|
Table Of Contents
C.1 Network Element Defaults Description
Network Element Defaults
Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration. Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's path protection feature, which may be used in any topological network configuration. Cisco does not recommend using its path protection feature in any particular topological network configuration.
This appendix describes the factory-configured (default) network element (NE) settings for the Cisco ONS 15454. It includes descriptions of card, node, and Cisco Transport Controller (CTC) default settings. To import, export, or edit the settings, refer to the "Maintain the Node" chapter of the Cisco ONS 15454 Procedure Guide. Cards supported by this platform that are not listed in this appendix are not supported by user-configurable NE defaults settings.
To change card settings individually (that is, without directly changing the NE defaults), refer to the "Change Card Settings" chapter of the Cisco ONS 15454 Procedure Guide. To change node settings, refer to the "Change Node Settings" chapter of the Cisco ONS 15454 Procedure Guide.
This appendix includes the following sections:
• Network Element Defaults Description
C.1 Network Element Defaults Description
The NE defaults are preinstalled on each Cisco ONS 15454 Advanced Timing, Communications, and Control (TCC2) and Advanced Timing, Communications, and Control Plus (TCC2P) card. They also ship as a file called 15454-defaults.txt on the CTC software CD in case you want to import the defaults onto existing TCC2/TCC2P cards. The NE defaults include card-level, CTC, and node-level defaults.
Changes to card provisioning that are made manually using the "Change Card Settings" chapter in the Cisco ONS 15454 Procedure Guide override default settings. If you use the CTC Defaults editor (in the node view Provisioning > Defaults tab) or import a new defaults file, any changes to card or port settings that result only affect cards that are installed or preprovisioned after the defaults have changed.
Changes that are made manually to most node-level default settings override the current settings, whether default or provisioned. If you change node-level default settings, either by using the Defaults editor or by importing a new defaults file, the new defaults reprovision the node immediately for all settings except those relating to protection (1+1 bidirectional switching, 1+1 reversion time, 1+1 revertive switching, bidirectional line switched ring [BLSR] ring reversion time, BLSR ring revertive switching, BLSR span reversion time, and BLSR span revertive switching), which apply to subsequent provisioning.
Note Changing some node-level provisioning via NE defaults can cause CTC disconnection or a reboot of the node in order for the provisioning to take effect. Before you change a default, check in the Side Effects column of the Defaults editor (right-click a column header and select Show Column > Side Effects) and be prepared for the occurrence of any side effects listed for that default.
C.2 Card Default Settings
The tables in this section list the default settings for each SONET card. Cisco provides several types of user-configurable defaults for Cisco ONS 15454 optical, electrical, storage access networking, and Ethernet (or data) cards. Types of card defaults can be broadly grouped by function, as outlined in the following subsections. For information about individual card settings, refer to the "Change Card Settings" chapter of the Cisco ONS 15454 Procedure Guide.
Note To view DWDM card defaults consult the Cisco ONS 15454 DWDM Reference Manual.
The following types of defaults are defined for SONET cards.
C.2.1 Configuration Defaults
Most card and port-level configuration defaults correspond to settings found in the CTC card-level Provisioning tabs.
Note The full set of Automatic Laser Shutdown (ALS) configuration defaults can be found in the CTC card-level Maintenance > ALS tab for supported cards. ALS defaults are supported for OC3-8, OC-48ELR, OC-192, OC192-XFP, and MRC-12 cards.
Configuration defaults that correspond to settings that are reachable from the CTC card-level Provisioning tabs (except as noted) include the following types of options (arranged by CTC subtab):
•Line—(DS-N, EC1-12, OC-N, MRC-12, G-series, and CE-series cards) Line-level configuration settings.
Note MRC-12 line configuration defaults are defined on a per OC-N rate basis.
•SONET STS—(OC-N and EC1-12 cards) SONET STS-level configuration settings.
