cc/td/doc/product/mels/15540x/12_2_sv
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - Y -

Index

Numerics

10-Gbps line card motherboards

description 1-3

10-GE transponder modules

configuration overview 5-1

description 1-3, 1-8

2.5-Gbps line card motherboards

description 1-3

2.5-Gbps transponder modules

configuration overview 4-1

description 1-3

A

AAA

configuring 3-8

add/drop mux/demux modules

description 1-3

interfaces 2-8, 2-9

See also mux/demux modules

aggregate shelf Ethernet interfaces. See ASE interfaces

alarm threshold

rates (table) 4-11, 5-9

alarm thresholds

configuring 4-9, 5-7

description 4-9, 5-7

displaying configuration 4-12, 5-10

MIBs 11-15

rates (table) 4-10, 5-8

ALS

laser safety control and 4-15

amplifiers. See EDFAs

APS

configuring dual shelf nodes 8-5to 8-7

configuring line card protection 7-8to 7-10

configuring splitter protection 7-2to 7-6

lockouts 7-30to 7-33

MIBs 11-16

switchovers 7-30to 7-33

aps clear command 7-32

aps direction command 7-19

aps disable command 7-4, 7-9, 7-15, 7-19, 8-6

aps enable command 6-3, 7-4, 7-9, 7-14, 7-15, 7-19, 7-24, 7-26, 7-27, 7-29, 8-6

aps far-end command 8-6

aps lockout command 7-31

APS lockouts. See lockouts

aps message-channel command 6-3, 7-14

aps protection command 6-3, 7-4, 7-9, 7-14, 8-6

aps revertive command 7-15

aps switch command 7-31

APS switchovers. See switchovers

aps timer message holddown command 7-29

aps timer message max-interval command 7-29

aps timer oscp holddown command 7-19

aps timer oscp max-interval command 7-19

aps timer search-for-up command 7-24, 7-26, 7-27

aps timer wait-to-restore command 7-15

aps trigger command 4-10, 5-8

aps working command 6-3, 7-4, 7-9, 7-14, 7-19, 8-6

aps y-cable command 7-9, 8-6

ASE interfaces

not supported (note) 2-10

associate group command 6-3, 7-4, 7-9, 7-14, 7-15, 7-19, 8-6

associate interface command 7-4

Authentication, Authorization, and Accounting. See AAA

autoboot

configuring 3-20

displaying configuration 3-20

See also booting

automatic laser shutdown. See ALS

Automatic Protection Switching. See APS

automatic synchronization

causes (table) 3-22

configuring 3-21

auto-sync running-config command 3-22

auto-sync startup-config command 3-22

auxiliary ports

interface naming convention 2-10

modem support 3-2

B

bands

description 1-3

bidirectional path switching

configuring 7-19

description 7-18

displaying configuration 7-23

example (figure) 7-20

figure 7-18

boot command 3-33

booting

default behavior 3-32

bootload failure

system response 3-32

boot system command 3-20, 3-32

Break key

controlling 3-31

C

CDL

configuring IP 11-11to 11-14

cdl enable command 5-3

CDP

clearing information 11-5

configuring 11-3to 11-6

description 11-3

displaying configuration 11-4

displaying information 11-4

cdp advertise-v2 command 11-3

cdp holdtime command 11-3

cdp run command 11-3

cdp timer command 11-3

channel bands. See bands

channels

description 1-3

OSC 1-9

See also data channels

Cisco Discovery Protocol. See CDP

Cisco ONS 15540

configuration overview 2-10

starting up 3-2

See also hardware; shelf; software

CiscoView. See Embedded CiscoView

CiscoWorks2000

support 1-9

clear cdp counters command 11-5

clear cdp table command 11-5

clear performance history command 4-26, 5-19

CLI

description 2-1

help 2-3

client equipment

monitoring 11-20

client protection

configuring 7-6, 7-7

description 7-6, 7-7

See also line card protection; y-cable protection

client signals

extended range transponder support 1-5

MM transponder support 1-5

SM transponder support 1-4

transparent interfaces and 2-6

clock rate command 4-3

clock rates

configuring 4-2to 4-5

displaying configuration 4-6

laser shutdown and (note) 4-5

command, disconnect ssh 3-12

command, ip domain-name 3-11

