|
Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - Y -
Index
Numerics
10-Gbps line card motherboards
description 1-3
10-GE transponder modules
configuration overview 5-1
2.5-Gbps line card motherboards
description 1-3
2.5-Gbps transponder modules
configuration overview 4-1
description 1-3
A
AAA
configuring 3-8
add/drop mux/demux modules
description 1-3
aggregate shelf Ethernet interfaces. See ASE interfaces
alarm threshold
alarm thresholds
displaying configuration 4-12, 5-10
MIBs 11-15
ALS
laser safety control and 4-15
APS
configuring dual shelf nodes 8-5to 8-7
configuring line card protection 7-8to 7-10
configuring splitter protection 7-2to 7-6
MIBs 11-16
aps clear command 7-32
aps direction command 7-19
aps disable command 7-4, 7-9, 7-15, 7-19, 8-6
aps enable command 6-3, 7-4, 7-9, 7-14, 7-15, 7-19, 7-24, 7-26, 7-27, 7-29, 8-6
aps far-end command 8-6
aps lockout command 7-31
aps message-channel command 6-3, 7-14
aps protection command 6-3, 7-4, 7-9, 7-14, 8-6
aps revertive command 7-15
aps switch command 7-31
APS switchovers. See switchovers
aps timer message holddown command 7-29
aps timer message max-interval command 7-29
aps timer oscp holddown command 7-19
aps timer oscp max-interval command 7-19
aps timer search-for-up command 7-24, 7-26, 7-27
aps timer wait-to-restore command 7-15
aps working command 6-3, 7-4, 7-9, 7-14, 7-19, 8-6
ASE interfaces
not supported (note) 2-10
associate group command 6-3, 7-4, 7-9, 7-14, 7-15, 7-19, 8-6
associate interface command 7-4
Authentication, Authorization, and Accounting. See AAA
autoboot
configuring 3-20
displaying configuration 3-20
automatic laser shutdown. See ALS
Automatic Protection Switching. See APS
automatic synchronization
causes (table) 3-22
configuring 3-21
auto-sync running-config command 3-22
auto-sync startup-config command 3-22
auxiliary ports
interface naming convention 2-10
modem support 3-2
B
bands
description 1-3
bidirectional path switching
configuring 7-19
description 7-18
displaying configuration 7-23
example (figure) 7-20
figure 7-18
boot command 3-33
booting
default behavior 3-32
bootload failure
system response 3-32
boot system command 3-20, 3-32
Break key
controlling 3-31
C
CDL
cdl enable command 5-3
CDP
clearing information 11-5
description 11-3
displaying configuration 11-4
displaying information 11-4
cdp advertise-v2 command 11-3
cdp holdtime command 11-3
cdp run command 11-3
cdp timer command 11-3
channels
description 1-3
OSC 1-9
Cisco Discovery Protocol. See CDP
Cisco ONS 15540
configuration overview 2-10
starting up 3-2
See also hardware; shelf; software
CiscoView. See Embedded CiscoView
CiscoWorks2000
support 1-9
clear cdp counters command 11-5
clear cdp table command 11-5
clear performance history command 4-26, 5-19
CLI
description 2-1
help 2-3
client equipment
monitoring 11-20
client protection
See also line card protection; y-cable protection
client signals
extended range transponder support 1-5
MM transponder support 1-5
SM transponder support 1-4
transparent interfaces and 2-6
clock rate command 4-3
clock rates
displaying configuration 4-6
laser shutdown and (note) 4-5
command, disconnect ssh 3-12
command, ip domain-name 3-11
command, show ip ssh 3-12
command, ssh 3-12
command hostname 3-11
command-line interface. See CLI
command modes
description 2-1
table 2-2
commands
abbreviating 2-3
listing 2-3
command show ssh 3-12
compliance 1-8
components
config-register command 3-20, 3-33
configuration register
changing value 3-20
See software configuration register
configurations
displaying 3-6
overview of tasks 2-10
connectivity
checking 3-14
console ports
configuring modem support 3-2
using 3-2
conventions
critical temperature shutdown
configuring 3-37
description 3-36
displaying thresholds 3-37
cross connect drawers
description 1-4
cross connections
crypto key command 3-11
D
data channels
transponder module support 1-4
diagnostic tests. See online diagnostics
disconnect ssh command 3-12
documentation
related xx
dual shelf nodes
description 8-1
