Anda di halaman 1dari 464

1850 Transport Service

Switch-5C (TSS-5C)
Release 6.1

User Provisioning Guide

8DG24624AGAATQZZA
Issue 7
September 2017

Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
1850 TSS-5C

Legal notice

Nokia is a registered trademark of Nokia Corporation. Other products and company names mentioned herein may be trademarks or
tradenames of their respective owners.

The information presented is subject to change without notice. No responsibility is assumed for inaccuracies contained herein.

© 2017 Nokia.

Contains proprietary/trade secret information which is the property of Nokia and must not be made available to, or copied or used by
anyone outside Nokia without its written authorization.

Not to be used or disclosed except in accordance with applicable agreements.

Notice

The information in this document is subject to change without notice. Although every effort has been made to make this document as
accurate, complete, and clear as possible, Nokia and its predecessors assume no responsibility for any errors that appear in this document.

Security Statement

In rare instances, unauthorized individuals make connections to the telecommunications network. In such an event, applicable tariffs require
that the customer pay all network charges for traffic. Nokia and its predecessors cannot be responsible for such charges and will not make
any allowance or give any credit for charges that result from unauthorized access.

Limited warranty

Nokia provides a limited warranty for this product. For more information, consult your local Nokia customer support team.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
2 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Contents

About this document..........................................................................................................................................24

1 Getting Started .............................................................................................................................................29


1.1 Overview ...........................................................................................................................................29
1.2 Craft terminal functionality.................................................................................................................29

2 System Management ...................................................................................................................................31


2.1 Overview ...........................................................................................................................................31
2.2 Zero-Installation Craft terminal overview...........................................................................................31
2.3 Graphical User Interface ...................................................................................................................33
2.4 Mouse ...............................................................................................................................................34
2.5 browser window ................................................................................................................................35
2.6 Hyperlinks .........................................................................................................................................36
2.7 Combo-boxes....................................................................................................................................38
2.8 Menus ...............................................................................................................................................38
2.9 Entry boxes .......................................................................................................................................39
2.10 Dialog boxes .....................................................................................................................................40
2.11 Menu description...............................................................................................................................40

3 Provisioning: Detailed Level Procedures ..................................................................................................93


3.1 Overview ...........................................................................................................................................93
Provisioning via ZIC.....................................................................................................................................97
3.2 Accessing ZIC ...................................................................................................................................97
3.3 Log into the system .........................................................................................................................100
3.4 Log out of the system......................................................................................................................101
3.5 Change user password ...................................................................................................................103
3.6 Change site identifier ......................................................................................................................104
3.7 Create user account........................................................................................................................105
3.8 Change user account ......................................................................................................................107
3.9 Initialize and Upgrade with a new release.......................................................................................114
3.10 Administer In-Service upgrade ........................................................................................................118
3.11 Database Management ..................................................................................................................119
3.12 Create a MAC/IP ACL .....................................................................................................................124
3.13 Create an access control element (ACE)........................................................................................126
3.14 Create IPv4 Access Control Element (ACE) ...................................................................................130
3.15 Create IPv6 Access Control Element (ACE) ...................................................................................134

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 3
1850 TSS-5C

3.16 Configure Management RADIUS ....................................................................................................137


3.17 Configure management radius authority .........................................................................................138
3.18 DB management remote file copy...................................................................................................139
3.19 Administer MAC File Collection ......................................................................................................140
3.20 Administer Network Element...........................................................................................................141
3.21 Administer LAC Management .........................................................................................................142
3.22 Retrieve the Manager List ...............................................................................................................144
3.23 Administer Proactive Tool Delay Measurement...............................................................................145
3.24 Create Synthetic Loss Measurement ..............................................................................................147
3.25 Administer PM Global File...............................................................................................................149
3.26 Administer SSH and SSL ................................................................................................................152
3.27 Administer Network time protocol ...................................................................................................162
3.28 Set the differential time frequency...................................................................................................166
3.29 Set IP ACL.......................................................................................................................................166
3.30 Retrieve Audit log ............................................................................................................................170
3.31 Log Settings ....................................................................................................................................171
3.32 Administer IP message settings ......................................................................................................172
3.33 Administer Tunnel Protection Switching (1:1) .................................................................................173
3.34 Create LAG .....................................................................................................................................174
3.35 Accessing the node.........................................................................................................................182
3.36 Provisioning a Shelf .......................................................................................................................183
3.37 Port configuration ............................................................................................................................191
3.38 Create Traffic Descriptor (Data) ......................................................................................................215
3.39 Create queue management ............................................................................................................218
3.40 Modify queue profile........................................................................................................................221
3.41 Create color profile..........................................................................................................................223
3.42 Create maintenance domain ...........................................................................................................224
3.43 Modify maintenance domain ...........................................................................................................226
3.44 Create maintenance association.....................................................................................................226
3.45 Modify maintenance association .....................................................................................................229
3.46 Create MEP.....................................................................................................................................230
3.47 Configure EFM tool .........................................................................................................................234
3.48 Configure On-Demand Delay Measurement...................................................................................238
3.49 Configure Alarm Indication Signal (AIS)..........................................................................................241
3.50 Configure PM Threshold .................................................................................................................243
3.51 Create 1:1 tunnel protection............................................................................................................248
3.52 Configure the IP address ................................................................................................................256

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
4 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

3.53 Configure LAN Management...........................................................................................................258


3.54 Enable Auto DCN ............................................................................................................................263
3.55 Manage OSPF ...............................................................................................................................268
3.56 Retrieve Network Service Access Point (NSAP).............................................................................275
3.57 Create IP routing .............................................................................................................................276
3.58 Configure OSI Network Element area.............................................................................................279
3.59 Configure Upper Layers Common report ........................................................................................280
3.60 Manage a port .................................................................................................................................281
(T)MPLS Management................................................................................................................................284
3.61 Overview .........................................................................................................................................284
3.62 Create L2 encapsulation profile ......................................................................................................284
3.63 Create PHB profile ..........................................................................................................................288
3.64 Create OAM PHB profile .................................................................................................................291
3.65 Create MPLS-TP Ring Protection ...................................................................................................294
3.66 TMPLS/MPLS-TP DM management ..............................................................................................296
3.67 TMPLS Loopback tool management...............................................................................................298
3.68 MPLS-TP MIP discovery .................................................................................................................301
3.69 Retrieve queue profile management ...............................................................................................303
3.70 Administer TMPLS/MPLS Delay Measurement ..............................................................................305
3.71 Administer MAC Flooding Threshold...............................................................................................309
Tunnel management procedures..............................................................................................................310
3.72 Overview .........................................................................................................................................310
3.73 Create head/tail tunnel ....................................................................................................................310
3.74 Create transit tunnel........................................................................................................................319
3.75 Modify Tunnel .................................................................................................................................322
3.76 Pseudowire management ...............................................................................................................346
3.77 Modify Pseudowire..........................................................................................................................348
3.78 Create head/tail pseudowire ...........................................................................................................358
3.79 Create transit pseudowire ...............................................................................................................360
Ethernet services .......................................................................................................................................364
3.80 Overview .........................................................................................................................................364
3.81 Create EVPL service .......................................................................................................................365
3.82 Create EVPLAN service..................................................................................................................372
3.83 Create an E-LAN Service................................................................................................................376
3.84 Create VLAN ...................................................................................................................................379
3.85 Administer Static Filtering ..............................................................................................................382
3.86 Create Storm Control profile ...........................................................................................................384

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 5
1850 TSS-5C

3.87 Create Packet Filtering profile.........................................................................................................394


3.88 Manage TDM ASAP ........................................................................................................................403
3.89 Create Generic TDM Parameters....................................................................................................407
3.90 Create CES Pseudowire Management ...........................................................................................410
3.91 Alarms menu ...................................................................................................................................411
3.92 Alarm Management.........................................................................................................................421
3.93 Manage TDM TCA profile................................................................................................................424
Synchronization .........................................................................................................................................427
3.94 Synchronize Ethernet: Clock Management.....................................................................................427
3.95 Outgoing SSM Management...........................................................................................................433
3.96 Administer 1588 PTP clock mode ...................................................................................................435
PNAC Management ....................................................................................................................................451
3.97 PNAC Management ........................................................................................................................451

Index ..................................................................................................................................................................462

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
6 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

List of tables
Table 1 Document changes ............................................................................................................................24
Table 2 Conventions used...............................................................................................................................26
Table 3 Documents related to the 1850 Transport Service Switch-5C............................................................27
Table 4 Examples of hyperlinks ......................................................................................................................37
Table 5 Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource:........................................57
Table 6 Prioritization for OUTFLOW resource with "Stacked-VLAN management .........................................58
Table 7 Range panel parameters....................................................................................................................65
Table 8 Create user account parameters......................................................................................................106
Table 9 Modify user account parameters ......................................................................................................109
Table 10 Restore DB parameters....................................................................................................................123
Table 11 System DB backup Information parameters.....................................................................................124
Table 12 Create MAC ACE parameters ..........................................................................................................129
Table 13 IPv4 ace parameters ........................................................................................................................132
Table 14 IPv6 ace ...........................................................................................................................................136
Table 15 Database Management Copy Remote file .......................................................................................139
Table 16 Network Element ..............................................................................................................................142
Table 17 Configure Delay Measurement.........................................................................................................147
Table 18 Configure Synthetic Loss Measurement ..........................................................................................148
Table 19 Performance Monitoring Global File Collection status parameters ..................................................150
Table 20 Start Performance Monitoring Global File Collection .......................................................................151
Table 21 Copy Security Remote file................................................................................................................154
Table 22 Copy Security Remote file of SSL ....................................................................................................158
Table 23 Certificate signing request................................................................................................................160
Table 24 Network Time Protocol parameters ..................................................................................................163
Table 25 IP ACL Inputs....................................................................................................................................167
Table 26 Link aggregation parameters ...........................................................................................................175
Table 27 Modify LAG parameters ...................................................................................................................180
Table 28 Board configuration parameters ......................................................................................................186
Table 29 Board parameters ............................................................................................................................190
Table 30 Configure MPLSIF parameters.........................................................................................................196
Table 31 Maintenance Rx/Tx parameters .......................................................................................................203

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 7
1850 TSS-5C

Table 32 PM Parameters Tab..........................................................................................................................209