command, show ip ssh 3-12

command, ssh 3-12

command hostname 3-11

command-line interface. See CLI

command modes

description 2-1

table 2-2

commands

abbreviating 2-3

listing 2-3

command show ssh 3-12

compliance 1-8

components

description 1-3to 1-8

config-register command 3-20, 3-33

configuration register

changing value 3-20

See software configuration register

configurations

displaying 3-6

overview of tasks 2-10

synchronizing 3-21to 3-22

connectivity

checking 3-14

console ports

configuring modem support 3-2

using 3-2

See also NME

conventions

naming interfaces 2-4to 2-10

CPUs. See processor cards

critical temperature shutdown

configuring 3-37

description 3-36

displaying thresholds 3-37

cross connect drawers

description 1-4

cross connections

description 4-24, 5-16

displaying 4-25, 5-17

crypto key command 3-11

D

data channels

OSC and 1-10, 11-1

transponder module support 1-4

description command 4-10, 5-8

diagnostic tests. See online diagnostics

digital video. See DV

disconnect ssh command 3-12

documentation

related xx

dual shelf nodes

configuring 8-1to 8-7

description 8-1

duplex command 3-4

DV

support on transponder modules 4-5

E

Embedded CiscoView

accessing 11-24

description 11-21

download URL 11-21

installing 11-21to 11-25

enable password command 3-4

enable passwords

description 3-3

enable secret command 3-4

enable secret passwords

description 3-3

encapsulation. See protocol encapsulation

encapsulation command 4-3

Enterprise Systems Connection. See ESCON

environment-monitor shutdown fan command 3-35

environment-monitor shutdown temperature command 3-37

environment-monitor temperature-threshold command 3-37

erbium-doped fiber amplifiers. See EDFAs

ESCON

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

network topologies and (note) 10-1

ethernetdcc interfaces 11-11

Ethernet management ports. See NME

extended range transponder modules

description 1-5

F

fan failure shutdown

configuring 3-35

description 3-34

displaying configuration 3-35

Fast Ethernet

configuring protocol encapsulation (table) 4-3

fastethernet 0 interfaces

configuring 3-3to 3-6

configuring IP addresses 3-4

description 2-9

IP on in-band message channel 11-12

IP on OSC 11-9

See also NME

fastethernet-sby 0 interfaces

description 2-9

See also NME

FDDI

configuring protocol encapsulation (table) 4-3

Fiber Connection. See FICON

Fibre Channel

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

FICON

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

filter interfaces

description 2-8

firewalls

configuring 3-14

Flash PC Cards

displaying contents 11-21

forward laser control

configuring 4-16

configuring tengigethernetphy interfaces 5-11

configuring waveethernetphy interfaces 5-11

description 4-13

displaying configuration 4-17, 5-12

figure 4-13

OFC and (caution) 4-16

G

Gigabit Ethernet

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

H

hardware

components 1-3to 1-8

features 1-1to 1-8

OSC guidelines 11-2

shelf overview 1-1

Hello hold-down timer

configuring 11-7

Hello inactivity factor

configuring 11-7

Hello interval timer

configuring 11-7

help

CLI 2-3

hostname command 3-6, 3-11

host names

configuring 3-6

hubbed ring topologies

configuring line card protection 10-22to 10-45

configuring splitter protection 10-3to 10-21

description 10-1

example (figure) 10-2

I

in-band message channel

description 1-9

displaying configuration 5-4, 11-14

enabling on tengigethernetphy interfaces 5-3

verifying connectivity 11-14

interface ethernetdcc command 11-12

interface loopback command 11-9, 11-12

interfaces

line card protection model (figure) 2-6

naming conventions 2-4to 2-10

splitter protection model (figure) 2-5

See also specific types of interfaces (for example, filter interfaces)

