cc/td/doc/product/ong/15454sdh/454sdh33
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Node Setup
3.1 Before You Begin
3.2 Setting Up Basic Node Information
3.3 Setting Up Network Information
3.4 Creating Users and Setting Security
3.5 Setting Up ONS 15454 SDH Timing
3.6 Creating Card Protection Groups

Node Setup


This chapter explains how to set up a Cisco ONS 15454 SDH node using Cisco Transport Controller (CTC). Table 3-1 lists node setup topics. Table 3-2 lists node setup procedures. The chapter also includes a list of required information for node setup. Refer to "Set up PC and Log into CTC" for CTC setup procedures.

Table 3-1   Node Setup Topics

Node Setup Topics 

3.1 Before You Begin

3.2 Setting Up Basic Node Information

3.3 Setting Up Network Information

3.4 Creating Users and Setting Security

3.5 Setting Up ONS 15454 SDH Timing

3.6 Creating Card Protection Groups

Table 3-2   Node Setup Procedures

Node Setup Procedures 

Procedure: Add the Node Name, Contact, Location, Date, and Time

Procedure: Set Up Network Information

Procedure: Change IP Address, Default Router, and Network Mask Using the LCD

Procedure: Create a New User with Security Settings

Procedure: Change a User's Security Settings

Procedure: Delete a User's Security Settings

Procedure: Set up External, Line, or Mixed Timing for the ONS 15454 SDH

Procedure: Set Up Internal Timing for the ONS 15454 SDH

Procedure: Create Protection Groups

Procedure: Edit Protection Groups

Procedure: Delete Protection Groups

3.1 Before You Begin

Before you begin node setup, you will need:

If the ONS 15454 SDH will be connected to a network, you will need:

If you are responsible for setting up IP networking for the ONS 15454 SDH network, see "IP Networking" for more information.

To create card protection groups, you will need to know:

3.2 Setting Up Basic Node Information

Setting basic information for each Cisco ONS 15454 SDH node is one of the first provisioning tasks you perform. This information includes node name, location, contact, latitude, longitude, dates, and time.

Procedure: Add the Node Name, Contact, Location, Date, and Time

Purpose

Use this procedure to set node identification and other node-specific information.

Prerequisite Procedures

"Logging into CTC" section.

Onsite/Remote

Onsite or remote


Step 1   Start CTC for an ONS 15454 SDH node. The CTC node view is displayed.

Step 2   Click the Provisioning > General tabs.


Figure 3-1   Setting up general node information


Step 3   Enter the following:

CTC uses the latitude and longitude to position node icons on the network view map.


Note   You can also position nodes manually by pressing Ctrl and dragging the node icon to a new location.

To convert a coordinate in degrees to degrees and minutes, multiply the number after the decimal by 60. For example, the latitude 38.250739 converts to 38 degrees, 15 minutes (.250739 x 60 = 15.0443, rounded to the nearest whole number).

If you check Use SNTP/NTP Server, type the server's IP address in the next field. If you do not use an SNTP/NTP server, complete the Date, Time, and Time Zone fields. The ONS 15454 SDH will use these fields for alarm dates and times. (CTC displays all alarms in the login node's time zone for cross network consistency.)

Step 4   Click Apply.



3.3 Setting Up Network Information

Before you connect a node to other nodes or to a LAN, you must change the default IP address that is shipped with each ONS 15454 SDH (192.168.1.1). IP addresses are unique identifiers for devices—called hosts—that connect to TCP/IP networks. Every IP address includes a network number, which is assigned to an organization, and a host (device) number, which the organization's LAN administrator assigns to an individual network device.

Subnetting enables LAN administrators to create subnetworks that are transparent to the Internet. Within networks, ONS 15454 SDHs often exist as subnetworks, which are created by adding a subnet mask to the ONS 15454 SDH IP address.

Procedure: Set Up Network Information

Purpose

Use this procedure to start provisioning a network. Additional ONS 15454 SDH networking information and procedures, including IP addressing examples, static route scenarios and Open Shortest Path First (OSPF) protocol options are provided in Chapter 3, "IP Networking."

