
the event by users.
Note: You can add user text to events in the Alarm Configuration page.
See Editing Alarm Text and Severity.
You can view a list of alarm types, edit the severity level assigned to individual alarm types, disable alarms and events
and add additional descriptive text to individual alarm types.
This section includes:
• Displaying Alarm Information
• Viewing the Probable Cause and Corrective Actions for an Alarm Type
• Editing an Alarm Type
• Setting Alarms to their Default Values
Parameter Definition
Sequence Number (#) A unique sequence number assigned to the row by the system.
Parameter Definition
Severity The severity assigned to the alarm type. You can edit the severity in the
Alarm Configuration – Edit page. See Editing an Alarm Type.
Additional Text Additional text that has been added to the system-defined description of
the alarm by users. You can edit the text in the Alarm Configuration – Edit
page. See Editing an Alarm Type.
Service Affecting Indicates whether the alarm is considered by the system to be service-
affecting (on) or not (off).
Alarm Admin Indicates whether the alarm is enabled or disabled. By default, all alarms
are enabled. See Editing an Alarm Type and Disabling Alarms and Events.
To change the severity of an alarm type and add additional text to the alarm type's description:
1. Select the alarm type in the Alarm Configuration page (Figure 327).
2. Click Edit. The Alarm Configuration - Edit page opens.
You can configure undervoltage and overvoltage alarm thresholds and display voltage PMs.
The default thresholds for PTP 820C are:
• Undervoltage Raise Threshold: 32V
• Undervoltage Clear Threshold: 34V
• Overvoltage Raise Threshold: 60V
• Overvoltage Clear Threshold: 58V
The default thresholds for the other PTP 820 all-outdoor products are:
• Undervoltage Raise Threshold: 36V
• Undervoltage Clear Threshold: 38V
• Overvoltage Raise Threshold: 60V
• Overvoltage Clear Threshold: 58V
These thresholds determine when the following alarms are raised and cleared:
• Alarm #32000: Under voltage
• Alarm #32001: Over voltage
To configure voltage alarm thresholds:
1 Select Faults > Voltage Alarm Configuration. The Voltage Alarm Configuration page opens.
Note: You can also open the Voltage Alarm Configuration page by selecting Platform > PM &
Statistics > Voltage and clicking Thresholds.
You can generate a Unit Information file, which includes technical data about the unit. This file can be uploaded and
forwarded to customer support, at their request, to help in analyzing issues that may occur.
You can upload the Unit Information file using HTTP, HTTPS, FTP, or SFTP.
Note
For troubleshooting, it is important that an updated configuration file be included in Unit Info files
that are sent to customer support. To ensure that an up-to-date configuration file is included, it is
recommended to back up the unit’s configuration before generating the Unit Info file.
For PTP 820C, PTP 820C-HP, and PTP 820S units with Unit Redundancy, you must use FTP or SFTP to
upload the User Information file.
2. Select HTTP.
3. Click Create to create the Unit Information file. The following fields display the status of the file
creation process:
◦ File Creation Status – Displays the file creation status. You must wait until the
status is Success to upload the file. Possible values are:
3. Select FTP
4. Set the FTP parameters:
◦ Click FTP Parameters. The FTP Parameters page opens.
5. In the File transfer protocol field, select the file transfer protocol you want to use (FTP or SFTP).
6. In the Username in server field, enter the user name you configured in the FTP server.
7. In the Password in server field, enter the password you configured in the FTP server. If you did not configure a
password for your FTP user, simply leave this field blank.
8. If the IP address family is configured to be IPv4, enter the IPv4 address of the PC or laptop you are using as the
FTP server in the Server IPv4 address field. See Defining the IP Protocol Version for Initiating Communications.
9. If the IP address family is configured to be IPv6, enter the IPv6 address of the PC or laptop you are using as the
FTP server in the IPv6 Server Address field. See Defining the IP Protocol Version for Initiating Communications.
10. In the Path field, enter the directory path to which you are uploading the file. Enter the path relative to the
FTP user's home directory, not the absolute path. If the location is the home directory, it should be left empty.
If the location is a sub-folder under the home directory, specify the folder name. If the shared folder is "C:\",
this parameter can be left empty or populated with "//".
11. In the File Name field, enter the name you want to give to the exported Unit Information file.
12. Click Apply to save your settings.
13. Click Create to create the Unit Information file. The following fields display the status of the file creation
process:
o Unit Info File creation status – Displays the file creation status. You must wait until
the status is Success to upload the file. Possible values are:
o Ready – The default value, which appears when no file is being created.
o Generating File – The file is being generated.
o Success – The file has been successfully created. You may now upload the file.
o Failure – The file was not successfully created.
o Unit Info File creation progress – Displays the progress of the current Unit
Information file creation operation.
14. Click Export. The upload begins. The following fields display the status of the upload process:
o File File transfer status – Displays the status of any pending Unit Information file
upload. Possible values are:
o Ready – The default value, which appears when no file transfer is in progress.
o File-in-transfer – The upload operation is in progress.
o Success – The file has been successfully uploaded.
o Failure – The file was not successfully uploaded.
If you try to export the file before it has been created, the following error message appears: Error #3-Invalid
set value.
If this occurs, wait about two minutes then click Export again.
o File transfer progress – Displays the progress of the current Unit Information file
upload operation.
Performing Diagnostics
2. Select the slot on which you want to perform loopback and click Edit. The Radio Loopbacks – Edit page opens.
Note
You cannot perform loopback directly on a Multi-Carrier ABC group. To perform traffic-level
diagnostics on a Multi-Carrier ABC group, the loopback must be activated for all members of the
group. Radio-level diagnostics can still be performed on individual members of the group.
3. In the Loopback timeout (minutes) field, enter the timeout, in minutes, for automatic termination of the
loopback (0-1440). A value of 0 indicates that there is no timeout.
4. In the RF loopback field, select On.
5. Click Apply.
3. In the Ethernet loopback admin field, select Enable to enable Ethernet loopback on the logical interface, or
Disable to disable Ethernet loopback on the logical interface.
4. In the Ethernet loopback duration (sec) field, enter the loopback duration time (in seconds).
5. In the Swap MAC address admin field, select whether to swap DA and SA MAC addresses during the loopback.
Swapping addresses prevents Ethernet loops from occurring. It is recommended to enable MAC address
swapping if LLDP is enabled.
6. Click Apply to initiate the loopback.
SOAM Overview
The Y.1731 standards and the MEF-30 specifications define Service OAM (SOAM). SOAM is concerned with
detecting, isolating, and reporting connectivity faults spanning networks comprising multiple LANs, including LANs
other than IEEE 802.3 media.
Y.1731 Ethernet FM (Fault Management) consists of three protocols that operate together to aid in fault
management:
• Continuity check
• Link trace
• Loopback
Note
Link trace is planned for future release.
PTP 820 utilizes these protocols to maintain smooth system operation and non-stop data flow.
The following are the basic building blocks of FM:
• MD (Maintenance Domain) – An MD defines the management space on a network, typically owned and
operated by a single entity, for which connectivity faults are managed via SOAM.
• MA/MEG (Maintenance Association/Maintenance Entity Group) – An MA/MEG contains a set of MEPs or
MIPs.
• MEP (MEG End Points) – Each MEP is located on a service point of an Ethernet service at the boundary of the
MEG. By exchanging CCMs (ContinuityCheck Messages), local and remote MEPs have the ability to detect the
network status, discover the MAC address of the remote unit/port where the peer MEP is defined, and
identify network failures.
Note
MIP – (MEG Intermediate Points) Similar to MEPs, but located inside the MEG and can only respond
to, not initiate, CMM message.
• CCM (Continuity Check Message) – MEPs in the network exchange CCMs with their peers at defined intervals.
This enables each MEP to detect loss of connectivity or failure in the remote MEP.
Configuring MDs
In the current release, you can define one MD, with an MD Format of None.
To add an MD:
1. Select Ethernet > Protocols > SOAM > MD. The SOAM MD page opens.
3. In the MD Name field, enter an identifier for the MD (up to 43 alphanumeric characters). The MD Name
should be unique over the domain.
4. In the MD Format field, select None.
Note
Support for MDs with the MD format Character String is planned for future release. In this release,
the software enables you to configure such MDs, but they have no function.
5. In the MD Level field, select the maintenance level of the MD (1-7). The maintenance level ensures that the
CFM frames for each domain do not interfere with each other. Where domains are nested, the encompassing
domain must have a higher level than the domain it encloses. The maintenance level is carried in all CFM
frames that relate to that domain. The MD Level must be the same on both sides of the link.
Note
In the current release, the MD level is not relevant to the SOAM functionality.
Configuring MA/MEGs
You can configure up to 1280 MEGs per network element: MEGs are classified as Fast MEGs or Slow MEGs
according to the CCM interval
• Fast MEGs have a CCM interval of 1 second.
• Slow MEGs have a CCM interval of 10 seconds, 1 minute, or 10 minutes.
You can configure up to 32 MEP pairs per network element.
To add a MEG:
1. Select Ethernet > Protocols > SOAM > MA/MEG. The SOAM MA/MEG page opens.
Parameter Definition
MD (ID, Name) Select the MD to which you are assigning the MEP.
MA/MEG short name Enter a name for the MEG (up to 44 alphanumeric characters).
Parameter Definition
MEG Level Select a MEG level (0-7). The MEG level must be the same for MEGs on
both sides of the link. Higher levels take priority over lower levels.
If MEGs are nested, the OAM flow of each MEG must be clearly
identifiable and separable from the OAM flows of the other MEGs. In
cases where the OAM flows are not distinguishable by the Ethernet layer
encapsulation itself, the MEG level in the OAM frame distinguishes
between the OAM flows of nested MEGs.
Eight MEG levels are available to accommodate different network
deployment scenarios. When customer, provider, and operator data path
flows are not distinguishable based on means of the Ethernet layer
encapsulations, the eight MEG levels can be shared among them to
distinguish between OAM frames belonging to nested MEGs of
customers, providers and operators. The default MEG level assignment
among customer, provider, and operator roles is:
The customer role is assigned MEG levels 6 and 7.
The provider role is assigned MEG levels 3 through 5.
The operator role is assigned MEG levels: 0 through 2.
The default MEG level assignment can be changed via a mutual
agreement among customer, provider, and/or operator roles.
The number of MEG levels used depends on the number of nested MEs
for which the OAM flows are not distinguishable based on the Ethernet
layer encapsulation.
CCM Interval The interval at which CCM messages are sent within the MEG. Options
are:
1 second (default)
10 seconds
1 minute
10 minutes
It takes a MEP 3.5 times the CCM interval to determine a change in the
status of its peer MEP. For example, if the CCM interval is 1 second, a
MEP will detect failure of the peer 3.5 seconds after it receives the first
CCM failure message. If the CCM interval is 10 minutes, the MEP will
detect failure of the peer 35 minutes after it receives the first CCM failure
message.
Service ID Select an Ethernet service to which the MEG belongs. You must define
the service and add service points before you configure the MEG.
Parameter Definition
MIP Creation Determines whether MIPs are created on the MEG. Options are:
• MHF none – No MIPs are created.
• MHF default – MIPs are created automatically on any service point in
the MEG’s Ethernet service.
• MHF explicit – MIPs are created on the service points of the MEG
when a lower-level MEP exists on the service point. This option is
usually used when the operator’s domain is encompassed by another
domain.
MHF defer – No MIPs are created. Not used in the current release.
MA/MEG ID Automatically generated by the system. You can change this value.
MA/MEG Name Format Reserved for future use. In the current release, this is Char String only.
Tx Sender ID TLV content Reserved for future use. Sender ID TLV is not transmitted.
Port Status TLV TX Reserved for future use. No Port Status TLV is transmitted in the CCM
frame.
Interface Status TLV TX Reserved for future use. No Interface Status TLV is transmitted in the
CCM frame, indicating the operational status of the interface on which
the transmitting MEP is configured (Up or Down).
MEP List Lists all local and remote MEPs that have been defined for the MEG.
Configuring MEPs
Each MEP is attached to a service point in an Ethernet service. The service and service point must be configured
before you configure the MEP. See Configuring Ethernet Service(s).
Each MEP inherits the same VLAN, C-VLAN, or S-VLAN configuration as the service point on which it resides. See
Configuring Service Points (CLI).Configuring Service Points
In order to set the VLAN used by CCM/LBM/LTM if the service point is defined ambiguously (for example PIPE,
Bundle-C, Bundle-S, or All-to-One), the service point’s C-VLAN/S-VLAN parameter should not be set to N.A.
Note
To display MEPs belonging to a specific MEG, select the MEG in the Filter by MA/MEG field near the
top of the SOAM MEP page. To display all MEPs configured for the unit, select All.
9. Verify that you want to submit the displayed parameters and click Submit.
Parameter Definition
MD (ID, Name) The MD ID and name are automatically generated by the system.
MA/MEG (ID, Name) The MA/MEG ID and name are automatically generated by the system.
Interface Location The interface on which the service point associated with the MEP is
located.
MEP Fault Notification The initial Indicates the status of the defect SOAM state machine.
State Possible values are:
• Fng Reset – Initial state.
• Fng Defect – Transient state when a defect is detected.
• Fng Defect Reported – The defect state is steady (stable).
• Fng Defect Clearing – Transient state when a defect is in the process
of being cleared.
Fng Defect Cleared – The defect has been cleared (Transient state).
Parameter Definition
Connectivity Status Indicates whether a MEP can exchange PDU (CCM, Loopback, LTR) with its
remote MEP. A MEP with some defect or an inactive MEP cannot
exchange PDUs.
Possible values are:
• inactive – At least one of the remote MEPs is enabled (True).in
rMEPFailed status (not discovered).
• active – All remote MEPs are discovered correctly and have an
rMEPOk status.
MEP Active Indicates whether the MEP is enabled (True) or disabled (False).
MEP CCM TX Enable Indicates whether the MEP is sending CCMs (True/False).
CCM and LTM Priority The p-bit included in CCMs and/or LTM frames sent by this MEP (0 to 7).
MEP Defects Indicates if a defect has been detected by the MEP level.
RMEP List Once you have configured at least one local MEP, all other MEPs that you
have added but not configured as local MEPs are displayed here, and are
considered to be remote MEPs.
2. Select a MEP and click RMEP List. The SOAM MEP DB table is displayed.
Table 71 lists and describes the parameters displayed in the SOAM MEP DB table. To return to the SOAM MEP
page, click Back to MEP.
Note
To display these parameters in a separate window for a specific remote MEP, select the RMEP ID and
click View.
Parameter Definition
RMEP Last rx CCM MAC The MAC Address of the interface on which the remote MEP is located.
Address
RMEP Last CCM OK or Fail The timestamp marked by the remote MEP indicated the most recent
Timestamp CCM OK or failure it recorded. If none, this field indicates the amount of
time since SOAM was activated.
RMEP Last rx CCM RDI Displays the state of the RDI (Remote Defect Indicator) bit in the most
Indication recent CCM received by the remote MEP. If none, displays False.
RMEP Last rx CCM Port The Port Status TLV in the most recent CCM received from the remote
Status TLV MEP. Reserved for future use.
RMEP Last rx CCM Displays the operational status of the interface on which the remote MEP
Interface Status TLV has been defined.
• True – RDI was received in the last CCM.
RMEP Last rx CCM Chassis Displays the format of the remote. chassis (always the MAC address).
ID Format
Parameter Definition
RMEP Last rx CCM Chassis Displays the MAC address of the remote chassis.
ID
The Last RX error CCM message field displays the frame of the last CCM that contains an error message received
by the MEP.
The Last RX Xcon fault message field displays the frame of the last CCM that contains a cross-connect error
message received by the MEP.
Note
A cross-connect error occurs when a CCM is received from a remote MEP that has not been defined
locally.
Performing Loopback
To perform loopback on a MEP:
1 In the SOAM MEP page (Figure 343), select the MEP on which you want to perform the loopback.
2 Click Loopback. The SOAM MEP – Loopback page opens.
o MAC Address (default) – If you select MAC Address, you must enter the MAC address of the
interface to which you want to send the loopback in the Loopback Messages Destination MAC
Address. If you are not sure what the interface’s MAC address is, you can get it from the Interface
Manager by selecting Platform > Management > Interface Manager.
4 In the Loopback messages to be transmitted field, select the number of loopback messages to transmit (0
– 1024). If you select 0, loopback will not be performed.
5 In the Loopback Messages Interval field, select the interval (in seconds) between each loopback message
(0.1 – 60). You can select in increments of 1/10 second. However, the lowest possible interval is 1 second. If
you select a smaller interval, the actual interval will still be 1 second.
6 In the Loopback Messages Frame Size field, select the frame size for the loopback messages (64 – 1516).
Note that for tagged frames, the frame size will be slightly larger than the selected frame size.
7 In the Loopback Messages Priority field, select a value (0 – 7) for the priority bit for tagged frames.
8 In the Drop Enable field, choose the value of the DEI field for tagged loopback frames (True or False). The
default value is False.
9 In the Loopback Messages Data Pattern Type field, select the type of data pattern to be sent in an OAM
PDU Data TLV. Options are All Zeros and All Ones. The default value is All Zeros.
10 Click Apply to begin the loopback. The Loopback session state field displays the status of the loopback:
o SOAM Loopback Complete – The loopback has been successfully completed.
o SOAM Loopback Stopped – The loopback has been manually stopped.
o SOAM Loopback Failed – The loopback failed.
o SOAM Loopback Active – The loopback is currently active.
o SOAM Loopback Inactive – No loopback has been initiated.
The remote interface will answer and the loopback session will be completed if either of the following is true:
• A remote MEP has been defined on the destination interface.
• A MIP has been defined on the destination interface. See Configuring MIPs with MHF Default.
Note
To manually stop a loopback, you must use the CLI. Enter the following command in root view:
root> ethernet soam loopback stop meg-id <meg-id> mep-id <mep-id>
Calculating an ifIndex
The ifIndex calculator enables you to:
• Calculate the ifIndex for any object in the system.
• Determine the object represented by any valid ifIndex.
To use the ifIndex calculator:
1 Select Utilities > ifCalculator. The ifIndex Calculator page opens.
• If you have an ifIndex and you want to determine which hardware item in the unit it represents, enter the
number in the ifIndex number field and click Calculate Index to name. A description of the object appears in
the Result field.
• To determine the ifIndex of a hardware item in the unit, such as an interface, card, or slot, select the object
type in the Functional Type field, select the Slot and Port (if relevant), and click Calculate Name to Index. The
object’s ifIndex appears in the Result field.
The MIB Reference Table is customized to the type of PTP 820 product you are using. There are three separate
versions of the MIB Reference Table:
• PTP 820G
• PTP 20C/S/C-HP/E
Note
Even though the MIB Reference Table is customized to these three product groups, some of the
entities listed in the Table may not be relevant to the particular unit you are using. This may occur
because of activation key restrictions, minor differences between product types, or simply because a
certain feature is not used in a particular configuration.
• To search for a text string, enter the string in the Search field and press <Enter>. Items that contain the string
are displayed in yellow. Searches are not case-sensitive.
• To save the MIB Reference Table as a .csv file, click Save to File.
General (CLI)
Before connection over the radio hop is established, it is of high importance that you assign to the PTP 820 unit a
dedicated IP address, according to an IP plan for the total network. See Changing the Management IP Address (CLI).
By default, a new PTP 820 unit has the following IP settings:
• IP address: 192.168.1.1
• Subnet mask: 255.255.255.0
Caution
If the connection over the link is established with identical IP addresses, an IP address conflict will
occur and remote connection to the element on the other side of the link may be lost.
Note
The PTP 820 IP address, as well as the password, should be changed before the system is set in
operation. See Changing the Management IP Address (CLI) and Changing Your Password (CLI).
PC Setup (CLI)
To obtain contact between the PC and the PTP 820 unit, it is necessary to have an IP address on the PC within the
same subnet as the PTP 820 unit. The default PTP 820 IP address is 192.168.1.1. Set the PC address to e.g.
192.168.1.10 and subnet mask to 255.255.255.0. Note the initial settings before changing.
Note
The PTP 820 IP address, as well as the password, should be changed before operating the system is
set in operation. See Changing the Management IP Address (CLI) and Changing Your Password (CLI).
Logging On (CLI)
Use a telnet connection to manage the PTP 820 via CLI. You can use any standard telnet client, such as PuTTy or ZOC
Terminal. Alternatively, you can simply use the telnet <ip address> command from the CMD window of your
PC or laptop.
The default IP address of the unit is 192.168.1.1. Establish a telnet connection to the unit using the default IP address.
When you have connected to the unit, a login prompt appears. For example:
login:
At the prompt, enter the default login user name: admin
A password prompt appears. Enter the default password: admin
The root prompt appears. For example:
login: admin
Password:
PTP 820C
root>
To display all command levels available from your current level, press <TAB> twice. For example, if you press <TAB>
twice at the root level, the following is displayed:
root>
root> platform
To auto-complete a command, press <TAB> once.
Use the up and down arrow keys to navigate through recent commands.
Use the ? key to display a list of useful commands and their definitions.
At the prompt, or at any point in entering a command, enter the word help to display a list of available
commands. If you enter help at the prompt, a list of all commands is displayed. If you enter help after
entering part of a command, a list of commands that start with the portion
of the command you have already entered is displayed.
To scroll up and down a list, use the up and down arrow keys.
To end the list and return to the most recent prompt, press the letter q.
To ping another network device, enter one of the following commands:
root> ping ipv4-address <x.x.x.x> count <number of echo packets> packet-size
<packet-size>
It is recommended to change your default Admin password as soon as you have logged into the system.
In addition to the Admin password, there is an additional password protected user account, “root user”, which is
configured in the system. The root user password and instructions for changing this password are available from
Cambium Networks Customer Support. It is strongly recommended to change this password.
To change your password, enter the following command in root view:
root> platform security access-control password edit own-password
The system will prompt you to enter your existing password. The system will then prompt you to enter the new
password.
If Enforce Password Strength is activated, the password must meet the following criteria:
• Password length must be at least eight characters.
• Password must include characters of at least three of the following character types: lower case letters, upper
case letters, digits, and special characters. For purposes of meeting this requirement, upper case letters at the
beginning of the password and digits at the end of the password are not counted.
• A password cannot be repeated within five changes in password.
See Configuring the Password Security Parameters (CLI).
Note
Mate Management Access can be used regardless of whether the unit’s IP address is in IPv4 or IPv6
format.
Mate Management Access should only be enabled for nodes receiving traffic from a LAG, where in-band management
is to be used. If either of these conditions is not present, Mate Management Access should be disabled. By default,
the feature is disabled.
The following are the requirements for using Mate Management Access:
• The management ports of both PTP 820 units must be connected by a protection cable The cable can be ordered
in a variety of sizes, depending on the distance between the two PTP 820 units. See the following Table.
• To ensure proper convergence after failure events, Automatic State Propagation must be enabled on both units
at the local node and both units at the remote node. See Configuring Automatic State Propagation and Link Loss
Forwarding (CLI).
• Mate Management Access must be enabled on both units at the local node and both units at the remote node.
On each unit, Mate Management Access must be enabled before configuring in-band management.
Note
When you enable or disable Mate Management Access, the unit is reset.
Note
Mate Management Access can only be configured via CLI.
Upon recovery from a failure event, management may be lost for up to 40 seconds.
You can configure in-band management in order to manage the unit remotely via its radio and/or Ethernet interfaces.
Note
Before configuring in-band management, it is recommended to review the configuration
recommendations for in-band management listed in Configuration tips.
To use in-band management for nodes that utilize two PTP 820C and PTP 820C-HP units (4x4 MIMO,
2x2 XPIC, and 4+0 Multi-Carrier ABC), you must first configure Mate Management Access (IP
Forwarding). See Mate Management Access (IP Forwarding) (CLI).
Each PTP 820 unit includes a pre-defined management service with Service ID 257. The management service is a
multipoint service that connects the two local management ports and the network element host CPU in a single
service. In order to enable in-band management, you must add at least one service point to the management service,
in the direction of the remote site or sites from which you want to access the unit for management. For instructions
on adding service points, see Configuring Service Points (CLI).
Note
In order to use in-band management, it must be supported on the external switch
Related Topics:
• Defining the IP Protocol Version for Initiating Communications (CLI)
• Configuring the Remote Unit’s IP Address (CLI)
You can enter the unit's address in IPv4 format and/or in IPv6 format. The unit will receive communications whether
they were sent to its IPv4 address or its IPv6 address.
To set the unit's IP address in IPv4 format, enter the following command in root view to configure the IP address,
subnet mask, and default gateway:
root> platform management ip set ipv4-address <ipv4-address> subnet
<subnet> gateway <gateway> name <name> description <name>
ipv4-address Dotted decimal format. Any valid IPv4 address. The IP address for the
unit.
subnet Dotted decimal format. Any valid subnet mask. The subnet mask for the
unit.
gateway Dotted decimal format. Any valid IPv4 address. The default gateway for
the unit (optional).
To set the unit's IP address in IPv6 format, enter the following command in root view to configure the IP address,
subnet mask, and default gateway:
root> platform management ip set ipv6-address <ipv6-address> prefix-length
<prefix-length> gateway <gateway>
Note
It is recommended not to configure addresses of type FE:80::/64 (Link Local addresses) because traps
are not sent for these addresses.
ipv6-address Eight groups of four Any valid IPv6 address. The IP address for the
hexadecimal digits unit.
separated by colons.
gateway Eight groups of four Any valid IPv6 address. The default gateway for
hexadecimal digits the unit (optional).
separated by colons.
Examples
The command below sets the following parameters:
• IPv4 Address - 192.168.1.160
• Subnet Mask – 255.255.0.0
• Default Gateway – 192.168.1.100
root> platform management ip set ipv4-address 192.168.1.160 subnet
255.255.0.0 gateway 192.168.1.100
The command below sets the following parameters:
• IPv6 Address - FE80:0000:0000:0000:0202:B3FF:FE1E:8329
• Prefix length – 64
• Default Gateway - FE80:0000:0000:0000:0202:B3FF:FE1E:8329
root> platform management ip set ipv6-address
FE80:0000:0000:0000:0202:B3FF:FE1E:8329 prefix-length 64 gateway
FE80:0000:0000:0000:0202:B3FF:FE1E:8329
Note
To obtain an activation key cipher, you may need to provide the unit’s serial number. See Displaying
Unit Inventory (CLI).
Each required feature and capacity should be purchased with an appropriate activation key. It is not permitted to
enable features that are not covered by a valid activation key. In the event that the activation-key-enabled capacity
and feature set is exceeded, an Activation Key Violation alarm occurs and the Web EMS displays a yellow background
and an activation key violation warning. After a 48-hour grace period, all other alarms are hidden until the capacity
and features in use are brought within the activation key’s capacity and feature set.
In order to clear the alarm, you must configure the system to comply with the activation key that has been loaded in
the system. The system automatically checks the configuration to ensure that it complies with the activation-key-
enabled features and capacities. If no violation is detected, the alarm is cleared.
When entering sanction state, the system configuration remains unchanged, even after power cycles. However, the
alarms remain hidden until an appropriate activation key is entered or the features and capacities are re-configured
to be within the parameters of the current activation key.
A demo mode is available which enables all features for 60 days. When the demo mode expires, the most recent valid
activation key goes into effect. The 60-day period is only counted when the system is powered up. Ten days before
the demo mode expires, an alarm is raised indicating that the demo mode is about to expire.
Note
Make sure to enter the command using the exact syntax above, including the spaces and
quotation marks, or an error will be returned.
Note
Activation key reclaim is only available for PTP 820 devices running release 9.2 or later.
A composite type activation key provides free activation keys when certain activation keys are purchased. For
example, if a customer purchases an activation key for one GB ethernet port, two FE ethernet port activation keys are
also provided. If the customer reclaims the activation key, the customer only gets credit for the original activation
key, not for the composite items.
Where the customer has purchased upgrade activation keys, credit is given for the full feature or capacity, not for
each individual upgrade. For example, if the customer purchased two capacity activation keys for 300M and later
purchased one upgrade activation key to 350M, credit is given as if the customer had purchased one activation key
for 350M and one activation key for 300M.
For instructions on how to reclaim an activation key, refer to the User Guide for the Activation Key Management
System, Rev A.15 or later, Chapter 7, Reclaiming an Activation Key. During the activation key reclaim procedure, you
will need to obtain a Validation Number from the PTP 820 unit. To display the Validation Number, enter the following
command in root view:
root> platform activation-key show all
Related Topics:
• Configuring NTP (CLI)
PTP 820 uses the Universal Time Coordinated (UTC) standard for time and date configuration. UTC is a more updated
and accurate method of date coordination than the earlier date standard, Greenwich Mean Time (GMT).
Every PTP 820 unit holds the UTC offset and daylight savings time information for the location of the unit. Each
management unit presenting the information uses its own UTC offset to present the information with the correct
time.
Note
If the unit is powered down, the time and date are saved for 96 hours (four days). If the unit remains
powered down for longer, the time and date may need to be reconfigured.
To set the UTC time, enter the following command in root view:
root> platform management time-services utc set date-and-time <date-and-
time>
To set the local time offset relative to UTC, enter the following command in root view:
root> platform management time-services utc set offset hours-offset <hours-
offset> minutes-offset <minutes-offset>
To display the local time configurations, enter the following command in root view:
root> platform management time-services show status
Examples
The following command sets the GMT date and time to January 30, 2014, 3:07 pm and 58 seconds:
root> platform management time-services utc set date-and-time 30-01-
2014,15:07:58
The following command sets the GMT offset to 13 hours and 32 minutes:
root> platform management time-services utc set offset hours-offset 13
minutes-offset 32
Examples
The following command configures daylight savings time as starting on May 30 and ending on October 1, with an
offset of 20 hours.
root> platform management time-services daylight-savings-time set start-
date-month 5 start-date-day 30 end-date-month 10 end-date-day 1 offset 20
By default:
• Ethernet traffic interfaces are disabled and must be manually enabled.
• The Ethernet management interface is enabled.
• Radio interfaces are enabled.
Note
PTP 820S and PTP 820E unit has a single radio interface.
For PTP 820C 2E2SX hardware versions, P4 can be used as a traffic port (Eth 4). However, in 4x4 MIMO and 2+2 Space
Diversity configurations, P4 is used as an Extension port.
When one of these configurations is applied, the system automatically configures P4 to operate in MIMO mode and it
is no longer available for use as a traffic port (Eth 4). In these configurations, P4 must be used with an SFP+ module.
If you try to apply a 4x4 MIMO or 2+2 Space Diversity configuration while P4 is assigned one or more service points,
ASP or LLF instances, or a LAG group or Sync source is configured on P4, the configuration will fail and an error
message will be generated. Also, the admin status of the port must be set to down before applying the 4x4 MIMO or
2+2 Space Diversity configuration.
In PTP 820C 2E2SX models, P2 is a DisplayPort that uses a special splitter cable and gland to accommodate two RJ-45
cables (see Table 14).
• One end of the cable is labelled GbE1/PoE. This is used for the RJ-45 connection to Eth 1
(traffic/PoE).
• The other end of the cable is labelled GbE2. This is used for the RJ-45 connection to Eth 2
(traffic).
Note
Even if you are using the default frequencies, it is mandatory to actually configure the
frequencies.
slot Number 2
Examples
The following command enters radio view for radio carrier 1:
root> radio slot 2 port 1
The following prompt appears:
radio[2/1]>
Note
For convenience, this User Guide generally shows the radio prompt as radio[2/1]>.
Note
In contrast to an ordinary mute, a timed mute is not persistent. This means that if the unit is
reset, the radio is not muted when the unit comes back online, even if the timer had not expired.
Also, in unit and radio protection configurations, a timed mute is not copied to the mate unit or
radio, and no mismatch alarm is raised if a timed mute is configured on only one radio in the
protection pair.
To display the mute status of a radio, enter the following command in radio view:
radio[x/x]>rf mute show status
Examples
The following command mutes radio carrier 1:
radio[2/1]>rf mute set admin on
The following command unmutes radio carrier 2 in a PTP 820C or PTP 820C-HP unit:
radio[2/2]>rf mute set admin off
The following command configures a timed mute on radio carrier 1. This mute will automatically expire in 30 minutes.
radio[2/1]> rf mute set admin on-with-timer timeout-value 30
tx-level Number PTP 820C and PTP 820S units: -1 to The desired TX signal level
22 (Hardware model dependent) (TSL), in dBm.
