cc/td/doc/product/mels/15540x/12_2_s
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents


Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - Y -

Index

Numerics

2.5-Gbps line card motherboards

description 1-3

2.5-Gbps transponder modules

configuration overview 4-1

description 1-3

10-Gbps line card motherboards

description 1-3

10-GE transponder modules

configuration overview 5-1

description 1-3, 1-8

A

AAA

configuring 3-9

add/drop mux/demux modules

description 1-3

interfaces 2-8, 2-9

See also mux/demux modules

aggregate shelf Ethernet interfaces. See ASE interfaces

alarm threshold

rates (table) 4-10, 5-8

alarm thresholds

configuring 4-9, 5-7

description 4-9, 5-7

displaying configuration 4-12, 5-9

MIBs 11-15

ALS

laser safety control and 4-15

amplifiers. See EDFAs

APS

configuring dual shelf nodes 8-5to 8-7

configuring line card protection 7-8to 7-10

configuring splitter protection 7-2to 7-6

lockouts 7-29to 7-32

MIBs 11-16

switchovers 7-29to 7-32

aps clear command 7-31

aps direction command 7-18

aps disable command 7-4, 7-9, 7-15, 7-18, 8-6

aps enable command 6-3, 7-4, 7-9, 7-13, 7-15, 7-19, 7-24, 7-25, 7-27, 7-28, 8-6

aps far-end command 8-6

aps lockout command 7-30

APS lockouts. See lockouts

aps message-channel command 6-3, 7-13

aps protection command 6-3, 7-4, 7-9, 7-13, 8-6

aps revertive command 7-15

aps switch command 7-30

APS switchovers. See switchovers

aps timer message holddown command 7-28

aps timer message max-interval command 7-28

aps timer oscp holddown command 7-19

aps timer oscp max-interval command 7-19

aps timer search-for-up command 7-24, 7-25, 7-27

aps timer wait-to-restore command 7-15

aps trigger command 4-10, 5-8

aps working command 6-3, 7-4, 7-9, 7-13, 7-18, 7-19, 8-6

aps y-cable command 7-9, 8-6

ASE interfaces

not supported (note) 2-10

associate group command 6-3, 7-4, 7-9, 7-13, 7-15, 7-18, 8-6

associate interface command 7-4

Authentication, Authorization, and Accounting. See AAA

autoboot

configuring 3-17

displaying configuration 3-17

See also booting

automatic laser shutdown. See ALS

Automatic Protection Switching. See APS

automatic synchronization

causes (table) 3-19

configuring 3-19

auto-sync running-config command 3-19

auto-sync startup-config command 3-19

auxiliary ports

interface naming convention 2-10

modem support 3-2

B

bands

description 1-3

bidirectional path switching

configuring 7-18

description 7-18

displaying configuration 7-23

example (figure) 7-19, 7-20

figure 7-18

boot command 3-27

booting

default behavior 3-27

bootload failure

system response 3-26

boot system command 3-17, 3-27

Break key

controlling 3-25

C

CDL

configuring IP 11-11to 11-14

cdl enable command 5-3

CDP

clearing information 11-5

configuring 11-3to 11-6

description 11-3

displaying configuration 11-3

displaying information 11-4

cdp advertise-v2 command 11-3

cdp holdtime command 11-3

cdp run command 11-3

cdp timer command 11-3

channel bands. See bands

channels

description 1-3

OSC 1-10

See also data channels

Cisco Discovery Protocol. See CDP

Cisco ONS 15540

configuration overview 2-10

starting up 3-2

See also hardware; shelf; software

CiscoView. See Embedded CiscoView

CiscoWorks2000

support 1-9

clear cdp counters command 11-5

clear cdp table command 11-5

CLI

description 2-1

help 2-3

client equipment

monitoring 11-21

client protection

configuring 7-6, 7-7

description 7-6, 7-7

See also line card protection; y-cable protection

client signals

extended range transponder support 1-5

MM transponder support 1-5

SM transponder support 1-4

transparent interfaces and 2-6

clock rate command 4-3