•Port—(FC_MR-4 cards only) Port line-level configuration, distance extension, and enhanced FC/FICON ISL settings.
•Card—(DS1/E1-56, ML-series, and FC_MR-4 cards) Transport mode, operating mode, enable/disable retiming, and port to Virtual Tributary (VT) mapping standard settings (DS1/E1-56 only); or FC_MR-4 card mode settings (FC_MR-4 only); or framing mode (ML-series cards).
•DS1—(DS3XM-12 cards only) DS-1 rate virtual port-level line configuration settings.
•Broadband Ports—(DS3/EC1-48 cards only) Set the port rate as DS3, EC1, or unassigned (DS3 is the default).
•DS3—(DS3/EC1-48 cards only) DS-3 rate port-level line configuration settings.
•EC1—(DS3/EC1-48 cards only) EC-1 rate port-level line configuration, section trace, and SONET STS settings.
•ALS (card-level Maintenance > ALS tab)—(OC3-8, OC-48ELR, OC-192, OC192-XFP, and MRC-12 cards) ALS configuration defaults.
•IOS (card-level IOS tab)—(ML-series cards) Console port and RADIUS server access settings.
•Ether Ports—(CE-series cards) Line configuration settings (including 802 class of service [IEEE 802.1p CoS] and IP type of service [ToS]).
•POS Ports—(CE-series cards) Line configuration settings.
Note Line configuration defaults for the CE-100T-8 card apply to both Ethernet port and packet-over-SONET (POS) port settings where the same setting exists for both.
Note For further information about each card, consult the appropriate card reference chapter, that is, Chapter 3, "Electrical Cards," Chapter 4, "Optical Cards," Chapter 5, "Ethernet Cards," and Chapter 6, "Storage Access Networking Cards."
Note For further information about IOS configuration defaults for ML-series cards, refer to the Ethernet Card Software Feature and Configuration Guide for the Cisco ONS 15454, Cisco ONS 15454 SDH, and Cisco ONS 15327.
C.2.2 Threshold Defaults
Threshold default settings define the default cumulative values (thresholds) beyond which a threshold crossing alert (TCA) will be raised, making it possible to monitor the network and detect errors early.
Card threshold default settings are provided as follows:
•PM thresholds—(DS-N, EC-1, OC-N, and MRC-12 cards) Can be expressed in counts or seconds; includes line, electrical path, and SONET thresholds.
•Physical Layer thresholds—(OC3-8, OC-192, OC-192XFP, and MRC-12 cards) Expressed in percentages; includes optics thresholds.
Threshold defaults are defined for near end and/or far end, at 15-minute and one-day intervals. Thresholds are further broken down by type, such as Section, Line, STS, or VT for performance monitoring (PM) thresholds, and TCA (warning) or Alarm for physical thresholds. PM threshold types define the layer to which the threshold applies. Physical threshold types define the level of response expected when the threshold is crossed.
Note For full descriptions of the thresholds you can set for each card, see Chapter 15, "Performance Monitoring."
Note For additional information regarding PM parameter threshold defaults as defined by Telcordia specifications, refer to Telcordia GR-820-CORE and GR-253-CORE.
C.2.3 Defaults by Card
In the tables that follow, card defaults are defined by the default name, its factory-configured value, and the domain of allowable values that you can assign to it.
Note Some default values, such as certain thresholds, are interdependent. Before changing a value, review the domain for that default and any other related defaults for potential dependencies.
C.2.3.1 DS-1 Card Default Settings
Table C-1 lists the DS-1 (DS1-14 and DS1N-14) card default settings.
C.2.3.2 DS1/E1-56 Card Default Settings
Table C-2 lists the DS1/E1-56 card default settings.
C.2.3.3 DS-3 Card Default Settings
Table C-3 lists the DS-3 card default settings.
C.2.3.4 DS3/EC1-48 Card Default Settings
Table C-4 lists the DS3/EC1-48 card default settings.