Table 33 FE port arrangement (Scenario R4.0) ..............................................................................................214
Table 34 GE port arrangement (Scenario R4.0) .............................................................................................214
Table 35 Traffic descriptor parameters............................................................................................................216
Table 36 Queue profile - new parameters.......................................................................................................220
Table 37 Modify queue profile parameters......................................................................................................222
Table 38 Color profile parameters ..................................................................................................................224
Table 39 Maintenance Domain Parameters....................................................................................................225
Table 40 Maintenance association - range parameters ..................................................................................227
Table 41 Maintenance association - create parameters .................................................................................228
Table 42 Maintenance association - Modify ...................................................................................................229
Table 43 MEP - range panel parameters ........................................................................................................230
Table 44 MEP parameters ..............................................................................................................................231
Table 45 Link monitoring parameters..............................................................................................................237
Table 46 Fast facility protection group parameters .........................................................................................249
Table 47 NE Autodiscovery .............................................................................................................................252
Table 48 IP address settings ...........................................................................................................................257
Table 49 Customer LAN Management ...........................................................................................................259
Table 50 Modify a Customer LAN ...................................................................................................................261
Table 51 IP routing parameters ......................................................................................................................277
Table 52 OSI NE Area parameters..................................................................................................................279
Table 53 Layer 2 encapsulation profile management parameters ..................................................................285
Table 54 L2 encapsulation profile - create parameters ...................................................................................286
Table 55 L2 encapsulation profile - modify......................................................................................................287
Table 56 Modify a PHB profile.........................................................................................................................290
Table 57 Modify a PHB profile.........................................................................................................................293
Table 58 MPLS-TP Fast Facility Protection Group Parameters ......................................................................295
Table 59 Queue profile management parameters ..........................................................................................304
Table 60 Delay Measurement Tool parameters...............................................................................................306
Table 61 Tunnel segment parameters ............................................................................................................313
Table 62 SLM CV parameters.........................................................................................................................317
Table 63 Tunnel management parameters ....................................................................................................318
Table 64 Tunnel management - modify...........................................................................................................325

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
8 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Table 65 Operation and maintenance parameters..........................................................................................330


Table 66 Performance monitoring report.........................................................................................................333
Table 67 Initialize PM parameters...................................................................................................................335
Table 68 Performance Monitoring mode parameters......................................................................................336
Table 69 Set Performance Monitoring parameters .........................................................................................337
Table 70 Retrieve Performance Monitoring parameters for E1.......................................................................340
Table 71 Initialize Register parameters with E1 ..............................................................................................343
Table 72 Retrieve Performance Monitoring mode parameters for E1.............................................................344
Table 73 Set Performance Monitoring mode parameters for E1.....................................................................345
Table 74 Pseudowire management - Search parameters...............................................................................347
Table 75 Pseudowire panel parameters..........................................................................................................350
Table 76 Performance Monitoring Report .......................................................................................................352
Table 77 Initialize PM parameters...................................................................................................................355
Table 78 Performance Monitoring mode parameters......................................................................................356
Table 79 Set Performance Monitoring parameters .........................................................................................357
Table 80 Pseudowire segment parameters.....................................................................................................358
Table 81 Pseudowire segment from - to parameters ......................................................................................360
Table 82 ETS Inflow Management ..................................................................................................................367
Table 83 EVPL service parameters.................................................................................................................370
Table 84 EVPLAN service parameters............................................................................................................374
Table 85 E-lan service - configuration.............................................................................................................377
Table 86 VLAN protocol profile parameters ....................................................................................................380
Table 87 E-LAN: Static filtering parameters ....................................................................................................383
Table 88 Storm Control Profile ........................................................................................................................384
Table 89 Packet Filtering Profile .....................................................................................................................395
Table 90 ASAP filter parameters .....................................................................................................................404
Table 91 ASAP create parameters..................................................................................................................406
Table 92 TDM Configuration Parameters .......................................................................................................408
Table 93 CES Pseudowire management ........................................................................................................411
Table 94 Filter panel parameters ....................................................................................................................425
Table 95 Reference Sources Setting parameters ...........................................................................................428
Table 96 PTP Clock Mode ..............................................................................................................................435
Table 97 Modify PAE parameters....................................................................................................................453

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 9
1850 TSS-5C

Table 98 Modify Authentication PAE parameters ............................................................................................454


Table 99 Configure Authentication ..................................................................................................................459

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
10 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

List of figures
Figure 1 Page view with cascading menu..........................................................................................................39
Figure 2 TMPLS-TP/T-MPLS Global Network ...................................................................................................43
Figure 3 L2 encapsulation profile .......................................................................................................................44
Figure 4 PHB profile...........................................................................................................................................46
Figure 5 OAM PHB profile .................................................................................................................................46
Figure 6 Traffic descriptor management ............................................................................................................47
Figure 7 TMPLS/MPLS-TP Tunnel ....................................................................................................................48
Figure 8 PseudoWire .........................................................................................................................................49
Figure 9 Connection - TDM Search (ETSI) ........................................................................................................51
Figure 10 Connection- TDM create (ETSI) ........................................................................................................52
Figure 11 EVPL service......................................................................................................................................53
Figure 12 EVPLAN service ................................................................................................................................53
Figure 13 Data - Traffic descriptor......................................................................................................................56
Figure 14 VLAN profile with ghost objects .........................................................................................................56
Figure 15 Color profile .......................................................................................................................................59
Figure 16 Group segregation management .......................................................................................................59
Figure 17 Queue profile management ...............................................................................................................60
Figure 18 Global setting .....................................................................................................................................61
Figure 19 OAM resource configuration - MD .....................................................................................................62
Figure 20 OAM resource configuration - MD .....................................................................................................62
Figure 21 OAM resource configuration - Maintenance association ...................................................................63
Figure 22 Maintenance association MEP list .....................................................................................................64
Figure 23 MEP ...................................................................................................................................................64
Figure 24 MIP ....................................................................................................................................................66
Figure 25 Proactive delay measurement ...........................................................................................................66
Figure 26 Synthetic loss measurement..............................................................................................................67
Figure 27 On-Demand Delay Measurement ......................................................................................................68
Figure 28 EFM Tool............................................................................................................................................68
Figure 29 ELAN service .....................................................................................................................................69
Figure 30 Static filtering DB ...............................................................................................................................69
Figure 31 Storm control profile...........................................................................................................................70

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 11
1850 TSS-5C

Figure 32 Packet filtering profile ........................................................................................................................70


Figure 33 TDM Parameters ...............................................................................................................................71
Figure 34 EVC Instance Management ...............................................................................................................71
Figure 35 EVC Filter Instance Management ......................................................................................................72
Figure 36 NE discovery - Site Header 1 ............................................................................................................77
Figure 37 NE discovery - Site header 2 .............................................................................................................78
Figure 38 In fiber in band management search .................................................................................................78
Figure 39 DCN physical interface IP address ....................................................................................................79
Figure 40 LAN Management ..............................................................................................................................80
Figure 41 NE autodiscovery...............................................................................................................................81
Figure 42 OSPF Area.........................................................................................................................................82
Figure 43 IP route configuration.........................................................................................................................82
Figure 44 Network service access point panel ..................................................................................................83
Figure 45 OSI NE area ......................................................................................................................................84
Figure 46 OSI OS address.................................................................................................................................85
Figure 47 Blank browser (example) ...................................................................................................................97
Figure 48 Authentication dialog box...................................................................................................................98
Figure 49 Details of the authentication dialog box .............................................................................................99
Figure 50 ZIC browser start (example) ............................................................................................................100
Figure 51 Login window ...................................................................................................................................101
Figure 52 ZIC application window ...................................................................................................................102
Figure 53 Logout panel ....................................................................................................................................102
Figure 54 Set Site Identifier .............................................................................................................................104
Figure 55 Create user account ........................................................................................................................105
Figure 56 Change user account.......................................................................................................................108
Figure 57 Modify user account.........................................................................................................................109
Figure 58 Inhibit user permissions ...................................................................................................................112
Figure 59 Allow User permissions....................................................................................................................112
Figure 60 Modify Account Default Settings ......................................................................................................113
Figure 61 Initialize and Upgrade with a new release .......................................................................................114
Figure 62 Retrieve the current sessions ..........................................................................................................115
Figure 63 Command Privileges ........................................................................................................................116
Figure 64 Modify Command Access Privileges ................................................................................................117

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
12 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Figure 65 In-Service Upgrade Status ...............................................................................................................118


Figure 66 Perform DB Backup .........................................................................................................................120
Figure 67 Perform DB backup complete ..........................................................................................................121
Figure 68 Cancel DB Backup...........................................................................................................................121
Figure 69 Restore DB ......................................................................................................................................122
Figure 70 DB Information .................................................................................................................................123
Figure 71 MAC Access Control List Management ...........................................................................................125
Figure 72 Create a MAC Access Control list....................................................................................................125
Figure 73 Modify a MAC Access Control List...................................................................................................126
Figure 74 Create MAC ACE .............................................................................................................................127
Figure 75 New access control list ....................................................................................................................128
Figure 76 MAC ACE with action Permit ...........................................................................................................128
Figure 77 MAC ACE with action Deny .............................................................................................................129
Figure 78 Access control list management ......................................................................................................130
Figure 79 Access Control Element Management ...........................................................................................131
Figure 80 Create an IPv4 ACE.........................................................................................................................131
Figure 81 Access Control List Management ...................................................................................................134
Figure 82 Access Control Element Management ...........................................................................................135
Figure 83 Create an IPv6 ACE.........................................................................................................................135
Figure 84 Configure RADIUS...........................................................................................................................137
Figure 85 Configure radius authority................................................................................................................138
Figure 86 DB management remote file copy ...................................................................................................139
Figure 87 MAC File Collection .........................................................................................................................141
Figure 88 Network Element .............................................................................................................................142
Figure 89 LAC state Management ...................................................................................................................143
Figure 90 LAC default ......................................................................................................................................144
Figure 91 Retrieve the Manager list .................................................................................................................145
Figure 92 Proactive delay measurement .........................................................................................................146
Figure 93 Create delay measurement tool.......................................................................................................146
Figure 94 Proactive Synthetic Loss Measurement ..........................................................................................148
Figure 95 Create Synthetic Loss Measurement...............................................................................................148
Figure 96 PM Global file ..................................................................................................................................150
Figure 97 Initialize SSH ...................................................................................................................................152