interface tengigethernetphy command 5-11

interface transparent command 4-3

interface wave command 4-16, 4-17, 4-20, 5-14, 6-8, 6-9, 11-9

interface waveethernetphy command 5-11

interface wavepatch command 7-11

interface wdm command 11-18

IP

configuring on OSC interfaces 11-9to 11-11

configuring over CDL 11-11to 11-14

ip address command 3-4, 11-9, 11-12

IP addresses

configuring on NME 3-4

ethernetdcc interfaces 11-11

OSC wave interfaces 11-9

ip default-gateway command 3-4

ip domain-name command 3-11

ip route command 11-10, 11-13

ip unnumbered command 11-9, 11-12

K

Kerberos

configuring 3-9

L

laser control. See forward laser control; laser safety control

laser control forward enable command 4-16, 5-11

laser control safety enable command 4-17

lasers

displaying status 5-16

turning on and off 5-15

laser safety control

configuring 4-17

description 4-15

displaying configuration 4-18

figure 4-15

line card protection and 4-17

OFC and (caution) 4-17

splitter protection and (caution) 4-15, 7-4

laser shutdown

configuring 4-16to 4-18

description 4-13to 4-15

laser shutdown command 5-15

line card motherboards

configuring for line card protection 7-11

displaying cross connections (example) 4-25, 5-17

splitter protection and 7-3, 7-8

wavepatch interfaces 2-7

line card protection

configuring dual shelf topologies 8-1to 8-7

configuring hubbed ring topologies 10-22to 10-45

configuring meshed ring topologies 10-72to 10-94

configuring point-to-point topologies 9-9to 9-17

configuring splitter protected line card motherboards 7-11

configuring y-cable protection 7-8

considerations 7-8

description 7-6

displaying cross connections (example) 4-25, 5-17

example (figure) 7-7

interface model (figure) 2-6

lockouts 7-30to 7-33

switchovers 7-30to 7-33

See also y-cable protection

line card redundancy controllers. See LRCs

line vty command 3-4

lockouts

clearing 7-32

description 7-30

displaying status 7-31, 7-32

requesting 7-31

logical mesh topologies. See meshed ring topologies

loopback command 5-6

loopbacks

configuring 5-5to 5-7

displaying configuration 5-6

LRCs

description 1-8

M

maintenance-mode command 3-23

management ports. See NME

management systems. See network management systems

meshed ring topologies

configuring line card protection 10-72to 10-94

configuring line card protection with unprotected channels 10-94to 10-104

configuring splitter protection 10-46to 10-63

configuring splitter protection with unprotected channels 10-63to 10-72

description 10-2

example (figure) 10-3

MIBs

enabling 11-16to 11-17

processor support 3-1

supported 11-15

MM transponder modules

description 1-5

modem

support 3-2

monitor enable command 4-8

monitoring. See network monitoring; protocol monitoring

multimode transponder modules. See MM transponder modules

multiple trunk

support 1-10

mux/demux cabling

dual shelf nodes 8-2to 8-4

hubbed ring topologies with line card protection, example 10-23, 10-31, 10-35, 10-39, 10-43

hubbed ring topologies with splitter protection, example 10-5, 10-11, 10-14, 10-17, 10-20

meshed ring topologies with line card protection, example 10-74, 10-81, 10-85, 10-90

meshed ring topologies with splitter protection, example 10-48, 10-53, 10-56, 10-60

meshed ring topologies with unprotected channels, line card protection, example 10-96, 10-100

meshed ring topologies with unprotected channels, splitter protection, example 10-65, 10-69

point-to-point topologies without protection, example 9-19

mux/demux modules

configuring for line card protection 7-8

interfaces 2-8

mux/demux motherboards

description 1-3

N

network management Ethernet. See NME

network management systems

supported 1-9

See also Embedded CiscoView

network monitoring

CDP 11-3to 11-5

Embedded CiscoView 11-21to 11-25

OSCP 11-6to 11-8

transparent interfaces 11-20

without OSC 11-18to 11-20

Network Time Protocol. See NTP

network topologies

adding interfaces 11-20

configuring neighbor discovery 11-5

MIBs 11-16, 11-17

types 1-10

See also hubbed ring topologies; meshed ring topologies; point-to-point topologies