Prerequisite Procedures

  • The IP address and subnet mask to assign to the node
  • The IP address of the default router
  • If Dynamic Host Configuration Protocol is used, you will need the IP address of the DHCP server

Onsite/Remote

Onsite or remote


Step 1   Log into CTC or navigate to the node view. Click the Provisioning > Network tabs (Figure 3-2).


Figure 3-2   Setting up general network information


Step 2   Complete the following:


Note    The MAC Address is read only. It displays the ONS 15454 SDH address used by the IEEE 802 Media Access Control (MAC) layer.

In a configuration where all nodes are on the same subnet, if you start a CTC session before proper provisioning, the login node will appear grey in the CTC network view. Other CTC users will not be able to open the grey-colored node to access their node. Provision a static route on the node that is LAN-connected, or, if you are directly connected to the node, provision craft access. For procedures, see "Scenario 5: Using Static Routes to Connect to LANs" section, or "Scenario 8: Provisioning the ONS 15454 SDH Proxy Server" section.

Step 3   Click Apply.

Step 4   Click Yes on the confirmation dialog box.

Both ONS 15454 SDH TCC-I cards will reboot, one at a time.


Note   CTC software does not monitor for the presence or absence of FMECs unless the TCC-I(s) card is Active/Stby. During transitional states such as power-up or TCC-I reset, CTC ignores the FMEC inventory displayed in node view.



Procedure: Change IP Address, Default Router, and Network Mask Using the LCD

Purpose

You can change the ONS 15454 SDH IP address, subnet mask, and default router address using the Slot, Status, and Port buttons on the front panel LCD.

Prerequisite Procedures

  • The IP address and subnet mask to assign to the node
  • The IP address of the default router
  • If Dynamic Host Configuration Protocol is used, you will need the IP address of the DHCP server

Onsite/Remote

Onsite or remote


Step 1   On the ONS 15454 SDH front panel, repeatedly press the Slot button until Node appears on the LCD.


Note    The LCD reverts to normal display mode after 5 seconds of button inactivity.

Step 2   Repeatedly press the Port button until the following displays:


Figure 3-3   Selecting the IP address option


Step 3   Press the Status button to display the node IP address (Figure 3-4), the node subnet mask length, or the default router IP address.


Figure 3-4   Changing the IP address


Step 4   Push the Slot button to move to the IP address or subnet mask digit you need to change. The selected digit flashes.

Step 5   Press the Port button to cycle the IP address or subnet mask digit to the correct digit.

Step 6   When the change is complete, press the Status button to return to the Node menu.

Step 7   Repeatedly press the Port button until the Save Configuration option appears (Figure 3-5).


Figure 3-5   Selecting the Save Configuration option


Step 8   Press the Status button to select the Save Configuration option.

A Save and REBOOT message appears (Figure 3-6).


Figure 3-6   Saving and rebooting the TCC-I


Step 9   Press the Slot button to save the new IP address configuration. (Or press Port to cancel the configuration.)

Saving the new configuration causes the TCC-I cards to reboot. During the reboot, a "Saving Changes - TCC Reset" message displays on the LCD. The LCD returns to the normal alternating display after the TCC-I reboot is complete.


Note   CTC software does not monitor for the presence or absence of FMECs unless the TCC-I(s) card is active/standby. During transitional states such as power-up or TCC-I reset, CTC ignores the FMEC inventory displayed in node view.



3.4 Creating Users and Setting Security

Use the CISCO15 user, provided with each ONS 15454 SDH, to set up other ONS 15454 SDH users. You can add up to 500 users to one ONS 15454 SDH. Each ONS 15454 SDH user can be assigned one of the following security levels:

Each ONS 15454 SDH user has a specified amount of time that he or she can leave the system idle before the CTC window is locked. The lockouts prevent unauthorized users from making changes. Higher-level users have shorter idle times, as shown in Table 3-3.

Table 3-3   ONS 15454 SDH User Idle Times

Security Level  Idle Time 

Superuser

15 minutes

Provisioning

30 minutes

Maintenance

60 minutes

Retrieve

Unlimited

Table 3-4 shows the actions that each user can perform in node view. In the tables below, Yes means the user can use the specified tab or screen. Table cells with dashes (—) mean the user cannot use the specified tab or screen.

