|
Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - Y -
Index
Numerics
2.5-Gbps line card motherboards
description 1-2
2.5-Gbps transponder module
configuration overview 4-1
2.5-Gbps transponder modules
description 1-2
A
AAA
configuring 3-9
add/drop mux/demux modules
description 1-2
aggregate shelf Ethernet interfaces. See ASE interfaces
alarm threshold
rates (table) 4-11
alarm thresholds
configuring 4-10
description 4-9
displaying configuration 4-12
MIBs 9-12
ALS
laser safety control and 4-15
APS
configuring dual shelf nodes 6-9to 6-11
configuring line card protection 5-8to 5-11
configuring splitter protection 5-2to 5-5
MIBs 9-13
aps clear command 5-28
aps direction command 5-15
aps disable command 5-4, 5-8, 5-11, 5-15, 6-10
aps enable command 5-4, 5-8, 5-11, 5-15, 5-20, 5-22, 5-23, 5-25, 6-10
aps far-end command 6-10
aps lockout command 5-27
aps protection command 5-4, 5-8, 6-10
aps revertive command 5-11
aps switch command 5-27
APS switchovers. See switchovers
aps timer message holddown command 5-25
aps timer message max-interval command 5-25
aps timer oscp holddown command 5-15
aps timer oscp max-interval command 5-15
aps timer search-for-up command 5-20, 5-22, 5-23
aps timer wait-to-restore command 5-11
aps trigger command 4-10
aps working command 5-4, 5-8, 5-15, 6-10
ASE interfaces
not supported (note) 2-9
associate group command 5-4, 5-8, 5-11, 5-15, 6-9
associate interface command 5-4
Authentication, Authorization, and Accounting. See AAA
autoboot
configuring 3-17
displaying configuration 3-18
automatic laser shutdown. See ALS
Automatic Protection Switching. See APS
automatic synchronization
causes (table) 3-19
configuring 3-19
auto-sync running-config command 3-19
auto-sync startup-config command 3-19
auxiliary ports
interface naming convention 2-9
modem support 3-2
B
bands
description 1-2
bidirectional path switching
configuring 5-15
description 5-14
displaying configuration 5-19
example (figure) 5-16
figure 5-14
boot system command 3-17
C
CDP
clearing information 9-5
description 9-3
displaying configuration 9-4
displaying information 9-4
cdp advertise-v2 command 9-3
cdp holdtime command 9-3
cdp run command 9-3
cdp timer command 9-3
channels
description 1-2
OSC 1-9
Cisco Discovery Protocol. See CDP
Cisco ONS 15540
configuration overview 2-10
starting up 3-2
See also hardware; shelf; software
CiscoView. See Embedded CiscoView
CiscoWorks2000
support 1-9
clear cdp counters command 9-5
clear cdp table command 9-5
CLI
description 2-1
help 2-3
client equipment
monitoring 9-17
client protection
configuring 5-6
description 5-6
See also line card protection; y-cable protection
client signals
extended range transponder support 1-4to 1-6
MM transponder support 1-4
SM transponder support 1-3
transparent interfaces and 2-6
clock rate command 4-3
clock rates
displaying configuration 4-6
laser shutdown and (note) 4-5
command-line interface. See CLI
command modes
description 2-1
table 2-2
commands
abbreviating 2-3
listing 2-3
syntax in documentation xiv
compliance
ITU-T G.692 1-7
NEBS 1-7
components
config-register command 3-17
configuration register
changing value 3-17
configurations
displaying 3-6
overview of tasks 2-10
console ports
configuring modem support 3-2
using 3-2
conventions
document xv
cross connections
description 4-22
displaying 4-23
D
data channels
transponder module support 1-3
description command 4-10
diagnostic tests. See online diagnostics
documentation
conventions xv
related xiv
dual shelf nodes
description 6-1
duplex command 3-4
DV
support on transponder modules 4-5
E
Embedded CiscoView
accessing 9-22
description 9-18
download URL 9-19
enable password command 3-4
enable passwords
description 3-3
enable secret command 3-4
enable secret passwords
description 3-3
encapsulation. See protocol encapsulation
encapsulation command 4-3
Enterprise Systems Connection. See ESCON
environment-monitor shutdown fan command 3-23
ESCON
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-6, 4-6
network topologies and (note) 8-1
Ethernet management ports. See NME
extended range transponder modules
F
fan failure shutdown
configuring 3-23
description 3-23
displaying configuration 3-24
Fast Ethernet
configuring protocol encapsulation (table) 4-3