duplex command 3-4
DV
support on transponder modules 4-5
E
Embedded CiscoView
accessing 11-24
description 11-21
download URL 11-21
enable password command 3-4
enable passwords
description 3-3
enable secret command 3-4
enable secret passwords
description 3-3
encapsulation. See protocol encapsulation
encapsulation command 4-3
Enterprise Systems Connection. See ESCON
environment-monitor shutdown fan command 3-35
environment-monitor shutdown temperature command 3-37
environment-monitor temperature-threshold command 3-37
erbium-doped fiber amplifiers. See EDFAs
ESCON
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-7, 4-6
network topologies and (note) 10-1
ethernetdcc interfaces 11-11
Ethernet management ports. See NME
extended range transponder modules
description 1-5
F
fan failure shutdown
configuring 3-35
description 3-34
displaying configuration 3-35
Fast Ethernet
configuring protocol encapsulation (table) 4-3
fastethernet 0 interfaces
configuring IP addresses 3-4
description 2-9
IP on in-band message channel 11-12
IP on OSC 11-9
fastethernet-sby 0 interfaces
description 2-9
FDDI
configuring protocol encapsulation (table) 4-3
Fibre Channel
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-7, 4-6
FICON
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-7, 4-6
filter interfaces
description 2-8
firewalls
configuring 3-14
Flash PC Cards
displaying contents 11-21
forward laser control
configuring 4-16
configuring tengigethernetphy interfaces 5-11
configuring waveethernetphy interfaces 5-11
description 4-13
displaying configuration 4-17, 5-12
figure 4-13
OFC and (caution) 4-16
G
Gigabit Ethernet
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-7, 4-6
H
hardware
OSC guidelines 11-2
shelf overview 1-1
Hello hold-down timer
configuring 11-7
Hello inactivity factor
configuring 11-7
Hello interval timer
configuring 11-7
help
CLI 2-3
host names
configuring 3-6
hubbed ring topologies
configuring line card protection 10-22to 10-45
configuring splitter protection 10-3to 10-21
description 10-1
example (figure) 10-2
I
in-band message channel
description 1-9
displaying configuration 5-4, 11-14
enabling on tengigethernetphy interfaces 5-3
verifying connectivity 11-14
interface ethernetdcc command 11-12
interface loopback command 11-9, 11-12
interfaces
line card protection model (figure) 2-6
splitter protection model (figure) 2-5
See also specific types of interfaces (for example, filter interfaces)
interface tengigethernetphy command 5-11
interface transparent command 4-3
interface wave command 4-16, 4-17, 4-20, 5-14, 6-8, 6-9, 11-9
interface waveethernetphy command 5-11
interface wavepatch command 7-11
interface wdm command 11-18
IP
configuring on OSC interfaces 11-9to 11-11
configuring over CDL 11-11to 11-14
ip address command 3-4, 11-9, 11-12
IP addresses
configuring on NME 3-4
ethernetdcc interfaces 11-11
OSC wave interfaces 11-9
ip default-gateway command 3-4
ip domain-name command 3-11
ip unnumbered command 11-9, 11-12
K
Kerberos
configuring 3-9
L
laser control. See forward laser control; laser safety control
laser control forward enable command 4-16, 5-11
laser control safety enable command 4-17
lasers
displaying status 5-16
turning on and off 5-15
laser safety control
configuring 4-17
description 4-15
displaying configuration 4-18
figure 4-15
line card protection and 4-17
OFC and (caution) 4-17
splitter protection and (caution) 4-15, 7-4
laser shutdown
laser shutdown command 5-15
line card motherboards
configuring for line card protection 7-11
displaying cross connections (example) 4-25, 5-17
splitter protection and 7-3, 7-8
wavepatch interfaces 2-7
line card protection
configuring dual shelf topologies 8-1to 8-7
configuring hubbed ring topologies 10-22to 10-45
configuring meshed ring topologies 10-72to 10-94
configuring point-to-point topologies 9-9to 9-17
configuring splitter protected line card motherboards 7-11
configuring y-cable protection 7-8
considerations 7-8
description 7-6
displaying cross connections (example) 4-25, 5-17