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 13
1850 TSS-5C

Figure 98 SSH Key Generation .......................................................................................................................153


Figure 99 Copy Security Remote file ...............................................................................................................153
Figure 100 Initialize SSL ..................................................................................................................................156
Figure 101 SSL Key Generation ......................................................................................................................157
Figure 102 Copy Security Remote file .............................................................................................................157
Figure 103 SSL Certificate Signing request .....................................................................................................160
Figure 104 SSL Certificate Installation.............................................................................................................161
Figure 105 Network Time Protocol...................................................................................................................163
Figure 106 Create NTP ....................................................................................................................................164
Figure 107 Modify NTP ....................................................................................................................................165
Figure 108 Set differential time frequency .......................................................................................................166
Figure 109 Manage IP ACL..............................................................................................................................167
Figure 110 Modify IP ACL ................................................................................................................................168
Figure 111 Viewing IP ACL details ...................................................................................................................169
Figure 112 Audit Log ........................................................................................................................................170
Figure 113 Log Settings ...................................................................................................................................171
Figure 114 IP message settings.......................................................................................................................172
Figure 115 1:1 Tunnel protection......................................................................................................................173
Figure 116 Aggregation management tree.......................................................................................................175
Figure 117 Hash Input......................................................................................................................................177
Figure 118 Mask 1............................................................................................................................................178
Figure 119 Mask 2............................................................................................................................................179
Figure 120 Accessing the node .......................................................................................................................182
Figure 121 Provisioned Rack ...........................................................................................................................183
Figure 122 Accessing the Shelf .......................................................................................................................184
Figure 123 Equipment view .............................................................................................................................186
Figure 124 Board xx configuration (PD)...........................................................................................................187
Figure 125 Conditions ......................................................................................................................................189
Figure 126 SFP details ....................................................................................................................................190
Figure 127 Port Configuration ..........................................................................................................................192
Figure 128 Configure MPLSIF .........................................................................................................................196
Figure 129 Quality of Service tab.....................................................................................................................199
Figure 130 Modify a Virtual Transport profile ...................................................................................................200

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
14 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Figure 131 Modify VT Queue ...........................................................................................................................201


Figure 132 Performance Monitoring Data ........................................................................................................202
Figure 133 Maintenance Rx tab .......................................................................................................................203
Figure 134 Current Data ..................................................................................................................................204
Figure 135 Create PM......................................................................................................................................205
Figure 136 CES Performance Monitoring Data ...............................................................................................206
Figure 137 CES Maintenance Rx Tab..............................................................................................................207
Figure 138 CES Current Data Tab ...................................................................................................................208
Figure 139 CES History Tab.............................................................................................................................209
Figure 140 MPLSIF Ethernet Port Management ..............................................................................................211
Figure 141 In Fiber In Band Management .......................................................................................................212
Figure 142 Activate In Fiber In Band Management .........................................................................................213
Figure 143 Traffic descriptor ............................................................................................................................215
Figure 144 Create traffic descriptor..................................................................................................................216
Figure 145 Queue profile management ...........................................................................................................219
Figure 146 Create queue profile ......................................................................................................................219
Figure 147 Queue profile management ...........................................................................................................221
Figure 148 Color profile ...................................................................................................................................223
Figure 149 Color profile creation......................................................................................................................223
Figure 150 Maintenance domain .....................................................................................................................225
Figure 151 OAM resource config. - maintenance association .........................................................................227
Figure 152 OAM management - MEP..............................................................................................................230
Figure 153 Create MEP ...................................................................................................................................231
Figure 154 OAM resource config - mep ..........................................................................................................233
Figure 155 Configure EFM tool ........................................................................................................................235
Figure 156 Link monitoring ..............................................................................................................................236
Figure 157 Event log ........................................................................................................................................237
Figure 158 Show event log ..............................................................................................................................238
Figure 159 On-Demand Delay Measurement ..................................................................................................239
Figure 160 Create On-Demand Delay Measurement ......................................................................................239
Figure 161 Modify On-Demand DM .................................................................................................................240
Figure 162 Alarm Indication Signal ..................................................................................................................241
Figure 163 Alarm Indication Signal ..................................................................................................................242

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 15
1850 TSS-5C

Figure 164 Modify Alarm Indication Signal.......................................................................................................243


Figure 165 Performance Monitoring Threshold................................................................................................244
Figure 166 Create PM Threshold.....................................................................................................................245
Figure 167 Modify PM Threshold .....................................................................................................................247
Figure 168 Fast facility protection group management ....................................................................................248
Figure 169 Fast facility protection group - create.............................................................................................248
Figure 170 NE discovery - Site Header 1 ........................................................................................................251
Figure 171 Configure OTRI on slot 3 and slot 4 ..............................................................................................253
Figure 172 Configure MSP ..............................................................................................................................254
Figure 173 DCN physical interface page - LAN management .........................................................................258
Figure 174 Accessing the Module....................................................................................................................264
Figure 175 Ethernet Port Management............................................................................................................265
Figure 176 IP address of Network Element .....................................................................................................266
Figure 177 Customer LAN Management ........................................................................................................267
Figure 178 Auto Dcn List .................................................................................................................................268
Figure 179 OSFP Area.....................................................................................................................................269
Figure 180 Configure OSPF ............................................................................................................................269
Figure 181 Configure OSPF Area ....................................................................................................................270
Figure 182 OSPF IF .........................................................................................................................................272
Figure 183 Network Service Access Point .......................................................................................................275
Figure 184 Retrieve Network Service Access Point.........................................................................................276
Figure 185 IP routing configuration ..................................................................................................................276
Figure 186 IP routing creation..........................................................................................................................277
Figure 187 OSI NE area ..................................................................................................................................279
Figure 188 OSI NE area ..................................................................................................................................280
Figure 189 Layer 2 encapsulation profile management ...................................................................................285
Figure 190 PHB profile create..........................................................................................................................288
Figure 191 8P0D PHB profile - create .............................................................................................................289
Figure 192 Modify PHB profile management ...................................................................................................290
Figure 193 OAM PHB profile management .....................................................................................................291
Figure 194 OAM PHB profile - create ..............................................................................................................292
Figure 195 Modify OAM PHB profile management ..........................................................................................293
Figure 196 MPLS-TP Ring Protection..............................................................................................................294

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
16 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Figure 197 Create a new MPLS-TP Fast Facility Protection Group.................................................................294


Figure 198 Create MPLS-TP DISCOVERY LB tool .........................................................................................301
Figure 199 Tunnel Segment Search ................................................................................................................302
Figure 200 Psuedowire Segment Search ........................................................................................................302
Figure 201 Queue profile management ...........................................................................................................303
Figure 202 Modify Queue Profile .....................................................................................................................304
Figure 203 Delay Measurement tool ................................................................................................................305
Figure 204 Create Delay Measurement tool ....................................................................................................306
Figure 205 MAC Flooding Threshold ...............................................................................................................309
Figure 206 Tunnel management - filter by panel..............................................................................................311
Figure 207 Tunnel management - search ........................................................................................................312
Figure 208 Tunnel management ......................................................................................................................312
Figure 209 Tunnel segment - from and to........................................................................................................319
Figure 210 MPLS port - select .........................................................................................................................320
Figure 211 PHB profile - select ........................................................................................................................321
Figure 212 L2 encapsulation profile - select ....................................................................................................321
Figure 213 Locate configured tunnels..............................................................................................................323
Figure 214 Modify tunnel segment...................................................................................................................324
Figure 215 PM report .......................................................................................................................................333
Figure 216 Retrieve PM results .......................................................................................................................334
Figure 217 Initialize PM ...................................................................................................................................335
Figure 218 Performance Monitoring mode ......................................................................................................336
Figure 219 Set Performance Monitoring .........................................................................................................337
Figure 220 Pseudowire management ..............................................................................................................347
Figure 221 Modify Pseudowire ........................................................................................................................349
Figure 222 PM Report......................................................................................................................................352
Figure 223 Retrieve PM Results ......................................................................................................................354
Figure 224 Initialize PM ...................................................................................................................................355
Figure 225 Performance Monitoring mode ......................................................................................................356
Figure 226 Set Performance Monitoring .........................................................................................................357
Figure 227 Pseudowire segment .....................................................................................................................358
Figure 228 PHB profile- select .........................................................................................................................360
Figure 229 In fiber In band Management .........................................................................................................362

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 17
1850 TSS-5C

Figure 230 EVPL service .................................................................................................................................365


Figure 231 EVPL Service list ...........................................................................................................................366
Figure 232 ETS Inflow management ...............................................................................................................367
Figure 233 EVPL service - create ....................................................................................................................369
Figure 234 EVPLAN service ............................................................................................................................372
Figure 235 EVPLAN service - create ...............................................................................................................373
Figure 236 E-lan service ..................................................................................................................................376
Figure 237 E-lan service - configuration ..........................................................................................................377
Figure 238 UNI port Binding ............................................................................................................................378
Figure 239 PW binding ....................................................................................................................................379
Figure 240 VLAN profile...................................................................................................................................380
Figure 241 VLAN protocol profile .....................................................................................................................380
Figure 242 VLAN profile modify .......................................................................................................................381
Figure 243 ELAN service: Static Filtering ........................................................................................................382
Figure 244 Create DB configuration ................................................................................................................383
Figure 245 Storm Control profile ......................................................................................................................384
Figure 246 Packet Filtering Profile ...................................................................................................................395
Figure 247 ASAP creation................................................................................................................................404
Figure 248 ASAP create window .....................................................................................................................406
Figure 249 Generic TDM Parameters ..............................................................................................................408
Figure 250 Pseudowire Management ..............................................................................................................410
Figure 251 Alarm page - CES TCA profile .......................................................................................................412
Figure 252 CES TCA profile - show ghost objects ...........................................................................................412
Figure 253 ETH TCA profile - ETH Port Threshold tab ....................................................................................413
Figure 254 ETH TCA profile - Flow Threshold tab ...........................................................................................413
Figure 255 Alarms page - TCA profile..............................................................................................................414
Figure 256 Alarms page - TDM ASAPs management......................................................................................415
Figure 257 Data ASAP management ...............................................................................................................416
Figure 258 Alarm resynchronization ................................................................................................................416
Figure 259 Alarm log........................................................................................................................................417
Figure 260 Alarms Housekeeping Input Points................................................................................................418
Figure 261 Input Points Attributes ....................................................................................................................419
Figure 262 CES TCA Profile alarm ..................................................................................................................421