clock rates

configuring 4-2to 4-5

displaying configuration 4-6

laser shutdown and (note) 4-5

command-line interface. See CLI

command modes

description 2-1

table 2-2

commands

abbreviating 2-3

listing 2-3

syntax in documentation xxiii

compliance 1-8

components

description 1-3to 1-8

config-register command 3-17, 3-28

configuration register

changing value 3-17

See software configuration register

configurations

displaying 3-6

overview of tasks 2-10

synchronizing 3-18to 3-19

console ports

configuring modem support 3-2

using 3-2

See also NME

conventions

document xxiv

naming interfaces 2-4to 2-10

CPUs. See processor cards

cross connect drawers

description 1-3

cross connections

description 4-24, 5-17

displaying 4-25, 5-17

CTM

configuring SNMP

Cisco Transport Manager. See CTM

D

data channels

OSC and 1-10, 11-1

transponder module support 1-4

description command 4-10, 5-8

diagnostic tests. See online diagnostics

digital video. See DV

documentation

conventions xxiv

related xxiii

dual shelf nodes

configuring 8-1to 8-7

description 8-1

duplex command 3-4

DV

support on transponder modules 4-5

E

Embedded CiscoView

accessing 11-25

description 11-22

download URL 11-22

installing 11-22to 11-26

enable password command 3-4

enable passwords

description 3-3

enable secret command 3-4

enable secret passwords

description 3-3

encapsulation. See protocol encapsulation

encapsulation command 4-3

Enterprise Systems Connection. See ESCON

environment-monitor shutdown fan command 3-29

erbium-doped fiber amplifiers. See EDFAs

ESCON

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

network topologies and (note) 10-1

ethernetdcc interfaces 11-11

Ethernet management ports. See NME

extended range transponder modules

description 1-5

F

fan failure shutdown

configuring 3-29

description 3-29

displaying configuration 3-30

Fast Ethernet

configuring protocol encapsulation (table) 4-3

fastethernet 0 interfaces

configuring 3-3to 3-6

configuring IP addresses 3-4

description 2-10

IP on in-band message channel 11-12

IP on OSC 11-9

See also NME

fastethernet-sby 0 interfaces

description 2-10

See also NME

FDDI

configuring protocol encapsulation (table) 4-3

Fiber Connection. See FICON

Fibre Channel

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

FICON

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

filter interfaces

description 2-8

firewalls

configuring 3-11

Flash PC Cards

displaying contents 11-22

forward laser control

configuring 4-16

configuring tengigethernetphy interfaces 5-11

configuring waveethernetphy interfaces 5-11

description 4-13, 5-10

displaying configuration 4-17, 5-11

figure 4-14

OFC and (caution) 4-16

G

Gigabit Ethernet

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

H

hardware

components 1-3to 1-8

features 1-1to 1-8

OSC guidelines 11-2

shelf overview 1-1

Hello hold-down timer

configuring 11-7

Hello inactivity factor

configuring 11-7

Hello interval timer

configuring 11-6

help

CLI 2-3

hostname command 3-6

host names

configuring 3-6

hubbed ring topologies

configuring line card protection 10-26to 10-50

configuring splitter protection 10-3to 10-25

description 10-2

example (figure) 10-2

I

in-band message channel

description 1-9

displaying configuration 5-4, 11-14

enabling on tengigethernetphy interfaces 5-3

verifying connectivity 11-14

interface ethernetdcc command 11-12

interface loopback command 11-9, 11-12

interfaces

line card protection model (figure) 2-6

naming conventions 2-4to 2-10

splitter protection model (figure) 2-5

See also specific types of interfaces (for example, filter interfaces)