fastethernet 0 interfaces
configuring IP addresses 3-4
description 2-9
IP on OSC 9-9
fastethernet-sby 0 interfaces
description 2-9
FDDI
configuring protocol encapsulation (table) 4-3
Fibre Channel
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-6, 4-6
FICON
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-6, 4-6
filterband interfaces
description 2-8
filtergroup interfaces
description 2-8
filter interfaces
description 2-7
firewalls
configuring 3-11
Flash PC Cards
displaying contents 9-19
forward laser control
configuring 4-16
description 4-13
displaying configuration 4-17
figure 4-13
OFC and (caution) 4-16
G
Gigabit Ethernet
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-6, 4-6
H
hardware
features 1-1
OSC guidelines 9-2
shelf overview 1-1
Hello hold-down timer
configuring 9-7
Hello inactivity factor
configuring 9-7
Hello interval timer
configuring 9-7
help
CLI 2-3
hostname command 3-6
host names
configuring 3-6
hubbed ring topologies
configuring line card protection 8-20to 8-36
configuring splitter protection 8-3to 8-19
description 8-2
example (figure) 8-2
I
interface loopback command 9-9
interfaces
configuration overview 4-1
line card protection model (figure) 2-6
splitter protection model (figure) 2-5
See also specific types of interfaces (for example, filter interfaces)
interface transparent command 4-3
interface wave command 4-16, 4-17, 4-19, 9-9
interface wavepatch command 5-10
interface wdm command 9-16
IP
configuring on OSC interfaces 9-8to 9-11
IP addresses
configuring on NME 3-4
OSC wave interfaces 9-8
ip route command 9-10
ip unnumbered command 9-9
ITU-T G.692
laser grid 1-7
K
Kerberos
configuring 3-9
L
laser control. See forward laser control; laser safety control
laser control forward enable command 4-16
laser control safety enable command 4-17
laser safety control
configuring 4-17
description 4-15
displaying configuration 4-18
figure 4-15
line card protection and 4-17
OFC and (caution) 4-17
splitter protection and (caution) 4-15, 5-3
laser shutdown
line card motherboards
configuring for line card protection 5-10
displaying cross connections (example) 4-23
splitter protection and 5-2, 5-7
wavepatch interfaces 2-7
line card protection
configuring dual shelf topologies 6-1to 6-11
configuring hubbed ring topologies 8-20to 8-36
configuring meshed ring topologies 8-60to 8-74
configuring point-to-point topologies 7-5to 7-8
configuring splitter protected line card motherboards 5-10
configuring y-cable protection 5-8
considerations 5-7
description 5-6
displaying cross connections (example) 4-23
example (figure) 5-6
interface model (figure) 2-6
line card redundancy controllers. See LRCs
line vty command 3-4
lockouts
clearing 5-28
description 5-26
requesting 5-27
logical mesh topologies. See meshed ring topologies
LRCs
description 1-7
M
maintenance-mode command 3-20
management systems. See network management systems
meshed ring topologies
configuring line card protection 8-60to 8-74
configuring line card protection with unprotected channels 8-74to 8-83
configuring splitter protection 8-37to 8-51
configuring splitter protection with unprotected channels 8-51to 8-59
description 8-3
example (figure) 8-3
MIBs
processor support 3-1
supported 9-12
MM transponder modules
description 1-4
modem
support 3-2
monitor enable command 4-8
monitoring. See network monitoring; protocol monitoring
multimode transponder modules. See MM transponder modules
mux/demux cabling
hubbed ring topologies with line card protection, example 8-21, 8-26, 8-29, 8-32, 8-35
hubbed ring topologies with splitter protection, example 8-5, 8-9, 8-12, 8-15, 8-18
meshed ring topologies with line card protection, example 8-61, 8-65, 8-68, 8-72
meshed ring topologies with splitter protection, example 8-39, 8-43, 8-46, 8-49
meshed ring topologies with unprotected channels, line card protection, example 8-76, 8-80
meshed ring topologies with unprotected channels, splitter protection, example 8-54, 8-57
point-to-point topologies with line card protection, 32 channels, example 6-4
point-to-point topologies without protection, example 7-10
mux/demux modules
configuring for line card protection 5-8
description 1-6