NME

configuring interfaces 3-3

description 2-9

displaying configuration 3-5

using 3-2

See also fastethernet 0 interfaces

no environment-monitor temperature-threshold command 3-37

notification-throttle timer command 4-9, 5-7

NTP

configuring 3-7

description 3-6

displaying configuration 3-8

ntp server command 3-7

ntp update-calendar command 3-7

O

OADMs. See add/drop mux/demux modules

OFC

configuring with encapsulation command 4-3

description 4-14

figure 4-14

forward laser control and (caution) 4-16

laser safety control and (caution) 4-17

online diagnostics

description 1-10

open fiber control. See OFC

optical add/drop mux/demux modules. See add/drop mux/demux modules

optical budgets. See optical power budgets

optical connections. See cross connections

optical mux/demux motherboards. See mux/demux motherboards

optical power budgets

system specifications 1-8

optical power thresholds

configuring 4-19, 5-14, 6-8

displaying configuration 4-20, 5-14, 6-9

trunk fiber based protection switchovers 6-4to 6-8

optical supervisory channel. See OSC

Optical Supervisory Channel Protocol. See OSCP

optical terminal mux/demux modules. See terminal mux/demux modules

optical threshold power receive command 4-20, 5-14, 6-8, 6-9

OSC

description 1-9, 11-1to 11-2

hardware guidelines 11-2

OSCP 11-6to 11-8

signal path (figure) 11-2

oscfilter interfaces

configuring patch connections 4-21

description 2-9

OSC interfaces

configuring CDP 11-3to 11-5

configuring IP 11-9to 11-11

description 2-9

patch connections 4-21

OSCP

configuring 11-6to 11-8

description 11-2

displaying configuration 11-8

displaying neighbors 11-8

MIBs 11-16

OSC Protocol. See OSCP

oscp timer hello holddown command 11-7

oscp timer hello interval command 11-7

oscp timer inactivity-factor command 11-8

P

passwords

description 3-3

patch command 4-21

patch connections

configuring 4-2, 4-21to 4-24, 5-12to 5-13

configuring for PSMs 6-10to 6-11

description 4-21

displaying configuration 4-23, 5-13, 6-10

types (table) 4-21

path lockouts. See lockouts

path switching

configuring 7-19to 7-24

description 7-17to 7-19

example (figure) 7-17

y-cable protection and 7-21to 7-23

path switchovers. See switchovers

performance history counters

description 4-25, 5-17

displaying 4-26, 5-18

point-to-point topologies

configuring line card protection 9-9to 9-17

configuring splitter protection 9-3

configuring without protection 9-17to 9-21

description 9-1

example without protection (figure) 9-2

example with protection (figure) 9-2

multiple trunk support 1-10, 9-3

power budgets. See optical power budgets

processor cards

autoboot 3-20

configuring 3-18to 3-25

description 1-8, 3-1

hardware state transitions 3-15

interfaces 2-9

redundant 3-18

reloading 3-25

slot assignments 1-2

software state transitions 3-16

starting up 3-2

processor redundancy. See redundancy

processors. See processor cards

processor switchovers

forcing 3-18to 3-19

protection

description 7-1

types 7-2to 7-10

protection switching. See path switching

protection switch modules. See PSMs

protocol encapsulation

configuring 4-2to 4-5

displaying configuration 4-6

types supported 1-4

protocol monitoring

configuring 4-8

description 4-6

displaying configuration 4-8

PSMs

configuring interfaces 6-2

description 1-3

network topology 6-11

optical power thresholds 6-4to 6-9

trunk fiber based protection 6-3

Q

quick laser shutdown. See forward laser control; laser safety control

R

RADIUS

configuring 3-9

redundancy

configuring 3-18to 3-25

description 3-15to 3-17

displaying alarm status (note) 3-15

displaying configuration 3-23

forcing switchovers 3-18to 3-19

MIBS 11-17

processor hardware state transitions 3-15

processor software state transitions 3-16

synchronizing configurations 3-21

redundancy command 3-22, 7-4

redundancy manual-sync command 3-21

redundancy reload peer command 3-25

redundancy reload shelf command 3-25

redundancy switch-activity command 3-18

reset command 3-19

reshape, retime, retransmit functions. See 3R functions

revertive switching

configuring 7-15

description 7-15

displaying configuration 7-16

ring topologies

description 10-1to 10-3

multiple trunk support 1-10, 10-3

See also hubbed ring topologies; meshed ring topologies

router bgp command 11-10, 11-13

router eigrp command 11-10, 11-13

router ospf command 11-10, 11-13

S

SDH

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

Secure Shell. See SSH

Secure Shell. See SSH.