C.2.3.5 DS3E Card Default Settings
Table C-5 lists the DS3E card default settings.
C.2.3.6 DS3I Card Default Settings
Table C-6 lists the DS3I card default settings.
C.2.3.7 DS3XM-6 Card Default Settings
Table C-7 lists the DS3XM-6 card default settings.
C.2.3.8 DS3XM-12 Card Default Settings
Table C-8 lists the DS3XM-12 card default settings.
C.2.3.9 EC1-12 Card Default Settings
Table C-9 lists the EC1-12 card default settings.
C.2.3.10 FC_MR-4 Card Default Settings
Table C-10 lists the FC_MR-4 card default settings.
C.2.3.11 Ethernet Card Default Settings
Table C-11 lists the G1000 (G1K-4), ML1000, ML100T, ML-100X-8, and CE-100T-8 card default settings.
C.2.3.12 OC-3 Card Default Settings
Table C-12 lists the OC-3 (OC3 IR 4/STM1 SH 1310) card default settings.
C.2.3.13 OC3-8 Card Default Settings
Table C-13 lists the eight-port OC3-8 (OC3 IR/STM1 SH 1310-8) card default settings.
C.2.3.14 OC-12 Card Default Settings
Table C-14 lists the OC-12 (OC12 IR/STM4 SH 1310, OC12 LR/STM4 LH 1310, and OC12 LR/STM4 LH 1550) card default settings.
C.2.3.15 OC12-4 Card Default Settings
Table C-15 lists the four-port OC12-4 (OC12 IR/STM4 SH 1310-4) card default settings.
C.2.3.16 OC-48 Card Default Settings
Table C-16 lists the OC-48 (OC48 IR 1310, OC48 LR 1550, OC48 IR/STM16 SH AS 1310, OC48 LR/STM16 LH AS 1550, OC48 ELR/STM16 EH 100 GHz, and OC48 ELR 200 GHz) card default settings.
C.2.3.17 OC-192 Card Default Settings
Table C-17 lists the OC-192 (OC192 SR/STM64 IO 1310, OC192 LR/STM64 LH ITU 15xx.xx, OC192 IR/STM64 SH 1550, and OC192 LR/STM64 LH 1550) card default settings.
C.2.3.18 OC192-XFP Default Settings
Table C-18 lists the OC192-XFP default settings.
C.2.3.19 MRC-12 Card Default Settings
Table C-19 lists the MRC-12 card default settings.
C.3 Node Default Settings
Table C-20 lists the node-level default settings for the Cisco ONS 15454. Cisco provides the following user-configurable defaults for each Cisco ONS 15454 node:
•Circuit settings—Set the administrative state and path protection circuit defaults, and whether to have circuits send a payload defect indication condition (PDIP).
•General settings—Set general node management defaults, including whether to use Daylight Savings Time (DST), whether to insert Alarm Indication Signal VT (AIS-V) in each VT when the carrying STS crosses the signal degrade (SD) path bit error rate (BER) threshold, the IP address of the NTP/SNTP server to be used, the time zone where the node is located, the SD path BER value, the defaults description, whether to raise a condition on an empty card slot, and whether to report loopback conditions on Out-of-Service, Maintenance (OOS-MT) state ports.
•Power Monitor settings—Set default voltage thresholds for the node.
•Network settings—Set whether to prevent display of node IP addresses in CTC (applicable for all users except Superusers); default gateway node type; whether to raise an alarm when the backplane LAN cable is disconnected; and whether to display the IP address in the LCD in an editable mode (in which you can change the IP address directly from LCD screen), to display the IP address on the LCD as read-only, or to suppress display of the IP on the LCD entirely.
•OSI settings—Set Open System Interconnection (OSI) main setup, generic routing encapsulation (GRE) tunnel, link access protocol on the D channel (LAP-D), router subnet, and TID address resolution protocol (TARP) settings.