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
18 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Figure 263 Create TCA Profile Alarm...............................................................................................................422


Figure 264 CES threshold profile creation .......................................................................................................423
Figure 265 PDH alarm global management.....................................................................................................424
Figure 266 TDM TCA profile ............................................................................................................................424
Figure 267 TCA profile creation .......................................................................................................................426
Figure 268 Synchronization Ethernet: clock management ..............................................................................427
Figure 269 View Alarms ...................................................................................................................................429
Figure 270 Equipment Clock - T0 ....................................................................................................................430
Figure 271 Clock Legend .................................................................................................................................431
Figure 272 Output Clock - T4...........................................................................................................................433
Figure 273 Outgoing SSM Management .........................................................................................................434
Figure 274 PTP Clock Mode ............................................................................................................................435
Figure 275 PTP Default Clock configuration ...................................................................................................436
Figure 276 PTP clocks .....................................................................................................................................441
Figure 277 Modify Local PTP Clock.................................................................................................................442
Figure 278 PTP Ports.......................................................................................................................................443
Figure 279 Create PTP port .............................................................................................................................443
Figure 280 Select the physical port..................................................................................................................444
Figure 281 Create PTP Port Session...............................................................................................................446
Figure 282 Modify PTP port session ................................................................................................................447
Figure 283 External Interfaces .........................................................................................................................449
Figure 284 Modify External Interfaces .............................................................................................................449
Figure 285 Configure PNAC per node .............................................................................................................451
Figure 286 PNAC Management per port .........................................................................................................452
Figure 287 PAE ................................................................................................................................................452
Figure 288 Authenticator PAE..........................................................................................................................454
Figure 289 Details of Authenticator PAE Statistics...........................................................................................456
Figure 290 Authentication Server Configuration .............................................................................................457
Figure 291 Local Server mode.........................................................................................................................457
Figure 292 Remote Server mode.....................................................................................................................458
Figure 293 PNAC Authentication Configuration ..............................................................................................458
Figure 294 Modify PNAC User Authentication .................................................................................................461

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 19
1850 TSS-5C

List of procedures
3.2 Accessing ZIC..........................................................................................................................................97

3.3 Log into the system................................................................................................................................100

3.4 Log out of the system ............................................................................................................................101

3.5 Change user password..........................................................................................................................103

3.6 Change site identifier .............................................................................................................................104

3.7 Create user account ..............................................................................................................................105

3.8 Change user account.............................................................................................................................107

3.9 Initialize and Upgrade with a new release .............................................................................................114

3.10 Administer In-Service upgrade...............................................................................................................118

3.11 Database Management .........................................................................................................................119

3.12 Create a MAC/IP ACL............................................................................................................................124

3.13 Create an access control element (ACE) ..............................................................................................126

3.14 Create IPv4 Access Control Element (ACE)..........................................................................................130

3.15 Create IPv6 Access Control Element (ACE)..........................................................................................134

3.16 Configure Management RADIUS...........................................................................................................137

3.17 Configure management radius authority................................................................................................138

3.18 DB management remote file copy .........................................................................................................139

3.19 Administer MAC File Collection ............................................................................................................140

3.20 Administer Network Element .................................................................................................................141

3.21 Administer LAC Management................................................................................................................142

3.22 Retrieve the Manager List......................................................................................................................144

3.23 Administer Proactive Tool Delay Measurement .....................................................................................145

3.24 Create Synthetic Loss Measurement.....................................................................................................147

3.25 Administer PM Global File .....................................................................................................................149

3.26 Administer SSH and SSL.......................................................................................................................152

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
20 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

3.27 Administer Network time protocol ..........................................................................................................162

3.28 Set the differential time frequency .........................................................................................................166

3.29 Set IP ACL .............................................................................................................................................166

3.30 Retrieve Audit log...................................................................................................................................170

3.31 Log Settings...........................................................................................................................................171

3.32 Administer IP message settings ............................................................................................................172

3.33 Administer Tunnel Protection Switching (1:1) ........................................................................................173

3.34 Create LAG............................................................................................................................................174

3.35 Accessing the node ...............................................................................................................................182

3.36 Provisioning a Shelf ..............................................................................................................................183

3.37 Port configuration...................................................................................................................................191

3.38 Create Traffic Descriptor (Data).............................................................................................................215

3.39 Create queue management ...................................................................................................................218

3.40 Modify queue profile ..............................................................................................................................221

3.41 Create color profile ................................................................................................................................223

3.42 Create maintenance domain..................................................................................................................224

3.43 Modify maintenance domain..................................................................................................................226

3.44 Create maintenance association ...........................................................................................................226

3.45 Modify maintenance association............................................................................................................229

3.46 Create MEP ...........................................................................................................................................230

3.47 Configure EFM tool................................................................................................................................234

3.48 Configure On-Demand Delay Measurement .........................................................................................238

3.49 Configure Alarm Indication Signal (AIS) ................................................................................................241

3.50 Configure PM Threshold........................................................................................................................243

3.51 Create 1:1 tunnel protection ..................................................................................................................248

3.52 Configure the IP address .......................................................................................................................256

3.53 Configure LAN Management .................................................................................................................258

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 21
1850 TSS-5C

3.54 Enable Auto DCN...................................................................................................................................263

3.55 Manage OSPF ......................................................................................................................................268

3.56 Retrieve Network Service Access Point (NSAP) ...................................................................................275

3.57 Create IP routing....................................................................................................................................276

3.58 Configure OSI Network Element area ...................................................................................................279

3.59 Configure Upper Layers Common report...............................................................................................280

3.60 Manage a port........................................................................................................................................281

3.62 Create L2 encapsulation profile .............................................................................................................284

3.63 Create PHB profile.................................................................................................................................288

3.64 Create OAM PHB profile........................................................................................................................291

3.65 Create MPLS-TP Ring Protection..........................................................................................................294

3.66 TMPLS/MPLS-TP DM management .....................................................................................................296

3.67 TMPLS Loopback tool management .....................................................................................................298

3.68 MPLS-TP MIP discovery........................................................................................................................301

3.69 Retrieve queue profile management......................................................................................................303

3.70 Administer TMPLS/MPLS Delay Measurement.....................................................................................305

3.71 Administer MAC Flooding Threshold .....................................................................................................309

3.73 Create head/tail tunnel...........................................................................................................................310

3.74 Create transit tunnel ..............................................................................................................................319

3.75 Modify Tunnel .......................................................................................................................................322

3.76 Pseudowire management ......................................................................................................................346

3.77 Modify Pseudowire ................................................................................................................................348

3.78 Create head/tail pseudowire ..................................................................................................................358

3.79 Create transit pseudowire......................................................................................................................360

3.81 Create EVPL service .............................................................................................................................365

3.82 Create EVPLAN service ........................................................................................................................372

3.83 Create an E-LAN Service ......................................................................................................................376

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
22 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

3.84 Create VLAN..........................................................................................................................................379

3.85 Administer Static Filtering .....................................................................................................................382

3.86 Create Storm Control profile ..................................................................................................................384

3.87 Create Packet Filtering profile ...............................................................................................................394

3.88 Manage TDM ASAP...............................................................................................................................403

3.89 Create Generic TDM Parameters ..........................................................................................................407

3.90 Create CES Pseudowire Management..................................................................................................410

3.92 Alarm Management ...............................................................................................................................421

3.93 Manage TDM TCA profile ......................................................................................................................424

3.94 Synchronize Ethernet: Clock Management ...........................................................................................427

3.95 Outgoing SSM Management .................................................................................................................433

3.96 Administer 1588 PTP clock mode..........................................................................................................435

3.97 PNAC Management...............................................................................................................................451

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 23
1850 TSS-5C

About this document


Purpose
The 1850 TSS-5C Release 6.1 User Provisioning Guide provides information on how to access and
log in to the Zero Installation Craft (ZIC) terminal and also provision and administer the ZIC.

What's new
This is Issue 7 of 1850 TSS-5C Release 6.1 User Provisioning Guide.
The following table shows the document changes in Issue 7.

Table 1 Document changes

Location Revision Issue


General Rebranding Issue 7, July 2017
Section 3.5 “Change user Updated the password Issue 6, December 2015
password” (p. 103) options available for the
user.
Section 3.94 “Synchronize Timing port and slots update Issue 5, July 2015
Ethernet: Clock Management” for Synchronize Ethernet
(p. 427) clock management.
Section 3.27 “Administer Modify NTP Server Issue 4, May 2015
Network time protocol” (p. 162) Synchronization update.
Section 3.81 “Create EVPL Procedure update. Issue 3, August 2014
service” (p. 365).
Section 3.82 “Create EVPLAN Traffic Descriptor
service” (p. 372). parameter update in E-LAN
to ETS flow section.
Section 3.34 “Create LAG” Maximum MRU value range Issue 2, June 2014
(p. 174) update.

Intended audience

This information product is intended for the following users:


• Technicians
• Network providers
• Operators
• Maintenance personnel

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
24 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

How to use this document


This guide includes descriptive and procedural chapters with supporting information (for example,
safety instructions, glossary, and index). See the Contents section to locate specific information.
Assumptions

This document assumes that users have an understanding of the following:


• Basic principles of telecommunication transmission
• Common telecommunication and system terminology (a glossary is provided in this document to
assist you)
• Test sets and tools used in the telecommunication industry
• Local operations and functional procedures of the company
• Personal computer (PC) operation, common PC terminology, and navigational procedures in a
windows-style user interface

Packaging, collection and recovery requirements


Countries, states, localities, or other jurisdictions may require that systems be established for the
return and/or collection of packaging waste from the consumer, or other end user, or from the waste
stream. Additionally, reuse, recovery, and/or recycling targets for the return and/or collection of the
packaging waste may be established.
For more information regarding collection and recovery of packaging and packaging waste within
specific jurisdictions, please contact the Nokia Services - Environmental Health and Safety
organization.

