cc/td/doc/product/software/ios112/ios112p
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Automatic Protection Switching of Packet-over-SONET Circuits

Feature Summary

Platforms

Supported MIBs and RFCs

Configuration Tasks

Configuration Examples

Command Reference

Automatic Protection Switching of Packet-over-SONET Circuits

Feature Summary

The automatic protection switching (APS) feature is supported on Cisco 7500 series routers and Cisco 12000 series routers. This feature allows switchover of packet-over-SONET (POS) circuits in the event of circuit failure and is often required when connecting SONET equipment to telco equipment. APS refers to the mechanism of using a "protect" POS interface in the SONET network as the backup for "working" POS interface. When the working interface fails, the protect interface quickly assumes its traffic load.

The protection mechanism used for this feature has "1+1, architecture" as described in the Bellcore publication TR-TSY-000253, SONET Transport Systems; Common Generic Criteria, Section 5.3. The connection may be bidirectional or unidirectional, and revertive or non-revertive.

In the 1+1 architecture, a protect interface (circuit) is paired with each working interface. Normally, the protect and working interfaces are connected to a SONET ADM (Add-Drop Multiplexer), which sends the same signal payload to the working and protect interfaces. The working and protect circuits may terminate in two ports of the same adapter card, or in different adapter cards in the same router, or in two different routers.

On the protect circuit, the K1 and K2 bytes from the line overhead (LOH) of the SONET frame indicate the current status of the APS connection and convey any requests for action. This signalling channel is used by the two ends of the connection to maintain synchronization.

The working and protect circuits themselves, within the router or routers in which they terminate, are synchronized over an independent communication channel, not involving the working and protect circuits. This independent channel may be a different SONET connection, or a lower-bandwidth connection. In a router configured for APS, the configuration for the protect interface includes the IP address of the router (normally its loopback address) that has the working interface.

The APS Protect Group Protocol, which runs on top of UDP, provides communication between the process controlling the working interface and the process controlling the protect interface. Using this protocol, the process controlling the protect circuit directs the process containing the working circuit whether to activate or deactivate the working circuit, in the case of degradation or loss of channel signal, or manual intervention. If communication between the two processes is lost, the working router assumes full control of the working circuit as if no protect circuit existed.

In bidirectional mode, the receive and transmit channels are switched as a pair. In unidirectional mode, the transmit and receive channels are switched independently. For example, in bidirectional mode, if the receive channel on the working interface has a loss of channel signal, both the receive and transmit channels are switched.

In addition to the new Cisco IOS commands added for the APS feature, the POS interface configuration commands pos  threshold and pos report have been added to support user configuration of the bit error rate (BER) thresholds and reporting of SONET alarms.

Document Conventions

Command descriptions use these conventions:

Platforms

This feature is supported on the Cisco 7500 series platforms and on the Cisco 12000 series platforms.

Supported MIBs and RFCs

None

Configuration Tasks

Two SONET connections are required to support APS. In a telco environment, the SONET circuits must be provisioned as APS. You must also provision the operation (for example, 1+1), mode (for example, bidirectional), and revert options (for example, no revert). If the SONET connections are homed on two separate routers (the normal configuration), an out of band (OOB) communications channel between the two routers needs to be set up for APS communication.

For more information on POS interfaces, refer to the Cisco IOS documentation (in particular, the "Configuring Interfaces" chapter in the Configuration Fundamentals Configuration Guide), and the installation and configuration documentation that accompanies the POS hardware.

Configure APS Working and Protect Interfaces

This section describes how to configure a working and protect interface. The tasks listed in this section are required. Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.

To configure the working interface, perform the following steps beginning in global configuration mode:

Task Command

Step 1 Specify the POS interface to be configured as the working interface and enter interface configuration mode.

interface pos slot/port-adapter/port

Step 2 Configure this interface as a working interface.

aps working circuit-number

Step 3 Exit configuration mode.

end

Step 4 Verify that the interface is configured correctly.

show controller pos

show interface pos

show aps


Note If a router has two or more protect interfaces, the aps group command for each interface must precede the corresponding aps protect command. We recommend you configure a group number for every APS interface. The aps group command must precede the corresponding aps working command.