•1+1 and Optimized 1+1 protection settings—Set whether or not protected circuits have bidirectional switching, are revertive, and what the reversion time is; set optimized 1+1 detection, recovery, and verify guard timer values.
Note Optimized 1+1 supports three timers that ensure the correct state of the cards at key points in card communication. A verification guard timer is used when a Force is issued, to ensure that the far end has a chance to respond. A detection guard timer is used to ensure the presence of an SF/SD condition before switching away from a card. A recover guard timer ensures the absence of SF/SD prior to switching to a card. You can change the default number of seconds before these timers expire by changing the NE default for the corresponding timer to a value within its domain of allowable values.
•BLSR protection settings—Set whether BLSR-protected circuits are revertive, and what the reversion time is, at both the ring and span levels.
•Legal Disclaimer—Set the legal disclaimer that warns users at the login screen about the possible legal or contractual ramifications of accessing equipment, systems, or networks without authorization.
•Security Grant Permissions—Set default user security levels for activating/reverting software, performance monitoring data clearing, database restoring, and retrieving audit logs.
•Security DataComm settings—Set default security settings for TCC Ethernet IP address and IP netmask, and CTC backplane IP suppression; set secure mode on and secure mode locked (for TCC2P cards only).
•Security Access settings—Set default security settings for LAN access, shell access, serial craft access, element management system (EMS) access (including Internet Inter-Object Request Broker Protocol [IIOP] listener port number), TL1 access, and SNMP access.
•Security RADIUS settings—Set default RADIUS server settings for accounting port number, authentication port number, and whether to enable the node as a final authenticator.
•Security Policy settings—Set the allowable failed logins before lockout, idle user timeout for each user-level, optional lockout duration or manual unlock enabled, password reuse and change frequency policies, number of characters difference between the old and new password, password aging by security level, enforced single concurrent session per user, and option to disable inactive user after a set inactivity period.
•BITS Timing settings—Set the AIS threshold, Admin SSM, coding, facility type, framing, state, and line build-out (LBO) settings for building integrated timing supply 1 (BITS-1) and BITS2 timing.
•General Timing settings—Set the mode (External, Line, or Mixed), quality of reserved (RES) timing (set the rule that defines the order of clock quality from lowest to highest), revertive, reversion time, and SSM message set for node timing.
Note For more information about each individual node setting, refer to the "Change Node Settings" chapter of the Cisco ONS 15454 Procedure Guide.
Table C-20 Node Default Settings
Default Name Default Value Default DomainNODE.circuits.SendPDIP
FALSE
TRUE, FALSE
NODE.circuits.State
IS,AINS
IS, OOS,DSBLD, OOS,MT, IS,AINS
NODE.circuits.upsr.AllowUpsrOverOnePlusOne
FALSE
TRUE, FALSE
NODE.circuits.upsr.ReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.circuits.upsr.Revertive
FALSE
TRUE, FALSE
NODE.circuits.upsr.STS_SDBER
1E-6
1E-5, 1E-6, 1E-7, 1E-8, 1E-9
NODE.circuits.upsr.STS_SFBER
1E-4
1E-3, 1E-4, 1E-5
NODE.circuits.upsr.SwitchOnPDIP
FALSE
TRUE, FALSE
NODE.circuits.upsr.VT_SDBER
1E-6
1E-5, 1E-6, 1E-7, 1E-8
NODE.circuits.upsr.VT_SFBER
1E-4
1E-3, 1E-4, 1E-5
NODE.general.DefaultsDescription
Factory Defaults
Free form field
NODE.general.InsertAISVOnSDP
FALSE
TRUE, FALSE
NODE.general.NtpSntpServer
0.0.0.0
IP Address
NODE.general.RaiseConditionOnEmptySlot
FALSE
TRUE, FALSE
NODE.general.SDPBER
1E-6
1E-5, 1E-6, 1E-7, 1E-8, 1E-9
NODE.general.ShowLoopbackAlarmsOnPortsUndergoingMaintenance
FALSE
FALSE, TRUE
NODE.general.TimeZone
(GMT-08:00) Pacific Time (US & Canada), Tijuana
(For applicable time zones, see Table C-21.)