example (figure) 7-7
interface model (figure) 2-6
line card redundancy controllers. See LRCs
line vty command 3-4
lockouts
clearing 7-32
description 7-30
requesting 7-31
logical mesh topologies. See meshed ring topologies
loopback command 5-6
loopbacks
displaying configuration 5-6
LRCs
description 1-8
M
maintenance-mode command 3-23
management systems. See network management systems
meshed ring topologies
configuring line card protection 10-72to 10-94
configuring line card protection with unprotected channels 10-94to 10-104
configuring splitter protection 10-46to 10-63
configuring splitter protection with unprotected channels 10-63to 10-72
description 10-2
example (figure) 10-3
MIBs
processor support 3-1
supported 11-15
MM transponder modules
description 1-5
modem
support 3-2
monitor enable command 4-8
monitoring. See network monitoring; protocol monitoring
multimode transponder modules. See MM transponder modules
multiple trunk
support 1-10
mux/demux cabling
hubbed ring topologies with line card protection, example 10-23, 10-31, 10-35, 10-39, 10-43
hubbed ring topologies with splitter protection, example 10-5, 10-11, 10-14, 10-17, 10-20
meshed ring topologies with line card protection, example 10-74, 10-81, 10-85, 10-90
meshed ring topologies with splitter protection, example 10-48, 10-53, 10-56, 10-60
meshed ring topologies with unprotected channels, line card protection, example 10-96, 10-100
meshed ring topologies with unprotected channels, splitter protection, example 10-65, 10-69
point-to-point topologies without protection, example 9-19
mux/demux modules
configuring for line card protection 7-8
interfaces 2-8
mux/demux motherboards
description 1-3
N
network management Ethernet. See NME
network management systems
supported 1-9
network monitoring
Embedded CiscoView 11-21to 11-25
transparent interfaces 11-20
Network Time Protocol. See NTP
network topologies
adding interfaces 11-20
configuring neighbor discovery 11-5
types 1-10
See also hubbed ring topologies; meshed ring topologies; point-to-point topologies
NME
configuring interfaces 3-3
description 2-9
displaying configuration 3-5
using 3-2
See also fastethernet 0 interfaces
no environment-monitor temperature-threshold command 3-37
notification-throttle timer command 4-9, 5-7
NTP
configuring 3-7
description 3-6
displaying configuration 3-8
ntp server command 3-7
ntp update-calendar command 3-7
O
OADMs. See add/drop mux/demux modules
OFC
configuring with encapsulation command 4-3
description 4-14
figure 4-14
forward laser control and (caution) 4-16
laser safety control and (caution) 4-17
online diagnostics
description 1-10
optical add/drop mux/demux modules. See add/drop mux/demux modules
optical budgets. See optical power budgets
optical connections. See cross connections
optical mux/demux motherboards. See mux/demux motherboards
optical power budgets
system specifications 1-8
optical power thresholds
displaying configuration 4-20, 5-14, 6-9
trunk fiber based protection switchovers 6-4to 6-8
optical supervisory channel. See OSC
Optical Supervisory Channel Protocol. See OSCP
optical terminal mux/demux modules. See terminal mux/demux modules
optical threshold power receive command 4-20, 5-14, 6-8, 6-9
OSC
hardware guidelines 11-2
signal path (figure) 11-2
oscfilter interfaces
configuring patch connections 4-21
description 2-9
OSC interfaces
description 2-9
patch connections 4-21
OSCP
description 11-2
displaying configuration 11-8
displaying neighbors 11-8
MIBs 11-16
oscp timer hello holddown command 11-7
oscp timer hello interval command 11-7
oscp timer inactivity-factor command 11-8
P
passwords
description 3-3
patch command 4-21
patch connections
configuring 4-2, 4-21to 4-24, 5-12to 5-13
configuring for PSMs 6-10to 6-11
description 4-21
displaying configuration 4-23, 5-13, 6-10
types (table) 4-21
path switching
example (figure) 7-17
y-cable protection and 7-21to 7-23
path switchovers. See switchovers
performance history counters
point-to-point topologies