Table 3-4   ONS 15454 SDH Security Levels—Node View

CTC Tab  Subtab  Actions  Retrieve  Maint.  Provision  Super user 

Alarms

Synchronize alarms

Yes

Yes

Yes

Yes

Conditions

Retrieve conditions

Yes

Yes

Yes

Yes

History

Session

Read only

Yes

Yes

Yes

Yes

Node

Retrieve alarms/events

Yes

Yes

Yes

Yes

Circuits

Create, delete, or edit circuits

Yes

Yes

Search for circuits

Yes

Yes

Yes

Yes

Provisioning

General

Edit

Yes

Yes

Ether

Bridge

Spanning Trees: Edit

Yes

Yes

Thresholds: Create, or delete

Yes

Yes

Network

General: Edit

Yes

Static Routing: Create, edit, or delete

Yes

OSPF: Edit

Yes

Protection

Create, delete, or edit

Yes

Yes

Browse groups

Yes

Yes

Yes

Yes

Ring

All (MS-SPRing)

Yes

Yes

Security

Create or delete

Yes

Change password

Same User

Same User

Same User

All Users

SNMP

Create, delete, or edit

Yes

Browse trap destinations

Yes

Yes

Yes

Yes

SDH DCC

Create, or delete

Yes

View SDCC Terminations and DCC Tunnel Connections

Yes

Yes

Yes

Yes

Timing

Edit

Partial Edit

Partial Edit

Yes

Yes

Alarm Behavior

Edit

Yes

Yes

Orderwire

Create, or delete

Yes

Yes

Inventory

Delete card

Yes

Yes

Reset card

Yes

Yes

Yes

View equipment information

Yes

Yes

Yes

Yes

Maintenance

Database

Backup, or restore

Yes

Ether Bridge

Spanning Tree Retrieve

Yes

Yes

Yes

Yes

Spanning Tree Clear/Clear all

Yes

Yes

Yes

MAC Table Retrieve

Yes

Yes

Yes

Yes

MAC Table Clear/Clear all

Yes

Yes

Yes

Trunk Utilization Refresh

Yes

Yes

Yes

Yes

Protection

Switch/lock out operations

Yes

Yes

Yes

Ring

MS-SPRing maintenance

Yes

Yes

Yes

Software

Download/Activate/Revert

Yes

XC Cards

Switch/Lock/Unlock

Yes

Yes

Yes

Diagnostic

Retrieve Diagnostics File

Yes

Lamp Test (Will be available for Maintenance, Provisioning, and Super users in Software R3.4.)

Yes

Timing

Edit

Yes

Yes

Yes

Audit

Retrieve Audit Trail

Yes

Yes

Yes

Yes

Routing Table

Read only

Yes

Yes

Yes

Yes

Procedure: Create a New User with Security Settings

You can perform ONS 15454 SDH user management tasks from network or node view. In network view, you can add, edit, or delete users from multiple nodes at one time. If you perform user management tasks in node view, you can only add, edit, or delete users from that node.


Note   You must add the same user name and password to each node the user will access.

Purpose

Create new users with security settings.

Prerequisite Procedures

"Logging into CTC" section

Onsite/Remote

Onsite or remote


Step 1   In network view, select the Provisioning > Security tabs.

Step 2   On the Security pane, click Create.


Figure 3-7   Creating new users from the network view


Step 3   In the Create User dialog box, enter the following:

Step 4   Under "Select applicable nodes," deselect any nodes where you do not want to add the user (all network nodes are selected by default).

Step 5   Click OK.


Note   New users can also be created from node view. If you add a user in node view, you can only add, edit, or delete users from that node (Figure 3-8).


Figure 3-8   Creating new users from the node view




Procedure: Change a User's Security Settings

Purpose

Change a user's security settings.

Prerequisite Procedures

"Logging into CTC" section

"Create a New User with Security Settings" section

Onsite/Remote

Onsite or remote


Step 1   In network view, select the Provisioning > Security tabs.

Step 2   Click a name under the list of users.


Figure 3-9   Changing a user's security settings from the network view


Step 3   On the Selected User dialog box, edit the user information: name, password, password confirmation, and/or security level. (A Superuser does not need to enter an old password. Other users must enter their old password when changing their own passwords.)