NODE.general.UseDST
TRUE
TRUE, FALSE
NODE.network.general.AlarmMissingBackplaneLAN
FALSE
TRUE, FALSE
NODE.network.general.CtcIpDisplaySuppression
FALSE
TRUE, FALSE
NODE.network.general.GatewaySettings
None
LeaveAsIs, None, ENE, GNE, ProxyOnlyNode
NODE.network.general.LcdIpSetting
Allow Configuration
Allow Configuration, Display Only, Suppress Display
NODE.osi.greTunnel.OspfCost
110
110, 120, 130 .. 65530
NODE.osi.greTunnel.SubnetMask
24 (bits)
8, 9, 10 .. 32
NODE.osi.lapd.Mode
AITS
AITS, UITS
NODE.osi.lapd.MTU
512
512, 513, 514 .. 1500
NODE.osi.lapd.Role
Network
Network, User
NODE.osi.lapd.T200
200 (ms)
200, 300, 400 .. 20000
NODE.osi.lapd.T203
10000 (ms)
4000, 4100, 4200 .. 120000
NODE.osi.mainSetup.L1L2LSPBufferSize
512 (bytes)
512 - 1500
NODE.osi.mainSetup.L1LSPBufferSize
512 (bytes)
512 - 1500
NODE.osi.mainSetup.NodeRoutingMode
Intermediate System Level 1
End System, Intermediate System Level 1, Intermediate System Level 1/Level 2
NODE.osi.subnet.DISPriority
63
1, 2, 3 .. 127
NODE.osi.subnet.ESH
10 (sec)
10, 20, 30 .. 1000
NODE.osi.subnet.GCCISISCost
60
1, 2, 3 .. 63
NODE.osi.subnet.IIH
3 (sec)
1, 2, 3 .. 600
NODE.osi.subnet.ISH
10 (sec)
10, 20, 30 .. 1000
NODE.osi.subnet.LANISISCost
20
1, 2, 3 .. 63
NODE.osi.subnet.LDCCISISCost
40
1, 2, 3 .. 63
NODE.osi.subnet.OSCISISCost
60
1, 2, 3 .. 63
NODE.osi.subnet.SDCCISISCost
60
1, 2, 3 .. 63
NODE.osi.tarp.L1DataCache
TRUE
FALSE, TRUE
NODE.osi.tarp.L2DataCache
FALSE
FALSE, TRUE
NODE.osi.tarp.LANStormSuppression
TRUE
FALSE, TRUE
NODE.osi.tarp.LDB
TRUE
FALSE, TRUE
NODE.osi.tarp.LDBEntry
5 (min)
1 - 10
NODE.osi.tarp.LDBFlush
5 (min)
0 - 1440
NODE.osi.tarp.PDUsL1Propagation
TRUE
FALSE, TRUE
NODE.osi.tarp.PDUsL2Propagation
TRUE
FALSE, TRUE
NODE.osi.tarp.PDUsOrigination
TRUE
FALSE, TRUE
NODE.osi.tarp.T1Timer
15 (sec)
0 - 3600
NODE.osi.tarp.T2Timer
25 (sec)
0 - 3600
NODE.osi.tarp.T3Timer
40 (sec)
0 - 3600
NODE.osi.tarp.T4Timer
20 (sec)
0 - 3600
NODE.osi.tarp.Type4PDUDelay
0 (sec)
0 - 255
NODE.powerMonitor.EHIBATVG
-56.5 (Vdc)
-54.0, -54.5, -55.0, -55.5, -56.0, -56.5
NODE.powerMonitor.ELWBATVG
-40.5 (Vdc)
-40.5, -41.0, -41.5, -42.0, -42.5, -43.0, -43.5, -44.0
NODE.powerMonitor.HIBATVG
-54.0 (Vdc)
-44.0, -44.5, -45.0 .. -56.5
NODE.powerMonitor.LWBATVG
-44.0 (Vdc)
-40.5, -41.0, -41.5 .. -54.0
NODE.protection.1+1.BidirectionalSwitching
FALSE
TRUE, FALSE
NODE.protection.1+1.DetectionGuardTimer
1 (seconds)
0, 0.05, 0.1, 0.5, 1, 2, 3, 4, 5
NODE.protection.1+1.RecoveryGuardTimer
1 (seconds)
0, 0.05, 0.1 .. 10
NODE.protection.1+1.ReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.protection.1+1.Revertive
FALSE
TRUE, FALSE
NODE.protection.1+1.VerifyGuardTimer
0.5 (seconds)
0.5, 1
NODE.protection.blsr.RingReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.protection.blsr.RingRevertive