To configure the protect interface, perform the following steps beginning in global configuration mode:

Task Command

Step 1 Specify the POS interface to be configured as the protect interface and enter interface configuration mode.

interface pos slot/port-adapter/port

Step 2 Configure this interface as a protect interface. Specify the IP address of the router that contains the working interface.

aps protect circuit-number ip-address

Step 3 Exit configuration mode.

end

Step 4 Verify that the interface is configured correctly.

show controller pos

show interface pos

show aps

Configure Other APS Options

To configure the other APS options, perform any of the following tasks in interface configuration mode. The tasks listed in this section are optional.

Task Command

Enable authentication and specify the string that must be present to accept any packet on the OOB communication channel.

aps authenticate string

Manually switch the specified circuit to a protect interface, unless a request of equal or higher priority is in effect.

aps force circuit-number

Allow more than one protect/working interface group to be supported on a router.

aps group group-number

Prevent a working interface from switching to a protect interface.

aps lockout circuit-number

Manually switch a circuit to a protect interface, unless a request of equal or higher priority is in effect.

aps manual circuit-number

Enable automatic switchover from the protect interface to the working interface after the working interface becomes available. By default, configuration is non-revertive.

aps revert minutes

Change the time between hello packets and the time before the protect interface process declares a working interface's router to be down (that is, seconds1 for the hello time, and seconds2 for the hold time). By default, interfaces are bidirectional.

aps timers seconds1 seconds2

Configure a protect interface for unidirectional mode.

aps unidirectional


Note The aps force command and the aps manual command take effect at the time they are entered. The commands are not written to NVRAM and do not show up when you display the running configuration.

Monitor and Maintain APS

To provide information about system processes, the Cisco IOS software includes an extensive list of EXEC commands that begin with the word show, which, when executed, display detailed tables of system information. Following is a list of some of the common show commands for the APS feature.

Perform these tasks in privileged EXEC mode to display the information described:

Task Command

Display information about the automatic protection switching feature.

show aps

Display information about the hardware.

show controllers pos

Display information about the interface.

show interface pos

Configure SONET Alarm Reporting

To configure the thresholds and the type of SONET alarms that are reported, perform any of the following tasks in interface configuration mode. The tasks listed in this section are optional. The default settings are adequate for most POS installations.

Task Command

Configure the BER threshold values for signal failure (SF), signal degrade (SD), or threshold crossing alarms alarms (TCA).

pos threshold {b1-tca | b2-tca | b3-tca | sd-ber | sf-ber} rate

Enable reporting of selected SONET alarms.

pos report {b1-tca | b2-tca | b3-tca | lais | lrdi | pais | plop | prdi | rdool | sd-ber | sf-ber | slof | slos}

Configure whether an Alarm Indication Signal - Line (AIS-L) is sent when a POS interface is shut down.

pos  ais-shut

To display the current BER threshold setting or to view the reporting of the SONET alarms, use the show controllers pos EXEC command.

Configuration Examples

The following examples show how to configure basic APS on a router and how to configure more than one protect/working interface on a router by using the aps group command.

Basic APS Configuration

The following example shows the configuration of APS on router A and router B (see Figure 1). In this example, router A is configured with the working interface, and router B is configured with the protect interface. If the working interface on router A becomes unavailable, the connection will automatically switchover to the protect interface on router B.


Figure 1: Basic APS Configuration

On router A, which contains the working interface, use the following configuration:

router# configure terminal router(config)# interface loopback 1 router(config-if)# ip address 7.7.7.7 255.255.255.0 router(config)# interface pos 2/0/0 router(config-if)# aps group 1 router(config-if)# aps working 1 router(config-if)# pos ais-shut router(config-if)# end router#

On router B, which contains the protect interface, use the following configuration:

router# configure terminal router(config)# interface loopback 2 router(config-if)# ip address 7.7.7.6 255.255.255.0 router(config)# interface pos 3/0/0 router(config-if)# aps group 1 router(config-if)# aps protect 1 7.7.7.7 router(config-if)# pos ais-shut router(config-if)# end router#
Note The loopback interface is used as the interconnect. The aps group command is used even when a single protect group is configured.

To verify the configuration or to determine if a switchover has occurred, use the show aps command.

Multiple APS Interface Configuration

To configure more than one protect/working interface on a router, you must use the aps group command. The following example shows the configuration of grouping more than one working/protect interface on a router. In this example, router A is configured with a working interface and a protect interface, and router B is configured with a working interface and a protect interface. If the working interface 2/0/0 on router A becomes unavailable, the connection will switchover to the protect interface 3/0/0 on router B because they are both in APS group 10. Similarly, if the working interface 2/0/0 on router B becomes unavailable, the connection will switchover to the protect interface 3/0/0 on router A because they are both in APS group 20.