configuring line card protection 9-9to 9-17
configuring splitter protection 9-3
configuring without protection 9-17to 9-21
description 9-1
example without protection (figure) 9-2
example with protection (figure) 9-2
multiple trunk support 1-10, 9-3
power budgets. See optical power budgets
processor cards
autoboot 3-20
hardware state transitions 3-15
interfaces 2-9
redundant 3-18
reloading 3-25
slot assignments 1-2
software state transitions 3-16
starting up 3-2
processor redundancy. See redundancy
processors. See processor cards
processor switchovers
protection
description 7-1
protection switching. See path switching
protection switch modules. See PSMs
protocol encapsulation
displaying configuration 4-6
types supported 1-4
protocol monitoring
configuring 4-8
description 4-6
displaying configuration 4-8
PSMs
configuring interfaces 6-2
description 1-3
network topology 6-11
optical power thresholds 6-4to 6-9
trunk fiber based protection 6-3
Q
quick laser shutdown. See forward laser control; laser safety control
R
RADIUS
configuring 3-9
redundancy
displaying alarm status (note) 3-15
displaying configuration 3-23
forcing switchovers 3-18to 3-19
MIBS 11-17
processor hardware state transitions 3-15
processor software state transitions 3-16
synchronizing configurations 3-21
redundancy manual-sync command 3-21
redundancy reload peer command 3-25
redundancy reload shelf command 3-25
redundancy switch-activity command 3-18
reset command 3-19
reshape, retime, retransmit functions. See 3R functions
revertive switching
configuring 7-15
description 7-15
displaying configuration 7-16
ring topologies
multiple trunk support 1-10, 10-3
See also hubbed ring topologies; meshed ring topologies
router bgp command 11-10, 11-13
router eigrp command 11-10, 11-13
router ospf command 11-10, 11-13
S
SDH
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-7, 4-6
security features
AAA 3-8
firewalls 3-14
Kerberos 3-9
overview 3-8
passwords and privileges 3-14
RADIUS 3-9
TACACS+ 3-10
traffic filters 3-14
selectable transceivers. See transceivers
SFP optics
description 1-5
shelf
configuration examples
hubbed ring topologies with splitter protection 10-10, 10-16
point-to-point topologies with line card protection, 32 channels 8-3
point-to-point topologies without protection 9-18
configuration overview 2-10
description 1-1
layout (figure) 1-2
starting up 3-2
show aps command 6-4, 7-5, 7-10, 7-14
show bootvar command 3-20
show cdp command 11-4
show cdp entry command 11-4
show cdp interface command 11-4
show cdp neighbor command 11-4
show cdp traffic command 11-4
show ciscoview package command 11-24
show ciscoview version command 11-24
show connect command 4-25, 5-17
show environment command 3-14, 3-35, 3-37
show flash command 11-21
show hardware command 3-4
show interfaces transparent command 4-6
show ip ssh command 3-12
show ntp status command 3-8
show oscp info command 11-8
show oscp neighbor command 11-8
show patch command 4-23, 5-13, 6-10
show performance command 4-26, 5-18
show processes command 3-13
show protocols command 3-13
show redundancy capability command 3-23
show redundancy running-config-file command 3-23
show redundancy summary command 3-23, 3-26
show ssh command 3-12
show stacks command 3-13
show threshold-list command 4-12, 5-10
show topology command 6-12, 11-6, 11-21
show topology neighbor command 11-19
show version command 3-20
Simple Network Management Protocol. See SNMP
single-mode transponder modules. See SM transponder modules
SM transponder modules
description 1-4
SNMP
configuring 11-14
configuring alarm thresholds (table) 4-9, 5-7
processor support 3-1
snmp-server enable traps aps command 11-16
snmp-server enable traps oscp command 11-16
snmp-server enable traps patch command 11-16
snmp-server enable traps rf command 11-17
snmp-server enable traps threshold min-severity command 11-15
snmp-server enable traps topology command 11-17
software
software configuration register
boot field values 3-32
Break key, controlling 3-31