TRUE
TRUE, FALSE
NODE.protection.blsr.SpanReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.protection.blsr.SpanRevertive
TRUE
TRUE, FALSE
NODE.protection.splitter.ReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.protection.splitter.Revertive
FALSE
TRUE, FALSE
NODE.protection.ycable.ReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.protection.ycable.Revertive
FALSE
TRUE, FALSE
NODE.security.dataComm.CtcBackplaneIpDisplaySuppression
TRUE
FALSE, TRUE when isSecureModeSupportedOnControlCard TRUE; (NOT SUPPORTED) when isSecureModeSupportedOnControlCard FALSE
NODE.security.dataComm.DefaultTCCEthernetIP
10.0.0.1
IP Address
NODE.security.dataComm.DefaultTCCEthernetIPNetmask
24 (bits)
8, 9, 10 .. 32
NODE.security.dataComm.isSecureModeSupportedOnControlCard
TRUE
FALSE, TRUE
NODE.security.dataComm.LcdBackplaneIpSetting
Display Only
Allow Configuration, Display Only, Suppress Display when isSecureModeSupportedOnControlCard TRUE; (NOT SUPPORTED) when isSecureModeSupportedOnControlCard FALSE
NODE.security.dataComm.SecureModeLocked
FALSE
FALSE, TRUE when isSecureModeSupportedOnControlCard TRUE; (NOT SUPPORTED) when isSecureModeSupportedOnControlCard FALSE
NODE.security.dataComm.SecureModeOn (May reboot node)
FALSE
FALSE, TRUE when isSecureModeSupportedOnControlCard TRUE; (NOT SUPPORTED) when isSecureModeSupportedOnControlCard FALSE
NODE.security.emsAccess.AccessState
NonSecure
NonSecure, Secure
NODE.security.emsAccess.IIOPListenerPort (May reboot node)
57790 (port #)
0 - 65535
NODE.security.grantPermission.ActivateRevertSoftware
Superuser
Provisioning, Superuser
NODE.security.grantPermission.PMClearingPrivilege
Provisioning
Provisioning, Superuser
NODE.security.grantPermission.RestoreDB
Superuser
Provisioning, Superuser
NODE.security.grantPermission.RetrieveAuditLog
Superuser
Provisioning, Superuser
NODE.security.idleUserTimeout.Maintenance
01:00 (hours:mins)
00:00, 00:01, 00:02 .. 16:39
NODE.security.idleUserTimeout.Provisioning
00:30 (hours:mins)
00:00, 00:01, 00:02 .. 16:39
NODE.security.idleUserTimeout.Retrieve
00:00 (hours:mins)
00:00, 00:01, 00:02 .. 16:39
NODE.security.idleUserTimeout.Superuser
00:15 (hours:mins)
00:00, 00:01, 00:02 .. 16:39
NODE.security.lanAccess.LANAccess (May disconnect CTC from node)
Front & Backplane
No LAN Access, Front Only, Backplane Only, Front & Backplane
NODE.security.lanAccess.RestoreTimeout
5 (minutes)
0 - 60
NODE.security.legalDisclaimer.LoginWarningMessage
<html><center><b>WARNING</b></center>This system is restricted to authorized users for business purposes. Unauthorized<p>access is a violation of the law. This service may be monitored for administrative<p>and security reasons. By proceeding, you consent to this monitoring.