Figure 2:
Multiple Working and Protect Interfaces Configuration

Note Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.

On router A, which contains the working interface for group 10 and the protect interface for group 20, use the following configuration:

router# configure terminal router(config)# interface loopback 1 router(config-if)# ip address 7.7.7.6 255.255.255.0 router(config)# interface pos 2/0/0 router(config)# aps group 10 router(config-if)# aps working 1 router(config)# interface pos 3/0/0 router(config-if)# aps group 20 router(config-if)# aps protect 1 7.7.7.7 router(config-if)# pos ais-shut router(config-if)# end router#

On router B, which contains the protect interface for group 10 and the working interface for group 20, use the following configuration:

router# configure terminal router(config)# interface loopback 2 router(config-if)# ip address 7.7.7.7 255.255.255.0 router(config)# interface pos 2/0/0 router(config)# aps group 20 router(config-if)# aps working 1 router(config)# interface pos 3/0/0 router(config-if)# aps group 10 router(config-if)# aps protect 1 7.7.7.6 router(config-if)# pos ais-shut router(config-if)# end router#

To verify the configuration or to determine if a switchover has occurred, use the show aps command.

Command Reference

This section documents new or modified commands. All other commands used with this feature are documented in the Cisco IOS Release 11.1 command references.

aps authenticate

To enable authentication and specify the string that must be present to accept any packet on the out of band (OOB) communications channel, use the aps authenticate interface command. To disable authentication, use the no form of the command.

aps authenticate string
no aps authenticate
Syntax Description

string

Text that must be present to accept the packet on a protected or working interface. Up to 8 alphanumeric characters are accepted.

Default

Authentication is disabled.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps authenticate command to ensure that only valid packets are accepted on the OOB communication channel.

The aps authenticate command must be configured on both the working and protect interfaces.

Examples

The following example enables authentication on POS interface 0 in slot 4:

router# configure terminal router(config)# interface pos 4/0/0 router(config-if)# aps working 1 router(config-if)# aps authenticate sanjose router(config-if)# exit router(config)# exit router#
Related Commands

aps protect
aps working

aps force

To manually switch the specified circuit to a protect interface, unless a request of equal or higher priority is in effect, use the aps force interface configuration command. To cancel the switch, use the no form of the command.

aps force circuit-number
no aps force circuit-number
Syntax Description

circuit-number

Number of the circuit to switch to the protect interface.

Default

No circuit is switched.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps force command to manually switch the interface to a protect interface when you are not using the aps revert command. For example, if you need to change the fiber connection, you can manually force the working interface to switch to the protect interface.

You can use the aps force 0 command to force traffic from the protect interface back onto the working interface. This is true only because APS always has one-plus-one (1+1) architecture.

The aps force command has a higher priority than any of the signal failures or the aps  manual command.

The aps force command is configured only on protect interfaces.

The aps force command takes effect immediately and is not saved with the configuration.

Examples

The following example forces the circuit on POS interface 0 in slot 3 (a protect interface) back onto a working interface:

router# configure terminal router(config)# interface pos 3/0/0 router(config-if)# aps protect 1 router(config-if)# aps force 1 router(config-if)# exit router(config)# exit router#
Related Commands

aps manual
aps protect
aps working

aps group

To allow more than one protect and working interface to be supported on a router, use the aps group interface configuration command. To remove a group, use the no form of the command.

aps group group-number
no aps group group-number
Syntax Description

group-number

Number of the group. The default group number is 0.

Default

No groups exist.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

The aps group command specifies a protect-group number for the protect or working circuit to which it applies.

The aps group command must be configured on both the protect and working interfaces.

The aps group command should appear before the aps working or aps protect command.

The aps group command specifies how the various working and protect circuits are associated. The aps group command must be configured on both the protect and working interfaces.