changing 3-33
description 3-30
IP broadcast address 3-31
response to bootload failure 3-32
settings 3-30
verifying value 3-34
SONET
configuring protocol encapsulation (table) 4-3
configuring protocol monitoring 1-7, 4-6
speed command 3-4
splitter protection
configuring 7-3
configuring hubbed ring topologies 10-3to 10-21
configuring meshed ring topologies 10-46to 10-63
configuring meshed ring topologies with unprotected channels 10-63to 10-72
configuring point-to-point topologies 9-3
considerations 7-3
description 7-2
displaying configuration 7-5
displaying cross connections (example) 4-25, 5-17
example (figure) 7-2
figure 2-5
interface model (figure) 2-5
SRCs
description 1-8
SSH
disconnecting 3-12
displaying 3-12
overview 3-11
ssh command 3-12
standards compliance. See compliance
standby privilege-mode enable command 3-25
standby processor card
enabling privileged EXEC mode access 3-25
switchcard redundancy controllers. See SRCs
switchover command 3-18
switchover-enable timer
configuring 7-24, 7-25, 7-27, 7-28
displaying configuration 7-25, 7-26, 7-28, 7-29
switchovers
clearing 7-32
description 7-30
requesting 7-31
types 7-30
synchronizing
Synchronous Digital Hierarchy. See SDH
system management
checking basic connectivity 3-14
TACACS 3-10
T
TACACS 3-10
TACACS+
configuring 3-10
tengigethernetphy interfaces
configuration overview 5-1
configuring alarm thresholds 5-7to 5-10
configuring CDP 11-5
configuring forward laser control 5-11
description 2-6
enabling 5-2
terminal mux/demux modules
description 1-3
threshold-group command 4-10, 5-8
threshold-list command 4-9, 5-7
thresholds. See alarm thresholds
thru interfaces
configuring patch connections 4-21
description 2-8
topologies. See network topologies
topology hold-time command 11-5
topology neighbor agent ip-address command 6-11, 6-12, 8-5, 11-18, 11-20
topology neighbor cdp command 11-6
topology neighbor command 6-11, 6-12, 8-5, 11-18, 11-20
topology neighbor disable command 11-6
traffic filters
configuring 3-14
transparent interfaces
adding to network topology 11-20
configuration overview 4-1
configuring alarm thresholds 4-9to 4-13
configuring clock rates 4-2to 4-5
configuring protocol encapsulation 4-2to 4-5
configuring protocol monitoring 4-6
description 2-6
displaying network topology information 6-12, 11-21
transponder modules
configuring y-cable protection 7-8
description 1-4
shutting down lasers 4-13to 4-18
splitter protection and 7-3
y-cable protection and 7-7
troubleshooting
online diagnostics 1-10
shelf misconfigurations 4-23, 5-13
trunk fiber based protection
configuring wdmsplit interfaces 6-3
switchovers and optical power thresholds 6-4to 6-8
trunk fiber protection
considerations 7-13
description 7-12
scheme (figure) 7-13
U
unidirectional path switching
configuring 7-19
description 7-17
displaying configuration 7-23
example (figure) 7-18
unprotected channels
configuring in meshed ring topologies 10-63to 10-72, 10-94to 10-104
configuring in point-to-point topologies 9-17to 9-21
V
W
waveethernetphy interfaces
configuration overview 5-2
configuring alarm thresholds 5-7to 5-10
configuring forward laser control 5-11
description 2-7
enabling 5-4
wave interfaces
configuration overview 4-2
configuring alarm thresholds 4-9to 4-13
configuring forward laser control 4-16
configuring laser safety control 4-17
configuring patch connections 4-21
description 2-7
protocol monitoring 4-7
wavepassthru interfaces
configuring patch connections 5-12
wavepatch interfaces
configuration overview 5-2
configuring patch connections 5-12
description 2-7
wdm interfaces
adding manually to network topologies, example 11-18to 11-20
configuring CDP 11-5
configuring patch connections 4-21
description 2-8
displaying CDP information 11-6
wdmrelay interfaces
configuring patch connections 6-10
wdmsplit interface
enabling 6-2
wdmsplit interfaces
displaying information 6-2
Y
y-cable protection
displaying configuration 7-10
Posted: Thu Feb 16 04:05:53 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.