Recycling/take-back/disposal of product
Electronic products bearing or referencing the displayed symbol, when put on the market within the
European Union, are collected and treated at the end of their useful life, in compliance with
applicable European Union and local legislation. They must not be disposed of as part of unsorted
municipal waste.
The product may contain materials such as heavy metals or batteries. Appropriate disposal of such
materials is necessary to avoid a negative impact on the environment and human health.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 25
1850 TSS-5C

Note:In the European Union, a solid bar under the crossed-out wheeled bin indicates that the product was put
on the market after 13 August 2005.
Moreover, in compliance with legal requirements and contractual agreements, where applicable,
Nokia offers to provide for the collection and treatment of Nokia products at the end of their useful
life, or products displaced by Nokia equipment offers.

For information regarding take-back of equipment by Nokia, or for more information regarding the
requirements for recycling/disposal of product:
• Contact your Nokia account manager
• Contact Nokia Asset Recovery (mailto: asset.recovery@nokia.com).
• Contact Nokia Global Sustainability (mailto: sustainability.global@nokia.com).
• Visit Nokia Protecting the Environment (http://company.nokia.com/en/our-activities/protecting-
the-environment).

Conventions used
The typographical conventions used in this document are described in the following table:

Table 2 Conventions used

Appearance Description
emphasis Text that is emphasized
document titles Titles of books or other documents
file or directory names The names of files or directories
graphical user interface text Text that is displayed in a graphical user
interface
keyboard keys The name of a key on the keyboard
system input Text that the user types as input to a system
system output Text that a system displays or prints
variable A value or command-line parameter that the
user provides
[] Text or a value that is optional
{ value1 │value2 } A choice of values or variables from which one
{ variable1 │ variable2 } value or variable is used

submenu The name of a second level submenu


submenu The name of a third level submenu

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
26 8DG24624AGAATQZZA Issue 7
1850 TSS-5C

Related information
The following table lists the documents included in the 1850 TSS-5C documentation set:

Table 3 Documents related to the 1850 Transport Service Switch-5C

Title Part Number Description


1850 TSS-5C Release Provides information on the Product and
6.1 Product detailed descriptions of the product specifics.
8DG24621AGAATQZZA
Information and
Planning Guide
1850 TSS-5C Release 8DG24622AGAATQZZA Provides information on product installation
6.1 Installation and and commissioning.
System Turn-Up
Guide
1850 TSS-5C Release 8DG24623AGAATQZZA Provides information on Fault Management,
6.1 Maintenance and alarms and clearance procedures.
Trouble-Clearing
Guide

Document support
For support in using this or any other Nokia document, contact Nokia at the following telephone
numbers:
• 1-888-582-3688 (from within the United States)
• +1-630-224-2485 (from outside the United States)
• origination country exit code-1-630-224-2485 (replace the plus sign with your country's exit
code) See a listing of exit codes. (Landline – phones lacking the plus (+) character)

Technical support
For technical support, contact your local customer support team. See the Support web site
(https://networks.nokia.com/support/) for contact information.

How to order
To order Nokia documents, contact your local sales representative or use the Online Customer
Support Site (OLCS) web site at https://online.networks.nokia.com (https://online.networks.nokia.
com).

How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.alcatel-lucent.com/
comments/) or e-mail your comments to the Comments Hotline (mailto:comments@nokia.com).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 27
1850 TSS-5C

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
28 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Getting Started

1 Getting Started

1.1 Overview

1.1.1 Purpose
This chapter provides information on the Zero-Installation Craft terminal (ZIC) menu. The ZIC
provides local management of single network element, with an ITU compliant Information Model
Interface that manages the Network Element.

1.1.2 Contents

1.1 Overview 29
1.2 Craft terminal functionality 29

1.2 Craft terminal functionality


1.2.1 Purpose
The following is a listing of the functionality of the Craft Terminal in managing the NE.

1.2.2 System Management


Provides descriptions of the following:
• System Overview
• Hierarchical menu
• System Functions

1.2.3 Equipment and Board Management


Provides a description of the presentation of the equipment and the hierarchical tree structure.

Equipment/Board Management also provides information on:


• Setting, Modifying and Removing Boards
• Board Hierarchy
• Remote Inventory
• Port Management
Port Management permits configuration and viewing of transmission resources at the port level.
The following are the Port level configuration menu listing:
− Ethernet Port Configuration

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 29
Craft terminal functionality 1850 TSS-5C

1.2.4 Network Configuration


Provides an overview and description of the Network and an introduction to Provisioning using the
Craft Terminal.

1.2.5 Data Communication


Provides a description of the Communication ports, functions and a description of traffic.

1.2.6 Ethernet functions


Provides descriptions of Ethernet related features and the detailed level provisioning procedures for
the same.

1.2.7 Synchronization
Provides descriptions of time and alarm Synchronization functions.

1.2.8 Fault Management


Provides a description and listing of the Alarms and the alarm management system.

1.2.9 Performance Management


Provides a description and procedure on Performance Monitoring and Remote Monitoring
functions.

1.2.10 Security
Provides descriptions and procedures based on Security Management.

1.2.11 Provisioning
Provides detailed level procedures for the following:
• Accessing the ZIC
• Provisioning, Administering and Creation of:
− Data Communication
− Alarms
− Protection
− Synchronization
− System Management
− Security

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
30 8DG24624AGAATQZZA Issue 7
1850 TSS-5C System Management

2 System Management

2.1 Overview

2.1.1 Purpose
Provides a description of the Craft Terminal System Overview and Hierarchical menu.

2.1.2 Contents

2.1 Overview 31
2.2 Zero-Installation Craft terminal overview 31
2.3 Graphical User Interface 33
2.4 Mouse 34
2.5 browser window 35
2.6 Hyperlinks 36
2.7 Combo-boxes 38
2.8 Menus 38
2.9 Entry boxes 39
2.10 Dialog boxes 40
2.11 Menu description 40

2.2 Zero-Installation Craft terminal overview


2.2.1 Purpose
Nokia provides a comprehensive range of Network Management Applications compliant with the
ITU-T Telecommunication management Network Principles.
The ZIC (Zero-Installation Craft terminal) is a project in charge of the local management of single
network elements from different Nokia SDH and DATA products, providing ITU compliant
Information Model Interface to the Network Element.
The ZIC can be integrated to products in charge of the management of networks and network
elements.
The ZIC uses a state-of-the-art platform for providing an advanced and integrated Management.
It performs all the SW functions related to the control and management activities like info–model
processing, event reporting and logging, equipment data base management, SW downloading and
management, etc.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 31
Zero-Installation Craft terminal overview 1850 TSS-5C

2.2.2 ZIC main functionalities


This chapter describes the main functionalities of the ZIC (Zero-Installation Craft terminal). The
functionalities constitute the heading of each sub-section below.

System management
• Start-Up/Stop of the system
• Visualization of all the ZIC related processes
• The computing environment (system back-up/restore)

Security management

This section is related to security within the ZIC. The functions of configuration and installation are
accessible only to the Administrator. It contains:
• Access to the system (password modification, login, logout)
• Profile assignment (determines which functionalities the user has access to)
• Property of the map (public/private)

Network element management


This section deals with the management of the equipment present in the network. Network Element
management is detailed in the Operator's Guides dedicated to the NE.

Some of the functionality offered by the ZIC are common to all the NEs, other functionalities are
dedicated and present only for some NE types.
• Supervision of NEs
• Changing of boards and subracks
• alarm and event notification
• Configuration of the alarm severity profile
• Time management
• Port management
• Performance monitoring. It consists of a set of functions that evaluate and report on the behavior
of the NEs and their effectiveness relating to the communications taking place on the Network.
• Synchronization
• Software download for NE upgrading, following the network evolution

Software management

The software management section refers to the software package(s) present in the NE. This is the
support of the ZIC application running on any NE. The operations concerned are:
• Getting information about the software downloaded in a selected NE
• Getting information about the software present on the FTP server for the NE
• Downloading software packages from the FTP server to a NE

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
32 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Graphical User Interface

Alarm management

This function is used to detect and correct abnormal functioning of the system. The managed
entities transmit alarms to the ZIC that processes them. The different alarm functionalities are:
• Reception and processing of alarms
• Establishment of filter criteria on alarm reception
• Log management of alarms
• Internal storing and treatment of alarm information
• User interface service management for displaying purposes
• User interface operations for alarm processing
• Alarm probable cause
• The alarms concerning a particular managed entity is represented in a synthetic way in all the
pages concerning the entity

2.3 Graphical User Interface


2.3.1 Purpose
The Zero Installation Craft (ZIC) terminal user interface is based on a browser client program that
uses HTTP (Hypertext Transfer Protocol) to make requests of Web servers throughout the Internet
on behalf of the user.

The following browsers can be used to access the interface are:


• Microsoft Internet Explorer (IE)
• Mozilla Firefox (the open source version of Netscape)
This section provides the different elements composing the interface as well as the users general
environment. Details on the various elements will be obtained using the Help of the browser and the
relevant manual.

The users work environment can be partitioned into the following utilities and widgets:
• Keyboards - The different keys and the actions they induce are defined.
• Mouse - The functioning of the mouse buttons is provided.
• Desktop - A desktop is the screen area where you bring the applications needed for your work,
arrange them to suit your preferences, and put them away when you're done. Desktop provides
a way to make a single display seem like several displays. You can customize the desktop by
adding shortcuts to your favorite programs, document, etc. and by changing its look as you like.
• Browser's pages - The page's or panel's general layout, menu and configuration (size) is
described.
• Buttons - The different types of buttons are described.
• Combo-boxes - The different types of buttons are described.
• Menus - The menu types used to open pages, select icons and navigate through the different
functionalities of the ZIC (Zero-Installation Craft terminal) are introduced.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 33
Mouse 1850 TSS-5C

• Entry and dialogue boxes - The different types of boxes and their aspect is defined so that the
user is familiar with them.
• Symbol and icon - A small, graphic representation of an object on the workspace. Objects can be
"iconified" (turned into icons) to clear a cluttered workspace and "normalized" (returned to their
original appearance) as needed. Processes executing in an object continue to execute when the
object is iconified.