interface tengigethernetphy command 5-11

interface transparent command 4-3

interface wave command 4-16, 4-17, 4-20, 5-14, 6-9, 11-9

interface waveethernetphy command 5-11

interface wavepatch command 7-11

interface wdm command 11-19

IP

configuring on OSC interfaces 11-8to 11-11

configuring over CDL 11-11to 11-14

ip address command 3-4, 11-9, 11-12

IP addresses

configuring on NME 3-4

ethernetdcc interfaces 11-11

OSC wave interfaces 11-8

ip default-gateway command 3-4

ip route command 11-10, 11-13

ip unnumbered command 11-9, 11-12

K

Kerberos

configuring 3-9

L

laser control. See forward laser control; laser safety control

laser control forward enable command 4-16, 5-11

laser control safety enable command 4-17

lasers

displaying status 5-16

turning on and off 5-15

laser safety control

configuring 4-17

description 4-15

displaying configuration 4-18

figure 4-15

line card protection and 4-17

OFC and (caution) 4-17

splitter protection and (caution) 4-15, 7-4

laser shutdown

configuring 4-16to 4-18

description 4-13to 4-15

laser shutdown command 5-15

line card motherboards

configuring for line card protection 7-11

displaying cross connections (example) 4-25, 5-17

splitter protection and 7-3, 7-7

wavepatch interfaces 2-7

line card protection

configuring dual shelf topologies 8-1to 8-7

configuring hubbed ring topologies 10-26to 10-50

configuring meshed ring topologies 10-79to 10-102

configuring point-to-point topologies 9-9to 9-17

configuring splitter protected line card motherboards 7-11

configuring y-cable protection 7-8

considerations 7-7

description 7-6

displaying cross connections (example) 4-25, 5-17

example (figure) 7-7

interface model (figure) 2-6

lockouts 7-29to 7-32

switchovers 7-29to 7-32

See also y-cable protection

line card redundancy controllers. See LRCs

line vty command 3-4

lockouts

clearing 7-31

description 7-29

displaying status 7-31, 7-32

requesting 7-30

logical mesh topologies. See meshed ring topologies

loopback command 5-6

loopbacks

configuring 5-5to 5-7

displaying configuration 5-6

LRCs

description 1-8

M

maintenance-mode command 3-20

management ports. See NME

management systems. See network management systems

meshed ring topologies

configuring line card protection 10-79to 10-102

configuring line card protection with unprotected channels 10-102to 10-114

configuring splitter protection 10-51to 10-68

configuring splitter protection with unprotected channels 10-69to 10-78

description 10-3

example (figure) 10-3

MIBs

enabling 11-16to 11-17

processor support 3-1

supported 11-15

MM transponder modules

description 1-5

modem

support 3-2

monitor enable command 4-8

monitoring. See network monitoring; protocol monitoring

multimode transponder modules. See MM transponder modules

multiple trunk

support 1-11

mux/demux cabling

dual shelf nodes 8-2to 8-4

hubbed ring topologies with line card protection, example 10-27, 10-36, 10-40, 10-44, 10-48

hubbed ring topologies with splitter protection, example 10-5, 10-11, 10-15, 10-19, 10-23

meshed ring topologies with line card protection, example 10-80, 10-88, 10-92, 10-98

meshed ring topologies with splitter protection, example 10-53, 10-58, 10-61, 10-65

meshed ring topologies with unprotected channels, line card protection, example 10-104, 10-109

meshed ring topologies with unprotected channels, splitter protection, example 10-71, 10-75

point-to-point topologies without protection, example 9-19

mux/demux modules

configuring for line card protection 7-8

interfaces 2-8

mux/demux motherboards

description 1-3

N

network management Ethernet. See NME

network management systems

supported 1-9

See also Embedded CiscoView

network monitoring

CDP 11-3to 11-5

Embedded CiscoView 11-22to 11-26

OSCP 11-6to 11-8, ??to 11-8

transparent interfaces 11-21

without OSC 11-19to 11-21

Network Time Protocol. See NTP

network topologies

adding interfaces 11-21

configuring neighbor discovery 11-5

MIBs 11-16, 11-17

types 1-10

See also hubbed ring topologies; meshed ring topologies; point-to-point topologies