Free form field
NODE.security.other.DisableInactiveUser
FALSE
FALSE, TRUE
NODE.security.other.InactiveDuration
45 (days)
1, 2, 3 .. 99 when DisableInactiveUser TRUE; 45 when DisableInactiveUser FALSE
NODE.security.other.SingleSessionPerUser
FALSE
TRUE, FALSE
NODE.security.passwordAging.EnforcePasswordAging
FALSE
TRUE, FALSE
NODE.security.passwordAging.maintenance.AgingPeriod
45 (days)
20 - 90
NODE.security.passwordAging.maintenance.WarningPeriod
5 (days)
2 - 20
NODE.security.passwordAging.provisioning.AgingPeriod
45 (days)
20 - 90
NODE.security.passwordAging.provisioning.WarningPeriod
5 (days)
2 - 20
NODE.security.passwordAging.retrieve.AgingPeriod
45 (days)
20 - 90
NODE.security.passwordAging.retrieve.WarningPeriod
5 (days)
2 - 20
NODE.security.passwordAging.superuser.AgingPeriod
45 (days)
20 - 90
NODE.security.passwordAging.superuser.WarningPeriod
5 (days)
2 - 20
NODE.security.passwordChange.CannotChangeNewPassword
FALSE
TRUE, FALSE
NODE.security.passwordChange.CannotChangeNewPasswordForNDays
20 (days)
20 - 95
NODE.security.passwordChange.NewPasswordMustDifferFromOldByNCharacters
1 (characters)
1 - 20
NODE.security.passwordChange.PreventReusingLastNPasswords
1 (times)
1 - 10
NODE.security.passwordChange.RequirePasswordChangeOnFirstLoginToNewAccount
FALSE
TRUE, FALSE
NODE.security.radiusServer.AccountingPort
1813 (port)
0 - 32767
NODE.security.radiusServer.AuthenticationPort
1812 (port)
0 - 32767
NODE.security.radiusServer.EnableNodeAsFinalAuthenticator
TRUE
FALSE, TRUE
NODE.security.serialCraftAccess.EnableCraftPort
TRUE
TRUE, FALSE
NODE.security.shellAccess.AccessState
NonSecure
Disabled, NonSecure, Secure
NODE.security.shellAccess.EnableShellPassword
FALSE
TRUE, FALSE
NODE.security.shellAccess.TelnetPort
23
23 - 9999
NODE.security.snmpAccess.AccessState
NonSecure
Disabled, NonSecure
NODE.security.tl1Access.AccessState
NonSecure
Disabled, NonSecure, Secure
NODE.security.userLockout.FailedLoginsAllowedBeforeLockout
5 (times)
0 - 10
NODE.security.userLockout.LockoutDuration
00:30 (mins:secs)
00:00, 00:05, 00:10 .. 10:00
NODE.security.userLockout.ManualUnlockBySuperuser
FALSE
TRUE, FALSE
NODE.timing.bits-1.AdminSSMIn
STU
PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES
NODE.timing.bits-1.AISThreshold
SMC
PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES
NODE.timing.bits-1.Coding
B8ZS
B8ZS, AMI when FacilityType DS1; AMI when FacilityType 64kHz+8kHz
NODE.timing.bits-1.CodingOut
B8ZS
B8ZS, AMI when FacilityTypeOut DS1; AMI when FacilityTypeOut 6MHz
NODE.timing.bits-1.FacilityType
DS1
DS1, 64kHz+8kHz
NODE.timing.bits-1.FacilityTypeOut
DS1
DS1, 6MHz
NODE.timing.bits-1.Framing
ESF
ESF, D4 when FacilityType DS1; N/A when FacilityType 64kHz+8kHz
NODE.timing.bits-1.FramingOut