2.3.2 Keyboard

A workstation keyboard displays the following types of keys:


• Alphabetic Keys - represents the letters of the alphabet, the punctuation marks, and text-
formatting functions such as Tab, Return, and the Space bar.
• Numeric Keys - represents the numbers from 0 to 9. They are located near the top of the
keyboard and in a numeric keypad on the right side of the keyboard.
• Navigation Keys - used to move the insertion cursor (up, down, right, left). These keys are
commonly called arrow keys and are represented on the keyboard by the symbols, , , ,. This
category comprises the keys like Home, Page Up, Page Down, and End also.
• Modifier Keys - used in conjunction with other keys to modify the meaning of these keys. They
are Ctrl, Shift, or Alt keys.
• Special purpose Keys - they have particular functions and are labelled to specify their function.
They are, for example, the Help, Esc, Enter, Delete, BackSpace, and Insert keys.

2.3.3 Location and insertion cursor


This cursor takes the form of an I-beam pointer. It indicates where the text is going to be entered.
This cursor is frequently met when using Entry boxes (see next paragraphs). The cursor can be
moved horizontally and vertically using the Navigation keys.

2.4 Mouse
2.4.1 Description
The mouse is associated with a mouse pointer. This pointer represents the current position of the
mouse on the screen. Any movement of the mouse, on the mouse pad, moves the pointer on the
screen in an identical way. The mouse can be moved anywhere on the workspace.

2.4.2 Mouse buttons


There are two Mouse buttons. The actions undertaken using the different mouse buttons depend on
their configuration.

Details on mouse configuration can be obtained in the "Mouse property" of "Control panel".
• Select/deselect - enables you to select/deselect objects.
• Custom Select - enables you to generate pop-up menus.
• Drag and drop - enables the user to move files from one location to the other by holding the left
mouse button.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
34 8DG24624AGAATQZZA Issue 7
1850 TSS-5C browser window

In a right-handed mouse configuration the "Select / deselect" button is left side. With left handed
mouse configuration it is on the opposite side.

2.4.3 Mouse functionality


• Double click - number of actions can be undertaken by double clicking using the "select" mouse
button. For example, closing Browser's Pages, opening Browser's Pages related to objects.
− Place the mouse pointer over the object you wish to open.
− Click twice, rapidly, using the "Select" mouse button on the object.
− The mouse pointer can take the work in progress representation until the object should open.
− Place the mouse pointer over the "Window menu button" of the window
− Click twice, rapidly, using the "Select" mouse button.
The action should be immediate and the window is closed.

2.5 browser window


2.5.1 Purpose
This section defines the attributes of Browser's Pages and describes their general aspects.

2.5.2 Dimensions and layout


The Browser's Page (also called Tabbed browsing or tabbed document interface [TDI]), is a feature
to effectively contain multiple pages in a single page. Each item occupies the browser's entire
viewing area when displayed. Tabs facilitate navigation among the items. The term "tab" arises from
the visual similarity to the physical tabs on manila folders used to store and organize hard copy.

This technology overview focuses on three areas:


• Makes everyday tasks easier with improved navigation through tabbed browsing.
• Dynamic security protection through a robust new architecture, security features that help defend
against malicious software (also known as malware).
• Improved platform for Web manageability, including improved support for cascading style sheets
(CSS).
The advantage of tabbed browsing is the fact that it eliminates the need to display tiled pages that
demand frequent re-sizing and repositioning. Tabbed browsing consumes less memory and
operating system resources than tiled-window browsing provided the user does not keep too many
items open at once.

2.5.3 Client area and browser's page titles


The Browser's Page title gives the name of the Page.
The Client area is the area in which you work, i.e. select from combo-box and act on hyperlink.

According to the choices, the Client area displays panel(s), table(s), and hyperlinks.
• Panel - is a rectangular light gray area that contains the combo-boxes.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 35
Hyperlinks 1850 TSS-5C

2.5.4 Window menu


The windows menu enables the operations to be undertaken on the window.

Note: It differs according to the Browser interface.


In the following is for Internet Explorer (IE) from Microsoft.
To open the window menu, click on the window menu button. You can then select an item from the
pull-down menu that appears.

The window menu options are:


• Restore - restores the window from the iconified state to its normal size (in this case the window
is already opened so this menu option is greyed.
• Move - displaces the window around the workspace.
• Size - changes the size of the window.
• Minimize - reduces the window to an icon size on the taskbar.
• Maximize - gives the window the full screen size.
• Close - the window is closed and disappears from the workspace.

2.5.5 Scroll Bars


If the page size does not enable all the information contained in the tree and client area to be
visible, scroll bars enable you to move up, down, right, or left in the tree and client area. There are
vertical and horizontal scroll bars.

There are four ways to use scroll bars:


• Stepper arrows - Place the mouse pointer on the stepper arrow and click on it using the "Select"
mouse button. The contents in the client area are displaced only one unit in the direction
indicated by the stepper arrow.
• Scroll regions - Place the mouse pointer in the scroll region outside the sliders. Click, using the
"Select" mouse button. The contents in the client area are displaced one Page length.
• Sliders - Place the mouse pointer on the slider. Drag, using the "Select" mouse button, the slider
in the direction desired. The contents in the client area are displaced as long as the slider
moves.

2.5.6 Functional tabs


Functional tab is a rectangular light blue tab that identifies the available function by the labels for
selection purposes. It is usually placed above the panel.

2.6 Hyperlinks
2.6.1 Description
In any working application related to the ZIC (Zero-Installation Craft terminal), the operator will have
to confirm, cancel, select options or ask for help using hyperlinks. Different types of hyperlinks
exist and are described in this section.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
36 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Hyperlinks

The hyperlinks are identified by theword identifying the action associated with it. Some examples of
the different types of hyperlinks are described in Table 4, “Examples of hyperlinks” (p. 36)

Table 4 Examples of hyperlinks

Parameter Description
Save To save the settings
Save & continue To save and continue the settings
Save & exit To save and exit the settings
Provision To start the provision procedure
Deprovision To start the de-provision procedure
Cancel To cancel the settings
Delete To remove the settings
Exit To exit the settings
Remove To remove the provisioning from the settings
Remote Inventory To perform the data recovering of the involved entity
Retrieve Section Trace To recover the data of the section trace
Retrieve To recover the data of the involved entity
Select To open a further page in order to operate a selection
Modify To modify the settings without exiting the page
Apply To apply the involved entity
New To start the creation procedure of the entity
Search To start the search procedure about the involved entity
Continue To continue the operation with further options without
saving the actual settings
Default To set the relevant item at the factory default value
View To display the hidden values (usually for alarms)
Reset Criteria To cancel the search criteria previously set
Operate xxx To apply the setting for the xxx entity (e.g., Loopback
etc.)

To apply the action related to a hyperlink, position the mouse pointer over the word you wish to
select and click using the Select mouse button.
The hyperlinks may open dialogue boxes. The reader may note that often, identical hyperlinks are
found on different Pages, this is because they often require similar actions to be undertaken.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 37
Combo-boxes 1850 TSS-5C

2.7 Combo-boxes
2.7.1 Description
When you click on an combo-box, you open an option menu from which you choose a single item.
Combo-boxes are used when a list of items are mutually exclusive.

Note: The example given above enables you to choose the Provisioned type. To open the
option menu, click on the option button. Select an item from the list of options.
For some fields a blank description is present. This allows to select none of the available items.

2.8 Menus
2.8.1 Description
This section describes an important aspect of the user interface. The user constantly has to open
Pages, select icons and navigate through the different functionalities of the ZIC (Zero-Installation
Craft terminal).
A menu consists of a title, that usually identifies the nature of the actions that can be undertaken,
and a list of options associated with actions.

Menu types can be classified as:


• Menu bars
• Pull-down menus
• Cascading menus
• Pop-up menus

2.8.2 Menu bars


Menu bars present at the top of a page's browser (under the title of the page) and above the client
area. They appear automatically along with the page.

2.8.3 Pull down menu


A pull-down menu is pulled down from a menu item present in a menu bar. To open a pull-down
menu, click on the title of the menu you need to open with the "Select" mouse button.

Note: A menu option followed by "..." means that selecting this option opens another view. For
example the Open... or Save As... menu options in the File pull- down menu.

2.8.4 Cascading menus


Cascading menus are derived from pull-down menus and represent additional options for the pull-
down menu item selected. Cascading menus are indicated if the ">" sign follows an option in a pull-
down menu.
To open a cascading menu, click on the menu option with the ">" sign in the pull-down menu.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
38 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Entry boxes

Figure 1 Page view with cascading menu

2.9 Entry boxes


2.9.1 Description and definition
Entry fields are the placeholders to insert and modify data.

Each Entry Box has two parts:


• Entry Box Label - Indicates what is entered or what is to be entered in the entry area concerned.
• Entry Box - When selected, enables you to enter a text.

Note: The text entry areas may not be accessible for entering text. In this case they have a
different color than other entry areas in which text can be entered. In the example above, the
Granularity entry box may not be used for text entry. Its color is lighter than the other entry
areas. Furthermore the text cursor is dotted, indicating that text cannot be entered.
To access an entry box and enter text, click on the text entry area. The text cursor begins to blink.
The text cursor has an I-beam shape. The following keys are useful when entering text.

Key Function
Back Space Deletes to the left.
Del Deletes to the right.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 39
Dialog boxes 1850 TSS-5C

Key Function
,,, Displace the cursor along the text.

To access another entry box, you can either click in the entry box using the Select mouse button or
use the Tab key on the keyboard.
Select the Tab key that enables you to pass to an entry box situated beneath the one from which
the Tab key is pressed. Select Shift+Tab keys to access an entry box situated above the one from
which the action is launched.

Note: The Tab key does not give you access to those entry boxes that are read only.
Therefore, when a dialogue box containing entry boxes opens, the Tab key takes you directly
to the first entry box in which you can write.

2.10 Dialog boxes


2.10.1 Generalities
Dialogue boxes provide an interface between the ZIC (Zero-Installation Craft terminal) and the user.
They enable to confirm operations or consult information, displayed by the system, following an
action of the user.
There are many types of dialogue boxes. They generally combine several of the graphical controls
previously described (scroll bars, push buttons...). The principal dialogue boxes are described
below.

2.10.2 Tree
A tree area is generally a part of a page that enables the operator to consult and select items from
an existing list.