Note    You cannot change the CISCO15 user name.

Step 4   If you do not want the user changes to apply to all network nodes, deselect the nodes that you do not want to change in the Change Users dialog box.

Step 5   Click OK.

Changed user permissions and access levels do not take effect until the user logs out of CTC and logs back in.


Note    User security settings can also be changed from node view (Figure 3-10).


Figure 3-10   Changing a user's security settings from the node view




Procedure: Delete a User's Security Settings

Purpose

Delete a user's security settings.

Prerequisite Procedures

"Logging into CTC" section

"Create a New User with Security Settings" section

Onsite/Remote

Onsite or remote


Step 1   In network view, select the Provisioning > Security tabs.

Step 2   Click Delete.


Figure 3-11   Deleting a user from the network view


Step 3   On the Delete User dialog box, enter the name of the user you want to delete.

Step 4   If you do not want to delete the user from all network nodes, deselect the nodes.

Step 5   Click OK and click Apply.


Note   User security settings can also be deleted from node view (Figure 3-12).


Figure 3-12   Deleting a user from the node view




3.5 Setting Up ONS 15454 SDH Timing

SDH timing parameters must be set for each ONS 15454 SDH.

3.5.1 Timing Sources and Modes

Each ONS 15454 SDH independently accepts its timing reference from one of three sources:

You can set ONS 15454 SDH timing to one of three modes: external, line, or mixed. If timing is coming from the MIC-C/T/P FMEC timing connector, set ONS 15454 SDH timing to external. If the timing comes from an STM-N card, set the timing to line.


Note   The line timing mode is not available for 64 KHz.

In typical ONS 15454 SDH networks:

You can set three timing references for each ONS 15454 SDH. The first two references are typically two FMEC-level sources, or two line-level sources optically connected to a node with a BITS source. The third reference is the internal clock provided on every ONS 15454 SDH TCC-I card. This clock is a Stratum 3 (ST3). If an ONS 15454 SDH becomes isolated, timing is maintained at the ST3 level.


Caution   Mixed timing allows you to select both external and line timing sources. However, Cisco does not recommend its use because it can create timing loops. Use this mode with caution.

3.5.2 Network Timing Example

Figure 3-13 shows an ONS 15454 SDH network timing setup example. Node 1 is set to external timing. Two timing references are set to BITS. These are Stratum 1 timing sources connected to the MIC-C/T/P FMEC. The third reference is set to internal clock. The Timing A and Timing B out connectors on the MIC-C/T/P FMEC of Node 3 are used to provide timing to outside equipment.

In the example, Slots 5 and 6 contain the trunk cards. Timing at Nodes 2, 3, and 4 is set to line, and the timing references are set to the trunk cards based on distance from the MIC-C/T/P FMEC. Reference 1 is set to the trunk card closest to the timing source. At Node 2, Reference 1 is Slot 5 because it is connected to Node 1. At Node 4, Reference 1 is set to Slot 6 because it is connected to Node 1. At Node 3, Reference 1 could be either trunk card because they are equal distance from Node 1.


Figure 3-13   An ONS 15454 SDH timing example


3.5.3 Synchronization Status Messaging

Synchronization Status Messaging (SSM) communicates information about the quality of the timing source. The SSM supported in SDH is G.811, STU, G812T, G812L, SETS, DUS (ordered from high quality to low quality). SSM messages are carried on bits 5 to 8 of SDH overhead byte S1. They enable SDH devices to automatically select the highest quality timing reference and to avoid timing loops.


Note   The message set in San1 to San4 is a copy of the set defined in SDH bits 5 to 8 of byte S1.

Table 3-5   Assignment of Bit Patterns as Shown in ITU G.704

QL  San1, San2, San3, or San4 S1 bits b5-b8 
SDH Synchronization Quality Level (QL) Description
 

0

0000

Quality unknown (existing synchronization network)

1

0001

Reserved

2

0010

Rec. G.811

3

0011

Reserved

4

0100

Synchronization Supply Unit (SSU-A)

5

0101

Reserved

6

0110

Reserved

7

0111

Reserved

8

1000

Synchronization Supply Unit (SSU-B)

9

1001

Reserved

10

1010

Reserved

11

1011

Synchronous Equipment Timing Source (SETS)

12

1100

Reserved

13

1101

Reserved

14

1110

Reserved

15

1111

Do not use for synchronization

Procedure: Set up External, Line, or Mixed Timing for the ONS 15454 SDH


Note   CTC refers to Timing A and Timing B as BITS (Building Integrated Timing Supply) 1 and BITS 2. The MIC-C/T/P FMEC connector is labeled as Timing A and Timing B.