Examples

The following example configures two working/protect interface pairs. Working interface (3/0/0) is configured in group 10 (the protect interface for this working interface is configured on another router), and protect interface (2/0/1) is configured in group 20:

router# configure terminal router(config)# interface loopback 1 router(config-if)# ip address 7.7.7.6 255.255.255.0 router(config)# interface pos 3/0/0 router(config-if)# aps group 10 router(config-if)# aps working 1 router(config)# interface pos 2/0/1 router(config-if)# aps group 20 router(config-if)# aps protect 1 7.7.7.7 router(config-if)# end

On the second router, protect interface (4/0/0) is configured in group 10, and working interface (5/0/0) is configured in group 20 (the protect interface for this working interface is configured on another router):

router(config)# interface loopback 2 router(config-if)# ip address 7.7.7.7 255.255.255.0 router(config)# interface pos 4/0/0 router(config-if)# aps group 10 router(config-if)# aps protect 1 7.7.7.6 router(config)# interface pos 5/0/0 router(config-if)# aps group 20 router(config-if)# aps working 1 router(config)# end router#
Related Commands

aps protect
aps working

aps lockout

To prevent a working interface from switching to a protect interface, use the aps lockout interface configuration command. To remove the lockout, use the no form of the command.

aps lockout circuit-number
no aps lockout circuit-number
Syntax Description

circuit-number

Number of the circuit to lock out.

Default

No lockout exists.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

The aps lockout command is configured only on protect interfaces.

Examples

The following example locks out (that is, prevents the circuit from switching to a protect interface in the event that the working circuit becomes unavailable) the POS interface 3/0/0:

router# configure terminal router(config)# interface pos 3/0/0 router(config-if)# aps protect 1 7.7.7.7 router(config-if)# aps lockout 1 router(config-if)# end router#
Related Commands

aps protect
aps working

aps manual

To manually switch a circuit to a protect interface, use the aps manual interface configuration command. To cancel the switch, use the no form of the command.

aps manual circuit-number
no aps manual circuit-number
Syntax Description

circuit-number

Number of the circuit to switch to a protect interface.

Default

No circuit is switched.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps manual command to manually switch the interface to a protect interface. For example, you can use this feature when you need to perform maintenance on the working channel. If a protection switch is already up, you can also use the aps manual command to revert the communication link back to the working interface before the wait to restore (WTR) time has expired. The WTR time period is set by the aps revert command.

In a one-plus-one (1+1) configuration only, you can use the aps manual 0 command to force traffic from the protect interface back onto the working interface.

The aps manual command is a lower priority than any of the signal failures or the aps force command.

Examples

The following example forces the circuit on POS interface 0 in slot 3 (a working interface) back onto the protect interface:

router# configure terminal router(config)# interface pos 3/0/0 router(config-if)# aps working 1 router(config-if)# aps manual 1 router(config-if)# end router#
Related Commands

aps force
aps protect
aps revert
aps working

aps protect

To enable a POS interface as a protect interface, use the aps protect interface command. To remove the POS interface as a protect interface, use the no form of the command.

aps protect circuit-number ip-address
no aps protect circuit-number ip-address
Syntax Description

circuit-number

Circuit number of the associated working POS interface.

ip-address

IP address of the router that has the working POS interface.

Default

No circuit is protected.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps protect command to configure the POS interface as backup to a specific working interface if the working interface becomes unavailable due to a router failure, degradation or loss of channel signal, or manual intervention.


Note Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.
Examples

The following example configures circuit 1 on POS interface 5/0/0 as a protect interface for the working interface on the router with the IP address of 7.7.7.7. For information on how to configure the working interface, refer to the aps working command.

router# configure terminal router(config)# interface pos 5/0/0 router(config-if)# aps protect 1 7.7.7.7 router(config-if)# end router#
Related Commands

aps working

aps revert

To enable automatic switchover from the protect interface to the working interface after the working interface becomes available, use the aps revert interface command. To disable automatic switchover, use the no form of the command.

aps revert minutes
no aps revert
Syntax Description

minutes

Number of minutes until the circuit is switched back to the working interface after the working interface is available.

Default

Automatic switchover is disabled.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps revert command to return the circuit to the working interface when it becomes available.

The aps revert command is configured only on protect interfaces.

Examples

The following example enables circuit 1 on POS interface 5/0/0 to revert to the working interface after the working interface has been available for 3 minutes:

router# configure terminal router(config)# interface pos 5/0/0 router(config-if)# aps protect 1 7.7.7.7 router(config-if)# aps revert 3 router(config-if)# end router#
Related Commands

aps protect

aps timers

To change the time between hello packets and the time before the protect interface process declares a working interface's router to be down, use the aps timers interface configuration command. To return to the default timers, use the no form of the command.

aps timers seconds1 seconds2
no aps timers
Syntax Description

seconds1

Number of seconds to wait before sending a hello packet (hello timer). The default is 1 second.

seconds2

Number of seconds to wait to receive a response from a hello packet before the interface is declared down (hold timer). The default is 3 seconds.