2.10.3 Message and confirmation dialog boxes


These dialog boxes display messages and information. They require a confirmation of the action to
undertake. Generally, work is suspended till the dialogue box is closed. This means that you first
have to click on the corresponding button (OK, Cancel, Help, or other options) before resuming
operations.
A question dialogue box requests additional confirmation following a command previously launched.
The Cancel push button cancels the operation.
The information dialog box gives indication on the action the operator has undertaken.

2.11 Menu description


2.11.1 Overview
In the following, all the menu and relevant option are described according to the menu structure as
shown in

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
40 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Note: In compliance with your access rights and the management state, you may or not have
access to some of the management options described below. The management options that
cannot be accessed aren't represented.
Refresh Tree - Allows to update the page area tree.
Following are the Menu and Sub-Menu options available:

2.11.2 TMPLS/MPLS-TP
TMPLS/MPLS-TP - Creates an application profile for the use MPLS frame format, the MPLS
forwarding paradigm, and the client to MPLS mapping in transport networks.

The following table describes the sub-menu options:

Menus Description
TMPLS/MPLS-TP Global Network Allows to manage all the global network parameters
assigned to T-MPLS.
L2 Encapsulation Profile Allows to configuration of the L2 encapsulation profile.
Quality of Service Allows to manage QoS information
PHB Profile This is the externally observable forwarding behavior
applied at a DS-compliant (Diff-Serv) node belonging to a
DS domain
OAM PHB Profile Supports the capability to configure an association
between a PHB value and a TMPLS OAM packet

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 41
Menu description 1850 TSS-5C

Menus Description
Traffic Descriptor ATraffic Descriptor also called MPLS Tunnel Resource
Descriptor, can be associated to Tunnels and/or
Psuedowires. ATD is the set of CIR, CBS, PIR and PBS
parameters used by the System for bandwidth checks
related to "port bit rate" or "Virtual Transport bit rate" on
which Tunnels and Psuedowires are defined.
TMPLS/MPLS-TP Tunnel Allows to manage the association between two terminated
tunnels.
MPLS-TP Ring Association Allows to manage the ring association between two
terminated tunnels
TMPLS/MPLS-TP OAM Allows the management of Delay, Loss and Loop back.
Delay Measurement Tool A point-to-point connectivity service
MPLS-TP Loop Back Tool To be updated
Loop back tool To be updated
MIP discovery To be updated
PseudoWire Allows to manage the T-MPLS Pseudowires

Note: Due to Hardware limitations, the range for Eth/TMPLS/MPLS-TP proactive/on-demand


DM and on-demand LB packet length (except Ethernet LB on UNI’s DOWN MEP, at 1564
bytes) is 0,82-9600 bytes and not 0,82-10240 bytes as displayed in the screen shot.

TMPLS/MPLS-TP Global Network


Figure 2, “TMPLS-TP/T-MPLS Global Network” (p. 43) provides the TMPLS/MPLS-TP Global
Network management OAM functions.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
42 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 2 TMPLS-TP/T-MPLS Global Network

• OAM CV Period - Specifies the selector of values range for CV Period into OAM CV frames.
The allowable values are:
− 4 (0.1ms, 0.5ms, 1ms, 3.33 ms,10 ms,100 ms,1s,10s, 1m, 10m)
− 4 (0.1ms, 0.5ms, 1ms, 3.33 ms,10 ms,100 ms,1s,10s, 1m, 10m)
• PHB Range - Specifies the selector of values range for user-defined PHB Profile.
The allowable values are:
− 1 (EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y)
− 2 (EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2)
• OAM Type - Specifies the OAM type of either T-MPLS or MPLS-TP.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 43
Menu description 1850 TSS-5C

• OAM Rx Detection - Specifies the OAM Rx Detection options TYPE-SEL or BOTH.


• Channel Type - Specifies the Channel type
• Channel Type RX1 - Specifies the RX1 Channel type
• Channel Type RX2 - Specifies the RX2 Channel type
• APS Channel Type - Specifies the APS Channel Type
• APS Channel Type RX1 - Specifies the APS RX1 Channel Type
• APS Channel Type RX2 - Specifies the APS RX2 Channel Type
• Proactive LM Mode - Bit is used in CV packets "flag byte" to indicate the Proactive LM Mode.
The default value is 4.
• Ignore Sec Bit - Position in CCM packets "flag byte" of the IGNORE-SEC bit, that is used for
indicating to the remote node that the primitives associated to the current second should not be
considered for PM counters and PM Elapsed Time has not to be incremented. The factory
default value is 5.
• Status Bit - Position in CCM packets "flag byte" of the active/standby status bit, that is used in
the L3VPN Tunnel Redundancy network scenario for indicating if the related facility is active or
standby. The factory default value is 6.
The MPLS-TP Loopback panel supports the following parameters:
• ICC-B – The default value is 000000.
• Node ID – Specifies the IPv4 address of the Node and Node ID options are 0-16.
• Lbr Timeout – The valid range is 5 to 30 seconds. The default timeout is 5 sec.
The Save hyperlink is used to save all the settings and return to the previous page.

L2 encapsulation profile
L2 Encapsulation Profile displays the following as shown in Figure 3, “L2 encapsulation profile”
(p. 44).

Figure 3 L2 encapsulation profile

The Layer 2 Encapsulation Profile Management tab displays the following parameters:
• Access Identifier - This specifies the access identifier to the L2ENCAP profile stored in the
system. The values are in the range L2ENCAPPROF-{1-32}.
• MAC Destination Address - This specifies the Medium Access Control Address to be used in
case of mapping of MPLS when a switched network is present.
• Tagged Flag - Specifies the flag Tagged/Untagged.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
44 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

• VLAN-ID - Specifies the VLAN identifier to be used in case of mapping of MPLS over Ethernet
when a switched network is present. The parameter is mandatory if Tagged Flag=TAGGED,
otherwise it is not valid.
• Priority - This specifies the priority value for TAGGED Ethernet frame. It is not valid if Tagged
Flag=UNTAGGED.
• Drop Eligible - This specifies the drop eligible indication according to 802.1ad. It is not valid if
Tagged Flag=UNTAGGED.
• In-Use - This specifies if the L2ENCAP Profile is referenced by a Tunnel Segment or Pseudowire
Segment.
Click Create to configure the L2 Encapsulation Profile.

Quality of Service

The Quality of Service contains the following sub-options:


• PHB Profile
• OAM PHB Profile
• Traffic Descriptor

PHB profile

A Per-Hop Behavioral Profile is the externally observable forwarding behavior applied at a DS-
compliant (Diff-Serv) node belonging to a DS domain. A set of "data treatments" (defined as PSCs)
are requested to be applied to packets on each NE inside DiffServ domain, where this treatment
includes both:
• Selection of the queue and schedule discipline to apply at NE egress interface
• Congestion thresholds to be applied over NE egress queues

The user can profile the NE forwarding behavior for TU Segment and PW Segment, combining
PHB. The user can use the following PSCs:
• EF MPLS Expedited Forwarding - Used to give preferential queuing treatment in a Strict Priority
queue. Useful to provide low loss, low jitter and low delay handling within an MPLS node.
• HIGH2 - Used for delay/jitter sensitive traffic and sharping both the same relationship with MPLS
PSC bandwidth-based parameter and the same queuing type as in MPLS EF PSC.
• AF Assured Forwarding - This defines 4 independent forwarding classes (denoted as AF1, AF2,
AF3, and AF4). These PSCs are used when, in case of congestion, is necessary to define the
drop precedence of a packet according to An class. Both Green and Yellow packets belonging to
the same AF class are not requested to be re-ordered from the system and are requested to be
sent to the same egress WFQ forwarding queue. This PSC is composed by 8 PHB [AF11, AF12,
AF21, AF22, AF31, AF32, AF41, AF42].
• DE Default Behavior - Identifies the existing "best effort" traffic
• LOW2 - The same queuing type and the same relationship with MPLS PSC bandwidth-based
parameters as in MPLS DE PSC
Click PHB Profile menu as shown in Figure 4, “PHB profile” (p. 46).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 45
Menu description 1850 TSS-5C

Figure 4 PHB profile

The Per Hop Behavior Profile Management tab provides the following parameters:
• A column containing a check box, used to manage the deletion of a PHB Profile. The PHB
Profile must not be the default one, nor an In Use one.
• Access Identifier - This specifies the access identifier to the PHB profile stored in the system.
The values are in the range PHBPROF-{1-8}. Related to the value of PHB range in the Global
Network page, a factory default PHB Profile is defined. The default value is PHBPROF-1..
• An hyperlink on this object is present only if the PHB Profile can be modified, that is the PHB
Profile is not the default one or in not in use.
• EXP Bit 'i' - Reports the User association between the EXP-bit field value 'i' and the PHB class,
where i = 0-7.
• In Use - This specifies if the PHB is referenced by a Tunnel Segment or Pseudowire Segment.
• CoS - Class of Service. There are two PHB Profiles under Class of service, 5P3D and 8POD
Click Create to configure a new PHB Profile.

OAM PHB profile


The system supports the capability to configure an association between a PHB value . The
configuration is on LSP base. A pool of up OAM PHB profiles has to be supported per NE. Each
LSP points to one of these profiles. The chosen PHB is then associated to an EXP bit value, based
on the PHB profile pointed by the monitored LSP. With OAMPHB the AID of PHB profile related to
OAM packets is defined. In the system is stored one predefined OAMPHB profile identified by
AID=OAMPHB-1.
The OAM PHB Profile tab displays the following as shown in Figure 5, “OAM PHB profile” (p. 46)

Figure 5 OAM PHB profile

The OAM PHB Profile Management tab provides the following parameters:

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
46 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

• Access Identifier - Specifies the access identifier to the OAMPHB profile stored in the system.
The values are in the range OAMPHB-{1-8}
• TYPE ‘i’ - Reports the association between the ‘i’ type packet and a PHB value, where i = 1 to 8
• Profile In Use - Specifies if the OAMPHB is referenced by a Tunnel Segment or Pseudowire
Segment

Traffic descriptor

A Traffic Descriptor, also called MPLS Tunnel Resource Descriptor, is associated to Tunnels and/or
Pseudowires. A TD is the set of CIR, CBS, PIR, and PBS parameters used by the System for
bandwidth checks related to "port bit rate" or "Virtual Transport bit rate" on which Tunnels and
Pseudowires are defined. The user uses the following parameters to condition MPLS packets:
• CIR MPLS committed Information Rate - This is the maximum rate (kbyte/sec) with high priority
guaranteed for the Tunnel/Pseudowire packets delivery.
• CBS MPLS Committed Burst Size - This is the maximum burst size (byte) with high priority
guaranteed for the Tunnel/Pseudowire packets deliver.
• PIR MPLS Peak Information Rate - This is the maximum peak rate allowed (kbyte/sec) for the
Tunnel/Pseudowire.
• PBS MPLS Peak Burst Size - This is the maximum burst rate allowed (byte) for the Tunnel/
Pseudowire.
CIR and PIR values are used for CAC checks with respect to output port. When the TD is
referenced by a Tunnel then the system checks if sum of CIR<=available bandwidth on which port
the Tunnel is defined and if each PIR<= available bandwidth on which port the Tunnel is defined.
When the TD is referenced by a Pseudowire then the system checks if sum of CIR<=available
bandwidth on which Tunnel the Pseudowire is defined and if each PIR<= available bandwidth on
which Tunnel the Pseudowire is defined. All CAC checks are involved when this TD is used by a
Tunnel or Pseudowire.
The Traffic Descriptor Management tab contains the following as shown in Figure 6, “Traffic
descriptor management” (p. 47).