NME

configuring interfaces 3-3

description 2-10

displaying configuration 3-5

using 3-2

See also fastethernet 0 interfaces

notification-throttle timer command 4-9, 5-7

NTP

configuring 3-7

description 3-6

displaying configuration 3-8

ntp server command 3-7

ntp update-calendar command 3-7

O

OADMs. See add/drop mux/demux modules

OFC

configuring with encapsulation command 4-3

description 4-14

figure 4-14

forward laser control and (caution) 4-16

laser safety control and (caution) 4-17

online diagnostics

description 1-10

open fiber control. See OFC

optical add/drop mux/demux modules. See add/drop mux/demux modules

optical connections. See cross connections

optical mux/demux motherboards. See mux/demux motherboards

optical power thresholds

configuring 4-19, 5-14, 6-9

displaying configuration 4-20, 5-14, 6-10

trunk fiber based protection switchovers 6-5to 6-8

optical supervisory channel. See OSC

Optical Supervisory Channel Protocol. See OSCP

optical terminal mux/demux modules. See terminal mux/demux modules

optical threshold power receive command 4-20, 5-14, 6-9

OSC

description 1-10, 11-1to 11-2

hardware guidelines 11-2

OSCP 11-6to 11-8, ??to 11-8

signal path (figure) 11-2

oscfilter interfaces

configuring patch connections 4-21

description 2-9

OSC interfaces

configuring CDP 11-3to 11-5

configuring IP 11-8to 11-11

description 2-9

patch connections 4-21

OSCP

configuring 11-6to 11-7

description 11-2

displaying configuration 11-8

displaying neighbors 11-8

MIBs 11-16

OSC Protocol. See OSCP

oscp timer hello holddown command 11-7

oscp timer hello interval command 11-7

oscp timer inactivity-factor command 11-7

P

passwords

description 3-3

patch command 4-21

patch connections

configuring 4-2, 4-21to 4-24, 5-12to 5-13

configuring for PSMs 6-10to 6-11

description 4-21

displaying configuration 4-23, 5-13, 6-11

types (table) 4-21

path lockouts. See lockouts

path switching

configuring 7-18to 7-23

description 7-16to 7-18

example (figure) 7-17

y-cable protection and 7-21to 7-23

path switchovers. See switchovers

point-to-point topologies

configuring line card protection 9-9to 9-17

configuring splitter protection 9-3

configuring without protection 9-18to 9-21

description 9-1

example without protection (figure) 9-2

example with protection (figure) 9-2

multiple trunk support 1-11, 9-3

processor cards

autoboot 3-17

configuring 3-15to 3-23

description 1-8, 3-1

hardware state transitions 3-12

interfaces 2-10

redundant 3-15

reloading 3-22

slot assignments 1-2

software state transitions 3-13

starting up 3-2

processor redundancy. See redundancy

processors. See processor cards

processor switchovers

forcing 3-15to 3-16

protection

description 7-1

types 7-2to 7-10

protection switching. See path switching

protection switch modules. See PSMs

protocol encapsulation

configuring 4-2to 4-5

displaying configuration 4-6

types supported 1-4

protocol monitoring

configuring 4-8

description 4-6

displaying configuration 4-8

PSMs

configuring interfaces 6-2

description 1-3

network topology 6-11

optical power thresholds 6-5to 6-10

trunk fiber based protection 6-3

Q

quick laser shutdown. See forward laser control; laser safety control

R

RADIUS

configuring 3-10

redundancy

configuring 3-15to 3-23

description 3-11to 3-14

displaying alarm status (note) 3-12

displaying configuration 3-20

forcing switchovers 3-15to 3-16

MIBS 11-17

processor hardware state transitions 3-12

processor software state transitions 3-13

synchronizing configurations 3-18

redundancy command 3-19, 7-4

redundancy manual-sync command 3-18

redundancy reload peer command 3-22

redundancy reload shelf command 3-22

redundancy switch-activity command 3-15

reset command 3-16

reshape, retime, retransmit functions. See 3R functions

revertive switching

configuring 7-14

description 7-14

displaying configuration 7-15

ring topologies

description 10-1to 10-3

multiple trunk support 1-11, 10-3

See also hubbed ring topologies; meshed ring topologies

router bgp command 11-10, 11-13

router eigrp command 11-10, 11-13

router ospf command 11-10, 11-13

S

SDH

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

security features

AAA 3-9

firewalls 3-11

Kerberos 3-9

overview 3-8

passwords and privileges 3-11

RADIUS 3-10

TACACS+ 3-10

traffic filters 3-11

selectable transceivers. See transceivers

SFP optics

description 1-6

shelf

configuration examples

hubbed ring topologies with splitter protection 10-10, 10-18

point-to-point topologies with line card protection, 32 channels 8-3

point-to-point topologies without protection 9-18

configuration overview 2-10

description 1-1

layout (figure) 1-2

starting up 3-2

show aps command 6-4, 7-5, 7-10, 7-14

show bootvar command 3-17

show cdp command 11-3

show cdp entry command 11-4

show cdp interface command 11-4

show cdp neighbor command 11-4

show cdp traffic command 11-4

show ciscoview package command 11-25

show ciscoview version command 11-25

show connect command 4-25, 5-17

show environment command 3-30

show flash command 11-22

show hardware command 3-4

show interfaces transparent command 4-6

show ntp status command 3-8

show oscp info command 11-8

show oscp neighbor command 11-8

show patch command 4-23, 5-13, 6-11

show redundancy capability command 3-20

show redundancy running-config-file command 3-20