Default

Hello time is 1 second, and hold time is 3 seconds.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps timers command to control the time between an automatic switchover from the protect interface to the working interface after the working interface becomes available.

The hold timer and hello timer control aspects of the OOB communications.

Normally, the hold time is greater than or equal to three times the hello time.

The aps timers command is configured only on protect interfaces.

Examples

The following example specifies a hello time of 2 seconds and a hold time of 6 seconds on circuit 1 on POS interface 5/0/0:

router# configure terminal router(config)# interface pos 5/0/0 router(config-if)# aps working 1 router(config-if)# aps timers 2 6 router(config-if)# end router#

aps unidirectional

To configure a protect interface for unidirectional mode, use the aps unidirectional interface configuration command. To return to the default, bidirectional mode, use the no form of the command.

aps unidirectional
no aps unidirectional

Syntax Description

This command has no keywords or arguments

Default

Bidirectional mode.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps unidirectional command when you must interoperate with SONET network equipment (ADMs) that supports unidirectional mode.


Note We recommend bidirectional mode when it is supported by the interconnecting SONET equipment. When the protect interface is configured as unidirectional, the working and protect interfaces must cooperate to switch the transmit and receive SONET channel in a bidirectional fashion. This happens automatically when the SONET network equipment is in bidirectional mode.

The aps unidirectional command is configured only on protect interfaces.

Examples

The following example configures POS interface 3/0/0 for unidirectional mode:

router# configure terminal router(config)# interface pos 3/0/0 router(config-if)# aps unidirectional router(config-if)# aps protect 1 7.7.7.7 router(config-if)# end router#

aps working

To configure a POS interface as a working interface, use the aps working interface command. To remove the protect from the POS interface, use the no form of the command.

aps working circuit-number
no aps working circuit-number
Syntax Description

circuit-number

Circuit number associated with this working interface.

Default

No circuit is configured as working.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

When a working interface becomes unavailable because of a router failure, degradation or loss of channel signal, or manual intervention, the circuit is switched to the protect interface to maintain the connection.

To enable the circuit on the protect interface to switch back to the working interface after the working interface becomes available again, use the aps revert interface configuration command.


Note Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.
Examples

The following example configures the POS interface 0 in slot 4 as a working interface. For information on how to configure the protect interface, refer to the aps protect command.

router# configure terminal router(config)# interface pos 4/0/0 router(config-if)# aps working 1 router(config-if)# end router#
Related Commands

aps protect
aps revert

pos ais-shut

To send the alarm indication signal - line (AIS-L) when the POS interface is placed in administrative shut down state, use the pos ais-shut interface command. Use the no form of the command to disable sending LAIS on administrative shut down.

[no] pos ais-shut
Syntax Description

This command has no keywords or arguments.

Default

No line alarm indication signal is sent.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC and Cisco IOS Release 11.2 GS.

In Automatic Protection Switching (APS) environments, AIS-L can be used to force a protection switch.


Note The term AIS-L is also known as LAIS.

Prior to Release 11.2(11)GS2, when a POS interface shut down the framer was reset. In 11.2(11)GS2 and later 11.2GS releases, the framer no longer is reset when a POS interface is shut down. The pos  ais-shut interface configuration command controls whether an Alarm Indication Signal - Line (AIS-L) is sent when a POS interface is shut down.

It is possible for an interface to shut down silently (no alarm) if pos  ais-shut is not configured. For more information on APS, refer to Automatic Protection Switching of Packet-over-Sonet Circuits.