See also add/drop mux/demux modules; terminal mux/demux modules
mux/demux motherboards
description 1-2
N
NEBS
compliance 1-7
network management Ethernet. See NME
network management systems
supported 1-9
network monitoring
Embedded CiscoView 9-18to 9-22
transparent interfaces 9-17
Network Time Protocol. See NTP
network topologies
adding transparent interfaces 9-17
adding wdm interfaces 9-5
MIBs 9-14
types 1-10
See also hubbed ring topologies; meshed ring topologies; point-to-point topologies
NME
configuring interfaces 3-3
description 2-9
displaying configuration 3-5
using 3-2
See also fastethernet 0 interfaces
notification-throttle timer command 4-10
NTP
configuring 3-7
description 3-6
displaying configuration 3-8
ntp server command 3-7
ntp update-calendar command 3-7
O
OADMs. See add/drop mux/demux modules
OFC
configuring with encapsulation command 4-3
description 4-14
figure 4-14
forward laser control and (caution) 4-16
laser safety control and (caution) 4-17
online diagnostics
description 1-9
optical add/drop mux/demux modules. See add/drop mux/demux modules
optical budgets. See optical power budgets
optical connections. See cross connections
optical monitor
MIBs 9-13
optical mux/demux motherboards. See mux/demux motherboards
optical power budgets
system specifications 1-7
optical power thresholds
configuring 4-18
displaying configuration 4-19
optical supervisory channel. See OSC
Optical Supervisory Channel Protocol. See OSCP
optical terminal mux/demux modules. See terminal mux/demux modules
optical threshold power receive command 4-19
OSC
hardware guidelines 9-2
signal path (figure) 9-2
oscfilter interfaces
configuring patch connections 4-20
description 2-9
OSC interfaces
description 2-9
patch connections 4-20
OSCP
description 9-2
displaying configuration 9-8
displaying neighbors 9-8
MIBs 9-13
oscp timer hello holddown command 9-7
oscp timer hello interval command 9-7
oscp timer inactivity-factor command 9-7
P
passwords
description 3-3
patch command 4-20
patch connections
description 4-20
displaying configuration 4-21
types (table) 4-20
path switching
example (figure) 5-13
y-cable protection and 5-17to 5-19
path switchovers. See switchovers
point-to-point topologies
configuring line card protection 7-5to 7-8
configuring splitter protection 7-3
configuring without protection 7-9to 7-11
description 7-1
example without protection (figure) 7-2
example with protection (figure) 7-2
power budgets. See optical power budgets
processor cards
autoboot 3-17
hardware state transitions 3-12
interfaces 2-9
redundant 3-15
reloading 3-22
slot assignments 1-2
software state transitions 3-13
starting up 3-2
processor redundancy. See redundancy
processors. See processor cards
processor switchovers
protection
description 5-1
protection switching. See path switching
protocol encapsulation
displaying configuration 4-6
types supported 1-3
protocol monitoring
configuring 4-8
description 4-6
displaying configuration 4-8
Q
quick laser shutdown. See forward laser control; laser safety control
R
RADIUS
configuring 3-10
redundancy
displaying alarm status (note) 3-12
displaying configuration 3-20
forcing switchovers 3-15to 3-16
MIBS 9-15
processor hardware state transitions 3-12
processor software state transitions 3-13
synchronizing configurations 3-18
redundancy manual-sync command 3-19
redundancy reload peer command 3-22
redundancy reload shelf command 3-22
redundancy switch-activity command 3-15
reset command 3-16
reshape, retime, retransmit functions. See 3R functions
revertive switching
configuring 5-11
description 5-11
displaying configuration 5-12
ring topologies
See also hubbed ring topologies; meshed ring topologies
router bgp command 9-10
router eigrp command 9-10
router ospf command 9-10
S
SDH
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-6, 4-6
security features
AAA 3-9
firewalls 3-11
Kerberos 3-9
overview 3-8
passwords and privileges 3-11
RADIUS 3-10
TACACS+ 3-10
traffic filters 3-11
SFP optics
description 1-4
shelf
configuration examples
hubbed ring topologies with splitter protection 8-8, 8-14
point-to-point topologies with line card protection, 32 channels 6-3, 6-6
point-to-point topologies without protection 7-9
configuration overview 2-10