Examples
The following command sets the TX level of radio carrier 1 to 10 dBm:
radio[2/1]>rf set tx-level 10
tx-frequency Number Depends on the MRMC The desired TX frequency (in KHz) and, if <local-
script and the unit type. remote> is set to enable, the desired RX
frequency of the remote unit.
Note
If the carrier belongs to a 4x4 MIMO group, an ASD group, an AFR group, or an XPIC group, you
must disable the group before changing the TX or RX frequency.
For PTP 820E, a frequency scanner is available to scan the frequency range covered by the
currently configured MRMC script and determine the current interference level for each
channel. This enables you to select the best channel in accordance with current interference
levels. See Running the Frequency Scanner (PTP 820E)
The following command sets the TX frequency of radio carrier 1 in an PTP 820C, PTP 820C-HP, or PTP 820S unit to
12900000 KHz, and sets the RX frequency of the remote unit to the same value.
radio[2/1]>rf set tx-frequency 12900000 local-remote enable
The following command sets the TX frequency of radio carrier 1 in an PTP 820C, PTP 820C-HP, or PTP 820S unit to
12900000 KHz, but does not set the RX frequency of the remote unit.
radio[2/1]>rf set rx-frequency 12900000 local-remote disable
The following command sets the TX frequency of the radio in an PTP 820E unit to 71000000 KHz, and sets the RX
frequency of the remote unit to the same value.
radio[2/1]> rf set tx-frequency 71000000 local-remote enable
The following command sets the TX frequency of the radio in an PTP 820E unit to 71000000 KHz, but does not set the
RX frequency of the remote unit.
radio[2/1]> rf set rx-frequency 71000000 local-remote disable
Multi-Rate Multi-Constellation (MRMC) radio scripts define how the radio utilizes its available capacity. Each script is
a pre-defined collection of configuration settings that specify the radio’s transmit and receive levels, link modulation,
channel spacing, and bit rate. Scripts apply uniform transmit and receive rates that remain constant regardless of
environmental impact on radio operation.
Note
The list of available scripts reflects activation-key-enabled features. Only scripts within your
activation-key-enabled capacity will be displayed.
Note
The list of available scripts reflects activation-key-enabled features. Only scripts within your
activation-key-enabled capacity will be displayed.
Examples
The following command displays available symmetrical (normal) scripts for radio carrier 1:
radio[2/1]>mrmc script show script-type normal acm-support yes
The following command displays available symmetrical (normal) scripts with ACM support for radio carrier 2 in a PTP
820C unit:
radio[2/2]>mrmc script show script-type normal acm-support yes
Note
When you enter a command to change the script, a prompt appears informing you that changing the
script will reset the unit and affect traffic. To continue, enter yes. Changing the maximum or
minimum profile does not reset the radio interface.
script-id Number Depends on The ID of the script you want to assign to the
available scripts. radio carrier.
max-profile Number Depends on the unit Adaptive ACM mode only: The maximum profile
type. See for the script. For example, if you select a
Configuring the maximum profile of 5, the system will not climb
Radio (MRMC) above profile 5, even if channel fading
Scripts (CLI). conditions allow it.
min-profile Number Depends on the unit Adaptive ACM mode only: The minimum profile
type. See for the script. For example, if you select a
Configuring the minimum profile of 3, the system will not go
Radio (MRMC) below profile 3 regardless of the channel fading
Scripts (CLI). conditions. The minimum profile cannot be
greater than the maximum profile, but it can be
equal to it.
If you do not include this parameter in the
command, the minimum profile is set at the
default value of 0.
profile Number Depends on the unit Fixed ACM mode only: The profile in which the
type. See system will operate
Configuring the
Radio (MRMC)
Scripts (CLI).
Examples
The following command assigns MRMC script ID 1503, with ACM enabled, a minimum profile of 3, and a maximum
profile of 9, to radio carrier 1 in a PTP 820C or PTP 820S unit:
radio[2/1]>mrmc set acm-support script-id 13 modulation adaptive max-
profile 9 min-profile 3
The following command assigns MRMC script ID 1502, with ACM disabled and a profile of 5, to radio carrier 2 in an
PTP 820C or PTP 820C-HP unit:
radio[2/2]>mrmc set acm-support script-id 13 modulation fixed profile 5
The following command assigns MRMC script ID 4702, with ACM disabled and a profile of 5, to the radio carrier in an
PTP 820E unit:
radio[2/1]>mrmc set acm-support script-id 4702 modulation fixed profile 5
The following command assigns MRMC script ID 4701, with ACM enabled, and both a minimum and a maximum
profile of 5, to the radio carrier in an PTP 820E unit. This is the functional equivalent of assigning a fixed profile.
radio[2/1]>mrmc set acm-support script-id 4701 modulation max-profile 5
min-profile 5
slot Number 2
radio[2/1]>
Note
In contrast to an ordinary mute, a timed mute is not persistent. This
means that if the unit is reset, the radio is not muted when the unit comes back
online, even if the timer had not expired. Also, in unit and radio protection
configurations, a timed mute is not copied to the mate unit or radio, and no
mismatch alarm is raised if a timed mute is configured on only one radio in the
protection pair.
To display the mute status of a radio, enter the following command in radio view:
Notes: If the carrier belongs to a 4x4 MIMO group, an ASD group, an AFR
group, or an XPIC group, you must disable the group before changing the
TX or RX frequency.
The following command sets the TX frequency of radio carrier 1 in an PTP 820C, PTP 820C-HP, or
PTP 820S unit to 12900000 KHz, and sets the RX frequency of the remote unit to the same value.
The following command sets the TX frequency of the radio in an PTP 820E unit to 71000000 KHz, and
sets the RX frequency of the remote unit to the same value.
When planning ACM-based radio links, the radio planner attempts to apply the lowest transmit power that will
perform satisfactorily at the highest level of modulation. During fade conditions requiring a modulation drop, most
radio systems cannot increase transmit power to compensate for the signal degradation, resulting in a deeper
reduction in capacity. The PTP 820 is capable of adjusting power on the fly, and optimizing the available capacity at
every modulation point.
To enable Adaptive TX Power for a radio, enter the following command:
radio[x/x]>rf adaptive-power set admin enable
To disable Adaptive TX Power for a radio, enter the following command:
radio[x/x]>rf adaptive-power set admin disable
To display whether Adaptive TX Power is enabled, enter the following command:
radio[x/x]>rf adaptive-power show status
The output of this command is:
radio [x/x]>rf adaptive-power show status
Note
Adaptive TX Power only operates when the MRMC script is configured to Adaptive mode. If the script
is configured to Fixed mode (or Adaptive mode with the Minimum and Maximum Profile set to the
same value), you can set adaptive-power admin to enable, but the adaptive power operational
status field will indicate down.
You can enable an alarm to be triggered in the event that the RSL falls beneath a defined threshold. This alarm is
alarm ID 1610, Radio Receive Signal Level is below the configured threshold. By default, the alarm is disabled.
To enable the RSL threshold alarm, enter the following command in radio view:
radio[x/x]> rf rsl-degradation set admin enable
To disable the RSL threshold alarm, enter the following command in radio view:
radio[x/x]> rf rsl-degradation set admin disable
To set the threshold of the RSL threshold alarm, enter the following command in radio view:
radio[x/x]> rf rsl-degradation set threshold <-99-0>
The default threshold is -68 dBm.
To display the current alarm configuration, enter the following command in radio view:
radio[x/x]> rf rsl-degradation show status
The following commands enable the RSL threshold alarm for radio carrier 1 and set the threshold to -55 dBm.
root> radio slot 2 port 1
radio [2/1]>rf rsl-degradation set admin enable
radio [2/1]>rf rsl-degradation set threshold -55
radio [2/1]>rf rsl-degradation show status
radio [2/1]>
The alarm is cleared when the RSL goes above the configured threshold. The alarm is masked if the radio interface
is disabled, the radio does not exist, or a communication-failure alarm (Alarm ID #1703) is raised.
Note
This feature is only relevant for PTP 820C, PTP 820C-HP and PTP 820S units.
FIPS 140-2 compliance is only available with the PTP 820 Assured platform. 1The PTP 820 Assured
0F
From release 10.9.6, PTP 820C, PTP 820C-HP and PTP 820S can be configured to be FIPS 140-2-compliant in specific
hardware and software configurations, as described in this section.
Note
Changing the FIPS configuration causes a unit reset.
To display the unit’s current FIPS setting, enter the following command in root view:
root> platform security fips-mode show
Status values are:
• enable – FIPS mode is enabled.
• disable – FIPS mode is disabled.
After enabling FIPS:
• The MD5 option for SNMPv3 is blocked.
1
The PTP 820 Assured platform is supported with Release 8.3. It is not supported with Release 9.0.
• After any system reset, the length of time before users can log back into the system is longer than usual due to
FIPS-related self-testing.
For a full list of FIPS requirements, including software configuration requirements, refer to the PTP 820 FIPS 140-2
Security Policy, available upon request.
At this point in the configuration process, you should configure any interface groups that need to be set up
according to your network plan. For details on available grouping and other configuration options, as well as
configuration instructions, see System Configurations (CLI).
In order to pass traffic through the PTP 820, you must configure Ethernet traffic services. For configuration
instructions, see Configuring Ethernet Services (CLI).
This section lists the basic system configurations and the PTP 820 product types that support them, as well as links
to configuration instructions.
Multiband (Enhanced Multi- PTP 820E Configuring Multiband (Enhanced Multi-Carrier ABC)
Carrier ABC) PTP 820C (CLI)
PTP 820C-HP
PTP 820S
Link Aggregation (LAG) PTP 820C/S Configuring Link Aggregation (LAG) and LACP
(Optional) (CLI)
HSB Radio Protection PTP 820C/S Configuring Unit Protection with HSB Radio Protection
(External Protection) (CLI)
1+1 HSB with Space Diversity PTP 820C Configuring 1+1 HSB with Space Diversity (CLI)
MIMO and Space Diversity PTP 820C Configuring MIMO and Space Diversity (CLI)
ASD 2+0 (XPIC) PTP 820C/C-HP Configuring adavanced space Diversity (CLI)
AFR+1+0 PTP 820C (hub Configuring Advanced Frequency Reuse (AFR) (CLI)
site or tail site)
PTP 820S (tail
site only)
PTP 820C in Single Radio PTP 820C/C-HP Operating a PTP 820C/PTP 820C-HP in Single Radio
Carrier Mode Carrier Mode (CLI)
Note
This option is only relevant for PTP 820C and PTP 820C-HPunits.
Note
Radio slot 2 port 1 should always be configured on channel 1 while Radio slot 2 port 2 should always
be configured on channel 2.
Notes:
Note
When using in-band management, management is lost in the event of radio failure and returns when
the radio link is restored.
The minimum bandwidth threshold is based on the capacity of the Multi-Carrier ABC group, not the
combined capacities of the group’s members. The group’s aggregated capacity is displayed in the
Multi-Carrier ABC Group – Edit Group page (Figure 63).
To enable Multi-Carrier ABC Minimum Bandwidth Override, enter the following command in root view:
root> platform if-manager set group-type abc group-number <1-4> minimum-
bw-admin enable
To disable Multi-Carrier ABC Minimum Bandwidth Override, enter the following command in root view:
root> platform if-manager set group-type abc group-number <1-4> minimum-
bw-admin disable
To set the Multi-Carrier ABC Minimum Bandwidth Override threshold (in Mbps), enter the following command in
root view:
root> platform if-manager set group-type abc group-number <1-4> minimum-
bw-threshold <0-20000>
The threshold can be between 0 – 20000 Mbps, with a resolution of 1 Mbps.
The following commands enable Multi-Carrier ABC Minimum Bandwidth Override threshold for Multi-Carrier ABC
group 1, and set a threshold of 12000 Mbps.
root> platform if-manager set group-type abc group-number 1 minimum-bw-
admin enable
root> platform if-manager set group-type abc group-number 1 minimum-bw-
threshold 12000
To view the status and the threshold use the following command:
root> platform if-manager show interfaces
When using a third-party radio as the paired unit, it is particularly important to set this
parameter properly in order to ensure optimal performance. Failure to properly set this
parameter may lead to frequent pauses as the queue fills up during low capacity periods,
such as when weather conditions cause the ACM profile to drop.
vi Reset the PTP 820E. See Error! Reference source not found..
Note: After adding Eth2 to the Multiband group, an alarm is raised (Alarm 1794). This
alarm is cleared when the unit is reset.
6 On the PTP 820C, PTP 820C-HP, or PTP 820S, configure a Pipe service between Eth2 and the radio or Multi-
Carrier ABC group. See Configuring Ethernet Services (CLI).
7 On the PTP 820C, PTP 820C-HP, or PTP 820S, configure Automatic State Propagation with ASP trigger by
remote fault enabled. See Error! Reference source not found..
8 On the PTP 820C, PTP 820C-HP, or PTP 820S, configure Bandwidth Notification. Bandwidth Notification must be
configured via the Web EMS. See Multiband Configuration, Step Error! Reference source not found..
Note:
When a third-party unit is paired with the PTP 820E, it is a prerequisite that the third-
party radio unit support SyncE and, if required, 1588 Transparent Clock in order to
provide synchronization for the Multiband node.
For instructions on configuring SyncE, see Error! Reference source not found..
For instructions on configuring 1588 Transparent Clock, see Error! Reference source not found..
Link aggregation (LAG) enables you to group several physical Ethernet or radio interfaces into a single logical
interface bound to a single MAC address. This logical interface is known as a LAG group. Traffic sent to the
interfaces in a LAG group is distributed by means of a load balancing function. PTP 820 uses a distribution function
of up to Layer 4 in order to generate the most efficient distribution among the LAG physical ports.
This section explains how to configure LAG and includes the following topics:
• LAG Overview (CLI)
• Configuring a LAG Group (CLI)
• Configuring LACP (CLI)
• Viewing LAG Details (CLI)
• Editing and Deleting a LAG Group (CLI)
• Enabling and Disabling the LAG Group Shutdown in Case of Degradation Event Option (CLI)
• Configuring Enhanced LAG Distribution (CLI)
• Displaying LACP Parameters and Statistics (CLI)
Note
To add or remove an Ethernet interface to a LAG group, the interface must be in an administrative
state of “down”. This restriction does not apply to radio interfaces. For instructions on setting the
administrative state of an interface, see Enabling the Interfaces (CLI)
PTP 820 supports LACP, which expands the capabilities of static LAG and provides interoperability with third-party
equipment that uses LACP. LACP improves the communication between LAG members. This improves error
detection capabilities in situations such as improper LAG configuration or improper cabling. It also enables the LAG
to detect uni-directional failure and remove the link from the LAG, preventing packet loss.
LACP is enabled as part of the LAG configuration process. It should only be used if the LAG is in a link with another
LACP-enabled LAG.
Note
LACP is not supported with unit protection. For unit protection, a special, limited implementation is
configured on the logical interface level. See Configuring Line Protection Mode (CLI).
LACP can only be used with Ethernet interfaces.
LACP cannot be used with Enhanced LAG Distribution or with the LAG Group Shutdown in Case of
Degradation Event feature.
GbE 3: 3
Radio Carrier 1: 1
Radio Carrier 2 (PTP 820C only): 2
Examples
The following commands create a LAG with the ID lag2. The LAG includes the Ethernet interfaces 1 and 2 and radio
interface 1:
root> platform if-manager set interface-type ethernet slot 1 port 1 admin
down
root>
root>
Static-lag members
-------------------
Eth#[1/1]
Eth#[1/2]
Radio#[2/1]
eth group [lag2]> port static-lag remove member interface eth slot 1 port
2
A LAG group can be configured to be automatically closed in the event of LAG degradation. This option is used if
you want traffic from the switch to be re-routed during such time as the link is providing less than a certain
capacity.
By default, the LAG group shutdown in case of degradation event option is disabled. When enabled, the LAG is
automatically closed in the event that any one or more ports in the LAG fail. When all ports in the LAG are again
operational, the LAG is automatically re-opened.
Note
Failure of a port in the LAG also triggers a lag-degraded alarm, Alarm ID 100.
To enable the LAG group shutdown in case of degradation event option, go to interface view for the LAG and enter
the following command:
eth group [lagx]> static-lag set lag-degrade-admin admin enable
To disable the LAG group shutdown in case of degradation event option, go to interface view for the LAG and enter
the following command:
eth group [lagx]> static-lag set lag-degrade-admin admin disable
To display the current LAG group shutdown in case of degradation event option setting, go to interface view for
the LAG and enter the following command:
eth group [lagx]> static-lag show lag-degrade-admin
The following commands enable the LAG group shutdown in case of degradation event option for LAG group 1:
root> ethernet interfaces group lag1
eth group [lag1]>static-lag set lag-degrade-admin admin enable
eth group [lag1]>
Note
Enhanced LAG distribution is only available for LAG groups that consist of exactly two interfaces. It
cannot be used with LACP.
To configure enhanced LAG distribution, go to interface view for the LAG and enter the following command:
eth group [lagx]> static-lag set df-pattern df <1-10>
The following commands set the LAG distribution scheme for LAG group 1 as distribution pattern 3.
root> ethernet interfaces group lag1
eth group [lag1]>static-lag set df-pattern df 3
The default LAG distribution pattern is 1.
To display the current LAG distribution scheme, go to interface view for the LAG and enter the following command:
eth group [lagx]> static-lag show df-pattern
It is recommended to experiment with the various schemes by monitoring the TX port PMs for each interface in
the LAG for each LAG distribution scheme. In the Web EMS, the page in which you configure enhanced LAG
distribution also displays TX throughput PMs per interface. See Configuring Enhanced LAG Distribution. For
information on monitoring Ethernet port PMs via the CLI, see Displaying Ethernet Port PMs (CLI).
Note
PTP 820 does not support any LACP write parameters.
Agg MAC Address The individual MAC address assigned to the Aggregator.
Partner System ID The MAC address value consisting of the unique identifier for the current
protocol Partner of this Aggregator.
Partner System Priority The priority value associated with the Partner’s System ID.
Partner Oper Key The current operational value of the Key for the Aggregator’s current
Protocol partner.
Collector Max Delay The maximum delay, in tens of microseconds.
Parameter Definition
Last RX Time The value of a TimeSinceSystemReset (F.2.1) when the last LACPDU was
received by this Aggregation port.
RX State The state of the receive state machine for the Aggregation port.
Possible values are:
• Current – An LACPDU was received before expiration of the most
recent timeout period.
• Expired – No LACPDU was received before expiration of the most
recent timeout period.
• Defaulted – No LACPDU was received during the two most recent
timeout periods.
Mux State The state of the Mux state machine for the Aggregation port. Possible
values are Collecting, Distributing, Attached, and Detached.
Mux Reason A text string indicating the reason for the most reason change in the state
of the Mux machine.
Partner Oper Port The operational port number assigned to this Aggregation port by the
Aggregation port’s port Partner.
Partner Oper System The operational value of priority associated with the Partner’s System ID.
Priority
Partner Oper Key The current operational value of the Key for the protocol Partner.
Partner Oper System ID The MAC Address value representing the current value of the
Aggregation Port’s protocol Partner’s System ID.
Partner Oper Port The Priority value assigned to this Aggregation port by the Partner.
Priority
Note
This option is only relevant for PTP 820C units.
This section explains how to configure XPIC and includes the following topics:
• XPIC Overview (CLI)
• Configuring the Radio Carriers for XPIC (CLI)
• Creating an XPIC Group (CLI)
• Performing Antenna Alignment for XPIC (CLI)
Note
XPIC support is indicated by an X in the script name. For example, mdN_A2828X_111_1205 is an
XPIC-enabled script. mdN_A2828N_130_100 is not an XPIC-enabled script. For a list of XPIC support-
enabled scripts, refer to the most recent PTP 820C/S Release Notes.
radio-groups>
radio-groups>
Note
To measure the second carrier, leave the Voltmeter connected to the BNC connector. In the Radio
Parameters page of the Web EMS, change the RSL Connector Source field from PHYS1 to PHYS2 (or
vice versa). The BNC connector will now measure RSL from the other carrier.
Note
As an extra step, to check the veracity of the initial measurements, you can mute the first carrier and
unmute the second carrier on the upper PTP 820C units on both sides of the link. Then measure the
RSL of the second carrier link (the “RSLwanted”), measure the RSL of the first carrier (the
“RSLunwanted”) and determine the XPD. The XPD should match the XPD with the second carriers
muted.
6. Unmute all the carriers and check the RSL levels of all the carriers on both sides of the link. The RSL of the
horizontal carrier of the local unit should match the RSL of the vertical carrier of the remote unit, within ±2dB.
The RSL of the vertical carrier of the local unit should match the RSL of the horizontal carrier of the remote
unit, within ±2dB.
7. For a 2x2 configuration, repeat Steps Error! Reference source not found. through Error! Reference source not
found. for the lower PTP 820C unit.
8. Check the XPI levels of all the carriers at both sides of the link by going to radio view and entering one of the
following commands:
radio [x/x]>modem pm-xpi show interval 15min
Note
In some cases, the XPI might not exceed the required 25dB minimum due to adverse atmospheric
conditions. If you believe this to be the case, you can leave the configuration at the lower values, but
be sure to monitor the XPI to make sure it subsequently exceeds 25dB. A normal XPI level in clear sky
conditions is between 25 and 30dB.
This section explains how to configure unit protection, including HSB radio protection and Ethernet interface
protection, and includes the following topics:
• Unit Protection Overview (CLI)
• Configuring HSB Radio Protection (CLI)
• Configuring 2+2 HSB Protection on a PTP 820C/PTP 820C-HP Unit (CLI)
• Viewing the Configuration of the Standby unit (CLI)
• Editing Standby Unit Settings (CLI)
• Viewing Link and Protection Status and Activity (CLI)
• Manually Switching to the Standby Unit (CLI)
• Disabling Automatic Switchover to the Standby Unit (CLI)
• Disabling Unit Protection (CLI)
Note
For instructions on configuring 1+1 unit protection with Space Diversity, see Configuring 1+1 HSB
with Space Diversity (CLI).
Note
For FIPS configurations, the external protection link must be encrypted using IPsec. This encrypts all
IP packets that pass between the management ports of the two units. For instructions, see
Encrypting the External Protection Link (CLI)
1 Configure the GE ports on the external switch in LACP mode. The external switch must support LACP.
Note
PTP 820 supports a special LACP implementation for purposes of line protection only. This LACP
implementation is configured on the logical interface level, as described below. Regular LACP is
configured as part of the LAG configuration, and is not supported with unit redundancy. See
Configuring Link Aggregation (LAG) and LACP (optional) (CLI).
2 Connect one port on the external switch to an Ethernet port on the active PTP 820, and the other port on
the external switch to an Ethernet port on the standby PTP 820.
3 Enable LACP on the Ethernet interface connected to the external switch on the active PTP 820:
i Go to interface view for the Ethernet interface connected to the external switch on the active PTP 820.
ii In interface view, enter the following command:
eth type eth [1/x]>interface-mode-set interface-mode LACP
To disable LACP mode, enter the following command in Ethernet interface view:
eth type eth [1/x]>interface-mode-set interface-mode NONE
To display an interface’s current LACP setting, enter the following command in Ethernet interface view:
eth type eth [1/x]>interface-mode-show
Note
While the system is performing the copy-to-mate operation, a temporary loss of management
connection will occur.
To keep the Standby unit up-to-date, after any change to the configuration of the Active unit enter the copy-to-
mate command to copy the configuration to the Standby unit.
If you are unsure whether the Standby unit’s configuration matches that of the Active unit, enter the following
command in root view. The command output displays the list of mismatched parameters.
root> platform management protection show mismatch details
mate/root>
2. Enter the specific CLI command you want to run in mate/root context.
3. To switch back to the active unit, enter the following command:
mate/root> switch-back
root>
A 1+1 HSB-SD configuration utilizes two PTP 820C units on each side of the link, with both radio carriers activated.
The PTP 820C units are combined and connected to the primary and diversity antennas via a dual coupler and two
flexible waveguides.
Radio carrier 2 is muted on each unit. On the receiving side, the signals are combined in the active unit to produce
a single, optimized signal. The link is protected via external protection, so that if a protection switchover occurs,
the standby unit becomes the active unit, and the link continues to function with full space diversity.
To configure a 1+1 HSB link with Space Diversity:
1. For one PTP 820C unit, enter the following command in root view to create a Space Diversity group:
Note
The identity of the active and standby units is not determined until unit protection is configured.
4. Configure Unit Protection, according to the instructions in Configuring Unit Protection with HSB Radio
Protection (External Protection) (CLI)
5. on the active PTP 8200 unit, mute the transmitter of radio carrier2. For instructions, see Muting and Unmuting
a Radio (CLI).
6. Perform Copy to Mate. See Step 3 in Configuring HSB Radio Protection (CLI)
Note
It is crucial to ensure that the port connected to the Diversity antenna is muted in each PTP 820 unit.
If you perform Copy to Mate after configuring unit protection, as indicated above, the mute
configuration will be copied to the standby unit. If you mute the interface before configuring unit
protection, you must make sure to manually mute the interface on both PTP 820 units. Otherwise,
configuring unit protection will override the mute configuration.
Note
This feature is only relevant for PTP 820C and PTP 820C-HP units.
This section describes how to configure MIMO and space diversity, and include the following topics:
• MIMO and Space Diversity Overview (CLI)
• Upgrading a 4x4 MIMO Link from an Earlier Version to System release 10.5 or Higher (CLI)
• Configuring a 4x4 MIMO Link (CLI)
• Configuring a 2x2 MIMO Link (CLI)
• Configuring a 1+0 or 2+2 Space Diversity Link (CLI)
• Viewing MMI Levels (CLI)
• Deleting a 4x4 MIMO Group (CLI)
• Deleting a 2x2 MIMO or Space Diversity Group (CLI)
Line-of-Sight (LoS) Multiple Input Multiple Output (MIMO) achieves spatial multiplexing by creating an artificial
phase de-correlation by deliberate antenna distance at each site in deterministic constant distance. At each site in
a LoS MIMO configuration, data to be transmitted over the radio link is split into two bit streams (MIMO 2x2) or
four bit streams (MIMO 4x4). These bit streams are transmitted via two antennas. In MIMO 2x2, the antennas use
a single polarization. In MIMO 4x4, each antenna uses dual polarization. The phase difference caused by the
antenna separation enables the receiver to distinguish between the streams.
PTP 820C supports both 2x2 MIMO and 4x4 MIMO. For a full explanation of MIMO support in PTP 820C, refer to
thePTP 820C Technical Description.
For 4x4 MIMO using an external switch operating in LAG mode, Mate Management Access enables users to
manage both units via in-band management. See Mate Management Access (IP Forwarding) (CLI).
For PTP 820C 2E2SX hardware models, if you try to apply a 4x4 MIMO or 2+2 Space Diversity configuration while
P4 is assigned one or more service points, ASP or LLF instances, or a LAG group or Sync source is configured on P4,
the configuration will fail and an error message will be generated. Also, the Admin status of the port must be set
to Down before applying the 4x4 MIMO or 2+2 Space Diversity configuration. See Enabling the Interfaces (CLI).
The same hardware configurations can also be used to implement BBS Space Diversity. PTP 820C and PTP 820C-HP
support 1+0 and 2+2 Space Diversity. For a full explanation of Space Diversity support in PTP 820C and PTP 820C-
HP, refer to the Technical Description for the product and system release version you are using.
2+2 HSB Space Diversity provides both equipment protection and signal protection. If one unit goes out of service,
the other unit takes over and maintains the link until the other unit is restored to service and Space Diversity
operation resumes.
2+2 HSB Space Diversity utilizes two PTP 820C units operating in dual core mode. In each PTP 820C unit, both radio
carriers are connected to a single antenna. One optical GbE port on each PTP 820C is connected to an optical
splitter. Traffic must be routed to an optical GbE port on each PTP 820C unit.
In effect, a 2+2 HSB configuration is a protected 2+0 Space Diversity configuration. Each PTP 820C monitors both of
its cores. If the active PTP 820C detects a radio failure in either of its cores, it initiates a switchover to the standby
PTP 820C.
Note
Only one MIMO or Space Diversity group can be created per PTP 820C or PTP 820C-HP unit. All
MRMC scripts that support MIMO also support Space Diversity.
For 4x4 MIMO links, system release is not interoperable with earlier System release versions. If
you are upgrading from an earlier version with an existing 4x4 MIMO link, you must follow the
procedure in Upgrading a 4x4 MIMO Link from an Earlier Version to system release 10.5 or Higher
(CLI).
Note
You must download the new system release software package to all four units before beginning
the upgrade process. All four units in the 4x4 MIMO link must use the same system release build
and version.
mimo-4X4-group[x]:
iii In group view, enter the following commands to add the unit’s two carriers to the group:
mimo-4X4-group[x]> amcc attach slot 2 port 1 role <mimo-master|mimo-
slave>
mimo-4X4-group[x]> amcc attach slot 2 port 2 role <mimo-master|mimo-
slave>
iv In group view, enter the following command to enable the group:
mimo-4X4-group[x]> set admin enable
Note: To display details about the group, enter the following command in root view:
Unit 1
root> amcc create group group_id 1 group_type mimo_4x4 group_sub_type
external
Note
The last two steps are crucial to ensure that the link continues to function via the MIMO
resiliency mechanism in the event of a hardware failure scenario.
Note
XPI is not relevant for 2x2 MIMO.
MIMO group 1st member The first radio carrier in the group.
MIMO group 2nd member The second radio carrier in the group.
MIMO group admin status Indicates whether the MIMO group is enabled or
disabled.
MIMO RFU role Indicates the role of the unit in the MIMO
configuration (Master or Slave).
MIMO 1st carrier MMI MIMO Mate Interference for the first group
member. MMI represents the difference between
the RSL1 and the RSL2 of the remote Master and
Slave transmitters with the same polarization. The
nominal range is 0. The range should be from -3
dB to +3 dB.
MMI is not relevant for 1+0 Space Diversity.
MIMO 2nd carrier MMI MMI for the second group member.
MIMO 1st carrier XPI Cross Polarization Interference for the first group
member. This is only relevant in 4x4 MIMO
configurations, where each unit operates in dual
polarization (XPIC) mode. The XPI value should be
at least 25 dB. For further information, refer to
Configuring XPIC (CLI).
mimo-4X4-group[x]:
2 In group view, enter the following commands to remove the unit’s two carriers from the group:
mimo-4X4-group[x]> amcc detach slot 2 port 1
mimo-4X4-group[x]> amcc detach slot 2 port 2
3 In group view, enter the following command to disable the group:
mimo-4X4-group[x]> set admin disable
4 In root view, enter the following command to delete the group:
root> amcc delete group group_id <1-4> group_type mimo_4x4
Note: This feature is only relevant for PTP 820C and PTP 820C-HP.
This section describes how to configure Advanced Space Diversity (ASD), and includes the following topics:
• Configuring an ASD Link (CLI)
• Viewing ASD Status (CLI)
• Deleting an ASD Group (CLI)
Note: Make sure to set the same MRMC parameters for all the radio carriers in the ASD
link. For ASD, the scripts must be set to Adaptive mode.
5 Mute both carriers on the Slave unit. See Error! Reference source not found..
6 Align the antenna of the Master unit to the antenna at Site 2 until you achieve a steady link at the RSL that is
expected according to the site plan, at 2048 QAM.
7 Unmute the carriers of the Slave unit and mute both carriers on the Master unit. See Error! Reference source
not found..
8 Align the antenna of the Slave unit to the antenna at Site 2 until you achieve a steady link at the RSL that is
expected according to the site plan, at 2048 QAM.