Example

The following example forces the alarm indication on the POS OC-3 interface 0 in slot 3:

router# pos 3/0 ais-shut

pos report

To permit selected SONET alarms to be logged to the console for a POS interface, use the pos report interface command. To disable logging of select SONET alarms, use the no form of this command.

pos report {b1-tca | b2-tca | b3-tca | lais | lrdi | pais | plop | prdi | rdool | sd-ber | sf-ber |
slof | slos}
no pos report {b1-tca | b2-tca | b3-tca | lais | lrdi | pais | plop | prdi | rdool | sd-ber | sf-ber |
slof | slos}

Syntax Description

b1-tca

Report B1 bit error rate (BER) threshold crossing alarm errors. Reported by default.

b2-tca

Report B2 BER threshold crossing alarm errors. Reported by default.

b3-tca

Report B3 BER threshold crossing alarm errors. Reported by default.

lais

Report line alarm indication signal errors.

lrdi

Report line remote defect indication errors.

pais

Report path alarm indication signal errors.

plop

Report path loss of pointer errors. Reported by default.

prdi

Report path remote defect indication errors.

rdool

Report receive data out of lock errors.

sd-ber

Report signal degradation BER errors.

sf-ber

Report signal failure BER errors. Reported by default.

slof

Report section loss of frame errors. Reported by default.

slos

Report section los of signal errors. Reported by default.

Default

b1-tca, b2-tca, b3-tca, plop, sf-ber, slof, and slos are reported by default.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Reporting an alarm means that the alarm can be logged to the console. Just because an alarm is permitted to be logged does not guarantee that it is logged. SONET alarm hierarchy rules dictate that only the most severe alarm of an alarm group is reported. Whether an alarm is reported or not, you can view the current state of a defect by checking the "Active Defects" line from the show controllers pos command output. A defect is a problem indication that is a candidate for an alarm.

For B1, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B1 byte of the following frame. Differences indicate that section level bit errors have occurred.

For B2, the bit interleaved parity error report is calculated by comparing the BIP-8/24 code with the BIP-8 code extracted from the B2 byte of the following frame. Differences indicate that line level bit errors have occurred.

For B3, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B3 byte of the following frame. Differences indicate that path level bit errors have occurred.

PAIS is sent by line terminating equipment (LTE) to alert the downstream path terminating equipment (PTE) that it has detected a defect on its incoming line signal.

PLOP is reported as a result of an invalid pointer (H1, H2) or an excess number of new data flag (NDF) enabled indications.

SLOF is detected when a severely error framing (SEF) defect on the incoming SONET signal persists for 3 milliseconds.

SLOS is detected when an all-zeros pattern on the incoming SONET signal lasts 19(+-3) microseconds or longer. This defect might also be reported if the received signal level drops below the specified threshold.

To determine the alarms that are reported on the interface, use the show controllers pos command.

Example

The following example enables reporting of SD-BER and LAIS alarms on the interface:

Router(config)# interface pos 3/0/0 Router(config-if)#  pos report sd-ber Router(config-if)#  pos report lais Router(config-if)# end Router#
Related Commands

interface pos
show controllers pos

pos threshold

To set the BER threshold values of the specified alarms for a POS interface, use the pos threshold interface command. To return to the default setting, use the no form of this command.

pos threshold {b1-tca | b2-tca | b3-tca | sd-ber | sf-ber} rate
no pos threshold {b1-tca | b2-tca | b3-tca | sd-ber | sf-ber} rate
Syntax Description

b1-tca

B1 bit error rate (BER) threshold crossing alarm.

b2-tca

B2 BER threshold crossing alarm.

b3-tca

B3 BER threshold crossing alarm.

sd-ber

Signal degrade BER threshold.

sf-ber

Signal failure BER threshold.

rate

Bit error rate from 3 to 9 (10-n). The default is 6 for all thresholds except for the sf-ber. For sf-ber, the default is 3 (that is, 10e-3).

Default

The default is 6 for b1-tca, b2-tca, b3-tca, and sd-ber. The default is 3 for sf-ber.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

For B1, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B1 byte of the following frame. Differences indicate that section level bit errors have occurred.

For B2, the bit interleaved parity error report is calculated by comparing the BIP-8/24 code with the BIP-8 code extracted from the B2 byte of the following frame. Differences indicate that line level bit errors have occurred.

For B3, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B3 byte of the following frame. Differences indicate that path level bit errors have occurred.

SF-BER and SD-BER are sourced from B2 BIP-8 error counts (as is B2-TCA). However, SF-BER and SD-BER feed into the APS machine and can lead to a protection switch (if APS is configured).

B1-TCA, B2-TCA, and B3-TCA do nothing more than print a log message to the console (if reports for them are enabled).

To determine the BER thresholds configured on the interface, use the show controllers pos command.