Purpose

Use this procedure to set external, line, or mixed timing for your ONS 15454 SDH nodes. To set up internal timing, see the "Set Up Internal Timing for the ONS 15454 SDH" procedure.

Prerequisite Procedures

"Logging into CTC" section

"Add the Node Name, Contact, Location, Date, and Time" section

"Set Up Network Information" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Provisioning > Timing tabs (Figure 3-14).


Figure 3-14   Setting up external, line, or mixed ONS 15454 SDH timing


Step 2   In the General Timing section, complete the following information:

Step 3   In the BITS Facilities section, complete the following information:


Note    The BITS Facilities section sets the parameters for your BITS1 and BITS2 timing references. Many of these settings are determined by the timing source manufacturer. If equipment is timed through BITS Out, you can set timing parameters to meet the requirements of the equipment.

Step 4   Under Reference Lists, complete the following information:


Figure 3-15   Reference list on the ONS 15454 SDH timing tab



Note    Reference lists define up to three timing references for the node and up to six BITS Out references. BITS Out references define the timing references used by equipment attached to the node's MIC-C/T/P FMEC Timing A and Timing B Out connector. If you attach equipment to the Timing A or B Out connector, you normally attach it to a node with Line mode because equipment near the External timing reference can be directly wired to the reference.

Step 5   Click Apply.


Note   Refer to the Cisco ONS 15454 SDH Troubleshooting and Maintenance Guide for timing-related alarms.



Procedure: Set Up Internal Timing for the ONS 15454 SDH


Note   CTC refers to Timing A and Timing B as BITS (Building Integrated Timing Supply) 1 and BITS 2. The MIC-C/T/P FMEC connector is labeled as Timing A and Timing B.

Purpose

If no BITS source is available, you can set up internal timing by timing all nodes in the ring from the internal clock of one node. Internal timing is Stratum 3 and not intended for permanent use. All ONS 15454 SDHs should be timed to a Stratum 2 or better primary reference source.

Use this procedure to set internal timing for your ONS 15454 SDH nodes. To set up external, line, or mixed timing, see the "Set up External, Line, or Mixed Timing for the ONS 15454 SDH" procedure.

Prerequisite Procedures

"Logging into CTC" section

"Add the Node Name, Contact, Location, Date, and Time" section

"Set Up Network Information" section

Onsite/Remote

Onsite or remote


Step 1   Log into the node that will serve as the timing source.

Step 2   From the CTC node view, click the Provisioning > Timing tabs (Figure 3-16).


Figure 3-16   Setting up internal ONS 15454 SDH timing


Step 3   In the General Timing section, enter the following:

Step 4   In the BITS Facilities section, enter the following information:

Step 5   In the Reference Lists section, enter the following information:

Step 6   Click Apply.

Step 7   Log into a node that will be timed from the node set up in Step 1 to Step 6.

Step 8   In the CTC node view, click the Provisioning > Timing tabs.

Step 9   In the General Timing section, enter the following:

Step 10   In the Reference Lists section, enter the following:

Step 11   Click Apply.

Step 12   Repeat Step 7 to Step 11 at each node that will be timed by the node serving as the timing source.



3.6 Creating Card Protection Groups

The ONS 15454 SDH provides several card protection methods. When you set up protection for ONS 15454 SDH cards, you must choose between maximum protection and maximum slot availability. The highest protection reduces the number of available card slots; the highest slot availability reduces the protection. Table 3-6 shows the protection types that can be set up for ONS 15454 SDH cards.