9 Unmute the carriers of the Master unit. At this point, all of the carriers in the ASD link should be unmuted.
10 Create an ASD group on each unit:
• To create an ASD group at Site 1 (two units), enter the following command in root view:
root> amcc create group group_id <1-4> group_type dual-asd group_sub_type
asd-2+0
• To create an ASD group at Site 2 (one unit), enter the following command in root view:
root> amcc create group group_id <1-4> group_type single-asd
group_sub_type asd-2+0
11 Enter group view:
• Use the following command to enter group view at Site 1 (two units):
root>amcc group group_ id <1-4> group_type dual-asd
dual-asd-group[1]>
• Use the following command to enter group view at Site 1 (two units):
root>amcc group group_id <1-4> group_type single-asd
single-asd-group[1]>
12 In group view, add members and set the unit’s role (Master or Slave):
• Use the following commands to add members and set the group’s role for the Master unit at Site 1:
dual-asd-group[1]>amcc attach slot 2 port 1 role master
dual-asd-group[1]>amcc attach slot 2 port 2 role master
• Use the following commands to add members and set the group’s role for the Slave unit at Site 1:
dual-asd-group[1]>amcc attach slot 2 port 1 role slave
dual-asd-group[1]>amcc attach slot 2 port 2 role slave
• Use the following commands to add members and set the group’s role for the unit at Site 2:
single-asd-group[1]>amcc attach slot 2 port 1 role master
single-asd-group[1]>amcc attach slot 2 port 2 role master
13 In group view, enter the following command to enable the group:
dual|single-asd-group[1]>set admin enable
To display details about the group at Site 1 enter the following command in root view:
root>amcc show group_id 1 group_type dual-asd
To display details about the group at Site 2 enter the following command in root view:
root>amcc show group_id 1 group_type single-asd
The following commands configure an ASD link:
Site 1, Unit 1 (Master)
root>amcc create group group_id 1 group_type dual-asd group_sub_type asd-2+0
group_id 1, group_type dual-asd created
dual-asd-group[1]>
Site 1, Unit 2
root>amcc create group group_id 1 group_type dual-asd group_sub_type asd-2+0
group_id 1, group_type dual-asd created
dual-asd-group[1]>
Site 2 (Master)
root>amcc create group group_id 1 group_type single-asd group_sub_type asd-2+0
group_id 1, group_type single-asd created
single-asd-group[1]>
• Main Only – Only relevant for Master units. Only the main path signal is being received.
• Diversity Only – Only relevant for Slave units and the Master unit at the single-unit side of the link. Only
the diversity path is providing a usable signal.
• N/A – No adequate signal is being received, either because of an LOF condition or misconfiguration of the
link.
For example:
Dual-asd-group[1]>show members
slot 2 port 1 role master state Idle Combined Combined
slot 2 port 2 role master state Idle Combined Combined
You can also display the status of the ASD group’s received radio signal, but you must do so via the Web EMS. See
Viewing ASD Status.
dual-asd-group[1]>exit
root>
root>
Perform the following steps for each site in the AFR configuration.
• If you are performing the configuration locally at the Hub site and each Tail site, the order in which you
configure the sites does not matter.
• If you are performing the configuration for all three sites remotely from the Hub Site, you must configure the
sites in the following order:
o Tail Site 1
o Tail Site 2
o Hub Site
After you configure AFR on the Tails Sites, the link between the Hub Site and the Tail Sites will be lost. The
links will be restored after you configure AFR on the Hub site and the Hub site comes back up after unit reset.
1. Create an AFR group by entering on of the following commands in root view:
If you are configuring the Hub site, enter the following command:
root> amcc create group group_id 1 group_type afr-agg group_sub_type
internal
If you are configuring a Tail site, enter the following command:
root>amcc create group group_id 1 group_type afr-tail group_sub_type
internal
2. Enter AMCC Group view by entering the following command in root view:
root> amcc group group_id 1
group [1]>
3. Assign a role to each radio interface, as follows:
If you are configuring the Hub site, enter the following command in group view for each radio interface:
group [1]> amcc attach slot 2 port <1|2> role <agg-1|agg-2>
If you are configuring a Tail site, enter the following command in group view:
If you wish to operate a PTP 820C unit in single radio carrier mode, you must perform the following steps:
1. Verify that XPIC is disabled. See Configuring XPIC (CLI)
2. Disable Multi-Carrier ABC, as described in Deleting a Multi-Carrier ABC Group (CLI)
3. Disable one of the two radio interfaces, as described in Enabling the Interfaces (CLI)
4. Mute the disabled radio interface, as described in Muting and Unmuting a Radio (CLI)
Related topics:
• Setting the Time and Date (Optional) (CLI)
• Uploading Unit Info (CLI)
• Changing the Management IP Address (CLI)
You can specify which IP protocol the unit will use when initiating communications, such as downloading software,
sending traps, pinging, or exporting configurations. The options are IPv4 or IPv6.
To define which IP protocol the unit will use when initiating communications, enter the following command in root
view:
root> platform management ip set ip-address-family <ipv4|ipv6>
To show the IP protocol version the unit will use when initiating communications, enter the following command in
root view:
root> platform management ip show ip-address-family
You can configure the remote unit’s IP address, subnet mask and default gateway in IPv4 format and/or in IPv6
format. The remote unit will receive communications whether they were sent to its IPv4 address or its IPv6
address.
ipv4-address Dotted decimal format. Any valid IPv4 address. Sets the default gateway or IP
address of the remote radio.
subnet-mask Dotted decimal format. Any valid subnet mask. Sets the subnet mask of the
remote radio.
Examples
The following command sets the default gateway of the remote radio as 192.168.1.20:
radio[2/1]>remote-unit set default-gateway IP 192.168.1.20
The following commands set the IP address of the remote radio as 192.168.1.1, with a subnet mask of
255.255.255.255.
radio[2/2]>remote-unit set ip-address 192.168.1.1
ipv6-address Eight groups of four Any valid IPv6 address. Sets the default gateway or IP
hexadecimal digits address of the remote radio.
separated by colons.
Examples
The following command sets the default gateway of the remote radio as
FE80:0000:0000:0000:0202:B3FF:FE1E:8329 :
radio[2/1]>remote-unit set default-gateway-ipv6 IPv6
FE80:0000:0000:0000:0202:B3FF:FE1E:8329
The following commands set the IP address of the remote radio as FE80:0000:0000:0000:0202:B3FF:FE1E:8329,
with a prefix length of 64:
radio[2/2]>remote-unit set ip-address-ipv6
FE80:0000:0000:0000:0202:B3FF:FE1E:8329
PTP 820 supports SNMP v1, V2c, and v3. You can set community strings for access to PTP 820 units.
PTP 820supports the following MIBs:
• RFC-1213 (MIB II).
• RMON MIB.
• Proprietary MIB.
Access to the unit is provided by making use of the community and context fields in SNMPv1 and
SNMPv2c/SNMPv3, respectively.
This section includes:
• Configuring Basic SNMP Settings (CLI)
• Configuring SNMPv3 (CLI)
• Displaying the SNMP Settings (CLI)
• Configuring Trap Managers (CLI)
Note
Additional security parameters can be configured in the Quick Configuration Security Protocols page.
See Quick Security Configuration – Protocols Page, Step 4.
read- Text String Any valid SNMP read The community string for the
community community. SNMP read community.
write- Text String Any valid SNMP write The community string for the
community community. SNMP write community.
Example
The following commands enable SNMP v2 on the unit, and set the read community to “public” and the write
community to “private”:
root> platform security protocols-control snmp admin set enable
Example
The following commands enable SNMP v2 on the unit, and set the read community to “public” and the write
community to “private”:
root> platform security protocols-control snmp admin set enable
manager-ipv4 Dotted Any valid IPv4 address. If the IP protocol selected in platform
decimal management ip set ip-address-
format. family is IPv4, enter the destination
IPv4 address. Traps will be sent to this
IP address.
manager-ipv6 Eight groups Any valid IPv6 address. If the IP protocol selected in platform
of four management ip set ip-address-
hexadecimal family is IPv6, enter the destination
digits IPv6 address. Traps will be sent to this
separated by IP address.
colons.
manager- Text String. Any valid SNMP read Enter the community string for the
community community. SNMP read community.
manager-v3- Text String. The name of a V3 user If the SNMP Trap version selected in
user defined in the system. platform security protocols-
control snmp version set is V3, enter
the name of a V3 user defined in the
system.
Note: Make sure that an identical V3
user is also defined on the manager's
side
Examples
The following commands enable trap manager 2, and assign it IP address 192.168.1.250, port 164, and community
“private”, with a heartbeat of 12 minutes.
root> platform security protocols-control snmp trap-manager set manager-
id 2 manager-admin enable manager-ip 192.168.1.250 manager-port 164
manager-community private manager-description text
protocol number
=====================================
ftp 21
sftp 22
protocol number
=====================================
ftp 125
sftp 126
root>
PTP 820 software and firmware releases are provided in a single bundle that includes software and firmware for all
components in the system. Software is first downloaded to the system, then installed. After installation, a reset is
automatically performed on all components whose software was upgraded.
This section includes:
• Software Upgrade Overview (CLI)
• Viewing Current Software Versions (CLI)
• Configuring a Software Download (CLI)
• Downloading a Software Package (CLI)
• Installing and Upgrading Software (CLI)
Note
When downloading an older version, all files in the bundle may be downloaded, including files that
are already installed.
Software bundles can be downloaded via HTTP, HTTPS, FTP or SFTP. After the software download is complete, you
can initiate the installation.
Note
Before performing a software upgrade, it is important to verify that the system date and time are
correct. See Setting the Time and Date (Optional) (CLI).
When upgrading a node with unit protection, upgrade the standby unit first, then the active unit.
Note
HTTP/HTTPS software download is only supported using the Web EMS. For instructions, see
Downloading and Installing Software.
When downloading software, the IDU functions as an FTP or SFTP client. You must install FTP or SFTP server
software on the PC or laptop you are using to perform the software upgrade. For details, see Installing and
Configuring an FTP or SFTP Server.
Note
For SFTP downloads, be aware that only certain ciphers are supported in some operation modes. For
a list of supported ciphers, including an indication of which ciphers are supported in HTTPS strong
mode and FIPS mode, refer to Annex A – Supported Ciphers for Secured Communication Protocols in
the Release Notes for the product and System release version you are using.
To set the file transfer protocol you want to use (FTP or SFTP), enter the following command:
root> platform software download version protocol <ftp|sftp>
If the IP protocol selected in platform management ip set ip-address-family is IPv4, enter the following command:
root> platform software download channel server set server-ip <server-
ipv4> directory <directory> username <username> password <password>
If the IP protocol selected in platform management ip set ip-address-family is IPv6, enter the following command:
root> platform software download channel server-ipv6 set server-ip
<server-ipv6> directory <directory> username <username> password
<password>
To display the software download channel configuration, enter one of the following commands:
root> platform software download channel server show
root> platform software download channel server-ipv6 show
server-ipv4 Dotted Any valid IPv4 address. The IPv4 address of the PC or laptop
decimal you are using as the FTP server.
format.
server-ipv6 Eight groups Any valid IPv6 address. The IPv6 address of the PC or laptop
of four you are using as the FTP server.
hexadecimal
digits
separated by
colons.
directory Text String. The directory path from which you are
downloading the files. Enter the path
relative to the FTP user's home
directory, not the absolute path. To
leave the path blank, enter //. If the
location is the home directory, it
should be left empty. If the location is
a sub-folder under the home directory,
specify the folder name. If the shared
folder is "C:\", this parameter can be
left empty or populated with "//".
The following command configures a download from IP address 192.168.1.242, in the directory “current”, with
user name “anonymous” and password “12345.”
root> platform software download channel server set server-
ip 192.168.1.242 directory \current username anonymous password 12345
You can import and export PTP 820 configuration files. This enables you to copy the system configuration to
multiple PTP 820 units. You can also backup and save configuration files.
Importing and exporting configuration files can be done using HTTP, HTTPS, FTP, or SFTP. However, import and
export using HTTP or HTTPS must be performed using the Web EMS. See Backing Up and Restoring Configurations.
Configuration files can only be copied between units of the same type, i.e., PTP 820C to PTP 820C, PTP 820C-HP to
PTP 820C-HP, PTP 820E to PTP 820E and PTP 820S to PTP 820S.
Note that you can also write CLI scripts that will automatically execute a series of commands when the
configuration file is restored. For information, refer to Editing CLI Scripts (CLI).
This section includes:
• Configuration Management Overview (CLI)
• Setting the Configuration Management Parameters (CLI)
• Backing up and Exporting a Configuration File (CLI)
• Importing and Restoring a Configuration File (CLI)
• Editing CLI Scripts (CLI)
Note
Before importing or exporting a configuration file, you must verify that the system date and time are
correct. See Setting the Time and Date (Optional) (CLI).
To set the FTP or SFTP parameters for configuration file import and export, enter one of the following commands
in root view:
• If the IP protocol selected in platform management ip set ip-address-family is IPv4, enter the following
command:
root> platform configuration channel server set ip-address <server-ipv4>
directory <directory> filename <filename> username <username> password
<password>
• If the IP protocol selected in platform management ip set ip-address-family is IPv6, enter the following
command:
root> platform configuration channel server-ipv6 set ip-address <server-
ipv6> directory <directory> filename <filename> username <username>
password <password>
To set the file transfer protocol you want to use (FTP or SFTP), enter the following command:
root>platform configuration channel set protocol <ftp|sftp>
To display the FTP channel parameters for importing and exporting configuration files, enter one of the following
commands in root view:
root> platform configuration channel server show
Parameter Permitted
Input Type Values Description
server-ipv4 Dotted Any valid IPv4 The IPv4 address of the PC or laptop you are using
decimal address. as the FTP server.
format.
server-ipv6 Eight groups Any valid IPv6 The IPv6 address of the PC or laptop you are using
of four address. as the FTP server.
hexadecimal
digits
separated by
colons.
Parameter Permitted
Input Type Values Description
directory Text String. The location of the file you are downloading or
uploading. If the location is the root shared folder,
it should be left empty. If the location is a sub-
folder under the root shared folder, specify the
folder name. If the shared folder is "C:\", this
parameter can be left empty or populated with
"//".
filename Text String. The name of the file you are importing, or the
name you want to give the file you are exporting.
Note: You must add the suffix .zip to the file name.
Otherwise, the file import may fail. You can export
the file using any name, then add the suffix .zip
manually.
username Text String. The user name you configured in the FTP server.
password Text String. The password you configured in the FTP server. If
you did not configure a password for your FTP
user, simply omit this parameter.
Examples
The following command configures the FTP channel for configuration file import and export to IP address
192.168.1.99, in the directory “current”, with file name “version_8_backup.zip”, user name “anonymous”, and
password “12345.”
root> platform configuration channel server set server-ip 192.168.1.99
directory \current filename version_8_backup.zip username anonymous
password 12345
Examples
The following commands save the current configuration as a configuration at Restore Point 1, and export the file to
the external server location:
root> platform configuration configuration-file add restore-point-1
Note
In order to import a configuration file, you must configure the FTP channel parameters and restore
points, as described in Setting the Configuration Management Parameters and Backing up and
Exporting a Configuration File.
Examples
The following commands import a configuration file from an external PC or laptop to Restore Point 2 on the PTP
820, and restore the file to be the system configuration file for the PTP 820:
Note
If any specific command in the CLI script requires reset, the unit is reset when that that command is
executed. During initialization following the reset, execution of the CLI script continues from the
following command.
To restore the unit to its factory default configuration, while retaining the unit’s IP address settings and logs, enter
the following commands in root view:
root> platform management set-to-default
The following prompt appears:
WARNING: All database and configuration will be lost, unit will be
restart.
Are you sure? (yes/no):yes
At the prompt, type yes.
Note
This does not change the unit’s IP address or FIPS configuration.
To initiate a hard (cold) reset on the unit, enter the following command in root view:
root> platform management chassis reset
The following prompt appears:
You are about to reset the shelf
Are you sure? :(yes/no):
Enter yes. The unit is reset.
Examples
The following commands configure a name, location, contact person, latitude coordinates, longitude coordinates,
and units of measurements for the PTP 820:
root> platform management system-name set name "My-System-Name"
PTP 820 supports Network Time Protocol (NTP). NTP distributes Coordinated Universal Time (UTC) throughout the
system, using a jitter buffer to neutralize the effects of variable latency.
You can configure up to four NTP servers. Each server can be configured using IPv4 or IPv6. When multiple servers
are configured, the unit chooses the best server according to the implementation of Version 4.2.6p1 of the
NTPD (Network Time Protocol Daemon). The servers are continually polled. The polling interval is determined by
the NTPD, to achieve maximum accuracy consistent with minimum network overhead.
To configure an NTP server, enter the following commands in root view:
ntp-server-ip- Dotted Any valid IP address. Enter the IP address of the NTP server.
address decimal
format.
Example
The following command enables NTP, using NTP v4, and sets the IP address of the NTP server as 62.90.139.210.
root> platform management ntp set admin enable ntp-version ntpv4 ntp-
server-ip-address-1
System information:
Subtype : 350
product name : AODU DC, All-outdoor, dual radio carriers in one product
product description : AODU DC, All-outdoor, dual radio carriers in one
product
root>
Note
DDM parameters are not relevant for electrical SFPs.
The following alarms are available in connection with SFP DDM and inventory monitoring. The polling interval for
these alarms is one minute.
• Alarm #803- SFP port RX power level is too low.
• Alarm #804 – SFP port RX power level is too high.
• Alarm #805- SFP port TX power level is too low.
• Alarm #806 – SFP port TX power level is too high.
These alarms are based on thresholds defined by the SFP module vendor, which are static. They also display the
actual RX or TX values as of the time when the alarm was raised, which are dynamic. The dynamic values are not
changed as long as the alarm is still raised. They are only updated if the alarm is cleared, then raised again.
If there is no signal on the interface, a Loss of Carrier alarm (LOC) is raised, and this alarm masks the DDM alarms.
Parameter Description
Laser Wavelength Display’s the SFP module’s laser wavelength. For CSFP modules,
(nm) two wavelengths are displayed. This parameters is not relevant
for copper SFPs.
Link Length SM The maximum length of the cable (in km) for single mode fiber
Fiber (km) cables.
Link Length OM1 The maximum length of the cable (in meters) for OM1 multi-
Fiber (m) mode fiber cables.
Link Length OM2 The maximum length of the cable (in meters) for OM2 multi-
Fiber (m) mode fiber cables.
Link Length OM3 The maximum length of the cable (in meters) for OM3 multi-
Fiber (m) mode fiber cables.
Optical Diagnostics Displays whether the SFP module supports DDM monitoring. For
Supported modules that do not support DDM monitoring, the parameters
described in Table 114 are not available.
DDM PMs are not persistent, which means they are not saved in the event of unit reset. RX and TX power levels
are collected five times per 15-minute interval. 15-minute PM data is saved for 24 hours. 24-hour PM data, which
is updated every 15 minutes, is saved for 30 days.
Note
For convenience, this User Guide generally shows the radio prompt as radio[2/1]>.
To view and configure radio parameters, you must first enter the radio’s view level in the CLI. For
details, refer to Entering Radio View (CLI)
Related topics:
• Configuring the Remote Unit’s IP Address (CLI)
tx-level Number Depends on the frequency The desired TX signal level (TSL), in
and unit type. dBm.
The following command sets the TX level of the remote radio to 10 dBm:
radio[2/1]>remote-unit set tx-level 10
ref-level Number -70 - -30 The RX reference level for the ATPC
mechanism.
The following command sets the ATPC RX reference level of the remote radio to -55:
radio[2/1]>remote-unit atpc set ref-level -55
Note
When canceling an ATPC override state, you should ensure that the underlying problem has been
corrected. Otherwise, ATPC may be overridden again. You cannot use ATPC in MIMO mode. See
Configuring MIMO and Space Diversity (CLI).
Note
The next command actually enables ATPC override. However, it is recommended to set the timer
before enabling ATPC override. Failure to do so can lead to unexpected reduction of the TX power
with corresponding loss of capacity if TX override is enabled with the timer set to a lower-than-
desired value.
To enable ATPC override, enter the following command in radio view. ATPC must be enabled before you enable
ATPC override.
radio[x/x]>atpc override set admin <override admin>
To display whether or not ATPC override is enabled, enter the following command in radio view:
radio[x/x]>atpc override show admin
To display the ATPC override timeout, enter the following command in radio view:
radio[x/x]>atpc show override timeout
To set the TX power to be used when the unit is in an ATPC override state, enter the following command in radio
view:
radio[x/x]>atpc set override-tx-level <override-tx-level>
To display the ATPC override TX power, enter the following command in radio view:
radio[x/x]>atpc show override tx-level
To display the current ATPC override state, enter the following command in radio view:
radio[x/x]>atpc show override
Possible values are:
• Normal – ATPC override is enabled, and there is no override.
• Disabled – ATPC override is not enabled.
• Override – ATPC override has been activated.
To cancel ATPC override, enter the following command in radio view:
radio[x/x]>atpc set override-cancel
rx-level Number -70 - -30 The RX reference level for the ATPC
mechanism.
The following commands enable ATPC mode and ATPC override for radio carrier 1, with an RSL reference level of -
55, an ATPC override timeout of 15 minutes, and an override TX level of 18 dBm:
Note
For PTP 820E, Header De-Duplication is available for all channels except 500 MHz. Make sure to
disable Header De-Duplication before selecting a 500 MHz MRMC script.
Header De-Duplication identifies traffic flows and replaces header fields with a flow ID. The Header De-Duplication
module includes an algorithm for learning each new flow, and implements compression on the flow type starting
with the next frame of that flow type.
You can determine the depth to which the compression mechanism operates, from Layer 2 to Layer 4. You must
balance the depth of compression against the number of flows in order to ensure maximum efficiency. Multi-Layer
(Enhanced) compression supports up to 256 flow types.
Note
The Header De-Duplication configuration must be identical on both sides of the link.
Note
In this release, if two radio carriers in a PTP 820C unit are activated, the Header De-Duplication
configuration for radio carrier 1 are applied to both carriers. You must enter radio view for radio
interface 1.
To clear Ethernet port counters, including both Frame Cut-Through and Header De-Duplication counters, enter the
following command:
radio[x/x]>clear-ethernet-port-counters
• TX frame out compressed count - Frames on the TX side that were compressed by Header De-Duplication.
• TX frame uncompressed count - The number of frames on the TX side that were not compressed due to
exclusion rules.
Note
The use of exclusion rules for Header De-Duplication is planned for future release.
• TX frame uncompressed other count - Frames on the TX side that were not compressed for reasons other than
the use of exclusion rules.
• TX out frame learning count - The number of frames that have been used to learn unique data flows. Once a
particular flow type has been learned, subsequent frames with that flow type are compressed by Header De-
Duplication.
• TX out number of active flows in count - The number of Header De-Duplication flows that are active on the TX
side.
Using the Frame Cut-Through feature, frames assigned to queues with 4th priority pre-empt frames already in
transmission over the radio from other queues. After the 4th queue frames have been transmitted, transmission of
the pre-empted framesresumes.
Note
The Frame Cut-Through configuration must be identical on both sides of the link.
If Frame Cut-Through is used together with 1588 Transparent Clock, the 1588 packets must be given
a CoS that is not assigned to the fourth priority queue.
Frame Cut-Through cannot be used together with 1588 Transparent Clock.
Radio [2/1]>
Note
This feature is only relevant for PTP 820C and PTP 820S units.
This feature is not supported with MIMO or Space Diversity links.
Note
In order for the AES activation key to become active, you must reset the unit after configuring a valid
AES activation key. Until the unit is reset, an alarm will be present if you enable AES. This is not the
case for other activation keys.
PTP 820C, PTP 820C-HP and PTP 820S support AES-256 payload encryption. The purpose of payload encryption is
to secure the radio link and provide protection against eavesdropping and/or personification (“man-in-the-
middle”) attacks.
AES is enabled and configured separately for each radio carrier.
PTP 820 uses a dual-key encryption mechanism for AES:
• The user provides a master key. The master key can also be generated by the system upon user command. The
master key is a 32-byte symmetric encryption key. The same master key must be manually configured on both
ends of the encrypted link.
• The session key is a 32-byte symmetric encryption key used to encrypt the actual data. Each link uses two
session keys, one for each direction. For each direction, the session key is generated by the transmit side unit
and propagated automatically, via a Key Exchange Protocol, to the other side of the link. The Key Exchange
Protocol exchanges session keys by encrypting them with the master key, using the AES-256 encryption
algorithm. Session keys are regenerated at user-configured intervals.
The first KEP exchange that takes place after a new master key is configured causes traffic to be blocked for up to
one minute, until the Crypto Validation State becomes Valid. Subsequent KEP exchanges that take place when a
session key expires do not affect traffic. KEP exchanges have no effect upon ACM, RSL, and MSE.
To display the current payload encryption status for all available radio links on the unit, enter the following
command in root view:
root> payload encryption status show
The following is a sample output of this command in which payload encryption is enabled but not operational on
radio interface 1, and disabled on radio interface 2.
Note
The Crypto Validation State field indicates whether the interface is functioning properly, with AES-256
encryption. In order for this field to display Valid, both the interface itself and AES-256 encryption
must be enabled, the hardware must be in place and functioning properly, initialization must be
finished, and AES-256 encryption must be functioning properly, with no loopback on the interface.
You must use the same master key on both sides of the link. This means that if you generate a master key
automatically on one side of the link, you must copy that key and for use on the other side of the link.
Once payload encryption has been enabled on both sides of the link, the Key Exchange Protocol
periodically verifies that both ends of the link have the same master key. If a mismatch is detected, an
alarm is raised and traffic transmission is stopped for the mismatched carrier at both sides of the link. The
link becomes non-valid and traffic stops being forwarded.
To define the master key manually, enter the following command in PayloadEncryption view:
PayloadEncryption [2/x]> payload encryption mkey
When you press <Enter>, the following prompt appears:
Please enter key:
Enter the master key and press <Enter>. The master key must be between 8 and 32 ASCII characters. The
characters do not appear as you type them. To display the master key and verify that you typed it
correctly, enter the payload encryption status show command described above. You can copy the
master key from the output of this command.
To generate the master key automatically, enter the following command in PayloadEncryption view:
PayloadEncryption [2/x]> master key generate
A random master key is generated. You must copy and paste this key to the other end of the link to
ensure that both sides of the link have the same master key. To display and copy the master key, enter
the traffic encryption status show command described above. You can copy the master key
from the output of this command.
6 On the local unit, follow the procedure described in Step 5 to configure the same master key configured
on the remote unit also on the local unit.
7 Enable payload encryption on the remote unit:
i Enter the following command in Payload Encryption view:
Payload Encryption [2/x]> payload encryption mode admin AES-256
This step will cause the link status to be Down until payload encryption is successfully enabled on the local
unit. However, the RSL measured on the link should remain at an acceptable level.
To disable payload encryption, enter the following command in Payload Encryption view:
Payload Encryption [2/x]> payload encryption mode admin Disable
ii The session key is automatically regenerated at defined intervals. To set the session key regeneration
interval, enter the following command in Payload Encryption view:
Payload Encryption [x/x]> payload encryption session-key period set
<00:00-00:00>
Enter the regeneration interval in hours and minutes (HH:MM). For example, the following command
configures radio interface 1 to regenerate the session key every 4 hours and 15 minutes:
Payload Encryption [2/1]> payload encryption session-key period set 04:15
To display the session key regeneration interval, enter the following command in Payload Encryption
view:
Payload Encryption [2/x]> payload encryption session-key period show
Note
The session key regeneration interval must be the same on both sides of the link.
8 Enable payload encryption on the local unit by following the procedure described in Step 7. Verify that on
both the local and remote active units, the link status returns to Up and user traffic is restored. In links
using in-band management, verify also that in-band management returns.
9 In a protected link, perform copy-to-mate, first on the remote and then on the local unit. See Step 3 in
Configuring HSB Radio Protection (CLI). After the copy-to-mate operation, wait for both standby units to
re-boot and verify that there are no alarms.
Note
The standby unit may have a payload encryption failure alarm for up to about one minute after the
unit is up and running.
4 In a protected link, remove the protection lockout, first on the remote and then on the local unit. See
Disabling Automatic Switchover to the Standby Unit (CLI).
5 Verify that there are no alarms on the link.
You can set all master keys defined on the unit to zero value. To zeroize the master keys, enter the following
command in root view:
root> payload encryption key zeroize
Warning
Executing this command on a FIPS-enabled unit formats the unit’s disk, and renders the unit non-
operational. If it is necessary to use this command, contact Cambium Networks Technical Support
for instructions how to re-configure the unit.
This command has no effect on units that are not enabled for FIPS
Note
Any time payload encryption fails, the Operational status of the link is Down until payload encryption
is successfully restored.
Current Tx profile: 0
Current Tx QAM: 4
Current Tx rate(Kbps): 43389
Current Rx profile: 0
Current Rx QAM: 4
Current Rx rate(Kbps): 43389
A value of 0 in the MSE (Db) field means that the modem is not locked.
To clear all radio PMs in the system, enter the following command in root view:
root> radio pm clear all
To clear defective blocks counters for a radio, enter the following command:
radio[x/x]>modem clear counters
radio [2/1]>
To display modem BER PMs in daily intervals, enter the following command:
radio [x/x]>framer pm-aggregate show interval 24hr
The following is a sample output of the framer pm-aggregate show interval 24hr command:
radio [2/1]>framer pm-aggregate show interval 24hr
radio [2/1]>
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
SES Indicates the number of severe error seconds in the measuring interval.
UAS Indicates the Unavailable Seconds value of the measured interval. The value
can be between 0 and 900 seconds (15 minutes).
BBE Indicates the number of background block errors during the measured
interval.
threshold Variable 1e-3 The level above which an excessive BER alarm
1e-4 is issued for errors detected over the radio
1e-5 link.
1e-6
1e-7
1e-8
1e-9
1e-10
The following command sets the RSL thresholds to -30 dBm and -60 dBm, respectively.
radio [2/1]>rf pm-rsl set threshold1 -30 threshold2 -60
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
Min RSL (dBm) The minimum RSL (Received Signal Level) that was measured during the
interval.
Max RSL (dBm) The maximum RSL (Received Signal Level) that was measured during the
interval.
Min TSL (dBm) The minimum TSL (Transmit Signal Level) that was measured during the
interval.
Max TSL (dBm) The maximum TSL (Transmit Signal Level) that was measured during the
interval.
TSL exceed The number of seconds the measured TSL exceeded the threshold during the
threshold seconds interval. See Configuring TSL Thresholds (CLI).
RSL exceed The number of seconds the measured RSL exceeded RSL threshold 1 during
threshold1 the interval. See Configuring RSL Thresholds (CLI).
seconds
RSL exceed The number of seconds the measured RSL exceeded RSL threshold 2 during
threshold2 the interval. See Configuring RSL Thresholds (CLI).
seconds
To display MSE (Mean Square Error) PMs in 15-minute intervals, enter the following command in radio view:
radio [x/x]>modem pm-mse show interval 15min
The following is a partial sample output of the modem pm-mse show interval 15min command:
radio [2/1]>
To display MSE (Mean Square Error) PMs in daily intervals, enter the following command in radio view:
radio [x/x]>modem pm-mse show interval 24hr
The following is sample output of the modem pm-mse show interval 24hr command in radio view:
radio [2/1]>modem pm-mse show interval 24hr
radio [2/1]>modem
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time. A 1 and a 0 value in the Max MSE field may also indicate that the
modem was unlocked.
Min MSE (dB) Indicates the minimum MSE in dB, measured during the interval. A 0 in this
field and a 1 in the Integrity field may also indicate that the modem was
unlocked during the entire interval.
Max MSE (dB) Indicates the maximum MSE in dB, measured during the interval. A 0 in this
field and a 1 in the Integrity field may also indicate that the modem was
unlocked.
Exceed Threshold Indicates the number of seconds the MSE exceeded the MSE PM threshold
Seconds during the interval.
To display XPI PMs in 15-minute intervals, enter the following command in radio view:
radio[x/x]>modem pm-xpi show interval 15min
The following is a partial sample output of the modem pm-xpi show interval 15min command:
radio [2/1]>modem pm-xpi show interval 15min
radio [2/1]>
To display XPI PMs in daily intervals, enter the following command in radio view:
radio[x/x]>modem pm-xpi show interval 24hr
The following is a partial sample output of the modem pm-xpi show interval 24hr command:
radio [2/1]>
Parameter Description
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
Min XPI (dB) Indicates the lowest XPI value in dB, measured during the interval.
Max XPI (dB) Indicates the highest XPI value in dB, measured during the interval.
XPI Below Indicates the number of seconds the XPI value was lower than the XPI
Threshold threshold during the interval.