Example

The following example configures thresholds on the interface:

Router(config)# interface pos 3/0/0 Router(config-if)#  pos threshold sd-ber 8 Router(config-if)#  pos threshold sf-ber 4 Router(config-if)#  pos threshold b1_tca 4 Router(config-if)# end Router#
Related Commands

interface pos
show controllers pos

show aps

To display information about the current automatic protection switching (APS) feature, use the show  aps EXEC command.

show aps
Syntax Description

This command has no arguments or keywords.

Command Mode

Privileged EXEC

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Sample Displays

The following is sample output of the show aps command on a router configured with a working interface. In this example, POS interface 0/0/0 is configured as a working interface in group 1, and the interface is selected (that is, active).

router1# show aps POS0/0/0 working group 1 channel 1 Enabled Selected

The following is sample output of the show aps command on a router configured with a protect interface. In this example, POS interface 2/0/0 is configured as a protect interface in group 1, and the interface is not selected (the ~ indicates that the interface is not active). The output also shows that the working channel is located on the router with the IP address 15.1.6.1 and that the interface is currently selected (that is, active).

router2# show aps POS2/0/0 protect group 1 channel 0 bidirectional ~Selected

For the K1 field (8 bits), the first 4 bits indicate the channel number that has made the request, and the last 4 bits map to the the requests (local or external) listed in Table 1. Under most conditions, the K1 bits are not displayed. For K2 field (8 bits), the first 4 bits indicate the channel number bridged onto the protect line, the next bit is the architecture used, and the last 3 bits indicate the mode of operation or non-APS use listed in Table 2. A show controller pos command displays K2 values.


Table 1: K1 Bit Descriptions
Bits (hex) Description
K1 Bits 87654321

Bits 8 through 5

 nnnn

Channel number that made the request.

Bits 4 through 1

 1111 (0xF)

Lockout of protection request.

 1110 (0xE)

Forced switch request.

 1101 (0xD)

Signal failure (SF)---high priority request.

 1100 (0xC)

Signal failure (SF)---low priority request.

 1011 (0xB)

Signal degradation (SD)---high priority request.

 1010 (0xA)

Signal degradation (SD)---low priority request.

 1001 (0x9)

Not used.

 1000 (0x8)

Manual switch request.

 0111 (0x7)

Not used.

 0110 (0x6)

Wait to restore request.

 0101 (0x5)

Not used.

 0100 (0x4)

Exercise request.

 0011 (0x3)

Not used.

 0010 (0x2)

Reverse request.

 0001 (0x1)

Do not revert request.

 0000 (0x0)

No request.


Table 2: K2 Bits Descriptions
Bits Description
K2 Bits 87654321

Bits 8 through 5

 nnnn

Channel number bridged on the protection line.

Bit 4

 1

One to n (1:n) architecture.

 0

One plus one (1+1) architecture.

Bits 3 through 1

 111

Line AIS.

 110

Line RDI.

 101

Bidirectional operation mode.

 100

Unidirectional operation mode.

 other

Reserved.

Related Commands

aps protect
aps working

show controllers pos

To display information about the POS controllers, use the show controllers pos privileged EXEC command.

show controllers pos [slot-number] [details]
Syntax Description

slot-number

(Optional) The chassis slot that contains the POS interface. For the Cisco  7500 series, use slot/port-adapter/port (for example, 2/0/0). For the Cisco  12000 series, use slot/port (for example, 4/0). The "/" is required. If you do not specify a slot number, information for all the installed POS controllers is displayed.

details

(Optional) In addition to the normal information displayed by the show controllers pos command, the details option provides a hexadecimal and ASCII "dump" of the path trace buffer.

Command Mode

Privileged EXEC

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC and 11.2 GS.

The information displayed is generally useful for diagnostic tasks performed by technical support personnel only.