Table 3-6   Protection Types

Type  Cards  Description 

1:1

E1-N-14

E3-12

DS3i-N-12

Pairs one working card with one protect card. Install the protect card in an odd-numbered slot and the working card in an even-numbered slot next to the protect slot towards the center, for example: protect in Slot 1, working in Slot 2; protect in Slot 3, working in Slot 4; protect in Slot 15, working in Slot 14.

1:N

E1-N-14

DS3i-N-12

Assigns one protect card for several working cards. The maximum is 1:5. Protect cards (E1-N-14, DS3i-N-12) must be installed in Slots 3 or 15 and the cards they protect must be on the same side of the shelf. Protect cards must match the cards they protect. For example, a E1-N-14 can only protect E1-N-14 cards. If a failure clears, traffic reverts to the working card after the reversion time has elapsed.

1+1

Any optical

Pairs a working optical port with a protect optical port. Protect ports must match the working ports. For example, Port 1 of an STM-1 card can only be protected by Port 1 of another STM-1 card. Cards do not need to be in adjoining slots.

Unprotected

Any

Unprotected cards can cause signal loss if a card fails or incurs a signal error. However, because no card slots are reserved for protection, unprotected schemes maximize the service available for use on the ONS 15454 SDH. Unprotected is the default protection type.

Procedure: Create Protection Groups

Purpose

Use this procedure to create card protection groups for the ONS 15454 SDH. Unprotected cards can cause signal loss if a card fails or incurs a signal error.

Prerequisite Procedures

"Logging into CTC" section

"Add the Node Name, Contact, Location, Date, and Time" section

"Set Up Network Information" section

"Setting Up ONS 15454 SDH Timing" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Provisioning > Protection tabs.

Step 2   Under Protection Groups, click Create.


Figure 3-17   Creating card protection groups


Step 3   In the Create Protection Group dialog box, enter the following:

Based on these selections, a list of available working cards or ports is displayed under Available Cards or Available Ports. Figure 3-18 shows a 1:1 protection group.


Figure 3-18   Creating a 1:1 protection group


Step 4   From the Available Cards or Available Ports list, choose the card or port that you want to be the working card or port (the card(s) or port(s) that will be protected by the card or port selected in Protect Cards or Protect Ports). Click the top arrow button to move each card/port to the Working Cards or Working Ports list.

Step 5   Complete the remaining fields:

Step 6   Click OK.


Caution   Before running traffic on a protected card within a protection group, enable the ports of all protection group cards. See the "Set Card Ports In Service" procedure.


Note   To convert protection groups, see the "Converting E1-N14 and DS-3i-N-12 Cards From 1:1 to 1:N Protection" section.



Procedure: Edit Protection Groups

Purpose

Use this procedure to make changes to your card protection scheme.

Prerequisite Procedures

"Create Protection Groups" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Provisioning > Protection tabs.

Step 2   In the Protection Groups section, choose a protection group.

Step 3   In the Selected Group section, edit the fields as appropriate:

Based on these selections, a list of available working cards or ports is displayed under Available Cards or Available Ports.

Step 4   From the Available Cards or Available Ports list, choose the card or port that you want to be the working card or port (that is, the card(s) or port(s) that will be protected by the card or port selected in Protect Cards or Protect Ports). Click the top arrow button to move each card/port to the Working Cards or Working Ports list.

Step 5   Complete the remaining fields:

Step 6   Click Apply.



Procedure: Delete Protection Groups

Purpose

Use this procedure to delete a card protection group.

Prerequisite Procedures

"Create Protection Groups" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Maintenance > Protection tabs.

Step 2   Verify that working traffic is not running on the protect card:

    a. In the Protection Groups section, choose the group you want to delete.

    b. In the Selected Group section, verify that the protect card is in standby mode. If the protect card is in standby mode, continue with Step 3. If it is active, complete Step c.

    c. If the working card is in standby mode, manually switch traffic back to the working card. In the Selected Group pane, click the working card, then click Manual. Verify that the protect card switches to standby mode and the working card is active. If the protect card is standby, continue with Step 3. If the protect card is still active, do not continue. Begin troubleshooting procedures or call technical support.

Step 3   From the node view, click the Provisioning > Protection tabs.

Step 4   In the Protection Groups section, click a protection group.

Step 5   Click Delete.




hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jul 24 11:29:49 PDT 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.