Seconds
The following command sets the XPI threshold for radio carrier 2 to 15:
To display the ACM thresholds, enter the following command in radio view:
To display ACM PMs in 15-minute intervals, enter the following command in radio view:
radio [x/x]>mrmc pm-acm show interval 15min
The following is a partial sample output of the modem pm-acm show interval 15min command:
radio [2/1]>mrmc pm-acm show interval 15min
MRMC PM Table:
==============
Interval Integrity Min profile Max profile Min bitrate Max bitrate
============================================================================
0 1 0 0 43389 43389
1 1 0 0 43389 43389
2 1 0 0 43389 43389
3 1 0 0 43389 43389
4 1 0 0 43389 43389
5 1 0 0 43389 43389
6 1 0 0 43389 43389
7 1 0 0 43389 43389
8 1 0 0 43389 43389
9 1 0 0 43389 43389
10 1 0 0 43389 43389
radio [2/1]>
To display ACM PMs in daily intervals, enter the following command in radio view:
radio [x/x]>mrmc pm-acm show interval 24hr
The following is sample output of the modem pm-acm show interval 24hr command:
radio [2/1]>mrmc pm-acm show interval 24hr
MRMC PM Table:
==============
Interval Integrity Min profile Max profile Min bitrate Max bitrate
===========================================================================
0 1 0 0 43389 43389
4 1 0 0 43389 43389
5 1 0 0 43389 43389
6 1 0 0 43389 43389
8 1 0 0 43389 43389
11 1 0 0 43389 43389
15 1 0 0 43389 43389
17 1 0 0 43389 43389
radio [2/1]>
Parameter Description
threshold1 The higher ACM profile threshold (0-15). The default value is 0.
Threshold2 The lower ACM profile threshold (0-15). The default value is 0.
Interval The number of the interval: 1-30 for daily PM reports, and 1-96 for 15 minute
PM reports.
Parameter Description
Integrity Indicates whether the values received at the time and date of the measured
interval are reliable. "1" in the column indicates that the values are not
reliable due to a possible power surge or power failure that occurred at that
time.
Min profile Indicates the minimum ACM profile that was measured during the interval.
Max profile Indicates the maximum ACM profile that was measured during the interval.
Min bitrate Indicates the minimum total radio throughput (Mbps), delivered during the
interval.
Max bitrate Indicates the maximum total radio throughput (Mbps), delivered during the
interval.
Note
You can use the management service for in-band management. For instructions on configuring in-
band management, see Mate Management Access (IP Forwarding) (CLI)
A service point is a logical entity attached to a physical or logical interface. Service points define the movement of
frames through the service. Each service point includes both ingress and egress attributes. A Point-to-Point or
Multipoint service can hold up to 32 service points. A Management service can hold up 30 service points.
For a more detailed overview of the PTP 820 service-oriented Ethernet switching engine, refer to the Technical
Description for the PTP 820 product type you are using.
sid Number Any unused value A unique ID for the service. Once you have added
from 1-256 the service, you cannot change the Service ID.
Service ID 257 is reserved for a pre-defined
management service.
Example
The following command adds a Multipoint service with Service ID 18.
root> ethernet service add type mp sid 18 admin operational evc-id Ring_1
description east_west
The following command adds a Point-to-Point service with Service ID 10.
root> ethernet service add type p2p sid 10 admin operational evc-id
Ring_1 description east_west
These services are immediately enabled, although service points must be added to the services in order for the
services to carry traffic.
sid Number Any unused value A unique ID for the service. Once you have added
from 1-256 the service, you cannot change the Service ID.
Service ID 257 is reserved for a pre-defined
management service.
Example
The following command enters service view for the service with Service ID 10:
root> ethernet service sid 10
The following prompt appears:
service[10]>
service info:
service id: 1
service type: p2p
service admin: operational
Maximal MAC address learning entries: 131072
default cos: 0
cos mode: preserve-sp-cos-decision
EVC id: N.A.
EVC description: N.A.
split horizon group: disable
configured multicast grouping: no
service[1]>
To display the attributes of a service and its service points, go to service view for the service and enter the
following command:
service[SID]>service detailed-info show
For example:
To display a list of service points and their attributes, enter the following command in root view:
root>ethernet service show info sid <sid>
For example:
Example
The following command sets Service 10 to be operational:
service[10]>service admin set operational
cos-mode Variable default-cos default cos - Frames passing through the service
preserve-sp-cos- are assigned the default CoS defined below. This
decision CoS value overrides whatever CoS may have been
assigned at the service point or interface level.
preserve-sp-cos-decision - The CoS of frames
passing through the service is not modified by the
service.
cos Number 0–7 This value is assigned to frames at the service level
if cos-mode is set to default-cos. Otherwise, this
value is not used, and frames retain whatever CoS
value they were assigned at the service point or
logical interface level.
Examples
The following commands configure Service 10 to assign a CoS value of 7 to frames traversing the service:
service[10]>service cos-mode set cos-mode default-cos
service[10]>service default-cos set cos 7
The following command configures Service 10 to preserve the CoS decision made at the interface or service point
level for frames traveling through the service:
service[10]>service cos-mode set cos-mode preserve-sp-cos-decision
evc descriptio Text String Up to 64 A text description of the service. This parameter
n characters. does not affect the network element’s behavior,
but is used by the NMS for topology management.
Examples
The following commands add the EVC ID "East_West" and the EVC description "Line_to_Radio" to Service 10:
service[10]>service evcid set East_West
service[10]>service description set Line_to_Radio
Examples
The following command deletes Service 10:
root>ethernet service delete sid 10
The following command deletes Services 10 through 15:
root>ethernet service delete sid 10 to 15
Management Yes No No No
Table 125 shows which service point types can co-exist on the same interface.
• S-Tag – All S-VLANs and untagged frames that enter the interface are classified to the same service point.
Table 142 Legal Service Point – Interface Type Combinations per Interface – SAP and SNP
Q in Q No No Yes No Yes No No
S-Tag No No No No No No Yes
Pipe 802.1q No No No No No No No
S-Tag No No No No No No No
Q in Q No No Yes No Yes No No
S-Tag No No No No No No Yes
Table 143 Legal Service Point – Interface Type Combinations per Interface – Pipe and MNG
Bundle-C No No Yes No No
Bundle-S No No No Yes No
All to One No No No No No
Q in Q No No No Yes No
S-Tag No No No No Yes
Q in Q No No No Only 1 MNG No
SP Allowed
int-type Variable all-to-one Determines which frames enter the service via this
dot1q service point, based on the frame's VLAN tagging.
Since more than one service point may be
s-tag
associated with a single interface, frames are
bundle-c-tag assigned to the earliest defined service point in
bundle-s-tag case of conflict.
qinq all-to-one - All C-VLANs and untagged frames that
enter the interface are classified to the service
point. Only valid for SAP service point types.
dot1q - A single C-VLAN is classified to the service
point. Valid for all service point types.
s-tag - A single S- VLAN is classified to the service
point. Valid for SNP and MNG service point types.
bundle-c-tag - A set of multiple C-VLANs is
classified to the service point. Only valid for SAP
service point types.
bundle-s-tag - A single S-VLAN and a set of multiple
C-VLANs are classified to the service point. Only
valid for SAP service point types.
qinq - A single S-VLAN and C-VLAN combination is
classified to the service point. Valid for SAP and
MNG service point types.
sp-id Number 1-32 for P2P and This ID is unique within the service.
MP services.
1-30 for MNG
services.
interface Variable eth The Interface type for the service point:
radio eth - An Ethernet interface.
radio - A radio interface.
When you are defining the service point on a
group, such as a LAG, use the group parameter
instead of the interface parameter.
group Variable rp1 When you are defining the service point on an HSB
rp2 group (rp1 - rp-4), a LAG (lag1 - lag4), or a Multi-
Carrier ABC group (mc-abc1 - mc-abc4), use this
rp3
parameter instead of the interface parameter to
rp4 identify the group. The group must be defined
lag1 before you add the service point.
lag2 Note: Multi-Carrier ABC and HSB protection are
lag3 only relevant for PTP 820C units.
lag4
mc-abc1
mc-abc2
mc-abc3
mc-abc4
port Number For an Ethernet The port or radio carrier on which the service point
interface: 1-3 is located.
For a radio
interface in PTP
820C units: 1-2
For a radio
interface in PTP
820S: 1
vlan Number or 1-4094 (except Defines the VLAN classified to the service point.
Variable 4092 which is This parameter should not be included for service
reserved for the points with an interface type of bundle-C-tag. For
default instructions on attaching a bundled VLAN, refer to
management Attaching a VLAN Bundle to a Service Point (CLI).
service), or
This parameter is also not relevant for:
Untagged
Service points with an interface type of qinq and
all-to-one.
Pipe service points.
outer-vlan Number 1-4094 (except Defines the S-VLAN classified to the service point.
4092, which is This parameter is only relevant for service points
reserved for the with the interface type bundle-s-tag or qinq.
default
management
service), or
Untagged
inner-vlan Number 1-4094 (except Defines the C-VLAN classified to the service point.
4092, which is This parameter is only relevant for service points
reserved for the with the interface type qinq.
default
management
service), or
Untagged
sp-name Text string Up to 20 A descriptive name for the service point (optional).
characters.
Examples
The following command adds an SAP service point with Service Point ID 10 to Service 37, with interface type dot1q.
This service point is located on radio carrier 1. VLAN ID 100 is classified to this service point.
service[37]>sp add sp-type sap int-type dot1q spid 10 interface radio
slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to Service 37, with interface type
bundle-s-tag. This service point is located on radio carrier 2 in a PTP 820C unit. S-VLAN 100 is classified to the
service point.
service[37]>sp add sp-type sap int-type bundle-s-tag spid 10 interface
radio slot 2 port 2 outer-vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to Service 37, with interface type qinq.
This service point is located on radio carrier 2 in a PTP 820C unit. S-VLAN 100 and C-VLAN 200 are classified to the
service point.
service[37]>sp add sp-type sap int-type qinq spid 10 interface radio slot
2 port 2 outer-vlan 100 inner-vlan 200 sp-name Radio
The following command adds an SAP service point with Service Point ID 10 to Service 37, with interface type all-to-
one. This service point is located on radio carrier 1. All traffic entering the system from that port is classified to the
service point.
service[37]>sp add sp-type sap int-type all-to-one spid 10 interface
radio slot 2 port 1 sp-name "all-to-one"
The following command adds an SNP service point with Service Point ID 10 to Service 37, with interface type s-tag.
This service point is located on radio carrier 1. S-VLAN 100 is classified to the service point.
service[37]>sp add sp-type snp int-type s-tag spid 10 interface radio
slot 2 port 1 vlan 100 sp-name Radio
The following command adds an SAP service point with Service Point ID 7 to Service 36, with interface type dot1q.
This service point is connected to HSB group 1 (rp1). VLAN ID 100 is classified to the service point.
service[36]>sp add sp-type sap int-type dot1q spid 7 group rp1 vlan 100
sp-name test1
The following command adds a Pipe service point with Service Point ID 1 to Service 1, with interface type dot1q.
This service point is connected to Eth1.
service[1]>sp add sp-type pipe int-type dot1q spid 1 interface eth slot 1
port 1 sp-name pipe_dot1q
The following commands create a Smart Pipe service between Eth1 and radio carrier 1. This service carries S-VLANs
and untagged frames between the two interfaces:
root> ethernet service add type p2p sid 10 admin operational evc-id test
description east_west
root>
service[10]>
service[10]>sp add sp-type pipe int-type s-tag spid 1 interface eth slot
1 port 1 sp-name test1
service[10]>
service[10]>
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
Examples
The following command allows frames with a broadcast destination MAC address to ingress Service 37 via Service
Point 1.
service[37]>sp broadcast set spid 1 state allow
The following command prevents frames with a broadcast destination MAC address from ingressing Service 37 via
Service Point 1.
service[37]>sp broadcast set spid 1 state disable
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
cos mode Variable sp-def-cos sp-def-cos - The service point re-defines the CoS of
interface-decision frames that pass through the service point,
according to the Default CoS (below). This decision
can be overwritten on the service level.
interface-decision - The service point preserves the
CoS decision made at the interface level. This
decision can still be overwritten at the service
level.
mac-da – The service point checks each frame
against a list of user-defined MAC DAs. If there is a
match, the service point applies to the frame the
CoS and Color defined for that MAC DA. If there is
no match, the service point preserves the CoS
decision made at the interface level. See
Classification Overview.
Note: For Bundle-S and Bundle-C service points, if
Cos Overwrite Valid is set to True, the CoS and
Color defined in the Attached VLAN page has
priority over the interface decision, but not over a
MAC DA match.
Examples
The following commands configure Service Point 1 in Service 37 to apply a CoS value of 5 to frames that ingress the
service point:
service[37]>sp cos-mode set spid 1 mode sp-def-cos
service[37]>sp sp-def-cos set spid 1 cos 5
The following command configures Service Point 1 in Service 37 to preserve the CoS decision made at the interface
level for frames that ingress the service point:
service[37]>sp cos-mode set spid 1 mode interface-decision
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
Examples
The following command configures Service Point 1 in Service 37 to flood incoming frames with unknown MAC
addresses to other service points:
service[37]>sp flooding set spid 1 state allow
The following command configures Service Point 1 in Service 37 not to flood incoming frames with unknown MAC
addresses to other service points:
service[37]>sp flooding set spid 1 state disable
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
c-vlan cos Variable enable Select enable or disable to determine whether the
preservation disable original C-VLAN CoS value is preserved or restored
mode for frames egressing the service point.
enable - the C-VLAN CoS value of frames egressing
the service point is the same as the value when the
frame entered the service.
disable - the C-VLAN CoS value of frames egressing
the service point is set at whatever value might
have been re-assigned by the interface, service
point, or service, or whatever value results from
marking (see Configuring Marking (CLI)).
Examples
The following command enables C-VLAN CoS preservation for Service Point 1 on Service 37:
service[37]>sp cvlan-cos-preservation-mode set spid 1 mode enable
The following command disables C-VLAN CoS preservation for Service Point 1 on Service 37:
service[37]>sp cvlan-cos-preservation-mode set spid 1 mode disable
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
Examples
The following command enables C-VLAN preservation for Service Point 1 on Service 37:
service[37]>sp cvlan-preservation-mode set spid 1 mode enable
The following command disables C-VLAN preservation for Service Point 1 on Service 37:
service[37]>sp cvlan-preservation-mode set spid 1 mode disable
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
s-vlan cos Variable enable Select enable or disable to determine whether the
preservation disable original S-VLAN CoS value is preserved or restored
mode for frames egressing the service point.
enable - the S-VLAN CoS value of frames egressing
the service point is the same as the value when the
frame entered the service.
disable - the S-VLAN CoS value of frames egressing
the service point is set at whatever value might
have been re-assigned by the interface, service
point, or service, or whatever value results from
marking (see Configuring Marking (CLI)).
Examples
The following command enables S-VLAN CoS preservation for Service Point 1 on Service 37:
service[37]>sp svlan-cos-preservation-mode set spid 1 mode enable
The following command disables S-VLAN CoS preservation for Service Point 1 on Service 37:
service[37]>sp svlan-cos-preservation-mode set spid 1 mode disable
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
Examples
The following command assigns Service Bundle 1 to Service Point 1 in Service 37.
service[37]>sp egress-service-bundle set spid 1 service-bundle-id 1
sp-id Number 1-32 for P2P and MP services. The Service Point ID.
1-30 for MNG services.
vlan Number 1-4094 (except 4092, which is The C-VLAN at the beginning of
reserved for the default the range of the VLAN Bundle.
management service)
to-vlan Number 1-4094 (except 4092, which is The C-VLAN at the end of the
reserved for the default range of the VLAN Bundle.
management service)
Examples
The following command classifies C-VLANs 100 through 200 to Service Point 1 in Service 37:
service[37]>sp bundle cvlan attach spid 1 vlan 100 to-vlan 200
The following command removes C-VLANs 100 through 200 from Service Point 1 in Service 37:
service[37]>sp bundle cvlan remove spid 1 vlan 100 to-vlan 200
sp-id Number 1-32 for P2P and MP services. The Service Point ID.
1-30 for MNG services.
Example
The following command displays the attributes of Service Point 1 in Service 37:
service[37]>sp service-point-info show spid 1
sp-id Number 1-32 for P2P and MP services. The Service Point ID.
1-30 for MNG services.
Example
The following command deletes Service Point 10 from Service 37:
service[37]>sp delete spid 10
Setting the Maximum Size of the MAC Address Forwarding Table (CLI)
To limit the size of the MAC address forwarding table for a specific service, go to service view for the service and
enter the following command:
service[SID]>service mac-limit-value set <mac limit>
Table 155 MAC Address Forwarding Table Maximum Size CLI Parameters
Example
The following command limits the number of dynamic MAC address forwarding table entries for Service 10 to 128:
service[10]>service mac-limit-value set 128
Table 156 MAC Address Forwarding Table Aging Time CLI Parameters
time Number 15 - 3825 The global aging time for the MAC address
forwarding table, in seconds.
Example
The following command sets the global aging time to 2500 seconds:
root> ethernet service learning-ageing-time set time 2500
To delete a static MAC address from the MAC address forwarding table, go to service view for the service from
which you want to delete the MAC address and enter the following command:
service[SID]>service mac-learning-table del-static-
mac <static mac> spid <sp-id>
Table 157 Adding Static Address to MAC Address Forwarding Table CLI Parameters
Examples
The following command adds MAC address 00:11:22:33:44:55 to the MAC address forwarding table for Service 10,
and associates the MAC address with Service Point ID 1 on Service 10:
service[10]>service mac-learning-table set-static-
mac 00:11:22:33:44:55 spid 1
The following command deletes MAC address 00:11:22:33:44:55, associated with Service Point 1, from the MAC
address forwarding table for Service 10:
service[10]>service mac-learning-table del-static-
mac 00:11:22:33:44:55 spid 1
Example
To display the MAC address forwarding table for GbE 1, enter the following commands:
root> ethernet interfaces eth slot 1 port 1
Note
The ability to flush the MAC address forwarding table per-service and per-interface is planned for
future release.
To perform a global flush of the MAC address forwarding table, enter the following command:
Examples
The following command enables MAC address learning for Service Point 1 on Service 37:
service[37]>sp learning-state set spid 1 learning enable
The following command disables MAC address learning for Service Point 1 on Service 37:
service[37]>sp learning-state set spid 1 learning disable
The following parameters are configured globally for the PTP 820 switch:
• S- VLAN Ethertype – Defines the ethertype recognized by the system as the S-VLAN ethertype.
• C-VLAN Ethertype – Defines the ethertype recognized by the system as the C-VLAN ethertype. PTP 820
supports 0x8100 as the C-VLAN ethertype.
• MRU – The maximum segment size defines the maximum receive unit (MRU) capability and the maximum
transmit capability (MTU) of the system. You can configure a global MRU for the system.
Note
The MTU is determined by the receiving frame and editing operation on the frame.
This section includes:
Example
For example, the following command sets the system S-VLAN ethertype to 0x88a8:
root> ethernet generalcfg ethertype set svlan-value 0x88a8
size Number 64 to 9612 Defines the global size (in bytes) of the
Maximum Receive Unit (MRU). Frames
that are larger than the global MRU will be
discarded.
Example
For example, the following command sets the system MRU to 9612:
root> ethernet generalcfg mru set size 9612
Note
You cannot change the configuration of the Management interface. By default, the Management
interface has the following configuration:
• Auto negotiation ON
• Full Duplex
• RJ45 - 100Mbps
size Number 64 to 9612 Defines the global size (in bytes) of the
Maximum Receive Unit (MRU). Frames
that are larger than the global MRU will be
discarded.
Example
The following command enters interface view for Ethernet port 3:
root> ethernet interfaces eth slot 1 port 3
The following prompt appears:
eth type eth [1/3]>
The following command enters interface view for radio interface 2 in a PTP 820C or PTP 820C-HP unit:
root> ethernet interfaces radio slot 2 port 2
The following prompt appears:
radio [2/2]>
The following command enters interface view for the radio interface in a PTP 820S unit:
root> ethernet interfaces radio slot 2 port 1
The following prompt appears:
radio [2/1]>
The following prompt appears:
radio [16/1]>
Note
For simplicity, the examples in the following sections show the prompt for an Ethernet interface.
Examples
The following command shows the attributes of GbE 1:
eth type eth [1/1]>summary show
The following command shows the operational state of GbE 1:
eth type eth [1/1]>operational state show
media type Variable rj45 Select the physical interface layer 1 media
sfp type:
RJ45 - An electrical (RJ-45) Ethernet
interface.
SFP - An optical (SFP) Ethernet interface.
Example
The following command sets GbE 1 to RJ-45 (electrical):
eth type eth [1/2]>media-type state set rj45
The following command sets GbE 2 to SFP:
eth type eth [1/2]>media-type state set sfp
Note
To use an SFP+ interface in 10G mode, the third-party switch must be running Pause Frame Flow
Control, as defined in IEEE 802.3x. It is also recommended to configure shapers on the third-party
switch so as to limit the packet flow from the switch to the PTP 820E unit to 2.5 Gbps.
After changing the speed of an SFP+ interface to or from 10000fd, you must reset the unit in order for
the change to take effect.
10HD is not supported in the current release.
Examples
The following command sets GbE 1 to 100 Mbps, full duplex:
eth type eth [1/1]>speed-and-duplex state set '100fd'
Note
Before performing this command, you must verify that the media-type attribute is set to RJ45.
Example
The following command enables auto negotiation for GbE 2:
eth type eth [1/2]>autoneg state set on
Example
The following command sets the ifg for GbE 1 to 12:
Example
The following command sets the preamble for GbE 1 to 8:
eth type eth [1/1]>preamble set 8
The following command displays the current preamble for GbE 1:
eth type eth [1/1]>preamble get
Example
The following command adds the description “Line” to GbE 1:
eth type eth [1/1]>description set Line
clear-on-read Boolean yes If you enter yes, the statistics are cleared
no once you display them.
Example
The following commands enter interface view for GbE 1, and clear the statistics after displaying them.
root> ethernet interfaces eth slot 1 port 1
eth type eth [1/1]>rmon statistics show clear-on-read yes layer-1 yes
The following commands enter interface view for radio carrier 1 in a PTP 820C, PTP 820C-HP or PTP 820S unit, and
display statistics for the interface, without clearing the statistics.
root> ethernet interfaces radio slot 2 port 1
Automatic state propagation enables propagation of radio failures back to the Ethernet port. You can also
configure Automatic State Propagation to close the Ethernet port based on a radio failure at the remote carrier.
Automatic state propagation is configured as pairs of interfaces. Each interface pair includes one Monitored
Interface and one Controlled Interface.
Automatic state propagation is configured as pairs of interfaces. Each interface pair includes one Monitored
Interface and one Controlled Interface. You can create multiple pairs using the same Monitored Interface and
multiple Controlled Interfaces.
Note
A radio interface that belongs to a LAG group cannot be used as a monitored interface.
The Monitored Interface is a radio interface, a radio protection, or Multi-Carrier ABC group. The Controlled
Interface is an Ethernet interface or LAG. An Ethernet interface can only be assigned to one Monitored interface.
Each Controlled Interface is assigned an LLF ID. If ASP trigger by remote fault is enabled on the remote side of the
link, the ASP state of the Controlled Interface is propagated to the Controlled Interface with the same LLF ID at the
remote side of the link. This means if ASP is triggered locally, it is propagated to the remote side of the link, but
only to Controlled Interfaces with LLF IDs that match the LLF IDs of the affected Controlled Interfaces on the local
side of the link.
Note
LLF requires an activation key. Without this activation key, only LLF ID 1 is available. See Configuring
the Activation Key (CLI).
The Controlled Interface remains closed or muted until all triggering events are cleared.
In addition, when a local triggering event takes place, the ASP mechanism sends an indication to the remote side of
the link. Even when no triggering event has taken place, the ASP mechanism sends periodic update messages
indicating that no triggering event has taken place.
A trigger delay time can be configured, so that when a triggering event takes place, the ASP mechanism does not
propagate the event until this delay time has elapsed. A trigger delay from 0 to 10,000 ms can be set per LLD ID.
Note
It is recommended to configure both ends of the link to the same Automatic State Propagation
configuration.
To configure propagation of a radio interface failure to an Ethernet port, use the following command:
root> auto-state-propagation add eth-port-to-radio eth-slot <eth-slot>
eth-port <eth-port> radio-slot <radio-slot> radio-port <radio-port> llf-
id <llf-id>
To configure propagation of a Multi-Carrier ABC group failure to an Ethernet port, use the following command:
root> auto-state-propagation add eth-port-to-multi-radio-group eth-slot
<eth-slot> eth-port <eth-port> multi-radio-group <multi-radio-group> slot
1 type TCC llf-id <llf-id>
To configure propagation of an HSB-SD protection group failure to an Ethernet port, use the following command:
root> auto-state-propagation add eth-port-to-protection-group eth-slot
<eth-slot> eth-port <eth-port> protection-group <protection-group> llf-id
<llf-id>
To enable automatic state propagation on an Ethernet port, determine whether remote interface failures are also
propagated, enable CSF mode (optional), and set a trigger delay (optional), use the following command:
root> auto-state-propagation configure eth-port eth-slot <eth-slot> eth-
port <eth-port> asp-admin <asp-admin> remote-fault-trigger-admin <remote-
fault-trigger-admin> csf-mode-admin <csf-mode-admin> trigger-delay
<trigger-delay> llf-id <llf-id>
Note
In this command, the llf-id command is used optionally to change the LLF ID of the Ethernet port.
To delete automatic state propagation on an Ethernet port, use the following command:
root> auto-state-propagation delete eth-port eth-slot <eth-slot> eth-port
<eth-port>
To display all automatic state propagation configurations on the unit, use the following command:
root> auto-state-propagation show-config all
To display the automatic state propagation configuration for a specific Ethernet port, use the following command:
root> auto-state-propagation show-config eth-port eth-slot <eth-slot>
eth-port <eth-port>
radio-slot Number 2
The following commands configure and enable automatic state propagation to propagate faults from radio
interface 1 to Ethernet ports 1 and 2, and from radio interface 2 to Ethernet port 3. ASP Management Safe mode is
disabled. Faults on the remote carrier are propagated to the local Ethernet ports as follows:
• A failure on the remote side of the link with radio interface 1 is propagated to any of local Ethernet ports 1 or
2 that share an LLF ID with an Ethernet interface in an ASP pair with the remote radio.
• A failure on the remote side of the link with radio interface 2 is propagated to Ethernet port 3 if it shares an
LLF ID with an Ethernet interface in an ASP pair with the remote radio.
• The trigger delay for Ethernet port 1 is 100 ms. The trigger delay for Ethernet port 2 is 5000 ms. There is no
trigger delay for Ethernet port 3.
root> auto-state-propagation add eth-port-to-radio eth-slot 1 eth-port 1
radio-slot 2 radio-port 1 llf-id 1
When ASP Management Safe mode (CSF) is configured, the peer unit must be configured to receive
CSF PDUs. To enable the unit to receive CSF PDUs, enter the following command in root view:
CSF receive must be enabled in order for G.8032 ERPI topology changes to be initiated upon receipt
of a CSF PDU.
To disable this setting, enter the following command
PTP 820 stores and displays statistics in accordance with RMON and RMON2 standards. You can display various
peak TX and RX rates (per seconds) and average TX and RX rates (per seconds), both in bytes and in packets, for
each measured time interval. You can also display the number of seconds in the interval during which TX and RX
rates exceeded the configured threshold.
This section includes:
• Displaying RMON Statistics (CLI)
• Configuring Ethernet Port PMs and PM Thresholds (CLI)
• Displaying Ethernet Port PMs (CLI)
• Clearing Ethernet Port PMs (CLI)
clear-on-read Boolean yes If you enter yes, the statistics are cleared
no once you display them.
The following commands bring you to interface view for Ethernet port 1, and clears the statistics after displaying
them.
root> ethernet interfaces eth slot 1 port 1
eth type eth [1/1]>rmon statistics show clear-on-read yes layer-1 yes
The following commands bring you to interface view for radio interface 2, without clearing the statistics.
root> ethernet interfaces radio slot 2 port 1
The following commands bring you to interface view for Ethernet port 1, enable PM gathering, and set the
thresholds for RX and TX PMs at 850,000,000 bytes per second:
root> ethernet interfaces eth slot 1 port 1
To display RX packet PMs in 15-minute intervals, go to interface view for the interface and enter the following
command:
eth type eth [x/x]> pm show rx-packets interval 15min
To display RX packet PMs in 24-hour intervals, go to interface view for the interface and enter the following
command:
Parameter Definition
Interval For 24-hour intervals, displays the date of the interval. For 15-minute
intervals, displays the date and ending time of the interval.
Invalid data flag Indicates whether the values received during the measured interval are
valid. An x in the column indicates that the values are not valid (for
example, because of a power surge or power failure that occurred
during the interval).
Peak RX Packets The peak rate of RX packets per second for the measured time interval.
Average RX Packets The average rate of RX packets per second for the measured time
interval.
Peak RX Broadcast Packets The peak rate of RX broadcast packets per second for the measured
time interval.
Average RX Broadcast The average rate of RX broadcast packets per second for the measured
Packets time interval.
Peak RX Multicast Packets The peak rate of RX multicast packets per second for the measured time
interval.
Average RX Multicast The average rate of RX multicast packets per second for the measured
Packets time interval.
Peak RX Bytes in Layer1 The peak RX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
Parameter Definition
Average RX Bytes in The average RX rate, in bytes per second, for the measured time
Layer1 interval (including preamble and IFG).
RX Bytes Layer1 Exceed The number of seconds during the measured time interval that the RX
Threshold (sec) rate exceeded the configured threshold.
Peak RX Bytes in Layer2 The peak RX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
Average RX Bytes in The average RX rate, in bytes per second, for the measured time
Layer2 interval (excluding preamble and IFG).
Peak TX Packets The peak rate of TX packets per second for the measured time interval.
Average TX Packets The average rate of TX packets per second for the measured time
interval.
Peak TX Broadcast Packets The peak rate of TX broadcast packets per second for the measured
time interval.
Average TX Broadcast The average rate of TX broadcast packets per second for the measured
Packets time interval.
Peak TX Multicast Packets The peak rate of TX multicast packets per second for the measured time
interval.
Average TX Multicast The average rate of TX multicast packets per second for the measured
Packets time interval.
Peak TX Bytes in Layer1 The peak TX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
Average TX Bytes in Layer1 The average TX rate, in bytes per second, for the measured time interval
(including preamble and IFG).
TX Bytes Layer1 Exceed The number of seconds during the measured time interval that the TX
Threshold (sec) rate exceeded the configured threshold.
Peak TX Bytes in Layer2 The peak TX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
Average TX Bytes in Layer2 The average TX rate, in bytes per second, for the measured time interval
(excluding preamble and IFG).
For example, if the frame is an untagged IP Ethernet frame, a match will not be found until the third priority level
(DSCP). The CoS and Color values defined for the frame’s DSCP value will be applied to the frame.
You can disable some of these classification methods by configuring them as un-trusted. For example, if 802.1p
classification is configured as un-trusted for a specific interface, the classification mechanism does not perform
classification by UP bits. This is useful, for example, if classification is based on DSCP priority bits.
If no match is found at the logical interface level, the default CoS is applied to incoming frames at this level. In this
case, the Color of the frame is assumed to be Green.
Classification may also be performed by Destination MAC Address (MAC DA) at the service point level. When MAC DA
classification is enabled on a service point, the classification mechanism checks each frame ingressing the interface on
which the service point is defined against a list of user-defined MAC DAs. If there is a match, the mechanism applies
to the frame the CoS and Color defined for that MAC DA. Classification by MAC DA overrides the other classification
criteria at the service point level.
Examples
The following command configures the classification mechanism on GbE 1 to override the CoS and Color values of
frames with S-VLAN ID 10 and C-VLAN ID 30 with a CoS value of 6 and a Color value of Green:
eth type eth [1/1]>vlan-cos-override set outer-vlan-id 10 inner-vlan-id 30
use-cos 6 use-color green
The following command configures the classification mechanism on GbE 2 to override the CoS and Color values of
frames with VLAN ID 20 with a CoS value of 5 and a Color value of Green:
eth type eth [1/2]>vlan-cos-override set outer-vlan-id 20 use-cos 5 use-
color green
The following command displays the CoS and Color override values for frames that ingress on GbE 1, with S-VLAN ID
10 and C-VLAN ID 20:
eth type eth [1/1]>vlan-cos-override show outer-vlan-id 10 inner-vlan-id 20
The following command displays all CoS and Color override values for frames that ingress on GbE 2:
eth type eth [1/2]>vlan-cos-override show all
The following command deletes the VLAN to CoS and Color override mapping for frames that ingress on GbE 1, with
S-VLAN ID 10 and C-VLAN ID 20:
eth type eth [1/1]>vlan-cos-override delete outer-vlan-id 10 inner-vlan-id
20
802.1p Variable trust Enter the interface's trust mode for user priority
un-trust (UP) bits:
trust – The interface performs QoS and color
classification according to UP and CFI/DEI bits
according to user-configurable tables for 802.1q
UP bits (C-VLAN frames) or 802.1AD UP bits (S-
VLAN frames). VLAN UP bit classification has
priority over DSCP and MPLS classification, so
that if a match is found with the UP bit of the
ingressing frame, DSCP values and MPLS bits are
not considered.
un-trust – The interface does not consider
802.1 UP bits during classification.
Examples
The following command enables 802.1p trust mode for GbE 1:
eth type eth [1/1]>classification set 802.1p trust
The following command disables 802.1p trust mode for GbE 1:
eth type eth [1/1]>classification set 802.1p un-trust
Modifying the C-VLAN 802.1 UP and CFI Bit Classification Table (CLI)
The following table shows the default values for the C-VLAN 802.1 UP and CFI bit classification table.