description 1-1
layout (figure) 1-2
starting up 3-2
show bootvar command 3-18
show cdp command 9-4
show cdp entry command 9-4
show cdp interface command 9-4
show cdp neighbor command 9-4
show cdp traffic command 9-4
show ciscoview package command 9-22
show ciscoview version command 9-22
show connect command 4-23
show environment command 3-24
show flash command 9-19
show hardware command 3-4
show interfaces transparent command 4-6
show ntp status command 3-8
show oscp info command 9-8
show oscp neighbor command 9-8
show patch command 4-21
show redundancy capability command 3-20
show redundancy running-config-file command 3-20
show redundancy summary command 3-20
show threshold-list command 4-12
show topology command 9-6, 9-18
show topology neighbor command 9-17
show version command 3-18
Simple Network Management Protocol. See SNMP
single-mode transponder modules. See SM transponder modules
SM transponder modules
description 1-3
SNMP
configuring 9-11
configuring alarm thresholds (table) 4-10
processor support 3-1
snmp-server enable traps aps command 9-13
snmp-server enable traps optical monitor command 9-13
snmp-server enable traps oscp command 9-13
snmp-server enable traps patch command 9-14
snmp-server enable traps rf command 9-15
snmp-server enable traps threshold min-severity command 9-12
snmp-server enable traps topology command 9-14
software
SONET
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-6, 4-6
speed command 3-4
splitter protection
configuring 5-3
configuring hubbed ring topologies 8-3to 8-19
configuring meshed ring topologies 8-37to 8-51
configuring meshed ring topologies with unprotected channels 8-51to 8-59
configuring point-to-point topologies 7-3
considerations 5-2
description 5-2
displaying configuration 5-5
displaying cross connections (example) 4-23
example (figure) 5-2
figure 2-5
interface model (figure) 2-5
SRCs
description 1-7
standards compliance. See compliance
switchcard redundancy controllers. See SRCs
switchover command 3-15
switchover-enable timer
configuring 5-20, 5-21, 5-23, 5-24
displaying configuration 5-21, 5-22, 5-24, 5-25
switchovers
clearing 5-28
description 5-26
requesting 5-27
types 5-26
synchronizing
Synchronous Digital Hierarchy. See SDH
T
TACACS+
configuring 3-10
telnet command 9-11
terminal mux/demux modules
description 1-3
subcard position numbering 2-8, 2-9
threshold command 4-10
threshold-group command 4-10
threshold-list command 4-10
thresholds. See alarm thresholds
thru interfaces
configuring patch connections 4-20
description 2-8
topologies. See network topologies
topology hold-time command 9-5
topology neighbor agent ip-address command 6-8, 9-16, 9-18
topology neighbor cdp command 9-5
topology neighbor command 6-8, 9-16, 9-18
topology neighbor disable command 9-5
traffic filters
configuring 3-11
transparent interfaces
adding to network topology 9-17
configuration overview 4-1
configuring alarm thresholds 4-9to 4-12
configuring clock rates 4-2to 4-5
configuring protocol encapsulation 4-2to 4-5
configuring protocol monitoring 4-6
description 2-6
displaying network topology information 9-18
transponder modules
configuring y-cable protection 5-8
description 1-3
shutting down lasers 4-13to 4-18
splitter protection and 5-2
y-cable protection and 5-7
troubleshooting
cross connections 4-22
online diagnostics 1-9
shelf misconfigurations 4-21
U
unidirectional path switching
configuring 5-15
description 5-14
displaying configuration 5-19
example (figure) 5-14
unprotected channels
configuring in meshed ring topologies 8-51to 8-59, 8-74to 8-83
configuring in point-to-point topologies 7-9to 7-11
V
value command 4-10
W
wave interfaces
configuration overview 4-1
configuring alarm thresholds 4-9to 4-12
configuring forward laser control 4-16
configuring laser safety control 4-17
configuring patch connections 4-20
description 2-7
protocol monitoring 4-7
wavepatch interfaces
description 2-7
wdm interfaces
adding manually to network topologies, example 9-16to 9-17
configuring CDP 9-5
configuring patch connections 4-20
description 2-8
displaying CDP information 9-6
Y
y-cable protection
displaying configuration 5-9
Posted: Thu Aug 19 17:22:04 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.