security features

AAA 3-8

firewalls 3-14

Kerberos 3-9

overview 3-8

passwords and privileges 3-14

RADIUS 3-9

TACACS+ 3-10

traffic filters 3-14

selectable transceivers. See transceivers

SFP optics

description 1-5

shelf

configuration examples

hubbed ring topologies with splitter protection 10-10, 10-16

point-to-point topologies with line card protection, 32 channels 8-3

point-to-point topologies without protection 9-18

configuration overview 2-10

description 1-1

layout (figure) 1-2

starting up 3-2

show aps command 6-4, 7-5, 7-10, 7-14

show bootvar command 3-20

show cdp command 11-4

show cdp entry command 11-4

show cdp interface command 11-4

show cdp neighbor command 11-4

show cdp traffic command 11-4

show ciscoview package command 11-24

show ciscoview version command 11-24

show connect command 4-25, 5-17

show environment command 3-14, 3-35, 3-37

show flash command 11-21

show hardware command 3-4

show interfaces transparent command 4-6

show ip ssh command 3-12

show ntp status command 3-8

show oscp info command 11-8

show oscp neighbor command 11-8

show patch command 4-23, 5-13, 6-10

show performance command 4-26, 5-18

show processes command 3-13

show protocols command 3-13

show redundancy capability command 3-23

show redundancy running-config-file command 3-23

show redundancy summary command 3-23, 3-26

show ssh command 3-12

show stacks command 3-13

show threshold-list command 4-12, 5-10

show topology command 6-12, 11-6, 11-21

show topology neighbor command 11-19

show version command 3-20

shutdown command 4-5, 7-11

Simple Network Management Protocol. See SNMP

single-mode transponder modules. See SM transponder modules

SM transponder modules

description 1-4

SNMP

configuring 11-14

configuring alarm thresholds (table) 4-9, 5-7

processor support 3-1

snmp-server enable traps aps command 11-16

snmp-server enable traps oscp command 11-16

snmp-server enable traps patch command 11-16

snmp-server enable traps rf command 11-17

snmp-server enable traps threshold min-severity command 11-15

snmp-server enable traps topology command 11-17

software

features 1-8to 1-10

software configuration register

boot field values 3-32

Break key, controlling 3-31

changing 3-33

description 3-30

IP broadcast address 3-31

response to bootload failure 3-32

settings 3-30

verifying value 3-34

SONET

configuring protocol encapsulation (table) 4-3

configuring protocol monitoring 1-7, 4-6

SONET APS. See APS

speed command 3-4

splitter protection

configuring 7-3

configuring hubbed ring topologies 10-3to 10-21

configuring meshed ring topologies 10-46to 10-63

configuring meshed ring topologies with unprotected channels 10-63to 10-72

configuring point-to-point topologies 9-3

considerations 7-3

description 7-2

displaying configuration 7-5

displaying cross connections (example) 4-25, 5-17

example (figure) 7-2

figure 2-5

interface model (figure) 2-5

lockouts 7-30to 7-33

switchovers 7-30to 7-33

SRCs

description 1-8

SSH

configuring 3-11to 3-12

disconnecting 3-12

displaying 3-12

overview 3-11

ssh command 3-12

standards compliance. See compliance

standby privilege-mode enable command 3-25

standby processor card

enabling privileged EXEC mode access 3-25

switchcard redundancy controllers. See SRCs

switchover command 3-18

switchover-enable timer

configuring 7-24, 7-25, 7-27, 7-28

displaying configuration 7-25, 7-26, 7-28, 7-29