Table 175 C-VLAN 802.1 UP and CFI Bit Classification Table Default Values
0 0 0 Green
0 1 0 Yellow
1 0 1 Green
1 1 1 Yellow
2 0 2 Green
2 1 2 Yellow
3 0 3 Green
3 1 3 Yellow
4 0 4 Green
4 1 4 Yellow
5 0 5 Green
5 1 5 Yellow
6 0 6 Green
6 1 6 Yellow
7 0 7 Green
7 1 7 Yellow
To modify the C-VLAN 802.1 UP and CFI bit classification table, enter the following command:
root> ethernet qos 802.1q-up-bits-mapping-tbl set 802.1p <802.1p> cfi <cfi>
cos <cos> color <color>
To display the C-VLAN 802.1 UP and CFI bit classification table, enter the following command:
root> ethernet qos 802.1q-up-bits-mapping-tbl show
Table 176 C-VLAN 802.1 UP and CFI Bit Classification Table CLI Parameters
cos Number 0–7 The CoS assigned to frames with the designated
UP and CFI.
color Variable green The Color assigned to frames with the designated
yellow UP and CFI.
Examples
The following command maps frames with an 802.1p UP bit value of 1 and a CFI bit value of 0 to CoS 1 and Green
color:
root> ethernet qos 802.1q-up-bits-mapping-tbl set 802.1p 1 cfi 0 cos 1
color green
Modifying the S-VLAN 802.1 UP and DEI Bit Classification Table (CLI)
The following table shows the default values for the S-VLAN 802.1 UP and DEI bit classification table.
Table 177 S-VLAN 802.1 UP and DEI Bit Classification Table Default Values
0 0 0 Green
0 1 0 Yellow
1 0 1 Green
1 1 1 Yellow
2 0 2 Green
2 1 2 Yellow
3 0 3 Green
3 1 3 Yellow
4 0 4 Green
4 1 4 Yellow
5 0 5 Green
5 1 5 Yellow
6 0 6 Green
6 1 6 Yellow
7 0 7 Green
7 1 7 Yellow
To modify the S-VLAN 802.1 UP and DEI bit classification table, enter the following command:
root> ethernet qos 802.1ad-up-bits-mapping-tbl set 802.1p <802.1p> dei
<dei> cos <cos> color <color>
To display the S-VLAN 802.1 UP and CFI bit classification table, enter the following command:
root> ethernet qos 802.1ad-up-bits-mapping-tbl show
Table 178 S-VLAN 802.1 UP and DEI Bit Classification Table CLI Parameters
cos Number 0–7 The CoS assigned to frames with the designated
UP and CFI.
color Variable green The Color assigned to frames with the designated
yellow UP and CFI.
Example
The following command maps frames with an 802.1ad UP bit value of 7 and a DEI bit value of 0 to CoS 7 and Green
color:
root> ethernet qos 802.1ad-up-bits-mapping-tbl set 802.1p 7 dei 0 cos 7
color green
Phn 3963 013v000
Page 746
Chapter 18: Quality of Service (QoS) (CLI) Configuring Classification (CLI)
ip-dscp Variable trust Select the interface's trust mode for DSCP
un-trust classification:
trust – The interface performs QoS and color
classification according to a user-configurable
table for DSCP to CoS and color classification.
DSCP classification has priority over MPLS
classification, so that if a match is found with the
DSCP value of the ingressing frame, MPLS bits are
not considered.
un-trust – The interface does not consider
DSCP during classification.
Examples
The following command enables DSCP trust mode for GbE 1:
eth type eth [1/1]>classification set ip-dscp trust
The following command disables DSCP trust mode for GbE 1:
eth type eth [1/1]>classification set ip-dscp un-trust
46 101110 EF 7 Green
Example
The following command maps frames with DSCP value of 10 to CoS 1 and Green color:
root> ethernet qos dscp-mapping-tbl set dscp 10 cos 1 color green
mpls Variable Trust Select the interface's trust mode for MPLS
un-trust bits:
trust – The interface performs QoS and
color classification according to a user-
configurable table for MPLS EXP to CoS
and color classification.
un-trust – The interface does not
consider MPLS bits during classification.
Examples
The following command enables MPLS trust mode for GbE 1:
eth type eth [1/1]>classification set mpls trust
The following command disables MPLS trust mode for GbE 1:
eth type eth [1/1]>classification set mpls un-trust
0 0 Yellow
1 1 Green
2 2 Yellow
3 3 Green
4 4 Yellow
5 5 Green
6 6 Green
7 7 Green
To modify the MPLS EXP bit classification table, enter the following command:
root> ethernet qos mpls-exp-bits-mapping-tbl set mpls-exp <mpls-exp> cos
<cos> color <color>
To display the MPLS EXP bit classification table, enter the following command:
root> ethernet qos mpls-mapping-tbl show
Table 184 MPLS EXP Bit Classification Table Modification CLI Parameters
Example
The following command maps frames with MPLS EXP bit value of 4 to CoS 4 and Yellow color:
root> ethernet qos mpls-exp-bits-mapping-tbl set mpls-exp 4 cos 4 color
yellow
To edit an entry to the MAC DA classification table, enter the following command in root view:
To delete an entry to the MAC DA classification table, enter the following command in root view:
To define a default CoS value for an interface, go to interface view for the interface and enter the following
command:
eth type eth [x/x]>classification set default-cos <default-cos>
To display the default CoS value for an interface, go to interface view for the interface and enter the following
command:
eth type eth [x/x]>classification show default-cos
default-cos Number 0–7 Enter the default CoS value for frames
passing through the interface. This value
can be overwritten on the service point
and service level.
Example
The following command sets the default CoS for GbE 1 as 7:
eth type eth [1/1]>classification set default-cos 7
Note
Policing on the service point level, and the service point and CoS level, is planned for future release.
The PTP 820's policer mechanism is based on a dual leaky bucket mechanism (TrTCM). The policers can change a
frame’s color and CoS settings based on CIR/EIR + CBS/EBS, which makes the policer mechanism a key tool for
implementing bandwidth profiles and enabling operators to meet strict SLA requirements.
The output of the policers is a suggested color for the inspected frame. Based on this color, the queue management
mechanism decides whether to drop the frame or to pass it to the queue.
cbs Number 0 - 8192 The Committed Burst Rate (CBR) for the
rate meter (policer), in Kbytes.
eir Number 0, or 64,000 - The Excess Information Rate (EIR) for the
1,000,000,000 rate meter (policer), in bits per second.
If the value is 0, all incoming EIR traffic is
dropped.
ebs Number 0 - 8192 The Excess Burst Rate (EBR) for the rate
meter (policer), in Kbytes.
Examples
The following command creates a rate meter (policer) profile with Profile ID 50, named “64k.”
root> ethernet qos rate-meter add profile-id 50 cir 64000 cbs 5 eir 64000
ebs 5 color-mode color-blind coupling-flag disable rate-meter-profile-name
64k
This profile includes the following parameters:
• CIR – 64,000 bps
• CBS – 5 Kbytes
• EIR – 64,000 bps
Phn 3963 013v000
Page 755
Chapter 18: Quality of Service (QoS) (CLI) Configuring Policers (Rate Metering) (CLI)
• EBS – 5 Kbytes
• Color Blind mode
• Coupling Flag disabled
The following command edits the rate meter (policer) profile with Profile ID 50, and changes its name to
“256 kBytes.”
root> ethernet qos rate-meter edit profile-id 50 cir 128000 cbs 5 eir
128000 ebs 5 color-mode color-aware coupling-flag enable rate-meter-
profile-name 256 kBytes
This edited profile includes the following parameters:
• CIR – 128,000 bps
• CBS – 5 Kbytes
• EIR – 128,000 bps
• EBS – 5 Kbytes
• Color Aware mode
• Coupling Flag enabled
Example
The following command displays the parameters of Rate Meter Profile 50:
root> ethernet qos rate-meter show profile-id 50
Example
The following command deletes Rate Meter Profile 50:
root> ethernet qos rate-meter delete profile-id 50
Table 187 Assigning Rate Meter for Unicast Traffic CLI Parameters
Examples
The following command assigns Rate Meter Profile 1 to unicast traffic on GbE 1, and enables rate metering on the
port:
eth type eth [1/1]>rate-meter unicast add capability admin-state enable
profile-id 1
The following command changes the rate meter (policer) profile for unicast traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter unicast edit admin-state enable profile-id 4
Table 188 Assigning Rate Meter for Multicast Traffic CLI Parameters
Examples
The following command assigns Rate Meter Profile 1 to multicast traffic on GbE 1, and enables rate metering on the
port.
eth type eth [1/1]>rate-meter multicast add capability admin-state enable
profile-id 1
The following command changes the rate meter (policer) profile for multicast traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter multicast edit admin-state enable profile-id
4
Table 189 Assigning Rate Meter for Broadcast Traffic CLI Parameters
Examples
The following command assigns Profile 1 to broadcast traffic on GbE 1, and enables rate metering on the port.
eth type eth [1/1]>rate-meter broadcast add capability admin-state enable
profile-id 1
The following command changes the rate meter (policer) profile for broadcast traffic on GbE 1 to 4:
eth type eth [1/1]>rate-meter broadcast edit admin-state enable profile-id
4
Examples
The following commands assign Rate Meter Profiles 1, 2, and 3 to Ethertypes 0x8000, 0x8100, and 0x9100,
respectively, on GbE 1, and enable rate metering on the port.
eth type eth [1/1]>rate-meter ethertype1 add capability ethertype-value
0x8000 admin-state enable profile-id 1
To change the rate meter (policer) profile for a service point, go to service view for the service and
enter the following command:
The current rate meter (policer) profile for a service point and CoS, go to service view for the
service and enter the following command:
To delete the rate meter (policer) profile for a service point or service point/CoS combination, go to service
view for the service and enter the following command:
service[x]>sp rate-meter delete spid <spid>
Table 191: Assigning Rate Meter for Service Point and Service Point/CoS CLI Parameters
sp-id Number 1-32 for P2P and The Service Point ID.
MP services.
1-30 for MNG
services.
admin-state Variable enable Enables or disables rate metering on unicast
disable traffic flows from the logical interface.
profile-id Number 1 – 250 Select from the rate meter profiles defined in the
system.
cos Number 0–7 The CoS value to which you are assigning the rate
meter.
The following commands assign Rate Meter Profile 2 to service point 10 on service 5:
Table 192 Assigning Line Compensation Value for Rate Meter CLI Parameters
Example
The following command sets the line compensation value for policers attached to GbE 1 to 20:
eth type eth [1/1]>rate-meter-compensation-value set 20
• Green Bytes
• Yellow Frames
• Yellow Bytes
• Red Frames
• Red Bytes
Note
Rate meter (policer) counters are displayed in granularity of 64 bits.
The following commands display rate meter counters for the available frame types and Ethertypes:
eth type eth [x/x]>rate-meter unicast show statistics clear-on-read <clear-
on-read> layer-1 <layer-1>
clear-on-read Boolean yes If you enter yes, the statistics are cleared once you
no display them.
Example
The following commands display rate meter counters for GbE 1, for each of the available frame types and Ethertypes.
These commands clear the counters after displaying them.
eth type eth [1/1]>rate-meter unicast show statistics clear-on-read yes
layer-1 no
Note
The calculated color is sent to the queue manager regardless of whether the marking bit is set.
sp-id Number 1-32 for P2P and MP The Service Point ID.
services.
1-30 for MNG
services.
Examples
The following command enables marking mode on Service Point 3 on Service 2:
service[2]>sp marking set spid 3 mode enable
The following command disables marking mode on Service Point 3 on Service 2:
service[2]>sp marking set spid 3 mode disable
0 Green 0 0
0 Yellow 0 1
1 Green 1 0
1 Yellow 1 1
2 Green 2 0
2 Yellow 2 1
3 Green 3 0
3 Yellow 3 1
4 Green 4 0
4 Yellow 4 1
5 Green 5 0
5 Yellow 5 1
6 Green 6 0
6 Yellow 6 1
7 Green 7 0
7 Yellow 7 1
To modify the 802.1q CoS and Color to UP and CFI bit mapping table, enter the following command in root view:
root> ethernet qos 802.1q-up-bits-marking-tbl set cos <cos> color <color>
802.1p <802.1p> cfi <cfi>
To display the 802.1q CoS and Color to UP and CFI bit mapping table, enter the following command in root view:
root> ethernet qos 802.1q-up-bits-marking-tbl show
Table 196 802.1q CoS and Color to UP and CFI Bit Mapping Table CLI Parameters
Example
The following command maps CoS 0, Green, to 802.1p UP bit 0, and CFI bit 0:
root> ethernet qos 802.1q-up-bits-marking-tbl set cos 0 color green 802.1p
0 cfi 0
0 Green 0 0
0 Yellow 0 1
1 Green 1 0
1 Yellow 1 1
2 Green 2 0
2 Yellow 2 1
3 Green 3 0
3 Yellow 3 1
4 Green 4 0
4 Yellow 4 1
5 Green 5 0
5 Yellow 5 1
6 Green 6 0
6 Yellow 6 1
7 Green 7 0
7 Yellow 7 1
To modify the 802.1ad CoS and Color to UP and DEI bit mapping table, enter the following command in root view:
root> ethernet qos 802.1ad-up-bits-marking-tbl set cos <cos> color <color>
802.1p <802.1p> dei <dei>
To display the 802.1q CoS and Color to UP and CFI bit mapping table, enter the following command in root view:
Example
The following command marks CoS 5, Yellow, to 802.1p UP bit 5, and DEI bit 1:
root> ethernet qos 802.1ad-up-bits-marking-tbl set cos 5 color yellow
802.1p 5 dei 1
You cannot delete a WRED profile that is assigned to a queue. You must first remove the WRED profile from the
queue by replacing it with a different WRED profile. You can then delete the WRED profile.
Note
Each queue always has a WRED profile assigned to it. By default, WRED Profile 31 is assigned to every
queue until a different profile is assigned.
Examples
The following command adds a WRED profile.
root> ethernet qos wred-profile-tbl add profile-id 2 green-min-threshold
8000 green-max-threshold 8000 green-max-drop 100 yellow-min-threshold 8000
yellow-max-threshold 8000 yellow-max-drop 100
The new profile has the following parameters:
• profile-id – 2
• green-min-threshold – 8000 Kbytes
• green-max-threshold – 8000 Kbytes
• green-max-drop – 100%
Examples
The following command assigns WRED Profile 2 to the CoS 0 queue in Service Bundle 1, on GbE 1:
eth type eth [1/1]> wred set service-bundle-id 1 cos 0 profile-id 2
The following command displays the WRED profile assigned to the CoS 0 queue in Service Bundle 1, on GbE 1:
eth type eth [1/1]> wred show profile-id service-bundle-id 1 cos 0
Note
Single leaky bucket shaping on the interface level is planned for future release.
You can configure up to 32 single leaky bucket queue shaper profiles. The CIR value can be set to the following values:
• 16,000 – 32,000,000 bps – granularity of 16,000 bps
• 32,000,000 – 131,008,000 bps – granularity of 64,000 bps
Note
You can enter any value within the permitted range. Based on the value you enter, the software
automatically rounds off the setting according to the granularity. If you enter a value below the
lowest granular value (except 0), the software adjusts the setting to the minimum.
You can attach one of the configured queue shaper profiles to each priority queue. If no profile is attached to the
queue, no egress shaping is performed on that queue.
This section includes:
• Configuring Queue Shaper Profiles (CLI)
• Attaching a Shaper Profile to a Queue (CLI)
Note
The burst-type parameter is reserved for future use. However, you must enter this parameter in
order for the command to execute.
To display the parameters of a queue shaper profile, enter the following command in root view:
root> ethernet qos queue-shaper-profile-tbl show profile-id <profile-id>
To delete a queue shaper profile, enter the following command in root view:
root> ethernet qos queue-shaper-profile-tbl delete profile-id <profile id>
You cannot delete a queue shaper profile if it is attached to a queue. You must first remove the profile from the
queue. You can then delete the profile.
Examples
The following command creates Queue Shaper 1, named “p1”, with a CIR value of 16000 bps.
root> ethernet qos queue-shaper-profile-tbl add profile-id 1 cir 16000
shaper-profile-name p1
The following command changes the CIR value of the profile created above from 16000 to 32000, and changes the
profile name to p3.
root> ethernet qos queue-shaper-profile-tbl edit profile-id 1 cir 32000
shaper-profile-name p3 burst-type short
Examples
The following command adds Queue Shaper Profile 5 to queues with CoS 0, on Service Bundle 1, on GbE 1, and
enables shaping on these queues.
eth type eth [1/1]> queue-shaper add capability service-bundle-id 1 cos 0
admin-state enable profile-id 5
The following command changes the Queue Shaper Profile assigned in the previous command to Queue Shaper
Profile 2:
eth type eth [1/1]> queue-shaper edit service-bundle-id 1 cos 0 admin-state
enable profile-id 2
Note
You can enter any value within the permitted range. Based on the value you enter, the software
automatically rounds off the setting according to the granularity. If you enter a value below the
lowest granular value (except 0), the software adjusts the setting to the minimum.
You can attach one of the configured service bundle shaper profiles to each service bundle. If no profile is attached to
the service bundle, no egress shaping is performed on that service bundle.
This section includes:
• Configuring Service Bundle Shaper Profiles (CLI)
• Attaching a Shaper Profile to a Service Bundle (CLI)
pir Number 16000 - 1000000000 The Peak Information Rate (PIR) assigned
to the profile (in bps).
The following command creates Service Bundle Shaper 1, named “p1”, with a CIR value of 100000000 bps and a PIR
value of 200000000 bps:
root> ethernet qos service-bundle-shaper-profile-tbl add profile-id 1 cir
100000000 pir 200000000 shaper-profile-name p1
The following command changes the CIR value in the Service Bundle Shaper created above from 100000000 bps to
110000000 bps:
root> ethernet qos service-bundle-shaper-profile-tbl edit profile-id 1 cir
110000000 pir 200000000 shaper-profile-name p1
Examples
The following command adds Service Bundle Shaper Profile 5 to Service Bundle 1, on GbE 1, and enables shaping on
this service bundle.
eth type eth [1/1]> service-bundle-shaper add capability service-bundle-id
1 admin-state enable profile-id 5
The following command changes the Service Bundle Shaper Profile assigned in the previous command to Service
Bundle 1, from 5 to 4:
eth type eth [1/1]> service-bundle-shaper edit service-bundle-id 1 admin-
state enable profile-id 4
value Number 0 – 26 (even numbers Shapers attached to the interface use this
only) value to compensate for Layer 1 non-
effective traffic bytes on egress.
Example
The following command sets the egress line compensation value to 0 on GbE 1:
eth type eth [1/1]>shaping-compensation-value set 0
Profile ID (1-9)
0 1 1 Best Effort
1 2 1 Data Service 4
2 2 1 Data Service 3
3 2 1 Data Service 2
4 2 1 Data Service 1
When the service bundle state is Green (committed state), the service bundle priorities are as defined in the Green
Priority column. When the service bundle state is Yellow (best effort state), the service bundle priorities are system-
defined priorities shown in the Yellow Priority column.
Note
CoS 7 is always marked with the highest priority and cannot be changed or edited, no matter what
the service bundle state is, since it is assumed that only high priority traffic will be tunneled via CoS
7.
The system supports up to nine interface priority profiles. Profiles 1 to 8 are defined by the user, while profile 9 is the
pre-defined read-only default interface priority profile.
To display the parameters of an interface priority profile, enter the following command in root view:
root> ethernet qos port-priority-profile-tbl show profile-id <profile-id>
To delete an interface priority profile, enter the following command in root view:
root> ethernet qos port-priority-profile-tbl delete profile-id <profile-id>
You can only delete an interface priority profile if the profile is not attached to any interface.
Parameter Permitted
Input Type Values Description
cos0-priority Number 1–4 The Green priority for the CoS 0 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 0 egressing the service
bundle to which the profile is assigned.
cos1-priority Number 1–4 The Green priority for the CoS 1 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 1 egressing the service
bundle to which the profile is assigned.
cos2-priority Number 1–4 The Green priority for the CoS 2 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 2 egressing the service
bundle to which the profile is assigned.
cos3-priority Number 1–4 The Green priority for the CoS 3 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 3 egressing the service
bundle to which the profile is assigned.
cos4-priority Number 1–4 The Green priority for the CoS 4 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 4 egressing the service
bundle to which the profile is assigned.
cos5-priority Number 1–4 The Green priority for the CoS 5 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 5 egressing the service
bundle to which the profile is assigned.
cos6-priority Number 1–4 The Green priority for the CoS 6 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 6 egressing the service
bundle to which the profile is assigned.
Parameter Permitted
Input Type Values Description
cos7-priority Number 1–4 The Green priority for the CoS 7 queue, from 4
(highest) to 1 (lowest). This priority is applied to
Green frames with CoS 7 egressing the service
bundle to which the profile is assigned.
Example
The following command configures a priority profile with Profile ID 1.
root> ethernet qos port-priority-profile-tbl add profile-id 1 cos0-priority
1 description c0_p1 cos1-priority 1 description c1_p1 cos2-priority 1
description c2_p1 cos3-priority 2 description c3_p2 cos4-priority 2
description c4_p2 cos5-priority 3 description c5_p3 cos6-priority 4
description c6_p4 cos7-priority 4 description c7_p4
This profile has the parameters listed in the following table.
0 1 1 c0_p1
1 1 1 c1_p1
2 1 1 c2_p1
3 2 1 c3_p2
4 2 1 c4_p2
5 3 1 c5_p3
6 4 1 c6_p4
7 4 4 c7_p4
The following command edits the profile you created in the previous command so that CoS 6 queues have a Green
priority of 3 instead of 4, and a description of “c6_p3”.
root> ethernet qos port-priority-profile-tbl edit profile-id 1 cos0-
priority 1 description c0_p1 cos1-priority 1 description c1_p1 cos2-
priority 1 description c2_p1 cos3-priority 2 description c3_p2 cos4-
priority 2 description c4_p2 cos5-priority 3 description c5_p3 cos6-
priority 3 description c6_p3 cos7-priority 4 description c7_p4
Parameter Permitted
Input Type Values Description
Examples
The following command attaches Interface Priority Profile 3 to GbE 1:
eth type eth [1/1]> priority set profile-id 3
The following is a sample output from the port-priority show profile-id command:
eth type eth [1/1]>port-priority show profile-id
Profile ID: 9
0 1 1 best effort
1 2 1 data service
2 2 1 data service
3 2 1 data service
4 2 1 data service
5 3 1 real time
6 3 1 real time
7 4 4 management
Profile ID (1-7)
0 20 20
1 20 20
2 20 20
3 20 20
4 20 20
5 20 20
6 20 20
7 20 20
You can attach one of the configured interface WFQ profiles to each interface. By default, the interface is assigned
Profile ID 1, the pre-defined system profile.
Parameter Permitted
Input Type Values Description
Parameter Permitted
Input Type Values Description
cos1- weight Number 1 - 20 The relative weight for the CoS 1 queue.
cos2- weight Number 1 - 20 The relative weight for the CoS 2 queue.
cos3- weight Number 1 - 20 The relative weight for the CoS 3 queue.
cos4- weight Number 1 - 20 The relative weight for the CoS 4 queue.
cos5- weight Number 1 - 20 The relative weight for the CoS 5 queue.
cos6- weight Number 1 - 20 The relative weight for the CoS 6 queue.
cos7- weight Number 1 - 20 The relative weight for the CoS 7 queue.
Examples
The following command configures a WFQ profile with Profile ID 2.
root> ethernet qos wfq-weight-profile-tbl add profile-id 2 cos0-weight 15
cos1-weight 15 cos2-weight 15 cos3-weight 15 cos4-weight 15 cos5-weight 15
cos6-weight 15 cos7-weight 20
This profile has the parameters listed in the following table. Note that the yellow queue weight is constant and
cannot be changed. This means that all best effort traffic (yellow) will always have the same weight, regardless of
CoS.
0 15 20
1 20 20
2 20 20
3 20 20
4 20 20
5 20 20
6 20 20
7 20 20
The following command edits the profile you created in the previous command so that CoS 6 queues have a weight of
20 instead of 15:
root> ethernet qos wfq-weight-profile-tbl edit profile-id 2 cos0-weight 15
cos1-weight 15 cos2-weight 15 cos3-weight 15 cos4-weight 15 cos5-weight 15
cos6-weight 20 cos7-weight 20
Parameter Permitted
Input Type Values Description
profile-id Number 1–6 Enter the ID of one of the configured WFQ profiles.
Examples
The following command assigns WFQ Profile 3 to GbE 1:
eth type eth [1/1]> port-wfq set profile-id 3
The following is a sample display for the port-wfq show profile-id command:
eth type eth [1/1]>port-wfq show profile-id
Profile ID: 1
0 20
1 20
2 20
3 20
4 20
5 20
6 20
7 20
PTP 820 collects egress PMs at the queue level and the service bundle level.
Parameter Permitted
Input Type Values Description
service- Number 1 – 63 The service bundle for which you want to display
bundle-id Note: In the PMs.
current
release, only
Service
Bundle 1 is
supported.
cos Number 0-7 The queue for which you want to display PMs.
clear-on-read Boolean yes If you enter yes, the statistics are cleared once you
no display them.
The following command displays PMs for the CoS 0 queue in Service Bundle 1, on GbE 2. The PMs are cleared after
they are displayed.
eth type eth [1/2]> tm-queue show statistics service-bundle-id 1 cos 0
clear-on-read yes layer-1 yes
The following command clears PMs for all queues in Service Bundle 1, on GbE 2.
eth type eth [1/2]> tm-queue clear statistics service-bundle-id 1
To display whether any service bundles are configured on an interface, enter the following command in
interface view:
eth type eth [x/x]> eth type eth [1/2]>pm tm-queue show
configuration all
If a service bundle has been configured and enabled, the following output is displayed:
If a service bundle has been configured but it’s Admin status is disabled, the
following output is displayed:
To change the Admin state of a service bundle, enter the following command in interface view:
To display the threshold settings for a service bundle, enter the following command in interface view:
For example:
eth type eth [x/x]> pm tm-queue set service-bundle-id <1-6> cos <0-7>
green-bytes-passed-threshold <0-4294967295>
To set thresholds for yellow bytes, enter the following command in interface view:
eth type eth [x/x]> pm tm-queue set service-bundle-id <1-6> cos <0-7>
yellow-bytes-passed-threshold <0-4294967295>
To display PMs for green bytes passed, enter the following command in interface view:
For example:
To display PMs for green packets passed, enter the following command in interface view:
For example:
To display PMs for green bytes dropped, enter the following command in interface view:
For example:
To display PMs for green packets dropped, enter the following command in interface view:
For example:
To display PMs for yellow bytes passed, enter the following command in interface view:
For example:
To display PMs for yellow packets passed, enter the following command in interface view:
To display PMs for yellow bytes dropped, enter the following command in interface view:
For example:
To display PMs for yellow packets dropped, enter the following command in interface view:
For example:
Parameter Permitted
Input Type Values Description
service- Number 1 – 63 The service bundle for which you want to display
bundle-id Note: In PMs.
the current
release, only
Service
Bundle 1 is
supported.
clear-on-read Boolean yes If you enter yes, the statistics are cleared once you
no display them.
Examples
The following command displays service bundle PMs for Service Bundle 1, on GbE 1. The PMs are cleared after
they are displayed.
eth type eth [1/1]> tm-service-bundle show statistics service-bundle-id 1
clear-on-read yes layer-1 yes
Note
P2P services are not affected by G.8032, and continue to traverse ports that are blocked by G.8032.
To display the destination MAC address, enter the following command in root view:
root> ethernet generalcfg g8032-dest-mac-address show
To display the destination MAC address and the node ID, enter the following command in root view:
root> ethernet g8032 show-node-attributes
The node ID is the base MAC address for the node.
Note
Service points on the PTP 820 side of the link must have a single, determinate VLAN. This means the
service point type must be dot1q, s-tag, or QinQ. On the customer side, any service point type can be
used.
root> ethernet g8032 create-erpi erp-type ring erpi-id <erpi- id> erpi-service-id
<erpi-service-id> west-sp <west-sp> east-sp
<east-sp> level <level> version <version>
To add a Ring with Sub-Ring ERPI, enter the following command in root view:
west-sp Number 1-32 The first endpoint for the ERPI. This can be any service
point that has been configured for the service.
east-sp Number 1-32 The second endpoint for the ERPI. This can be any service
point that has been configured for the service.
sub-ring-sp Number 1-32 The service point that connects the Ring with the Sub-
Ring. This can be any service point that has been
configured for the service.
level Number 0-7 Optional. The Maintenance Entity Group (MEG) level used
for R-APS messages sent in the ERPI.
version Number 1-2 Optional. The ERPI (G.8032) protocol version currently
being used in the unit.
The following commands create a Ring ERPI with ID 1, and name the ERPI "service_x". This ERPI is associated with
Ethernet Service 1. The end points of the ERPI are Service Point 1 and Service Point 2. The ERPI is configured with
MEG level 2:
root> ethernet g8032 create-erpi erp-type ring erpi-id 1 erpi- service-id 1 west-
sp 1 east-sp 2 level 2
root> ethernet g8032 set-erpi-name erpi-id 1 erpi-name
service_x
The following commands create a Sub-Ring ERPI with ID 10, and name the ERPI "Sub_ring". This ERPI is associated
with Ethernet Service 20. The end points of the ERPI are Service Point 1 and Service Point 2. The ERPI is configured
with MEG level 4:
The following commands create a Ring with Sub-Ring ERPI with ID 20, and name the ERPI "RSRi". This ERPI is
associated with Ethernet Service 30. The end points of the ERPI are Service Point 1 and Service Point 2, and the point
of connection between the Ring and the Sub-Ring is Service Point 3. The ERPI is configured with MEG level 5:
To remove the RPL Owner Node, enter the following command in root view:
The following command sets the East service point as the RPL owner for ERPI 1:
The following command sets the Sub-Ring service point as the RPL owner for ERPI 20:
Note
The Guard Time is used to prevent Ethernet ring nodes from acting upon outdated R-APS messages
and prevents the possibility of forming a closed loop.
Hold-Off Time – Determines the time period from failure detection to response. It is used to coordinate between
recovery mechanisms (which mechanism takes place first).
To configure the WTR timer, enter the following command in root view:
To configure the guard time, enter the following command in root view:
erpi-id Number 1-64 The ID of the ERPI for which you want to set a timer.
wtr Number 1-12 The minimum time (in minutes) the system waits
after signal failure is recovered before reverting to
idle state.
guard- time Number 10-2000, in The minimum time (in msec) the system waits after
multiples of 10 recovery from a signal failure before accepting new R-
APS messages.
holdoff- time Number 0-10000, in The minimum time (in msec) the system waits before
multiples of 100 reacting to a signal failure.
The following command sets the WTR timer for ERPI 1 to 2 minutes:
The following command sets the guard time for ERPI 1 to 20 msecs:
Initiating a Manual or Forced Switch and Clearing the Switch or Initiating Reversion (CLI)
To initiate a forced switch, enter the following command in root view:
You can use a "clear" command to clear a forced or manual switch. You can also use a "clear" command to trigger
convergence prior to the expiration of the relevant timer. To issue a "clear" command, enter the following command
in root view:
erpi-id Number 1-64 The ID of the ERPI on which you want to perform
or clear the switch or initiate convergence.
SP Number or east west sub-ring Specifies the service point on which to clear the
Variable manual or forced switch or to implement
convergence.
The following command initiates a forced switch in the East service point of ERPI 1:
root> ethernet g8032 set-erpi-sp-tx-raps-cntrl erpi-id <erpi- id> SP <SP> tx-raps <tx-raps>
erpi-id Number 1-64 The ID of the ERPI on which you want to perform or
clear the switch or initiate convergence.