ESF
ESF, D4 when FacilityTypeOut DS1; N/A when FacilityTypeOut 6MHz
NODE.timing.bits-1.LBO
0-133
0-133, 134-266, 267-399, 400-533, 534-655
NODE.timing.bits-1.State
IS
IS, OOS,DSBLD
NODE.timing.bits-1.StateOut
IS
IS, OOS,DSBLD
NODE.timing.bits-2.AdminSSMIn
STU
PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES
NODE.timing.bits-2.AISThreshold
SMC
PRS, STU, ST2, TNC, ST3E, ST3, SMC, ST4, DUS, RES
NODE.timing.bits-2.Coding
B8ZS
B8ZS, AMI when FacilityType DS1; AMI when FacilityType 64kHz+8kHz
NODE.timing.bits-2.CodingOut
B8ZS
B8ZS, AMI when FacilityTypeOut DS1; AMI when FacilityTypeOut 6MHz
NODE.timing.bits-2.FacilityType
DS1
DS1, 64kHz+8kHz
NODE.timing.bits-2.FacilityTypeOut
DS1
DS1, 6MHz
NODE.timing.bits-2.Framing
ESF
ESF, D4 when FacilityType DS1; N/A when FacilityType 64kHz+8kHz
NODE.timing.bits-2.FramingOut
ESF
ESF, D4 when FacilityTypeOut DS1; N/A when FacilityTypeOut 6MHz
NODE.timing.bits-2.LBO
0-133
0-133, 134-266, 267-399, 400-533, 534-655
NODE.timing.bits-2.State
IS
IS, OOS,DSBLD
NODE.timing.bits-2.StateOut
IS
IS, OOS,DSBLD
NODE.timing.general.Mode
External
External, Line, Mixed
NODE.timing.general.QualityOfRES
RES=DUS
PRS<RES, STU<RES<PRS, ST2<RES<STU, ST3<RES<ST2, SMC<RES<ST3, ST4<RES<SMC, RES<ST4, RES=DUS when SSMMessageSet Generation 1; PRS<RES, STU<RES<PRS, ST2<RES<STU, TNC<RES<ST2, ST3E<RES<TNC, ST3<RES<ST3E, SMC<RES<ST3, ST4<RES<SMC, RES<ST4, RES=DUS when SSMMessageSet Generation 2
NODE.timing.general.ReversionTime
5.0 (minutes)
0.5, 1.0, 1.5 .. 12.0
NODE.timing.general.Revertive
FALSE
TRUE, FALSE
NODE.timing.general.SSMMessageSet
Generation 1
Generation 1, Generation 2
C.3.1 Time Zones
Table C-21 lists the time zones that apply for node time zone defaults. Time zones in the table are ordered by their relative relationships to Greenwich Mean Time (GMT), and the default values are displayed in the correct format for valid default input.
C.4 CTC Default Settings
Table C-22 lists the CTC-level default settings for the Cisco ONS 15454. Cisco provides the following user-configurable defaults for CTC:
•Automatic Routing—Set circuit creation with the Route Automatically check box selected by default.
•Create TL1-like—Set whether to create only TL1-like circuits; that is, instruct the node to create only cross-connects, allowing the resulting circuits to be in an upgradable state.
•Local domain creation and viewing—Set whether domains that you create and view persist globally (all CTC sessions), or only locally (within the current CTC session).
•Network Map—Set the default network map (which country's map is displayed in CTC network view).
Posted: Thu Oct 25 03:43:38 PDT 2007
All contents are Copyright © 1992--2007 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.