switchovers

clearing 7-32

description 7-30

displaying status 7-31, 7-32

requesting 7-31

types 7-30

synchronizing

configurations 3-21to 3-22

Synchronous Digital Hierarchy. See SDH

system management

checking basic connectivity 3-14

TACACS 3-10

T

TACACS 3-10

TACACS+

configuring 3-10

telnet command 11-11, 11-14

tengigethernetphy interfaces

configuration overview 5-1

configuring alarm thresholds 5-7to 5-10

configuring CDP 11-5

configuring forward laser control 5-11

description 2-6

enabling 5-2

loopbacks 5-5to 5-7

terminal mux/demux modules

description 1-3

See also mux/demux modules

threshold command 4-10, 5-8

threshold-group command 4-10, 5-8

threshold-list command 4-9, 5-7

thresholds. See alarm thresholds

thru interfaces

configuring patch connections 4-21

description 2-8

topologies. See network topologies

topology hold-time command 11-5

topology neighbor agent ip-address command 6-11, 6-12, 8-5, 11-18, 11-20

topology neighbor cdp command 11-6

topology neighbor command 6-11, 6-12, 8-5, 11-18, 11-20

topology neighbor disable command 11-6

traffic filters

configuring 3-14

transceivers. See SFP optics

transparent interfaces

adding to network topology 11-20

configuration overview 4-1

configuring alarm thresholds 4-9to 4-13

configuring clock rates 4-2to 4-5

configuring protocol encapsulation 4-2to 4-5

configuring protocol monitoring 4-6

description 2-6

displaying network topology information 6-12, 11-21

transponder modules

configuring y-cable protection 7-8

description 1-4

interfaces 2-6, 2-7

shutting down lasers 4-13to 4-18

splitter protection and 7-3

y-cable protection and 7-7

troubleshooting

cross connections 4-24, 5-16

online diagnostics 1-10

shelf misconfigurations 4-23, 5-13

trunk fiber based protection

configuring wdmsplit interfaces 6-3

switchovers and optical power thresholds 6-4to 6-8

trunk fiber protection

considerations 7-13

description 7-12

scheme (figure) 7-13

U

unidirectional path switching

configuring 7-19

description 7-17

displaying configuration 7-23

example (figure) 7-18

unprotected channels

configuring in meshed ring topologies 10-63to 10-72, 10-94to 10-104

configuring in point-to-point topologies 9-17to 9-21

V

value command 4-10, 5-8

W

waveethernetphy interfaces

configuration overview 5-2

configuring alarm thresholds 5-7to 5-10

configuring forward laser control 5-11

description 2-7

enabling 5-4

loopbacks 5-5to 5-7

wave interfaces

configuration overview 4-2

configuring alarm thresholds 4-9to 4-13

configuring forward laser control 4-16

configuring laser safety control 4-17

configuring patch connections 4-21

description 2-7

protocol monitoring 4-7

wavepassthru interfaces

configuring patch connections 5-12

wavepatch interfaces

configuration overview 5-2

configuring patch connections 5-12

description 2-7

wdm interfaces

adding manually to network topologies, example 11-18to 11-20

configuring CDP 11-5

configuring patch connections 4-21

description 2-8

displaying CDP information 11-6

wdmrelay interfaces

configuring patch connections 6-10

wdmsplit interface

enabling 6-2

wdmsplit interfaces

displaying information 6-2

Y

y-cable protection

displaying configuration 7-10

path switching and 7-21to 7-23


hometocprevnextglossaryfeedbacksearchhelp

Posted: Thu Feb 16 04:05:53 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.