SP Variable east west sub-ring Specifies the service point on which to clear the
manual or forced switch or to implement
convergence.
To display all ERPIs that include a service point on a specific port, enter the following command in root view:
To display all ERPIs that include a service point on a specific group, enter the following command in root view:
The following command displays all ERPIs with a service point on HSB protection group 2:
The following command displays all ERPIs with a service point on Multi-Carrier ABC group 1:
To display detailed information about a specific ERPI, enter the following command in root view:
To display state information about a specific ERPI, enter the following command in root view:
group Variable rp1 rp2 rp3 rp4 To enter interface view for a group, enter the group
lag1 lag2 lag3 lag4 ID for one of the following types of group:
mc-abc1 mc-abc2 HSB group (rp1 - rp-4)
mc-abc3 mc-abc4 LAG (lag1 - lag4)
Multi-Carrier ABC group (mc-abc1 - mc- abc4)
Note: HSB and Multi-Carrier ABC groups are only
relevant for PTP 820C.
erpi-id Number 1-64 The ID of the ERPI for which you want to perform or
clear the switch, initiate convergence, or display
information.
Parameter Description
ERPI ID A unique ID that identifies the ERPI.
ERPI Name A descriptive name for the ERPI.
Service The ID of the Ethernet service to which the ERPI belongs.
User Instance The MSTI to which the Ethernet service is mapped.
Ring State Indicates the current ERPI state. Possible values are: Initializing
Idle Pending Protecting
West SP The interface to which the west ERPI service point belongs.
FS (Forced Switch) MS (Manual Switch)
East SP The interface to which the east ERPI service point belongs.
Sub-Ring SP The interface to which the ERPI service point that connects the Ring to the
Sub-Ring belongs.
ERPI Type The ERPI type (Ring, Sub-Ring, or Ring with Sub-Ring).
MEG Level The Maintenance Entity Group (MEG) level used for R-APS messages sent
in the ERPI.
Version The ERPI (G.8032) protocol version currently being used in the unit.
Virtual Channel Reserved for future use.
RPL Owner Indicates whether the ERPI is currently an RPL owner, and if it is, which
ERPI port is the owner.
Revertive Indicates whether the ERPI is currently in revertive mode.
WTR The Wait to Restore (WTR) timer. This timer sets the minimum time (in
minutes) the system waits after signal failure before entering revertive
Guard Time The
mode.minimum time (in msec) the system waits after recovery from a signal
failure before accepting new R-APS messages. The purpose of this timer is
Hold-Off Time The minimum
to prevent time (in msec)
unnecessary the system
state changes thatwaits
mightbefore reacting
be caused to a signal
by outdated
failure.
messages.
SD Handling Reserved for future use.
West SP SD Capacity Reserved for future use.
Threshold
East SP SD Capacity Reserved for future use.
Threshold
Sub-Ring SP SD Reserved for future use.
Capacity Threshold
Local State The current local state input to the ERPI state machine.
Remote State The last event received from the other end of the link.
Parameter Description
Last HP Request The last high priority request.
Last Change Time The time of the last ring state transition.
To display the state of a specific service point, enter the following command in root view:
Parameter Description
ERPI ID A unique ID that identifies the ERPI.
SP Index Identifies the service point in the ERPI.
SP ID The Service Point ID.
Active State Indicates whether or not the service point is active for traffic
forwarding.
R-APS Channel Forwarding Indicates whether the service point is forwarding R-APS messages.
State
Data Forwarding State Indicates whether the service point is in unblocked (forwarding)
state.
RPL Link Blocked State Only relevant if the ERPI to which the service point belongs is the
RPL owner. Indicates whether the service point is in blocked state.
Defect State Indicates whether the service point is in Signal Fail (SF) or Signal
Defect (SD) state.
Note: Support for Signal Defect state is planned for future release.
TX R-APS Frames The number of R-APS frames that have been transmitted via the
service point.
TX R-APS SF The number of R-APS Signal Fail (SF) frames that have been
transmitted via the service point.
TX R-APS NR The number of R-APS No Request (NR) frames that have been
transmitted via the service point.
TX R-APS RB The number of R-APS RPL Blocked (RB) frames that have been
transmitted via the service point.
TX R-APS SD The number of R-APS Signal Degrade (SD) frames that have been
transmitted via the service point.
TX R-APS FS The number of R-APS Forced Switch (FS) frames that have been
transmitted via the service point.
TX R-APS MS The number of R-APS Manual Switch (MS) frames that have been
transmitted via the service point.
RX Invalid R-APS Frames The number of R-APS frames with an invalid format that have been
received by the service point.
RX R-APS SF The number of R-APS Signal Fail (SF) frames that have been received
by the service point.
RX R-APS NR The number of R-APS No Request (NR) frames that have been
received by the service point.
TX R-APS RB The number of R-APS RPL Blocked (RB) frames that have been
transmitted by the service point.
TX R-APS SD The number of R-APS Signal Degrade (SD) frames that have been
transmitted by the service point.
TX R-APS FS The number of R-APS Forced Switch (FS) frames that have been
transmitted by the service point.
TX R-APS MS The number of R-APS Manual Switch (MS) frames that have been
transmitted by the service point.
Note
P2P services are not affected by MSTP, and continue to traverse ports that are blocked by MSTP.
Note
All mapping of Ethernet services to MSTP instances (MSTIs) should be performed before
enabling MSTP, For instructions, see Mapping Services to MSTIs (CLI).
To enable MSTP on the unit, enter the following command in root view:
Note
Changing the number of MSTIs causes the MSTP stack to reset.
To display the number of MSTIs on the unit, enter the following command in root view:
To display whether MSTP is or is not currently frozen in the unit, enter the following command in root view:
Note
This feature is planned for future release.
To determine how SD failures are treated, enter the following command in root view:
sd- handling Variable ignored same-as-ignored – Signal Degrade (SD) failures are ignored in
SF MSTP.
same-as-SF – MSTP handles SD failures the same as
Signal Failure, i.e., an SD failure triggers a topology
change.
To display the configuration ID attributes, enter the following command in root view:
Note
All mapping of Ethernet services to MSTP instances (MSTIs) should be performed before enabling
MSTP.
To assign a service to another MSTI, enter the following command in root view:
To assign a range of services to another MSTI, enter the following command in root view:
To display the service to MSTI mapping for a specific service, enter the following command in root view:
The following command displays the service to MSTI mapping for services 1 through 1000:
To set the CIST hold time, enter the following command in root view:
root> ethernet mstp set cist-bridge-hold-time <cist-bridge- hold-time>
To set the CIST maximum age, enter the following command in root view:
root> ethernet mstp set cist-bridge-max-age <cist-bridge-max- age>
To set the CIST forward delay, enter the following command in root view:
root> ethernet mstp set cist-bridge-forward-delay <cist-bridge- forward-delay>
To set the CIST Hello Time, enter the following command in root view:
To set the CIST maximum number of hops, enter the following command in root view:
cist-bridge-max-age Number 600-4000 Enter a value (in cs) that all bridges will
use, when this bridge is the root, as the
maximum age of MSTP information
learned from the network on any port
before the information is discarded.
cist-bridge-forward- Number 400-3000 Enter a value (in cs) that all bridges will
delay use, when this bridge is the root, as the
speed at which ports change their
spanning state when moving towards the
Forwarding state. This value determines
how long the port stays in Listening state
and Learning state. This value is also used
when a topology change has been
detected and is underway for purposes of
aging all dynamic entries in the filtering
database.
cist-bridge-hello- Number 100-1000 Enter the value (in cs) that all bridges will
time use, when this bridge is the root, as the
Hello Time. The Hello Time determines
how often the switch broadcasts its hello
message to other switches, and is the
same for all MSTIs.
cist-bridge-max- Number 6-40 Enter the value that all bridges will use,
hops when this bridge is the root, as the
maximum number of hops allowed for a
BPDU within a region before it is
discarded.
instance Number 1-16 Enter the MSTI ID of the MSTI you want to
configure.
msti- Number 0-61440, in steps of The MSTI writeable portion of the Bridge ID.
bridge- 4096.
priority
group Variable rp1 rp2 rp3 rp4 lag1 To enter interface view for a group, enter the
lag2 lag3 lag4 group ID for one of the following types of group:
mc-abc1 mc-abc2 mc- HSB group (rp1 - rp-4)
abc3 mc-abc4 LAG (lag1 - lag4)
Multi-Carrier ABC group (mc-abc1 - mc- abc4)
Note: HSB and Multi-Carrier ABC groups are only
relevant for PTP 820C.
To set the CIST port priority of an interface group, enter the following command in root view:
To set the CIST path cost of a port, enter the following command in root view:
root> ethernet mstp set interface <interface> slot <slot> port<port> cist-port-path-cost <cist-port-path-
cost>
To set the CIST path cost of an interface group, enter the following command in root view:
To set a port's administrative edge port parameter for the CIST, enter the following command in root view:
To set a port's MAC Enabled parameter for the CIST, enter the following command in root view:
group Variable rp1 rp2 rp3 rp4 lag1 lag2 To enter interface view for a group, enter
lag3 lag4 the group ID for one of the following types
mc-abc1 mc-abc2 mc-abc3 of group:
mc-abc4 HSB group (rp1 - rp-4)
LAG (lag1 - lag4)
Multi-Carrier ABC group (mc-abc1 - mc-
abc4)
Note: HSB and Multi-Carrier ABC groups are
only relevant for PTP 820C.
cist-port- Variable true false true – The port is considered an edge port in
edge-port the CIST.
false – The port is considered a non-edge
port in the CIST.
The following command sets the CIST port priority for Ethernet port 2 to 192:
root> ethernet mstp set interface eth slot 1 port 2 cist-port- priority 192
The following command sets the CIST port priority for HSB protection group 1 to 192:
The following command sets fixed radio interface 1 to be an Edge port in the CIST:
root> ethernet mstp set interface radio slot 3 port 1 cist- port-admin-edge true
The following command sets HSB protection group 1 to be an Edge port in the CIST:
To set the port priority for an MSTI and an interface group, enter the following command in root view:
root> ethernet mstp set instance <instance> group <group> msti- port-priority
<msti-port-priority>
To set the path cost for a port in a specific MSTI, enter the following command in root view:
To set the path cost for an interface group in a specific MSTI, enter the following command in root view:
root> ethernet mstp set instance <instance> group <group> msti- port-path-cost
<msti-port-path-cost>
To display the MSTI parameters for a specific MSTI and port, enter the following command in root view:
To display the MSTI parameters for a specific MSTI and interface group, enter the following command in root
view:
instance Number 1-16 Enter the MSTI ID of the MSTI you want to
configure.
group Variable rp1 rp2 rp3 rp4 lag1 lag2 To enter interface view for a group, enter the
lag3 lag4 group ID for one of the following types of
mc-abc1 mc-abc2 mc-abc3 group:
mc-abc4 HSB group (rp1 - rp-4)
LAG (lag1 - lag4)
Multi-Carrier ABC group (mc-abc1 - mc-abc4)
Note: HSB and Multi-Carrier ABC groups are
only relevant for PTP 820C.
msti-port- Number 0-240, in multiples of 16. The priority contained in the first octet of the
priority two-octet Port ID.
msti-port- Number 1-200000000. The port's Path Cost parameter for the MSTI.
path-cost Note: Changing the value of this parameter
may cause re-initialization of the MSTI for
which the parameter is changed. No other
MSTI should be affected.
The following command sets the MSTI port priority for MSTI 14 on Ethernet port 2 to 192:
root> ethernet mstp set instance 14 interface eth slot 1 port 2 msti-port-priority
192
The following command sets the MSTI port priority for MSTI 14 on LAG 1 to 192:
The following command sets the MSTI path cost for MSTI 12 on Ethernet port 3 to 20000:
root> ethernet mstp set instance 12 group rp1 msti-port-path- cost 20000
The following command displays the MSTI parameters for MSTI 10 and radio interface 1:
To reset the BPDU counters, enter the following command in root view:
monitored- Number 2
slot
Examples
The following command creates an ABN entity with radio interface 1 as the monitored interface and Ethernet port 1
as the control interface. It also specifies to transmit bandwidth messages on VLAN 1:
root> ethernet abn abn-entity-create abn-name ABN-1 monitored-interface
radio monitored-slot 1 monitored-port 1 control-interface ethernet control-
slot 1 control-port 1 vlan 1
The following command creates an ABN entity in a PTP 820C or PTP 820C-HP unit with radio interface 2 as the
monitored interface and LAG group lag1 as the control interface. It also specifies to transmit bandwidth messages on
VLAN 55:
root> ethernet abn abn-entity-create abn-name ABN-3 monitored-interface
radio monitored-slot 1 monitored-port 2 control-group lag1 vlan 55
The following command creates an ABN entity in a PTP 820C or PTP 820C-HP unit with HSB protection group rp1 as
the monitored interface and Ethernet port 2 as the control interface. It also specifies to transmit bandwidth messages
on VLAN 200:
root> ethernet abn abn-entity-create abn-name ABN-4 monitored-group rp1
control-interface ethernet control-slot 1 control-port 2 vlan 200
The following command creates an ABN entity in a PTP 820C or PTP 820C-HP unit with HSB protection group rp1 as
the monitored interface and LAG group lag1 as the control interface. It also specifies to transmit bandwidth messages
on VLAN 300:
root> ethernet abn abn-entity-create abn-name ABN-5 monitored-group rp1
control-group lag1 vlan 300
The following command deletes ABN-1:
root> ethernet abn abn-entity-delete abn-name ABN-1
The following command sets the monitoring interval of ABN-1 to 1 second:
root> ethernet abn abn-monitoring-interval-set abn-name ABN-1 period 1
The following command sets the frequency of bandwidth messages regarding ABN-1 to 10 seconds:
root> ethernet abn abn-period-set abn-name ABN-1 period 5-ten-seconds
The following command sets the Holdoff time of ABN-1 to 15 seconds:
root> ethernet abn abn-holdoff-set abn-name ABN-1 holdoff 15
You must first create an ETH-BN entity consisting of the Monitored Interface on the one hand, and the
Control Interface on the other. You must then use separate commands to enable or disable bandwidth
monitoring of the monitored interface and transmission of messages. You can also set various
parameters related to the bandwidth sampling and the transmitted bandwidth messages.
To create an ETH-BN entity in which the Monitored and Control interfaces are both single interfaces,
enter the following command in root view:
To create an ETH-BN entity on an PTP 820E in which the Monitored interface is an Enhanced Multi-
Carrier ABC (Multiband) group and the Control interface is a single Ethernet interface, enter the
following command in root view:
To create an ETH-BN entity in which the Monitored interface is an individual radio interface and the
Control interface is a LAG, enter the following command in root view:
To create an ETH-BN entity in which the Monitored interface is a Multi-Carrier ABC group and the
Control interface is a LAG, enter the following command in root view:
To create an ETH-BN entity on an PTP 820E in which the Monitored interface is an Enhanced Multi-
Carrier ABC (Multiband) group and the Control interface is a LAG, enter the following command in root
view:
To set the Maintenance Level of messages sent by the ETH-BN entity, enter the following command in
root view:
Note
If CFM MEPs are being used, the MEL must be set to a value greater than the MEG
level of the MEP. Otherwise, the BNM frames will be dropped.
If CFM MEPs are not being used, the MEL for ETH-BN must be set to a value greater than 0.
Otherwise, the BNM frames will be dropped.
To set the VLAN with which messages sent by the ETH-BN entity are transmitted, enter the following
command in root view:
To set the holdoff time, enter the following command in root view. Holdoff time is the amount of time
the system waits when bandwidth degradation occurs, before transmitting a message. If the
bandwidth is below the nominal value when the holdoff period ends, the system starts transmitting
messages:
To clear the messages counter, enter the following command in root view:
root>
Examples
The following commands set the Transmit Interval to 50 seconds with a TTL Multiplier of 5. This produces a TTL of
4 minutes and 10 seconds.
root> ethernet lldp tx-interval-set tx-interval 50
root> ethernet lldp tx-hold-multiplier-set hold-multiplier 50
The following command sets a Notification Interval of 20 seconds.
root> ethernet lldp notif-interval-set notif-interval 20
• Message Fast Tx - The interval, in seconds, at which LLDP frames are transmitted during fast transmission
periods, such as when the unit detects a new neighbor. In this release, this parameter is set at 1.
• Message Fast Init - The initial value used to initialize the variable which determines the number of
transmissions that are made during fast transmission periods. In this release, this parameter is set at 4.
Example
The following commands configure Ethernet port 2 to transmit and receive LLDP frames and to send a Topology
Change trap to the NMS whenever the system information of its peer changes:
root> ethernet lldp agent-admin-set interface eth slot 1 port 2 agent-
admin txAndRx
• local System Name - The system name included in TLVs transmitted by the LLDP agent. To define the system
name, see Configuring Unit Parameters (CLI).
• local System Description - The system description included in TLVs transmitted by the LLDP agent.
• local System Cap Supported - A bitmap value used to identify which system capabilities are supported on the
local system, as included in TLVs transmitted by the LLDP agent. The bitmap is defined by the following
parameters:
o 0 - other
o 1 - repeater
o 2 - bridge
o 3 - wlanAccessPoint
o 4 - router
o 5 - telephone
o 6 - docsisCableDevice
o 7 - stationOnly
o 8 - cVLANComponent
o 9 - sVLANComponent
o 10 - twoPortMACRelay
• local System Cap Enabled - A bitmap value used to identify which system capabilities are enabled on the local
system, as included in TLVs transmitted by the LLDP agent. The bitmap is defined by the following parameters:
o 0 - other
o 1 - repeater
o 2 - bridge
o 3 - wlanAccessPoint
o 4 - router
o 5 - telephone
o 6 - docsisCableDevice
o 7 - stationOnly
o 8 - cVLANComponent
o 9 - sVLANComponent
o 10 - twoPortMACRelay
Note
Remote information is not displayed for ports that belong to a LAG group.
agent-start- Date Use the format: The sys-up-time of the entry creation.
time dd-mm-yyyy,hh:mm:ss
Note
The Rem Port Description, Rem System Name, and Rem System Description fields are not used in the
current version.
• Rem System Cap Supported - The bitmap value used to identify which system capabilities are supported on
the peer. The bitmap is defined by the following parameters:
o 0 - other
o 1 - repeater
o 2 - bridge
o 3 - wlanAccessPoint
o 4 - router
o 5 - telephone
o 6 - docsisCableDevice
o 7 - stationOnly
o 8 - cVLANComponent
o 9 - sVLANComponent
o 10 - twoPortMACRelay
• Rem System Cap Enabled - The bitmap value used to identify which system capabilities are enabled on the
peer. The bitmap is defined by the following parameters:
o 0 - other
o 1 - repeater
o 2 - bridge
o 3 - wlanAccessPoint
o 4 - router
o 5 - telephone
o 6 - docsisCableDevice
o 7 - stationOnly
o 8 - cVLANComponent
o 9 - sVLANComponent
o 10 - twoPortMACRelay
• Remote Changes - Indicates whether there are changes in the peer's MIB, as determined by the variable
remoteChanges. Possible values are:
o True - Changes have taken place in the peer's MIB since the defined agent-start-time.
o False - No changes have taken place in the peer's MIB since the defined agent-start-
time.
Table 238 LLDP Remote Management Data Per Port CLI Parameters
slot Number 1
agent-start- Date Use the format: The sys-up-time of the entry creation.
time dd-mm-yyyy,hh:mm:ss
• stats Rem Tables Ageouts - The number of times the information from the remote system has been deleted
from the local unit's database because the information's TTL has expired. The RX Ageouts counter is similar
to this counter, but is for specific ports rather than the entire unit.
• RX Ageouts - The number of age-outs that occurred on the port. An age-out is the number of times the
complete set of information advertised by the remote system has been deleted from the unit's database
because the information timeliness interval has expired. This counter is similar to the LLDP No. of
Ageouts counter, except that it is per port rather than for the entire unit. This counter is set to zero during
agent initialization. This counter is incremented only once when the complete set of information is invalidated
(aged out) from all related tables on a particular port. Partial ageing is not allowed.
Note
PTP 820E R2H ESP, SyncE Regenerator is planned for future release.
In SyncE PRC pipe regenerator mode, frequency is transported between two interfaces through the radio link.
With the system acting as a simple link, no distribution mechanism is necessary, resulting in improved frequency
distribution performance with PRC quality and a simplified configuration.
Note
SyncE Regenerator currently supports only a single pipe configuration. It cannot be used
together with 1588 Transparent Clock.
Before adding a pipe configuration, you must set the Sync mode to Pipe. Enter the following command in root
view:
root> platform sync mode set pipe
By default, the Sync mode is set to Automatic. To display the current Sync mode, enter the following command in
root view:
root> platform sync mode show
To add a pipe configuration, enter the following command in root view:
root> platform sync pipe add pipe-id <pipe-id> interface-1-type
<interface-1-type> slot <slot> port <port> interface-2-type <interface-2-
type> slot <slot> port <port>
To change the first interface in a SyncE pipe, enter the following command in root view:
root> platform sync pipe edit interface-1 pipe-id <pipe-id> interface-1-
type <interface-1-type> slot <slot> port <port>
To change the second interface in a SyncE pipe, enter the following command in root view:
root> platform sync pipe edit interface-1 pipe-id <pipe-id> interface-2-
type <interface-2-type> slot <slot> port <port>
To remove a SyncE pipe, enter the following command in root view:
root> platform sync pipe remove pipe-id <pipe-id>
To remove all SyncE Regenerators (pipes), enter the following command in root view:
root> platform sync pipe remove all
To view the configured SyncE pipes, enter the following command in root view:
root> platform sync pipe show
interface-1- Variable ethernet The interface type for the first interface
type radio in the pipe.
Examples
The following command configures a SyncE pipe between Ethernet port 1 and radio interface 1:
root> platform sync pipe add pipe-id 1 interface-1-type ethernet slot 1
port 1 interface-2-type radio slot 2 port 1
The following command changes the first interface in the pipe from ethernet port 1 to Ethernet port 2:
root> platform sync pipe edit interface-1 pipe-id 1 interface-1-type
ethernet slot 1 port 2
The following command changes the second interface in the pipe from radio interface 1 to radio interface 2:
root> platform sync pipe edit interface-2 pipe-id 1 interface-2-type
radio slot 2 port 2
The following command removes SyncE pipe 1:
root> platform sync pipe remove pipe-id 1
By default, PTP 820 units are set to ETSI mode. No mode change is necessary to configure an MRMC script, even if
an FCC (ANSI) script is used. However, to configure a sync source on which the sync source Quality parameter must
be set according to ANSI specifications. You must change the ETSI/ANSI mode to ANSI before configuring the sync
source.
To change the ETSI/ANSI mode, enter the following command in root view:
root> platform management set interfaces-standard <ansi|etsi>
The following command changes the ETSI/ANSI mode from the default value of ETSI to ANSI mode:
root> platform management set interfaces-standard ansi
To display the current ETSI/ANSI mode, enter the following command in root view:
root> platform management show interfaces-standard
Changing the ETSI/ANSI mode does not require unit reset.
Note
To configure a sync source on which the sync source Quality parameter must be set according to
ANSI specifications, change the ETSI/ANSI mode to ANSI before configuring the sync source. See
Changing the ETSI/ANSI Mode (CLI).
Frequency signals can be taken by the system from Ethernet and radio interfaces. The reference frequency may
also be conveyed to external equipment through different interfaces.
Frequency is distributed by configuring the following parameters in each node:
• System Synchronization Sources – These are the interfaces from which the frequency is taken and distributed
to other interfaces. Up to 16 sources can be configured in each node. A revertive timer can be configured. For
each interface, you must configure:
o Priority (1-16) – No two synchronization sources can have the same priority.
o Quality – The quality level applied to the selected synchronization source. This
enables the system to select the source with the highest quality as the current
synchronization source.
• Each unit determines the current active clock reference source interface:
o The interface with the highest available quality is selected.
o From among interfaces with identical quality, the interface with the highest priority is
selected.
When configuring the Sync source, the Sync mode must be set to its default setting of automatic. To display the
current Sync mode, enter the following CLI command in root view:
root> platform sync mode show
If the Sync mode is set to pipe, you must set it to automatic by entering the following CLI command in root view:
root> platform sync mode set automatic
When configuring an Ethernet interface as a Sync source, the Media Type of the interface must be rj45 or sfp, not
auto-type. To view and configure the Media Type of an Ethernet interface, see Configuring an Interface’s Media
Type (CLI).
This section includes:
• Configuring an Ethernet Interface as a Synchronization Source (CLI)
• Configuring a Radio Interface as a Synchronization Source (CLI)
• Clearing All Sync Sources (CLI)
Note
In order to select an Ethernet interface, you must first specify the media type for this interface. See
Configuring Ethernet Services (CLI).
To configure an Ethernet interface as a synchronization source, enter the following command in root view:
root> platform sync source add eth-interface slot <slot> port <port>
priority <priority> quality <quality>
To edit the parameters of an existing Ethernet interface synchronization source, enter the following command in
root view:
root> platform sync source edit eth-interface slot <slot> port <port>
priority <priority> quality <quality>
To remove an Ethernet interface as a synchronization source, enter the following command in root view:
root> platform sync source remove eth-interface slot <slot> port <port>
slot Number 1
quality Variable For ETSI systems: The quality level applied to the selected
• automatic synchronization source. This enables the
system to select the source with the
• prc
highest quality as the current
• ssu-a synchronization source.
• ssu-b If the quality is set to automatic, then
• g813.8262 the quality is determined by the
For ANSI (FCC) received SSMs. If no valid SSM messages
systems: are received or in case of interface
failure (such as LOS, LOC, LOF), the
• automatic
quality becomes "failure."
• prs
SSM must be enabled on the remote
• stratum-2 interface in order for the interface to
• transit-node receive SSM messages.
• stratum-3e If the quality is configured to a fixed
• stratum-3 value, then the quality status becomes
“failure” upon interface failure (such as
• smc
LOS, LOC, LOF).
• unknown
The following command configures Ethernet port 2 as a synchronization source with priority = 8, and quality =
automatic:
root> platform sync source add eth-interface slot 1 port 2 priority 8
quality automatic
The following command changes the priority of this synchronization source to 6:
root> platform sync source edit eth-interface slot 1 port 2 priority 6
The following command removes this synchronization source:
root> platform sync source remove eth-interface slot 1 port 2
root> platform sync source add radio-interface slot <slot> port <port>
radio-channel <radio-channel> priority <priority> quality <quality>
To edit the parameters of an existing radio interface synchronization source, enter the following command in root
view:
root> platform sync source edit radio-interface slot <slot> port <port>
radio-channel <radio-channel> priority <priority> quality <quality>
To remove a radio interface as a synchronization source, enter the following command in root view:
root> platform sync source remove radio-interface slot <slot> port <port>
radio-channel <radio-channel>
slot Number 2
quality Variable For ETSI systems: The quality level applied to the selected
• automatic synchronization source. This enables the
system to select the source with the
• prc
highest quality as the current
• ssu-a synchronization source.
• ssu-b If the quality is set to automatic, then
• g813.8262 the quality is determined by the
For ANSI (FCC) received SSMs. If no valid SSM messages
systems: are received or in case of interface
failure (such as LOS, LOC, LOF), the
• automatic
quality becomes "failure."
• prs
SSM must be enabled on the remote
• stratum-2 interface in order for the interface to
• transit-node receive SSM messages.
• stratum-3e
• stratum-3
• smc
• unknown
The following command configures radio interface 1 as a synchronization source with priority = 16, and quality =
automatic:
root> platform sync source add radio-interface slot 2 port 1 radio-
channel 0 priority 16 quality automatic
The following command changes the priority of this synchronization source to 14:
root> platform sync source edit radio-interface slot 2 port 1 radio-
channel 0 priority 14
The following command removes this synchronization source:
root> platform sync source remove radio-interface slot 2 port 1 radio-
channel 0
For each interface, you can choose between using the system clock or the interface’s internal clock as its
synchronization source. By default, interfaces use the system clock.
When configuring the outgoing clock, the Sync mode must be set to its default setting of automatic. To display the
current Sync mode, enter the following command in root view:
root> platform sync mode show
If the Sync mode is set to pipe, you must set it to automatic by entering the following command in root view:
root> platform sync mode set automatic
;
To set the interface clock for a radio interface, enter the following command in root view:
root> platform sync interface-clock set radio-interface slot <slot> port
<port> radio-channel <radio-channel> source <source>
To set the interface clock for an Ethernet interface, enter the following command in root view:
root> platform sync interface-clock set eth-interface slot <slot> port
<port> source <source>
Note
To configure the interface clock on an Ethernet interface, the Media Type of the interface must be
rj45 or sfp, not auto-type. To view and configure the Media Type of an Ethernet interface, see
Configuring Ethenet Interfaces (CLI).
The following command sets the clock source for radio interface 2 to its internal clock:
root> platform sync interface-clock set radio-interface slot 2 port 2
radio-channel 0 source local-clock
The following command sets the clock source for Ethernet port 2 to the system clock:
root> platform sync interface-clock set eth-interface slot 1 port 2
source system-clock
In order to provide topological resiliency for synchronization transfer, PTP 820C, PTP 820S, PTP 820C-HP and PTP
820E implements the passing of SSM messages over the Ethernet and radio interfaces. SSM timing in PTP 820C
complies with ITU-T G.781.
In addition, the SSM mechanism provides reference source resiliency, since a network may have more than one
source clock.
The following are the principles of operation:
• At all times, each source interface has a “quality status” which is determined as follows:
o If quality is configured as fixed, then the quality status becomes “failure” upon
interface failure (such as LOS, LOC, LOF).
o If quality is automatic, then the quality is determined by the received SSMs. If no
valid SSM messages are received or in case of interface failure (such as LOS, LOC,
LOF), the quality becomes "failure."
• Each unit holds a parameter which indicates the quality of its reference clock. This is the quality of the current
synchronization source interface.
• The reference source quality is transmitted through SSM messages to all relevant radio interfaces.
• In order to prevent loops, an SSM with quality “Do Not Use” is sent from the active source interface (both
radio and Ethernet).
In order for an interface to transmit SSM messages, SSM must be enabled on the interface. By default, SSM is
disabled on all interfaces.
When configuring SSM, the Sync mode must be set to its default setting of automatic. To display the current Sync
mode, enter the following command in root view:
root> platform sync mode show
If the Sync mode is set to pipe, you must set it to automatic by entering the following command in root view:
root> platform sync mode set automatic
To enable SSM on a radio interface, enter the following command in root view:
root> platform sync ssm admin radio-interface slot <slot> port <port>
admin on
To disable SSM on a radio interface, enter the following command in root view:
root> platform sync ssm admin radio-interface slot <slot> port <port>
admin off
To enable SSM on an Ethernet interface, enter the following command in root view:
root> platform sync ssm admin eth-interface slot <slot> port <port> admin
on
To disable SSM on an Ethernet interface, enter the following command in root view:
root> platform sync ssm admin eth-interface slot <slot> port <port> admin
off
The following command enables SSM on radio interface 2:
To display the synchronization sources configured in the system, enter the following command in root view:
root> platform sync source config show
The following is a sample synchronization source display output:
number of configured sources = 4
|============================================================|
| Slot | Port | Type | Instance | Priority | Quality |
|============================================================|
| 1 | 1 | Ethernet | | 11 | automatic |
|------------------------------------------------------------|
| 1 | 2 | Ethernet | | 3 | automatic |
|------------------------------------------------------------|
| 2 | 1 | Radio | | 5 | automatic |
|------------------------------------------------------------|
| 2 | 2 | Radio | | 6 | automatic |
|------------------------------------------------------------|
To display the synchronization source status, enter the following command in root view:
root> platform sync source status show
The following is a sample synchronization source status display output:
number of configured sources = 4
|=============================================================|
| Slot | Port | Type | Instance | Active-Src | Act. Quality | Received
SSM | revert-time |
|=============================================================|
| 1 | 1 | ethernet | | false | PRC | do-not-use | 0 |
|------------------- -----------------------------------------|
| 1 | 2 | ethernet | | false | do-not-use | do-not-use | 0 |
|-------------------------------------------------------------|
| 2 | 1 | radio | | false | failure | do-not-use | 0 |
|------------------- -----------------------------------------|
| 2 | 2 | radio | | true | failure | g.813 | 0 |
|=============================================================|
To display the current system reference clock quality, enter the following command in root view:
root> platform sync source show-reference-clock-quality
To display the current synchronization configuration of the unit’s interfaces, enter the following command in root
view:
root> platform sync interface config show
The following is a sample interface synchronization configuration display output:
|=============================================================|
| Slot | Port | Type | Trail Radio | Source-Type | SSM-Admin |
|=============================================================|
| 1 | 1 | Ethernet | | System Clock | Off |
| 1 | 2 | Ethernet | | System Clock | Off |
| 1 | 3 | Ethernet | | System Clock | Off |
| 2 | 1 | Radio | | System Clock | On |
| 2 | 2 | Radio | | System Clock | On |
|=============================================================|
To display the current system clock status, enter the following command in root view:
root> platform sync clu-state show
The following is a sample system clock status display output:
CLU is in Free-running mode
Note
1588 Transparent Clock is supported with PTP 820C and PTP 820S.
PTP 820 uses 1588v2-compliant Transparent Clock to counter the effects of delay variation. Transparent Clock
measures and adjusts for delay variation, enabling the PTP 820 to guarantee ultra-low PDV.