show redundancy summary command 3-20, 3-23

show threshold-list command 4-12, 5-9

show topology command 6-12, 11-6, 11-22

show topology neighbor command 11-20

show version command 3-17

shutdown command 4-5, 7-11

Simple Network Management Protocol. See SNMP

single-mode transponder modules. See SM transponder modules

SM transponder modules

description 1-4

SNMP

configuring 11-14

configuring alarm thresholds (table) 4-9, 5-7

processor support 3-1

snmp mib command 11-18

snmp-server enable traps aps command 11-16

snmp-server enable traps oscp command 11-16

snmp-server enable traps patch command 11-16

snmp-server enable traps rf command 11-17

snmp-server enable traps threshold min-severity command 11-15

snmp-server enable traps topology command 11-17

snmp-server engineID command 11-18

snmp-server host command 11-18

software

features 1-9to 1-11

software configuration register

boot field values 3-26

Break key, controlling 3-25

changing 3-28

description 3-24

IP broadcast address 3-25

response to bootload failure 3-26

settings 3-25

verifying value 3-28

SONET

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

SONET APS. See APS

speed command 3-4

splitter protection

configuring 7-3

configuring hubbed ring topologies 10-3to 10-25

configuring meshed ring topologies 10-51to 10-68

configuring meshed ring topologies with unprotected channels 10-69to 10-78

configuring point-to-point topologies 9-3

considerations 7-3

description 7-2

displaying configuration 7-5

displaying cross connections (example) 4-25, 5-17

example (figure) 7-2

figure 2-5

interface model (figure) 2-5

lockouts 7-29to 7-32

switchovers 7-29to 7-32

SRCs

description 1-8

standards compliance. See compliance

standby privilege-mode enable command 3-23

standby processor card

enabling privileged EXEC mode access 3-23

switchcard redundancy controllers. See SRCs

switchover command 3-15

switchover-enable timer

configuring 7-24, 7-25, 7-26, 7-28

displaying configuration 7-24, 7-26, 7-27, 7-29

switchovers

clearing 7-31

description 7-29

displaying status 7-31, 7-32

requesting 7-30

types 7-30

synchronizing

configurations 3-18to 3-19

Synchronous Digital Hierarchy. See SDH

system management

TACACS 3-10

T

TACACS 3-10

TACACS+

configuring 3-10

telnet command 11-11, 11-14

tengigethernetphy interfaces

configuration overview 5-1

configuring alarm thresholds 5-7to 5-10

configuring CDP 11-5

configuring forward laser control 5-11

description 2-6

enabling 5-2

loopbacks 5-5to 5-7

terminal mux/demux modules

description 1-3

See also mux/demux modules

threshold command 4-10, 5-8

threshold-group command 4-10, 5-8

threshold-list command 4-9, 5-7

thresholds. See alarm thresholds

thru interfaces

configuring patch connections 4-21

description 2-8

topologies. See network topologies

topology hold-time command 11-5

topology neighbor agent ip-address command 6-12, 8-5, 11-19, 11-21

topology neighbor cdp command 11-5

topology neighbor command 6-12, 8-5, 11-19, 11-21

topology neighbor disable command 11-5

traffic filters

configuring 3-11

transceivers. See SFP optics

transparent interfaces

adding to network topology 11-21

configuration overview 4-1

configuring alarm thresholds 4-9to 4-13

configuring clock rates 4-2to 4-5

configuring protocol encapsulation 4-2to 4-5

configuring protocol monitoring 4-6

description 2-6

displaying network topology information 6-12, 11-22

transponder modules

configuring y-cable protection 7-8

description 1-4

interfaces 2-6, 2-7

shutting down lasers 4-13to 4-18

splitter protection and 7-3

y-cable protection and 7-7

troubleshooting

cross connections 4-24, 5-17

online diagnostics 1-10

shelf misconfigurations 4-23, 5-13

trunk fiber based protection

configuring wdmsplit interfaces 6-3

switchovers and optical power thresholds 6-5to 6-8

trunk fiber protection

considerations 7-13

description 7-12

scheme (figure) 7-12

U

unidirectional path switching

configuring 7-18

description 7-17

displaying configuration 7-23

example (figure) 7-17

unprotected channels

configuring in meshed ring topologies 10-69to 10-78, 10-102to 10-114

configuring in point-to-point topologies 9-18to 9-21

V

value command 4-10, 5-8

W

waveethernetphy interfaces

configuration overview 5-2

configuring alarm thresholds 5-7to 5-10

configuring forward laser control 5-11

description 2-7

enabling 5-4

loopbacks 5-5to 5-7

wave interfaces

configuration overview 4-1

configuring alarm thresholds 4-9to 4-13

configuring forward laser control 4-16

configuring laser safety control 4-17

configuring patch connections 4-21

description 2-7

protocol monitoring 4-7

wavepassthru interfaces

configuring patch connections 5-12

wavepatch interfaces

configuration overview 5-2

configuring patch connections 5-12

description 2-7

wdm interfaces

adding manually to network topologies, example 11-19to 11-21

configuring CDP 11-5

configuring patch connections 4-21

description 2-8

displaying CDP information 11-6

wdmrelay interfaces

configuring patch connections 6-10

wdmsplit interface

enabling 6-2

wdmsplit interfaces

displaying information 6-3

Y

y-cable protection

displaying configuration 7-10

path switching and 7-21to 7-23


hometocprevnextglossaryfeedbacksearchhelp

Posted: Fri Oct 15 09:01:56 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.