Sample Display

The following is sample output of the show controllers pos command on a Cisco 7500 series router:

router# show controllers pos POS2/0/0 SECTION LOF = 0 LOS = 2335 BIP(B1) = 77937133 LINE AIS = 2335 RDI = 20 FEBE = 3387950089 BIP(B2) = 1622825387 PATH AIS = 2340 RDI = 66090 FEBE = 248886263 BIP(B3) = 103862953 LOP = 246806 NEWPTR = 11428072 PSE = 5067357 NSE = 4645 Active Defects: B2-TCA B3-TCA Active Alarms: None Alarm reporting enabled for: B1-TCA APS COAPS = 12612784 PSBF = 8339 State: PSBF_state = False Rx(K1/K2): 00/CC Tx(K1/K2): 00/00 S1S0 = 03, C2 = 96 CLOCK RECOVERY RDOOL = 64322060 State: RDOOL_state = True PATH TRACE BUFFER: UNSTABLE Remote hostname : Remote interface: Remote IP addr : Remote Rx(K1/K2): ../.. Tx(K1/K2): ../.. BER thresholds: SF = 10e-3 SD = 10e-8 TCA thresholds: B1 = 10e-7  B2 = 10e-3 B3 = 10e-6 router#

Table 3 describes the fields shown in the display.


Table 3: Show Controllers POS Field Descriptions
Field Description

POS2/0/0

Slot number of the POS interface.

LOF

Section loss of frame is detected when a severely error framing (SEF) defect on the incoming SONET signal persist for 3 milliseconds.

LOS

Section loss of signal is detected when an all-zeros pattern on the incoming SONET signal lasts 19(+-3) microseconds or longer. This defect might also be reported if the received signal level drops below the specified threshold.

BIP(B1)/BIP(B2)/BIP(B3)

Bit interleaved parity error reported.

For B1, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B1 byte of the following frame. Differences indicate that section level bit errors have occurred.

For B2, the bit interleaved parity error report is calculated by comparing the BIP-8/24 code with the BIP-8 code extracted from the B2 byte of the following frame. Differences indicate that line level bit errors have occurred.

For B3, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B3 byte of the following frame. Differences indicate that path level bit errors have occurred.

AIS

Alarm indication signal.

Line alarm indication signal is sent by the section terminating equipment (STE) to alert the downstream line terminating equipment (LTE) that a LOS or LOF defect has been detected on the incoming SONET section.

Path alarm indication signal is sent by the LTE to alert the downstream path terminating equipment (PTE) that it has detected a defect on its incoming line signal.

RDI

Remote defect indication.

Line remote defect indication is reported by the downstream LTE when it detects LOF, LOS, or AIS.

Path remote defect indication is reported by the downstream PTE when it detects a defect on the incoming signal.

FEBE

Far end block errors.

Line far end block error (accumulated from the M0 or M1 byte) is reported when the downstream LTE detects BIP(B2) errors.

Path far end block error (accumulated from the G1 byte) is reported when the downstream PTE detects BIP(B3) errors.

LOP

Path loss of pointer is reported as a result of an invalid pointer (H1, H2) or an excess number of new data flag (NDF) enabled indications.

NEWPTR

An inexact count of the number of times the SONET framer has validated a new SONET pointer value (H1,H2).

PSE

An inexact count of the number of times the SONET framer has detected a positive stuff event in the received pointer (H1, H2).

NSE

An inexact count of the number of times the SONET framer has detected a negative stuff event in the received pointer (H1, H2).

Active Defects

List of all currently active SONET defects.

Active Alarms

List of current Alarms as enforced by Sonet Alarm Hierarchy.

Alarm reporting enabled for

List of alarms that you enabled reporting for with the pos report interface command.

APS

Automatic protection switching.

COAPS

An inexact count of the number of times a new APS value has been detected in the K1, K2 bytes.

PSBF

An inexact count of the number of times a protection switching byte failure has been detected (no three consecutive SONET frames contain identical K1 bytes).

PSBF_state

Protection switching byte failure state.

Rx(K1/K2)/Tx(K1/K2)

Contents of the received and transmitted K1 and K2 bytes. For more information on the K1 field, refer to Table 1. For more information on the K2 field, refer to Table 2.

S1S0

The two S bits received in the last H1 byte.

C2

The value extracted from the SONET path signal label byte (C2).

CLOCK RECOVERY

SONET clock is recovered using information in the SONET overhead. RDOOL is an inexact count of the number of times Receive Data Out Of Lock has been detected which indicates the clock recovery phased lock loop is unable to lock to the receive stream.

PATH TRACE BUFFER

SONET path trace buffer is used to communicate information regarding the remote hostname, interface name/number and IP address. This is a Cisco-proprietary use of the J1 (path trace) byte.

BER thresholds

List of the bit error rate (BER) thresholds you configured with the pos threshold interface command.

TCA thresholds

List of threshold crossing alarms (TCA) you configured with the pos threshold interface command.


hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.