A Transparent Clock node resides between a master and a slave node, and updates the timestamps of PTP packets
passing from the master to the slave to compensate for delay, enabling the terminating clock in the slave node to
remove the delay accrued in the Transparent Clock node. The Transparent Clock node is itself neither a master nor
a slave node, but rather, serves as a bridge between master and slave nodes.
Note that in release 10.9.6:
• 1588 TC Transparent Clock is not supported when Master-Slave communication is using the UDP/IPv6
transport layer.
• 1588 TC cannot be used on 1+1 HSB links.
• 1588 TC cannot be used with 2 x 1+0 (East-West) configurations
• If 1588 TC is not supported with Frame Cut-Through.
Note
Make sure to enable Transparent Clock on the remote side of the link before enabling it on the local
side.
Note
To disable Transparent Clock, enter the following command in root view:
root> platform sync ptp-tc set admin disable
Note
Disabling 1588 PTP can drastically affect time synchronization performance in the entire network.
7. Enter one of the following commands in root view to assign the radio or Multi-Carrier ABC group that will
carry the PTP packets and determine the direction of the PTP packet flow:
For an individual radio, enter the following command:
root> platform sync ptp-tc set radio slot <slot> port <port> direction
<upstream|downstream>
For a Multi-Carrier ABC group, enter the following command:
root> platform sync ptp-tc set group id <group> direction
<upstream|downstream>
The direction parameter must be set to different values on the two sides of the link, so that if you set the local side
to upstream, you must set the remote side to downstream, and vice versa. Otherwise than that, it does not
matter how you set this parameter.
To display the Transparent Clock settings, enter the following command in root view:
root> platform sync ptp-tc show status
The following commands enable Transparent Clock on radio carrier 1 and configure the radio to send PTP packets
upstream:
root> platform sync ptp-tc set admin enable
root> platform sync ptp-tc set radio slot 2 port 1 direction upstream
The following commands enable Transparent Clock on Multi-Carrier ABC group 1 and configure the radio to send
PTP packets upstream:
root> platform sync ptp-tc set group id mc-abc1 direction upstream
slot Number 2
8. 1588 packets should be mapped to CoS 7. By default, 1588 packets are not mapped to any CoS. To map
1588 packets to CoS 7, you must disable CoS preservation for 1588 packets. This must be performed via
CLI, using the following command:
root> ethernet generalcfg ptp-tc cos-preserve set admin disable
9. To map 1588 packets to CoS 7, enter the following command:
root> ethernet generalcfg ptp-tc cos-preserve cos value 7
After you enter these commands, 1588 packets will automatically be mapped to CoS 7.
Note
If necessary, you can use the ethernet generalcfg ptp-tc cos-preserve cos value
command to map a different CoS value (0-7) to 1588 packets, but it is recommended to map 1588
packets to CoS 7.
To avoid unauthorized login to the system, the following parameters should be set:
• Inactivity Timeout
• Blocking access due to login failures
• Blocking unused accounts
This section includes:
• Configuring the Inactivity Timeout Period (CLI)
• Configuring Blocking Upon Login Failure (CLI)
• Configuring Blocking of Unused Accounts (CLI)
Example
The following command sets the session inactivity timeout period to 30 minutes:
root> platform security protocols-control session inactivity-timeout set
30
Example
The following commands configure a blocking period of 45 minutes for users that perform 5 consecutive failed
login attempts:
root> platform security access-control block-failure-login attempt set 5
user-name Text String Any valid user name. The name of the user being blocked or
unblocked.
Examples
The following command configures the system to block any user that does not log into the system for 50 days:
root> platform security access-control block-unused-account period set 50
The following commands block, then unblock, a user with the user name John_Smith:
root> platform security access-control user-account block user-name
John_Smith block yes
Example
The following command sets the password aging time to 60 days:
root> platform security access-control password aging set 60
Example
The following command enables password strength enforcement:
root> platform security access-control password enforce-strength set yes
Table 249 Force Password Change on First Time Login CLI Parameters
Example
The following commands create a user profile called “operator” and give users to whom this profile is assigned
normal write privileges for all system functionality and advanced read privileges for all functionality except security
features.
root> platform security access-control profile add name operator
allowed Boolean yes yes – Users with this user profile can
no access the access channel type defined
in the preceding parameter.
no - Users with this user profile cannot
access the access channel type defined
in the preceding parameter.
Example
The following command prevents users with the user profile “operator” from accessing the system via NMS:
root> platform security access-control profile edit mng-channel name
operator channel-type NMS allowed no
Note
The latest date that can be configured is 30-12-2037. If no expiration date is configured, the user
account will expire five years after the date configured on the unit.
profile name Text String Up to 49 characters The name of the User Profile you want
to assign to the user. The User Profile
defines the user’s access permissions
per functionality group.
expired-date Date Use the format: Optional. The date on which the user
YYYY-MM-DD account will expire. On this date, the
user automatically becomes inactive.
Example
The following command creates a user account named Tom_Jones, with user profile “operator”. This user’s
account expires on February 1, 2014.
root> platform security access-control user-account add user-name
Tom_Jones profile-name operator expired-date 2014-02-01
ip-address Dotted Any valid IP address The IP address of the Radius server.
decimal
format
retries Number 3-30 The number of times the device will try
to communicate with the RADIUS server
before declaring the server to be
unreachable.
timeout Number 1-10 The timeout (in seconds) that the agent
will wait in during each communication
with the selected RADIUS server before
retrying if no response is received.
shared-secret String Between 22-128 The shared secret of the RADIUS server.
characters
Example
The following command configures Radius server attributes for the primary Radius server:
root> platform security radius-server-communication-ipv4 set server-id 1
ip-address 192.168.1.99 port 1812 retries 5 timeout 10 secret
U8glp3KJ6FKGksdgase4IQ9FMm
• Management Func Group Write level – The Write access level in the Management functional group: None,
Regular or Advanced.
• Radio Func Group Read level – The Read access level in the Radio functional group: None, Regular or
Advanced.
• Radio Func Group Write level – The Write access level in the Radio functional group: None, Regular or
Advanced.
• TDM Func Group Read level – The Read access level in the TDM functional group: None, Regular or Advanced.
• TDM Func Group Write level – The Write access level in the TDM functional group: None, Regular or
Advanced.
• Eth Func Group Read level – The Read access level in the Eth functional group: None, Regular or Advanced.
• Eth Func Group Write level – The Write access level in the Eth functional group: None, Regular or Advanced.
• Sync Func Group Read level – The Read access level in the Sync functional group: None, Regular or Advanced.
• Sync Func Group Write level – The Write access level in the Sync functional group: None, Regular or
Advanced.
The web interface protocol for accessing PTP 820 can be configured to HTTP (default) or HTTPS. It cannot be set to
both at the same time.
Before setting the protocol to HTTPS, you must:
1 Create and upload a CSR file. See Generating a Certificate Signing Request (CSR) File (CLI).
2 Download the certificate to the PTP 820 and install the certificate. See Downloading a Certificate (CLI).
3 Enable HTTPS. See Enabling HTTPS (CLI).
When uploading a CSR and downloading a certificate, the PTP 820 functions as an SFTP client. You must install
SFTP server software on the PC or laptop you are using to perform the upload or download. For details, see
Installing and Configuring an FTP or SFTP Server.
Note
For these operations, SFTP must be used.
To set the CSR parameters, enter the following command in root view:
root> platform security csr-set-parameters common-name <common-name>
country <country> state <state> locality <locality> organization
<organization> org-unit <org-unit> email <email> file-format <file-
format>
To display the currently-configured CSR parameters, enter the following command in root view:
root> platform security csr-show-parameters
If the IP address family is configured to be IPv4, enter the following command in root view to configure the SFTP
server parameters for the CSR file upload:
root> platform security csr-set-server-parameters server-ipv4 <server-
ipv4> server-path <server-path> filename <filename> server-username
<username> server-password <password>
If the IP address family is configured to be IPv6, enter the following command in root view to configure the SFTP
server parameters for the CSR file upload:
server-ipv4 Dotted Any valid IPv4 IP The IPv4 address of the PC or laptop you
decimal address. are using as the SFTP server.
format.
server-ipv6 Eight groups Any valid IPv6 address. The IPv6 address of the PC or laptop you
of four are using as the SFTP server.
hexadecimal
digits
separated by
colons.
filename Text String The name you want to give the CSR.
username Text String The user name for the SFTP session.
server-ipv4 Dotted Any valid IPv4 IP The IPv4 address of the PC or laptop you
decimal address. are using as the SFTP server.
format.
server-ipv6 Eight groups Any valid IPv6 address. The IPv6 address of the PC or laptop you
of four are using as the SFTP server.
hexadecimal
digits
separated by
colons.
server-path Text String The directory path from which you are
downloading the certificate. Enter the
path relative to the SFTP user's home
directory, not the absolute path. If the
location is the home directory, it should
be left empty. If the location is a sub-
folder under the home directory, specify
the folder name. If the shared folder is
"C:\", this parameter can be left empty
or populated with "//".
username Text String The user name for the SFTP session.
Note
Make sure you have installed a valid certificate in the PTP 820 before changing the web interface
protocol to HTTPS. Failure to do this may prevent users from accessing the Web EMS.
To change the protocol back to HTTP, enter the following command in root view:
You can configure the PTP 820 to operate in HTTPS strong mode. In HTTPS strong mode, SSLv3, TLSv1.0, and
TLSv1.1 are disabled completely and only certain ciphers are supported in TLSv1.2.
In FIPS mode also, SSLv3, TLSv1.0, and TLSv1.1 are disabled completely and only certain ciphers are supported in
TLSv1.2.
For a list of supported HTTPS ciphers, including an indication of which ciphers are supported in HTTPS strong mode
and FIPS mode, refer to Annex B – Supported Ciphers for Secured Communication Protocols in the Release Notes
for the System release version you are using.
Note
HTTPS cipher hardening is supported from system release 10.3. HTTPS cipher hardening is not
available in FIPS mode.
PTP 820 devices support RSA keys for communication using HTTPS and SSH protocol. The PTP 820 device comes
with randomly generated default private and public RSA keys. However, you can replace the private key with a
customer-defined private key. The corresponding RSA public key will be generated based on this private key. The
file must be in PEM format. Supported RSA private key sizes are 2048, 4096, and 8192.
The following is an example of a valid RSA private key file:
-----BEGIN PRIVATE KEY-----
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC+7jRmt27yF4xDh5Pc8w4ikvXUu32BI0eOyELmeUB
nEeIHbCOXD3upi8+ZnH51Q+8hzgoSqXgEYFgZMoF/sXCrO2yf62UJ5ohj3zadhx/7585zoGwHtYz1S62hsa4+cdAl/i1Vbc
6CoUBh5642XYje+Q+q1XJtObed884eaQcXUFLlBipYKvVx2kuelymansE91WJU+UjFlc3aiQG8qsSgW5Ar6wet0pXkP2V
demo//QAXXjcTqqMBuizrlhlcvi+OKYFl9kSh21ZqSgjvK3cfAssCJBIY5d6t6bVkX9p2gjo/IPnErjAv7W6lZoemotb5KAeSHe
R1sYTw17/xIpM7AgMBAAECggEAAwliLKQMOq4kh/UXD/OPAlPDXyp1jjaTw8dBm811OG5wttzXGrxJ+OIFX5Rn79Db
HnbayCiJL8tMe2dx5yhY+hA247roX3ua0w57cuPxnp21izc+S0fC7H/TTM1jpRCbATparuTRMlitinZshJGA73Lsod3v36GE
Xxm/6dHnz/drCs2F4NdHWpjMAAG/1CiBwut8jNkJUwa78Ivk3JF+XRoZ0txN2mIybQxxzjuNXqZbNO6H3Ua2u1iYyD+
McfgOWCCUfSnstGRhFg0OsQuqj6d74qKVQWaukEH91SVZHEoqX6DgpKy4INZBxORZmlTNmadwNhw5O7rvFxZ205u
4gQKBgQDT5bXvc0Ok+Ypm2xnIbu2GFjxNYwYhR3TvHPy14NIO5Q9I/uDqwrSL1igzalr6EbZyLu8cDXa4aybrzCyBfPeG8
9Qq+a6J3JR/RwJndLyjV4h5CT8Zy4O/wjgTrP3Rhq7LAbWgLjSarafLgruHTcnOifhkK7MK7Fr+xi2IJfOKQQKBgQDmq1eY
NzlMPlATESlsfbkcL49jSsu70kYg0g5Iol6+bVPo9K7mopICtWC/fwdNlUAfO+vr/231YUfSo7YNEDNNRoT/NwvqqtAYxZaI
UdIQxhMywF9jjYBBuq6+f/7+dwDfNBtMb2q7hceTdk6yZ8/MehCkvSwOBmP+lq0FwTmmewKBgQClxmj31G1ve+rTX
UZmkKIy7OJwiLAbCRRqnXr3r9Om43151i2QfJNTc1AwKVzTl1ftLNrUT5Q541qnzyxigaoFYmzy0jPCl1d128/9sE6EW87
hImLDg3ynYQMOIaDRc1T8bXHyxzNQb9t+U+DykeD4POifNbD1MsRd3h1xDn/iAQKBgHmKpukJkCNgYgjp7g3AYR084i
zLaHZa4aDBjc0v4QQtzxzccJwN5SmQMJ42bL6wecz7YeBEAshcrd+La42Oj7mUAtgHRTwtLOEgm6TQmANGmy8OtjRa
hs4bc5/lCZNDWS5C4m9v9alBYFuO5wCSOqffWY20L9Zj/6RR+HEj0yCpAoGAHwrbRqPVZtZptFuNsCq130dtmqI7HFQ
Alqrc5DwP7YSsznE6biHfLUw891xu0vmevALrCaoeOMaidugohgiorSJO4qk7I3XN3pUJhPYqbhtdCVnBI2Fm9pr3V/SHG
vrl1NW92cXObeQ2UEBiKPOyQKfOBlbac707u0HqaTu+/ts=
-----END PRIVATE KEY-----
You can download and install a private RSA key via HTTP, HTTPS, or SFTP. It is strongly recommended not to use
HTTP to download RSA key files.
Note: To download an RSA key file using HTTP or HTTPS, you must use the Web EMS. See
Downloading an RSA Key via HTTP or HTTPS.
To display the current RSA public key, enter the following command in root view:
root> platform security rsa-show-installed-public-key
If the IP address family is configured to be IPv4, enter the following command in root view to configure the SFTP
server parameters for downloading the RSA key:
root> platform security rsa-set-download-parameters server-ipv4 <server-
ipv4> server-path <server-path> filename <filename> server-username
<username> server-password <password>
If the IP address family is configured to be IPv6, enter the following command in root view to configure the SFTP
server parameters for downloading the RSA key:
root> platform security rsa-set-download-parameters server-ipv6 <server-
ipv6> server-path <server-path> filename <filename> server-username
<username> server-password <password>
To download an RSA key, enter the following command in root view:
root> platform security rsa-download
To install the RSA key, enter the following command in root view:
root> platform security rsa-install
You can block telnet access to the unit. By default, telnet access is not blocked.
To block telnet access, enter the following command:
root> platform security protocols-control telnet admin set disable
To unblock telnet access, enter the following command:
root> platform security protocols-control telnet admin set enable
To display whether telnet is currently allowed (enable) or blocked (disable), enter the following command:
root> platform security protocols-control telnet show
Note
When you block telnet, any current telnet sessions are immediately disconnected.
The security log is an internal system file which records all changes performed to any security feature, as well as all
security related events.
In order to read the security log, you must upload the log to an FTP or SFTP server. PTP 820 works with any
standard FTP or SFTP server. For details, see Installing and Configuring an FTP or SFTP Server.
Before uploading the security log, you must install and configure the FTP server on the laptop or PC from which
you are performing the download. See Installing and Configuring an FTP or SFTP Server.
To set the FTP parameters for security log upload, enter the following command in root view:
root> platform security file-transfer set server-path <server-path> file-
name <file-name> ip-address <ip-address> protocol <protocol> username
<username> password <password>
To display the FTP channel parameters for uploading the security log, enter the following command in root view:
root> platform security file-transfer show configuration
To upload the security log to your FTP server, enter the following command in root view:
root> platform security file-transfer operation set upload-security-log
To display the progress of a current security log upload operation, enter the following command in root view:
root> platform security file-transfer show operation
To display the result of the most recent current security log upload operation, enter the following command in
root view:
root> platform security file-transfer show status
file-name Text String The name you want to give the file you
are uploading.
ip-address Dotted Any valid IP address. The IP address of the FTP server.
decimal
format.
username Text String The user name for the FTP or SFTP
session.
Example
The following commands configure an FTP channel for security log upload to IP address 192.168.1.80, in the
directory “current”, with file name “security_log_Oct8.zip”, user name “anonymous”, and password “12345”, and
initiate the upload:
root> platform security file-transfer set server-path \current file-name
security_log_Oct8.zip ip-address 192.168.1.80 protocol ftp username
anonymous password 12345
The configuration log lists actions performed by users to configure the system. This file is mostly used for security,
to identify suspicious user actions. It can also be used for troubleshooting.
In order to upload the configuration log, you must install an FTP or SFTP server on the laptop or PC from which you
are performing the upload. PTP 820 works with any standard FTP or SFTP server. For details, see Installing and
Configuring an FTP or SFTP Server.
To set the FTP or SFTP parameters for configuration log export, enter the following command in root view:
root> platform security configuration-log-upload-params set path <path>
file-name <file-name> ip-address <ip-address> protocol <protocol>
username <username> password <password>
To display the FTP or SFTP parameters for configuration log export, enter the following command in root view:
root> platform security configuration-log-upload-params show
To export the configuration log, enter the following command in root view:
root> platform security configuration-log upload
To display the status of a configuration log export operation, enter the following command in root view
root> platform security configuration-log-upload-status show
file-name Text String The name you want to give the file you
are exporting.
Note: You must add the suffix .zip to
the file name. Otherwise, the file import
may fail. You can export the file using
any name, then add the suffix .zip
manually. For example: UnitInfo.zip
If the Unit Information file is exported
several times consecutively, the file
itself will not be replaced. Instead, the
filename will be updated by time stamp.
For example: UnitInfo.zip.11-05-14 03-
31-04
ip-address Dotted Any valid IP address. The IP address of the PC or laptop you
decimal are using as the FTP or SFTP server.
format.
username Text String The user name for the FTP or SFTP
session.
Note
The path and fie name, together, cannot be more than:
If the IP address family is configured to be IPv4: 236 characters
If the IP address family is configured to be IPv6: 220 characters
Examples
The following commands configure an FTP channel for configuration log export to IP address 192.168.1.99, in the
directory “current”, with file name “cfg_log”, user name “anonymous”, and password “12345.”
root> platform security configuration-log-upload-params set path \file-
name cfg_log ip-address 192.168.1.99 protocol ftp username anonymous
password 12345
PTP 820 devices support SDN, with NETCONF/YANG capabilities. This enables PTP 820
devices to be managed via SDN using Cambium Networks SDN controller, SDN Master.
In order for the device to be managed via SDN, you must enable NETCONF on the device. By default,
NETCONF is disabled.
To enable NETCONF, enter the following command in root view:
To display the current NETCONF configuration on the device, enter the following command in root
view:
root>platform security protocols-control netconf show-all
You can terminate all active sessions of all users by entering the following command in root view:
To display all alarms currently raised on the unit, enter the following command in root view:
root> platform status current-alarm show module unit
To display the most severe alarm currently raised in the unit, enter the following command in root view:
root> platform status current-alarm show most-severe-alarm module unit
The Event Log displays a list of current and historical events and information about each event.
To display the event log, enter the following command in root view:
root> platform status event-log show module unit
To clear the event log, enter the following command in root view:
root> platform status event-log clear module unit
Note
You can save the event log to a CSV file from the Web EMS. See Viewing and Saving the Event Log
You can view a list of alarm types, edit the severity level assigned to individual alarm types, and add additional
descriptive text to individual alarm types.
This section includes:
• Displaying Alarm Information (CLI)
• Editing an Alarm Type (CLI)
• Setting Alarms to their Default Values (CLI)
alarm-id Number All valid alarm type IDs, Enter the unique Alarm ID that identifies
depending on system the alarm type.
configuration
Example
The following command changes the severity level of alarm type 401 (Ethernet Loss of Carrier) to minor:
root> platform status alarm-management set alarm-id 401 severity-level
minor
alarm-id Number All valid alarm type IDs, Enter the unique Alarm ID that identifies
depending on system the alarm type.
configuration
Example
The following command restores alarm type 401 (Ethernet Loss of Carrier) to its default severity level:
root> platform status alarm-management set alarm-id 401 restore default
You can configure a wait time of up to 120 seconds after an alarm is cleared in the system before the alarm is
actually reported as being cleared. This prevents traps flooding the NMS in the event that some external condition
causes the alarm to be raised and cleared continuously.
This means that when the alarm is cleared, the alarm continues to be displayed and no clear alarm trap is sent until
the timeout period is finished.
The timeout for trap generation can be configured via CLI. By default, the timeout is 10 seconds.
Note
If the unit is upgraded from an earlier version to System Release 10.0 or higher, the timeout retains
its previous value until it is changed. That means if it was never configured, it retains its previous
default value of 0. If the unit is set to its factory default configuration, the timeout is set to 10
seconds.
To configure the timeout (in seconds) for trap generation, enter the following command in root view:
root> platform status alarm-management alarm-stabilization-set time <0-120>
To disable the timeout for trap generation, enter the following command in root view:
root> platform status alarm-management alarm-stabilization-set time 0
To display the current trap generation timeout, enter the following command in root view:
root> platform status alarm-management alarm-stabilization-show
The following command sets a trap generation timeout of 60 seconds:
root> platform status alarm-management alarm-stabilization-set time 60
You can choose to disable selected alarms and events. Any alarm or event can be disabled, so that no indication of
the alarm is displayed, and no traps are sent for the alarm.
If you disable an alarm that is currently raised, the alarm is treated as if it has been cleared. If an alarm that has
been disabled is enabled while it is in a raised state, the alarm is treated as if it has just been raised when it is
enabled.
If a timeout for trap generation is configured, and a disabled alarm is enabled while the alarm is raised, the
timeout count begins to run when the alarm is enabled. If an alarm is disabled while raised, the timeout count
begins to run upon disabling the alarm, and an alarm cleared trap is sent when the timeout expires.
To disable an alarm or event, enter the following command in root view:
root> platform status alarm-management set alarm-id <alarm ID> admin disable
To enable an alarm or event, enter the following command in root view:
root> platform status alarm-management set alarm-id <alarm ID> admin enable
To display a list of all disabled alarms and events, and their attributes, enter the following command in root view:
root> platform status alarm-management show all admin disable attributes
To display a list of all enabled alarms and events and their attributes, enter the following command in root view:
root> platform status alarm-management show all admin enable attributes
To enable all alarms and events, enter the following command in root view:
root> platform status alarm-management set all admin default
The alarm status commands platform status alarm-management show alarm-id all and platform
status alarm-management show alarm-id <alarm-id> attributes display alarms, even if they are
disabled. The Alarm Admin column in the output displays whether the alarm or event is enabled or disabled.
For example:
You can generate a unit information file, which includes technical data about the unit. This file can be forwarded to
customer support, at their request, to help in analyzing issues that may occur.
Note
For troubleshooting, it is important that an updated configuration file be included in Unit Info files
that are sent to customer support. To ensure that an up-to-date configuration file is included, it is
recommended to back up the unit’s configuration before generating the Unit Info file.
In order to export a unit information file, you must install an FTP or SFTP server on the laptop or PC from which
you are performing the upload. PTP 820 works with any standard FTP or SFTP server. For details, see Installing and
Configuring an FTP or SFTP Server.
Note
You can also use HTTP or HTTPS to upload the Unit Information file. HTTP or HTTPS upload must be
performed via the Web EMS. See Uploading Unit Info.
To set the FTP or SFTP parameters for unit information file export, enter one of the following commands in root
view. If the IP protocol selected in platform management ip set ip-address-family is IPv4, enter the destination IPv4
address. If the selected IP protocol is IPv6, enter the destination IPv6 address.
root> platform unit-info channel server set ip-address <server-ipv4>
directory <directory> filename <filename> username <username> password
<password>
server-ipv4 Dotted Any valid IPv4 address. The IPv4 address of the PC or laptop you
decimal are using as the FTP or SFTP server.
format.
server-ipv6 Eight groups Any valid IPv6 address. The IPv6 address of the PC or laptop you
of four are using as the FTP or SFTP server.
hexadecimal
digits
separated by
colons.
filename Text String The name you want to give the file you
are exporting.
Note: You must add the suffix .zip to
the file name. Otherwise, the file import
may fail. You can export the file using
any name, then add the suffix .zip
manually.
username Text String The user name for the FTP or SFTP
session.
The following commands configure an FTP or SFTP channel for configuration log export to IP address 192.168.1.99,
in the directory “current”, with file name “cfg_log”, user name “anonymous”, and password “12345.”
Example
The following commands configures an FTP channel for unit information file export to IP address 192.168.1.99, in
the directory “current”, with file name “version_8_backup.zip”, user name “anonymous”, and password “12345.”
root> platform unit-info channel server set ip-address 192.168.1.99
directory \current filename version_8_backup.zip username anonymous
password 12345
Note
In order to conserve CPU resources, do not activate the Radio Logger unless it is necessary for
unit diagnostic purposes, and do not leave it active longer than necessary.
To activate the Radio Logger, enter the following command in root view:
root> logger start logger-type radio logger-duration <1-1440> slot1 2
port1 1 slot2 2 port2 2
The logger-duration parameter is set in minutes. You can activate the logger on one or (for PTP 820C and PTP
820C-HP) two radios in a single command. For example, the following command activates the logger for 40
minutes on both carriers of an PTP 820C and PTP 820C-HP device:
root> logger start logger-type radio logger-duration 40 slot1 2 port1 1
slot2 2 port2 2
To display whether the Radio Logger is currently active, enter the following command in root view:
root> logger get status logger-type radio
For example, the following display indicates the Radio Logger has been set on both carriers for 20 minutes, and
that the Logger is set to run for an additional 1191 seconds:
root> logger get status logger-type radio
Logger status:
Logger duration(in minutes): 20
Logger time left(in seconds): 1191
Active instances list:
Slot 2 Port 1
Slot 2 Port 2
root>
To stop the Radio Logger manually, enter the following command in root view:
root> logger stop logger-type radio
To delete all data that has been saved by the Radio Logger, enter the following command in root view:
root> logger delete logger files<logger-type>.
Important Note: Whenever you activate the Radio Logger, any previous Radio
Logger results are deleted.
Examples
The following commands initiate an RF loopback on radio carrier 1 with a timeout of two minutes:
radio[2/1]> radio loopbacks-timeout set duration 2
Examples
The following command enables Ethernet loopback on Ethernet interface 2.
eth type eth [1/2]> loopback admin enable
The following command sets the loopback duration time to 900 seconds.
eth type eth [1/2]> loopback set duration 900
The following command enables MAC address swapping during the loopback.
eth type eth [1/2]> loopback swap-mac-address admin enable
The following command displays Ethernet port loopback status.
eth type eth [1/2]> loopback status show
Note
Link trace is planned for future release.
PTP 820 utilizes these protocols to maintain smooth system operation and non-stop data flow.
The following are the basic building blocks of FM:
• MD (Maintenance Domain) – An MD defines the management space on a network, typically owned and
operated by a single entity, for which connectivity faults are managed via SOAM.
• MA/MEG (Maintenance Association/Maintenance Entity Group) – An MA/MEG contains a set of MEPs or
MIPs.
• MEP (MEG End Points) – Each MEP is located on a service point of an Ethernet service at the boundary of the
MEG. By exchanging CCMs (Continuity Check Messages), local and remote MEPs have the ability to detect the
network status, discover the MAC address of the remote unit/port where the peer MEP is defined, and
identify network failures.
• MIP –(MEG Intermediate Points) – Similar to MEPs, but located inside the MEG and can only respond to, not
initiate, CCM messages.
• CCM (Continuity Check Message) – MEPs in the network exchange CCMs with their peers at defined intervals.
This enables each MEP to detect loss of connectivity or failure in the remote MEP.
Note
Support for MDs with the MD format Character String is planned for future release. In this release,
the software enables you to configure such MDs, but they have no functionality.
md-name String Up to 43 alphanumeric An identifier for the MD. The MD Name should be
characters. unique over the domain.
Note
In the current release, charString is the only available MEG name format.
The following command creates MEG ID 1, named FR-10, with MEG level 4, assigned to Ethernet service 20.
root> ethernet soam meg create meg-id 1 meg-fmt charString meg-name FR-10
meg-level 4 service-id 20
To set the interval at which CCM messages are sent within the MEG, enter the following command in root view:
root> ethernet soam meg ccm-interval set meg-id <meg-id> ccm <ccm>
The following command sets an interval of one second between CCM messages for MEG 1.
root> ethernet soam meg ccm-interval set meg-id 1 ccm interval1s
To determine whether MIPs are created on the MEG, enter the following command in root view:
root> ethernet soam meg mip set meg-id <meg-id> mhf <1-
4|defMHFnone|defMHFdefault|defMHFexplicit|defMHFdefer>
The following command creates MIPs on any service point in the MEG:
root> ethernet soam meg mip set meg-id 1 mhf defMHFdefault
To delete a MEG, enter the following command in root view:
root> ethernet soam meg delete <meg-id> ccm <ccm>
Note
To can only delete a MEG if no MEPs or MIPs are attached to the MEP.
To display a list of all MEGs configured on the unit, enter the following command in root view:
root> ethernet soam meg show
To display MEG attributes, including the number of MEPS, local MEPS, and MIPs attached to the MEG, enter the
following command in root view:
root> ethernet soam meg attributes show meg-id <meg-id>
meg-level Number 0-7 The MEG level must be the same for MEGs on both
sides of the link. Higher levels take priority over
lower levels.
If MEGs are nested, the OAM flow of each MEG must
be clearly identifiable and separable from the OAM
flows of the other MEGs. In cases where the OAM
flows are not distinguishable by the Ethernet layer
encapsulation itself, the MEG level in the OAM
frame distinguishes between the OAM flows of
nested MEGs.
Eight MEG levels are available to accommodate
different network deployment scenarios. When
customer, provider, and operator data path flows
are not distinguishable based on means of the
Ethernet layer encapsulations, the eight MEG levels
can be shared among them to distinguish between
OAM frames belonging to nested MEGs of
customers, providers and operators. The default
MEG level assignment among customer, provider,
and operator roles is:
The customer role is assigned MEG levels 6 and 7
The provider role is assigned MEG levels 3 through 5
The operator role is assigned MEG levels: 0 through
2
The default MEG level assignment can be changed
via a mutual agreement among customer, provider,
and/or operator roles.
The number of MEG levels used depends on the
number of nested MEs for which the OAM flows are
not distinguishable based on the Ethernet layer
encapsulation.
service-id Number 0-4095 Assign the MEG to an Ethernet service. You must
define the service before you configure the MEG.
mhf Variable defMHFnone Determines whether MIPs are created on the MEG.
defMHFdefault Options are:
defMHFexplicit defMHFnone – No MIPs are created.
defMHFdefer defMHFdefault – MIPs are created on any service
point in the MEG.
defMHFexplicit – MIPs are created on the service
points of the MEG when a lower-level MEP exists on
the service point. This option is usually used when
the operator’s domain is encompassed by another
domain.
defMHFdefer – No MIPs are created.
sp-id Number 0-32 The Service Point ID of the service point to which
you want to assign the MEP.
ccm-enabled Variable true true – CCM messages are enabled on the MEP.
false false – CCM messages are disabled on the MEP.
ccm-ltm- Number 0-7 The p-bit included in CCMs sent by this MEP.
priority
To display a list of remote MEPs (RMEPs) and their parameters per MEG and local MEP, enter the following
command in root view:
root> ethernet soam mep rmep list show meg-id <meg-id <meg-id> mep-id
<mep-id>
For example:
To display a list of remote MEPs (RMEPs) and their parameters per MEG and local MEP, enter the following
command in root view:
root> ethernet soam mep rmep show meg-id meg-id < meg-id <meg-id> mep-id
<mep-id> rmep-id <rmep-id>
For example:
Parameter Description
MD Parameters
MD ID The MD ID.
Parameter Description
MEG Parameters
Service The Service ID of the Ethernet service to which the MEG belongs.
CCM Interval The interval at which CCM messages are sent within the MEG.
Number of Local MEPs The number of local MEPs that belong to the MEG.
Interface Location The interface on which the service point associated with the MEP is located.
MEP Active Indicates whether the MEP is enabled (true) or disabled (false).
MEP CCM TX Enable Indicates whether the MEP is configured to send CCMs (true or false).
CCM and LTM Priority The p-bit included in CCMs sent by the MEP (0-7).
MEP MAC Address The MAC address of the service point associated with the MEP.
MEP Lowest priority fault The lowest defect priority that can trigger alarm generation. Defects with a
alarm lower priority will not trigger alarms.
MEP Alarm on time The amount of time that defects must be present before an alarm is
generated, in msec intervals (250-1000).
MEP Alarm Clear Time The amount of time that defects must be absent before an alarm is cleared,
msec intervals (250-1000).
RMEP Parameters
MepId The MEP ID of the local MEP paired with the remote MEP.
Parameter Description
OKorFail Time The timestamp marked by the remote MEP indicating the most recent CCM OK
or failure it recorded. If none, this field indicates the amount of time, in msec
intervals, since SOAM was activated.
MAC The MAC Address of the interface on which the remote MEP is located.
Rdi Displays the state of the RDI (Remote Defect Indicator) bit in the most recent
CCM received by the remote MEP:
• True – RDI was received in the last CCM.
• False – No RDI was received in the last CCM.
Port Status The Port Status TLV in the most recent CCM received from the remote MEP.
Reserved for future use.
Interface Status The Interface Status TLV in the most recent CCM received from the remote
MEP. Indicates the operational status of the interface (Up or Down).
Chassis ID Format Displays the address format of the remote chassis (in the current release, MAC
Address).
Mng Addr Domain Displays the BASE MAC address of the remote unit (the unit on which the
remote MEP resides).,
To display the same information without the last RX error CCM and fault messages, enter the following command
in root view:
root> ethernet soam mep status general show meg-id <meg-id> mep-id <mep-
id> detailed no
The Last RX error CCM message field displays the frame of the last CCM that contains an error received by the
MEP.
The Last RX Xcon fault message field displays the frame of the last CCM that contains a cross-connect error
received by the MEP.
Note
A cross-connect error occurs when a CCM is received from a remote MEP that has not been defined
locally.
root> ethernet soam loopback data set meg-id <meg-id> mep-id <mep-id>
size <size> pattern <pattern>
For example, the following command sets the loopback frame size to 128 and the pattern to zero for MEP 25 on
MEG 1 to 5 seconds:
root> ethernet soam loopback data set meg-id 1 mep-id 25 size 128 pattern
zeroPattern
To set the loopback priority bit size and drop-enable parameters, enter the following command in root view:
root> ethernet soam loopback prio set meg-id <meg-id> mep-id <mep-id>
prio <priority> drop <drop>
For example, the following command sets a priority bit size of 5 and enables frame dropping for MEP 25 on MEG 1
to 5 seconds:
root> ethernet soam loopback prio set meg-id 1 mep-id 25 prio 5 drop true
To set the loopback destination by MAC address, set the number of loopback messages to transmit and the
interval between messages, and initiate the loopback, enter the following command in root view:
root> ethernet soam loopback send meg-id <meg-id> mep-id <mep-id> dest-
mac-addr <dest-mac-addr> tx-num <tx-num> tx-interval <interval>
For example, the following command initiates a loopback session with the interface having MAC address
00:0A:25:38:09:4B. The session is configured to send 100 loopback messages at six-second intervals.
root> ethernet soam loopback send meg-id 1 mep-id 25 dest-mac-addr
00:0A:25:38:09:4B tx-num 100 tx-interval 6000
To set the loopback destination by MEP ID, set the number of loopback messages to transmit and the interval
between messages, and initiate the loopback, enter the following command in root view:
root> ethernet soam loopback send meg-id <meg-id> mep-id <mep-id> dest-
mep-id <dest-mac-addr> tx-num <tx-num> tx-interval <interval>
For example, the following command initiates a loopback session with the interface having MAC address
00:0A:25:38:09:4B. The session is configured to send 100 loopback messages at six-second intervals.
root> ethernet soam loopback send meg-id 1 mep-id 25 dest-mac-addr
00:0A:25:38:09:4B tx-num 100 tx-interval 6000
Note
If you initiate the loopback via MEP ID, the loopback will only be activated if CCMs have already been
received from the MEP. For this reason, it is recommended to initiate loopback via MAC address.
To display the loopback attributes of a MEP, enter the following command in root view:
root> ethernet soam loopback config show meg-id <meg-id> mep-id <mep-id>
For example:
To stop a loopback that is already in progress, enter the following command in root view:
root> ethernet soam loopback stop meg-id <meg-id> mep-id <mep-id>
meg-id Number 1-4294967295 The MEG ID of the MEG on which the loopback is
being configured or run.
mep-id Number 1-8191 The MEP ID of the MEP on which the loopback is
being configured or run.
interval Number 0-60000 The interval (in ms) between each loopback
message. Note that the granularity for this
parameter is 100 ms. If you enter a number that is
not in multiples of 100, the value will be rounded off
to the next higher multiple of 100. Also, the lowest
interval is 1000 ms (1 second). If you enter a smaller
value, it will be rounded up to 1000 ms.
size Number 64-1518 The frame size for the loopback messages. Note that
for tagged frames, the frame size will be slightly
larger than the selected frame size.
pattern Variable zeroPattern The type of data pattern to be sent in an OAM PDU
onesPattern Data TLV.
dest-mac-addr Six groups of The MAC address of the interface to which you want
two to send the loopback. If you are not sure what the
hexadecimal interface’s MAC address is, you can get it from the
digits Interface Manager by entering the platform if-
manager show interfaces command in root
view.
dest-mep-id Number 1-8191 The MEP ID of the interface to which you want to
send the loopback.
CW mode enables you to transmit a single or dual frequency tones, for debugging purposes.
To work in CW mode, enter the following command:
radio[x/x] modem tx-source set admin enable
Once you are in CW mode, you can choose to transmit in a single tone or two tones.
To transmit in a single tone, enter the following command in radio view:
radio[x/x] modem tx-source set mode one-tone freq-shift <freq-shift>
To transmit two tones, enter the following command in radio view:
radio[x/x] modem tx-source set mode two-tone freq-shift <freq-shift>
freq-shift2 <freq-shift>
To exit CW mode, enter the following command:
radio[x/x] modem tx-source set admin disable
The following commands set a single-tone transmit frequency of 5050 KHz on radio interface 1, then exit CW mode
and return the interface to normal operation:
root> radio slot 2 port 1
radio[2/1] modem tx-source set admin enable
radio[2/1] radio[x/x] modem tx-source set mode one-tone freq-shift 5050
radio[2/1] modem tx-source set admin disable
Temperature Ranges
The following are the permissible unit temperature ranges for PTP 820C, PTP 820C-HP and PTP 820S.
• -33C to 55 – Temperature range for continuous operating temperature with high reliability.
• -45C to 60C – Temperature range for exceptional temperatures, tested successfully, with limited margins.
For PTP 820C, PTP 820S, and PTP 820E, an extreme temperature alarm (25) is raised if the unit’s internal
temperature goes above 100°C or below -40°C. The alarm is cleared when the temperature goes below 95°C or
above -35°C.
For PTP 820C-HP, an extreme temperature alarm (25) is raised if the unit’s internal temperature goes above 92°C
or below -40°C. The alarm is cleared when the temperature goes below 87°C or above -35°C.
To display the current unit temperature, see Configuring Unit Parameters.
• The permissible IDU humidity range is 5%RH to 100%RH
Troubleshooting Tips
Platform
If during or right after a software upgrade the message Your session has expired, please login
again appears and you cannot log in, it is recommended to refresh the Web EMS page (F5)
after completion of the upgrade. If pressing F5 does not help, clear the browser’s cache by
pressing Ctrl+Shift+Delete.
XPIC
• For dual-polarization and XPIC links, if one of the polarizations has significantly reduced performance, check to
make sure the antenna’s rectangular interface was replaced with a circular adaptor.
• For dual-polarization and XPIC links, the RSL should be similar for both polarizations. For XPIC links, the XPI
value should be similar for both polarizations; the difference should not be more than 2 dB.
Unit Protection
• When switchover takes place, a series of GARP packets are sent identifying the MAC address of the new
management interface. This enables the management device to immediately re-establish the management
connection. By default, three GARP packets are sent:
o The first GARP packet is sent immediately upon switchover.
o The second GARP packet is sent 500 ms after switchover.
o The third GARP packet is sent one second after switchover.
Use the following CLI command to show the current configuration of this parameter:
root>platform management protection debug show garp
MIMO Port
Table 273 PTP 820C MIMO Port - RJ-45/SFP pinouts
Troubleshooting Tips
• For dual-polarization and XPIC links, if one of the polarizations has significantly reduced performance,
check to make sure the antenna’s rectangular interface was replaced with a circular adaptor.
• For dual-polarization and XPIC links, the RSL should be similar for both polarizations. For XPIC links, the XPI
value should be similar for both polarizations; the difference should not be more than 2 dB.
If during or right after a software upgrade the message Your session has expired, please login again appears and
you cannot log in, it is recommended to refresh the Web EMS page (F5) after completion of the upgrade. If
pressing F5 does not help, clear the browser’s cache by pressing Ctrl+Shift+Delete.MGT/PROT - Management (FE-
Standard) and Protection (FE-Non-Standard)
1 TX+
2 TX-
3 RX+
6 RX-
4 TX+
5 TX-
7 RX+
8 RX-
DC
The DC port is UL-60950 compliant, with a 2-pin connector.
RSL Interface
PTP 820C uses a weather-proof BNC connector.
Note
The voltage at the RSL interface is 1.XX where XX is the RSL level. For example; 1.59V means an RSL
of -59 dBm. Note that the voltage measured at the RSL interface is not accurate and should be used
only as an aid).
Source Sharing
PTP 820C uses a TNC connector for source sharing. This connector is marked EXT/REF.
The PTP 820C provides the following LEDs to indicate the status of the unit's interfaces, and the unit as a whole:
• Electrical GbE Interface (RJ-45) LEDs
• Optical GbE Interface (SFP) LEDs
• Management FE Interface (RJ-45) LEDs
• Radio LED
• Status LED
• Protection LED
Status LED
The Status LED indicates the status of the rmain board:
• Off – The power is off.
• Green - The power is on, and no alarms are raised on the motherboard.
• Red - The power is on, and one or more major or critical alarms are raised on the motherboard.
• Orange – The power is on, and one or more minor alarms or warnings are raised on the motherboard.
Protection LED
The Protection LED operates in a protected configuration to indicate the protection status:
• Orange - Protection is enabled, and the unit is in standby mode.
• Green - Protection is disabled or protection is enabled, and the unit is in active mode.
• Red – A protection alarm exists (cable disconnected, mismatch configuration, or mate communication not
working). Note that only the active unit will have a red LED.
• Off – Protection is not enabled
DC
The DC port is UL-60950 compliant, with a 2-pin connector.
RSL Interface
PTP 820C-HP uses a dual-pin connector.
Note
The voltage at the RSL interface is 1.XX where XX is the RSL level. For example; 1.59V means an RSL
of -59 dBm. Note that the voltage measured at the RSL interface is not accurate and should be used
only as an aid).
Source Sharing
PTP 820C-HP uses a TNC connector for source sharing. This connector is marked EXT/REF.
Radio LED
The Radio LED indicates the status of the radio link:
• Off – The radio is off; all carriers are Admin = Disabled in the Interface Manager.
• Green - The power is on, and all carriers are operational (up).
• Orange – A signal degrade condition exists on at least one carrier.
• Red - A loss of frame (LOF) or excessive BER condition exists on at least one carrier.
Status LED
The Status LED indicates the status of the main board:
• Off – The power is off.
• Green - The power is on, and no alarms are raised on the motherboard.
• Orange – The power is on, and one or more minor alarms or warnings are raised on
the motherboard.
• Red - The power is on, and one or more major or critical alarms are raised on the
motherboard.
Protection LED
The Protection LED operates in a protected configuration to indicate the protection status:
• Red – A protection alarm exists (cable disconnected, mismatch configuration, or mate
communication not working). Note that only the active unit will have a red LED.
• Orange -Protection is enabled, and the unit is in standby mode.
• Green - Protection is enabled, the unit is in active mode, and no protection alarms are
present.
• Off – Protection is not enabled.
1 TX+
2 TX-
3 RX+
6 RX-
4 TX+
5 TX-
7 RX+
8 RX-
DC
The DC port is UL-60950 compliant, with a 2-pin connector.
RSL Interface
PTP 820S uses a weather-proof BNC connector.
Note
The voltage at the RSL interface is 1.XX where XX is the RSL level. For example: 1.59V means an RSL
of -59 dBm. Note that the voltage measured at the RSL interface is not accurate and should be used
only as an aid).
Radio LED
The RadioLED indicates the status of the radio link:
• Green - The power is on, and all carriers are operational (up).
• Red - A Loss of Frame (LOF) condition exists in at least one carrier.
• Orange – A signal degrade condition exists on the carrier.
• Off – The radio is off; the carrier is Admin = Disabled in the Interface Manager.
Status LED
The Status LED indicates the status of the main board:
• Off – The power is off.
• Green - The power is on, and no alarms are raised on the motherboard.
• Red - The power is on, and one or more major or critical alarms are raised on the motherboard.
• Orange – The power is on, and one or more minor alarms or warnings are raised on the motherboard.
Protection LED
The Protection LED operates in a protected configuration to indicate the protection status:
• Red – A protection alarm exists (cable disconnected, mismatch configuration, or mate communication not
working). Note that only the active unit will have a red LED.
• Orange -Protection is enabled, and the unit is in standby mode.
• Green - Protection is enabled, the unit is in active mode, and no protection alarms are present.
• Off – Protection is not enabled.
•
• Note:PTP820E ESS requires System Release 9.0 or higher
• ESP – One electrical Ethernet interface for PoE and management (Port 1), an optical SFP cage that supports
regular and CSFP standards (Port 2), and an optical SFP cage that can be configured for 1G or 10G (Port 3).
Notes: PTP 820E ESP requires Release 9.7 or higher.
The following table summarizes the port distribution in each of these variants.
• Port 1 (Eth1):
Electric: 10/100/1000Base-T RJ-45.
PoE or external DC support (adapter)
• Port 2
SFP cage which supports – Regular and CSFP standards
• Regular SFP provides Eth2
• CSFP (Dual BiDir SFP) provides Eth2 and Eth3
• Port 3 (MGT):
Electric: 10/100/1000Base-T RJ-45.
Management port (no traffic)
• Extension Port:
◦ XPIC and HSB source sharing (planned for future release)
◦ Direct connection to CPU by technician – see Error! Reference source not
found.
◦
EXT Port
This port is reserved for future use.
Power Adaptor
For configurations in which power is not provided via PoE, a special adaptor (PTP 820_Mini_Power_Adaptor) is
available that enables users to connect a two-wire power connector to the PoE port. This adaptor is located inside
of the gland. In such configurations, only one electrical GbE interface is available (MGT).
RSL Interface
PTP 820E uses a two-pin connection to measure the RSL level using standard voltmeter test leads:
Note: The LED does not indicate traffic on the interface (Blinking Green) in 10G mode.
Note: The Web EMS displays Ethernet port 3 even if a regular SFP is used, and there is
no Ethernet port 3. You must avoid configuring Ethernet port 3 in this case.
On ESE and ESS hardware versions, there is one Green LED to the left of the interface and one Green LED to the
right of the interface. On ESP hardware versions, there are two LEDS to the left of the interface. The LED to the left
or the upper LED is for Eth2. When CSFP is used, the LED to the right or the lower LED is for Eth3; otherwise, it is
inactive.
Each LED indicates the interface's Admin and cable connection status, and whether there is traffic on the interface:
• Off - Admin is Disabled or no cable is connected to the interface.
• Green - Admin is Enabled and a cable is connected to the interface.
• Blinking Green - Admin is Enabled and a cable is connected to the interface, and there is traffic on the
interface.
Radio LED
The Radio LED indicates the status of the radio link:
• Off – The radio is off; the carrier is Admin = Disabled in the Interface Manager.
• Green - The power is on, and the carrier is operational (up).
• Orange – A signal degrade condition exists on the carrier.
• Red - A loss of frame (LOF) or excessive BER condition exists on the carrier.
Status LED
The Status LED indicates the status of the main board:
• Off – The power is off.
• Green - The power is on, and no alarms are raised on the motherboard.
• Orange - The power is on, and one or more minor alarms or warnings are raised on the motherboard.
• Red - The power is on, and one or more major or critical alarms are raised on the motherboard.
Protection LED
Reserved for future use.
PoE Port
Table 284 PoE Injector PoE Port - RJ-45 Pinouts
Data Port
Table 285 PoE Injector RJ-45 Data Port Supporting 10/100/1000Base-T
DC
One or two DC ports, depending on the PoE Injector model:
The available PoE Injector model is:
• PTP 820 PoE Injector all outdoor, redundant DC input, +24VDC suppor (part number: N000082L022A) –
PoE_Inj_AO_2DC_24V_48V – Includes two DC power ports with power input ranges of ±(18-60)V each.
These ports are UL-60950 compliant, with a 2-pin connector.
Radio LED
The Radio LED indicates the status of the radio link:
PoE supply output is too low. Make sure the PoE voltage is within
30 Alarm POE input voltage is too low Warning
PoE cable to the unit is defective. the specification range.
Protection revertive mode - Identical configuration for the Ensure one (and only one) unit is
warning
205 Alarm insufficient configuration revertive-primary parameter. configured as the primary unit.
SFP port TX power level is Check laser Bias current and laser
806 Alarm above the tx power level high Warning SFP laser Tx power is too high. temperature values. If either of
threshold them is too high, replace SFP.
Default Activation Key
activated due to failure
807 Event Critical Corrupted Inventory
Activation key validation has failed Make sure that the activation key
910 Alarm Activation key signature failure Major due to invalid product serial number matches the serial number of the
or activation key does not match. unit.
Modem firmware was not Modem firmware file is corrupted. Download software package.
1202 Alarm Critical
loaded successfully System failure. Reset the system.
Radio MRMC script LUT file is Download the specific radio MRMC
1301 Alarm Critical Damaged radio MRMC script LUT file
corrupted script LUT file
Radio MRMC script LUT file is Download the specific radio MRMC
1302 Alarm Critical Missing radio MRMC script LUT file
not found script LUT file
Radio MRMC script modem file Damaged radio MRMC script modem Download the specific radio MRMC
1304 Alarm Critical
is corrupted file script modem file
Radio MRMC script modem file Missing radio MRMC script modem Download the specific radio MRMC
1305 Alarm Critical
is not found file script modem file
Damaged Radio MRMC script LUT Download the specific radio MRMC
1308 Alarm Radio MRMC file is corrupted Critical
file RFU file
Radio MRMC RFU file is not Download the specific radio MRMC
1309 Alarm Major Missing radio MRMC RFU file
found RFU file
1501 Alarm Remote communication failure Critical Fade in the link Check the link performance
Check installation.
Reset the RMC (Radio Modem
Extreme temperature condition.
1602 Alarm IF synthesizer is unlocked. Critical Card) module.
HW failure.
Replace the RMC (Radio Modem
Card).
The RFU type does not support the Replace the RFU with an RFU type
RFU is incompatible with ABC
1707 Alarm Warning type of Multi-Carrier ABC the user that supports the configured Multi-
configuration
has configured. Carrier ABC type.
1709 Alarm RFU hardware failure 1 Critical Defective RFU. Replace RFU.
1710 Alarm RFU hardware failure 2 Critical Defective RFU. Replace RFU.
Defective RMC (Radio Modem Card). Replace RMC (Radio Modem Card).
Replace RFU.
1722 Alarm RFU loopback is active Major User has activated RFU loopback. Disable RFU loopback.
At least one of the RFU's power Check the RFU cable connection.
1726 Alarm RFU power supply failure Major
supply voltages is too low. Replace the RFU.
Radio unit communication Defective RIC (Radio Interface Card). Check RFU cable and connectors.
1730 Alarm Critical
failure Defective RFU. Replace RIC (Radio Interface Card).
RFU initialization in progress. Replace RFU.
RFU powered off.
Replace RFU.
At least one of the RFU synthesizers
1733 Alarm RFU synthesizer unlocked Major In XPIC mode, replace mate RFU as
is unlocked
well.
Replace RFU.
Defective RFU (the RFU cannot
1734 Alarm RFU TX level out of range Minor Intermediate solution - reduce TX
transmit the requested TX power)
power.
1735 Alarm RFU TX Mute Warning RFU Transmitter muted by user Unmute the RFU transmitter
1737 Event Card was extracted from slot Warning Card was extracted from slot NA
Reset Card.
Download card firmware has Firmware download was
1740 Alarm Major Download software package.
failed unsuccessful.
Try to insert another Card.
1741 Event Card was inserted to slot Warning Card was inserted to slot NA
Card is missing.
Insert Expected Card.
1743 Alarm Expected Card is missing in slot Major Expected Card Type configured on
Clear Expected Card Type.
empty slot.
Reset.
This Card type is not supported The card is not on the Allowed Card
1744 Alarm Major Insert Card belongs to Allowed
in this slot Types list for this slot.
Card Types list.
1745 Event Card operational state is Down Indeterminate Card state was change to Down state NA
1746 Event Card operational state is Up Indeterminate Card state was change to Up state NA
1749 Event Slot was Disabled Indeterminate The user Disabled slot NA
1750 Event Slot was Enabled Indeterminate The user Enabled slot NA
1751 Event Card on slot was Reset Indeterminate The user Reset slot NA
1754 Event FAN Card was inserted to slot Warning FAN Card was inserted to slot
This alarm is non-operational Installation conditions. Verify that the product is operating
1756 Alarm and has been superseded by Major Defective unit. according to specifications.
Alarm 32002. Defective fan. Replace the fan card.
Replace the unit.
1757 Alarm FAN Card is in Failure state Major FAN Card is in Failure state Change FAN Card
Power Supply was extracted Power Supply was extracted from Re-Insert the power supply back
1758 Event Warning
from slot slot into the slot.
Reset board.
Download Main Board Firmware download was
1764 Alarm Major Download software package.
firmware has failed unsuccessful.
Try to insert another board.
The hardware of the XCVR is OK, but Upgrade the XCVR software
RFU software download cannot
1774 Alarm Critical is it running with METRO radio application via XPAND-IP and then
be initiated.
application. reinitiate software download..
Replace RFU.
RFU power decreased due to Defective RFU (the RFU cannot
1778 Alarm Major Intermediate solution - reduce TX
PA temperature transmit the requested TX power).
power.
New installed software package does Reset the radio carrier to reacquire
MRMC running script is
1781 Event Warning has an updated version of the the new updated MRMC radio
updated
running MRMC radio script script
2.5Gbps mismatch The card cannot function outside of Add the card to an ABC group, or
1782 Alarm Warning
configuration an ABC group in 2.5Gbps mode. change the Slot Section to 1Gbps.
Reconnect cable.
Late-frame alarm on TDM TDM service failure or device Check TDM service configuration
2008 Alarm Warning
service synchronization problem. across the network.
Reconnect line.
Excessive BER on TDM-LIC Line is not properly connected. Check line cables.
2022 Alarm Major
STM1/OC3 port External equipment is faulty. Check external equipment.
Power cycle the TDM-LIC.
Loopback on TDM-LIC
2024 Alarm Warning STM1/OC3 loopback enabled. Disable STM1/OC3 loopback.
STM1/OC3 port
Loss Of Signal (LOS) on TDM-LIC External equipment is faulty. Check line cables.
2025 Alarm Critical
STM1/OC3 port Peer Equipment Configuration Check external equipment.
problem. Reset the TDM-LIC.
Remote Defect Indication (RDI) Fix the problem along the trail.
Alarm exists along the Trail.
2037 Alarm received on TDM-LIC Minor Check the cable connectivity at
Cable is not properly connected.
VC12/VT1.5 both local and peer interfaces.
Reconnect line.
Signal Degrade on TDM-LIC Line is not properly connected. Check line cables.
2039 Alarm Minor
VC12/VT1.5 External equipment is faulty. Check external equipment.
Reset the TDM-LIC.
Reconnect line.
Incorrect line is connected.
Unequipped on TDM-LIC Check line cables.
2040 Alarm Minor External equipment is faulty or
VC12/VT1.5 Check external equipment.
misconfigured.
Reset the TDM-LIC.
Path protection switch on TDM Failure along service primary path. Check errors along primary path
2046 Event Minor
service User command. Check local service configuration.
Reconnect line.
Loss of Signal on Line Interface Line is not properly connected.
2100 Alarm Critical Check line cables.
(LOS) on STM-1/OC-3 port. External equipment is faulty.
Check external equipment.
Reconnect line.
Loss of Frame on Line Interface Line is not properly connected.
2101 Alarm Major Check line cables.
(LOF) on STM-1/OC-3 port. External equipment is faulty.
Check external equipment.
MS-RDI/RDI-L on Radio
2106 Alarm Minor External equipment is faulty. Check remote equipment.
Interface detected.
2109 Alarm PRBS insertion. Warning PRBS insertion on STM-1/OC-3 card. Remove PRBS insertion.
Replace RMC.
Hardware failure between RMC and
2203 Alarm LVDS RX Error Slot 2. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2204 Alarm LVDS RX Error Slot 3. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2205 Alarm LVDS RX Error Slot 4. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2206 Alarm LVDS RX Error Slot 5. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2207 Alarm LVDS RX Error Slot 6. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2208 Alarm LVDS RX Error Slot 7. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2209 Alarm LVDS RX Error Slot 8. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2210 Alarm LVDS RX Error Slot 9. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2211 Alarm LVDS RX Error Slot 10. Major Replace TCC.
TCC cards.
Replace chassis.
Replace RMC.
Hardware failure between RMC and
2212 Alarm LVDS RX Error Slot 12. Major Replace TCC.
TCC cards.
Replace chassis.
MC-ABC member has been Major The corresponding MC-ABC member Verify the proper functioning and
2213 Alarm disabled due to robustness has been temporarily disabled within connectivity of the cable and RF
reason the group. It was caused by unit.
consecutive RFU HW failures
User issued a command to reset the Wait until the reset cycle is ended
3000 Event Chassis was reset Warning
chassis. and the system is up and running.
Multi Carrier ABC group is not Multi Carrier ABC group does not
Configure the relevant capacity
3003 Alarm functional in current configured Warning support the configured capacity
mode to 1 Gbps mode.
capacity mode mode.
User blocked due to User blocked due to consecutive The user should wait few minutes
5000 Event Indeterminate
consecutive failure login failure login until it account will be unblock
ERPI is either in protection Either user "force switch" command Either clear force command or
5001 Alarm Minor
state or forced protection state or one of the ring links has failed recover the link
5004 Event Security log upload started Indeterminate Security log upload started
5005 Event Security log upload failed Indeterminate Security log upload failed
5006 Event Security log upload succeeded Indeterminate Security log upload succeeded
System Synchronization Active Sync Source Failure and the Fix the Sync Source Failure.
5012 Alarm Critical
Reference in Holdover Mode clock unit enters holdover mode Provide an alternative sync source.
The pipe is missing an edge Pipe Regenerator contains less than Configure a second interface for
5015 Alarm Major
interface 2 interfaces. the Pipe Regenerator.
5018 Alarm 1588TC is not operational Major System Failure Reboot the unit
1588TC over the radio is not 1588TC over the radio is enabled but TC enabled on both sides
5019 Alarm Major
calibrated could not be calibrated Frequency lock UP on both sides
TC downstream at one side and
upstream on the other side
T3 Interface is configured in
5020 Alarm T3 interface at loopback mode Warning If required, disable the loopback.
loopback.
T4 Interface is configured in
5021 Alarm T4 interface at loopback mode Warning If required, disable the loopback.
loopback.
5025 Event Security rsa key install failed Indeterminate Security rsa key install failed
5026 Event Security rsa key install started Indeterminate Security rsa key install started
A connectivity failure in
5030 Alarm Minor Wrong link configurations. Check the link in the traffic path
MA/MEG
Auto state propagation Remote system triggered Auto state Resolve the problem on the remote
5048 Alarm Major
indication received propagation system
5109 Alarm Main Board is not FIPS certified Critical Main Board used is not FIPS certified Use a FIPS-certified TCC.
5110 Alarm Radio card is not FIPS certified Major Radio Card used is not FIPS certified Use a FIPS-certified RMC.
Protection Pre-Shared-Key has Protection Pre-shared key was not Configure the Pre-shared key to a
5113 Alarm Major
the default value configured different value than the default
5222 Event Security CSR upload succeeded Indeterminate Security csr upload succeeded N/A
5223 Event Security CSR upload failed Indeterminate Security csr upload failed N/A
5224 Event Security CSR upload started Indeterminate Security csr upload started N/A
Faulty coaxial cable between master Replace faulty coaxial cable and
Clock source sharing cable
31005 Alarm Critical and slave RFUs reset Master RFU.
unplugged
Mate does not exist Replace faulty RFU.
Radio script is incompatible to MRMC Script selected does not Set AFR Script in both Agg1 & Agg2
31100 Alarm Critical
AMCC support AMCC Group type/subtype carriers
Inconsistent MRMC script All members of a group must be Set the members to the
31101 Alarm Critical
between members configured to the same MRMC Script appropriate MRMC script
Agg1 did not complete Bring-up Drop both Agg1 & Agg2 into single
31103 Alarm Agg 1 failed Bring-up procedure Critical
successfully carrier mode (Pre-Init)
MIMO script is not enabled on any Align MIMO script on all radio
radio member. members.
Different TX/RX frequency. Align same frequency on all radio
ATPC enabled. members.
AMCC/MIMO insufficient
31105 Alarm condition – configuration is not Critical XPIC enabled. Disable ATPC.
supported ACM mode (adaptive/Fixed) is not Disable XPIC.
the same. Align ACM mode.
Unit Redundancy enabled. Disable Unit Redundancy.
Platform not supported. Replace unit.
Master/Slave configuration
mismatch due to:
MIMO insufficient condition -
Different TX/RX frequency.
31111 Alarm Master/Slave configuration Critical Align Master/Slave configuration.
Different MIMO script ID.
mismatch
Different ACM mode
(adaptive/Fixed).
XPIC communication with mate Warning 1. The mate unit is 1. Check the cable between
unreachable. the two units.
unit is interrupted
2. In FIPS mode, possible 2. In FIPS mode, make sure
31120 Alarm mismatch between the that the same IPSec pre-
IPSec pre-shared keys shared key is configured
configured on the two on the two units.
units.
AMCC insufficient condition - Critical Radio Unit failure. 1. Verify radio unit power.
31121 Alarm
Radio unit failure. 2. Replace HW.
User issued a command to reset the Wait until the reset cycle is ended
32003 Event Unit was reset. Warning
unit and the system is up and running
Term Definition
AC Alternating Current
AT Anti-Theft
BB Baseband
Clk Clock
CODEC Coder/Decoder
DA Destination Address
DC Direct Current
GND Ground
HSB Hot-Standby
IF Intermediate Frequency
IFC IF Combining
LO Local Oscillator
MUX Multiplexer
NE Network Element
PC Personal Computer
PM Performance Monitoring
PN Provider Network
PWR Power
RCVR Receiver
RF Radio Frequency
SP Service Point
TC Traffic Class
VC Virtual Container
WG Waveguide
XMTR Transmitter
XO Crystal Oscillator