Figure 6 Traffic descriptor management

Click Search to locate Traffic Descriptors already configured.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 47
Menu description 1850 TSS-5C

Note: Creation of the MPLS Traffic Descriptor will be enabled only when the Tunne/PWl is set
to On.

TMPLS/MPLS-TP Tunnel management


The Tunnel Management provides the following as shown in Figure 7, “TMPLS/MPLS-TP Tunnel ”
(p. 47).

Figure 7 TMPLS/MPLS-TP Tunnel

The TMPLS/MPLS-TP Tunnel Management tab displays the Filter by panel that contains the
following parameters:
• Tunnel Type - This specifies the type of tunnel. The values are:
− LOCAL - No filter applied
− ALL
• Tunnel Resource Filter - The drop-down provides the following resource filter options: This
specifies the type of Tunnel to be filtered. The values are:
− Tunnel ID - No filter applied
− Tunnel AID - All the tunnel related to the Control Plane
• Tunnel Ranging Filter - Allows to set the tunnel range to filter the tunnel group. The valid range
is 1-100.
The Create Head/Tail Tunnel is to create a new Tunnel. See 3.73 “Create head/tail tunnel”
(p. 310)
The Create Transit Tunnel is to create a new Transit Tunnel.
The Search allows to execute the search based on the entered tunnel range.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
48 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

MPLS-TP Ring Association


This allows management of the to manage the association of a segment to a Ring is displayed.

TMPLS/MPLS-TP OAM
The TMPLS/MPLS-TP OAM supports the following OAM functions
• Delay Measurement Tool – Allows to retrieve active DM session. See 3.66 “TMPLS/MPLS-TP
DM management ” (p. 296).
• MPLS-TP Loopback Tool – Allows to retrieve active Loopback session See 3.67 “TMPLS
Loopback tool management” (p. 298).

PseudoWire
The PseudoWire Management window displays the following as shown in Figure 8, “PseudoWire”
(p. 48).

Figure 8 PseudoWire

The PseudoWire tab displays the Filter by panel that provides the following parameter:
• Pseudowire Resource Filter - Select the Pseudowire Resource from the combo-box.
The supported values are:
− PW ID
− PW AID - Allows to enter the Pseudowire Access Identifier in the entry field.
• PW Ranging Filter - Provides the From and To Pseudowire filter range, in the supported range
of 1 to 100.
The Create Head/Tail Pseudowire allows to create a new Pseudowire.
The Create Transit Pseudowire allows to create a new Transit Pseudowire.

2.11.3 Connection
Connection- Allows to manage (provisioning, service type) the client/line traffic

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 49
Menu description 1850 TSS-5C

The following table describes the sub-menu options:

Menus Description
TDM Search Allows to set the SDH service
Ethernet Sevice XC Allows cross-connection for Ethernet services.
EVPL A point-to-point connectivity service.
EVPLAN A point-to-multipoint connectivity service.

TDM Search for ETSI


Select Connection -> TDM Search as shown in Figure 9, “Connection - TDM Search (ETSI)”
(p. 51).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
50 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 9 Connection - TDM Search (ETSI)

For ETSI region, the Search tab displays the Search Cross-Connections panel that contains the
following:
• Search Type - Allows to select XConnection or Protection legs:
The options are:
− Using Specific VC Type Commands (RTRV-CRS-[LO]VCn and RTRV-CRSPROT-
[LO]VCn for a searching identified by the VCn specific type declared in the next VC Type
combo-box.
− VC Type - The combo-box allows to select one of the items VC4, in order to chose the
hierarchical level of the signal.
• Retrieve Command - Specifies the TL1 Command used for the searching procedure set in the
Search Type field.
• VC Access Identifier - The entry box allows to select one of the available VCn. For the
information relevant to the procedure.
• Circuit Identifier - For search using circuit identifier (CKTID).
SelectSearch hyperlink to start the search operation to filter the results.

TDM create for ETSI


Select Connection -> TDM Create as shown in Figure 10, “Connection- TDM create (ETSI)”
(p. 52)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 51
Menu description 1850 TSS-5C

Figure 10 Connection- TDM create (ETSI)

For ETSI region, the Create Cross Connection panel displays the following:
• Cross Connection Type - Specifies the type of cross-connection to be created.
The values are:
− Connection
− Connection Path Protected
• VC Type - The combo-box allows to select one of the items VC4, VC44C, VC416C, VC464C ,
LOVC12 or LOVC3 in order to chose the hierarchical level of the signal.
• Direction - Specifies the source and destination points to establish a cross-connect. The values
are Starting Fromping Starting Fromped and Ending To according to the selected type of
cross-connection..
Click Continue link to specify a VC of a type VC4.

Ethernet Services XC

The Ethernet Service XC contains the following sub-menu option:


• EVPL - A point-to-point connectivity service
• EVPLAN - A point-to-multipoint connectivity service

EVPL
The EVPL displays the following as shown in Figure 11, “EVPL service” (p. 53).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
52 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 11 EVPL service

The EVPL Service tab provides the following parameters:


• Fron XC Id - Specifies the cross-connection Id for the selected EVPL service
• To XC Id - specifies the target to establish EVPL service
Click Create to configure a new EVPL service. See3.81 “Create EVPL service” (p. 365).

EVPLAN
The EVPLAN service contains the following as shown in Figure 12, “EVPLAN service” (p. 53).

Figure 12 EVPLAN service

The EVPLAN Service tab provides the following parameters:


• From XC Id - Specifies the cross-connection Id for the selected EVPLAN service

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 53
Menu description 1850 TSS-5C

• To XC Id - Specifies the target to establish EVPLAN service


Click Create to configure a new EVPLAN service. See3.82 “Create EVPLAN service” (p. 372)Lk.

2.11.4 Data
Data - menu allows the operator to set the service for Data traffic:

The following table describes the sub-menu options:

Menus Description
Traffic descriptor Allows to set the operation mode
VLAN Profile Allows to set the virtual LAN mode
Color Profile Allows to set the signal color policing
Group Segregation Management Allows to set the segregation state
FDB Operations To be updated
MAC File Collection Allows to administer MAC file collection
MAC Aging Time Management Allows to administer MAC Time Management
MAC Table Configuration Allows to administer MAC Table configuration
Queue Management Allows to manage the data queue.
OAM Management Allows operation and maintenance management
Global Settings Allows to manage global settings

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
54 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Menus Description
OAM Resource Config. Allows to create and maintenance management.
MD Allows to create maintenance domain
MA Allows to configure the maintenance association
MA MEP List Allows to search for a list of MEP's
MEP Allows to configure a new MEP
MIP Allows to configure a new MIP
Proactive Tool Allows the Delay measurement and Synthetic Loss
Measurement
Delay Measurement Allows to administer delay measurement
Synthetic Loss Measurement Tool Allows to create a Synthetic Loss Measurement
On-Demand tool Allows to manage Delay measurement
Delay Measurement To be updated
Alarm Indication Signal To be updated
EMF Tool Allows to manage EFM
E-LAN Service Management To be updated
E-LAN Service To be updated
Static Filtering DB To be updated
Traffic Control To be updated
Storm Control Profile To be updated
Packet Filtering Profile To be updated
CES Management Allows to manage traffic control
Generic TDM Management To be updated
PW Management To be updated
EVC Loopback Management Allows to supports to inhibit traffic forwarding among
group of ports.
EVC Instance Management To be updated
EVC Filter Instance Management To be updated

Traffic descriptor
Select Data -> Traffic Descriptor as shown in the Figure 13, “Data - Traffic descriptor” (p. 56).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 55
Menu description 1850 TSS-5C

Figure 13 Data - Traffic descriptor

To remove the existing traffic descriptor from the list, click Delete hyperlink.
To configure a new traffic descriptor, click Create to configure a data traffic descriptor tab.

VLAN profile
VLAN registration is not applicable to MAC Bridge case. Select Data -> VLAN profile as shown in
Figure 14, “VLAN profile with ghost objects” (p. 56).
• User Label - This is the name of the VLAN profile.
• Ethernet type - The value identifies the network provider and has to be 2-bytes long in
hexadecimal notation; the third non-included byte is forced by default to "0x".
Validating the check box Show ghost object the column State is shown where the status of the
VLAN is displayed as shown in Figure 14, “VLAN profile with ghost objects” (p. 56).

Figure 14 VLAN profile with ghost objects

The Delete hyperlink is to select one or more VLAN profile to delete from the list.
The Create hyperlink to select one or more VLAN profiles to start the creation process.
See3.84 “Create VLAN” (p. 379).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
56 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Color profile
The prioritization of an Ethernet data flow can be indicated on the three user-priority bits (802.1p) of
the "Tagged-Ethernet" frame and also on the 3 "provider-priority" bits of the "Stacked-Vlan" frame.
Eight levels of User-priority can be defined: pri0 ... to pri7, where pri0 is the minimum and pri7 the
maximum. The relayed traffic towards a generic "Provider Network" can be "prioritized" using the
"Default" or "Regenerated" UserPriority" settings.
Sixty four levels of DSCP can be defined: DSCP0 ... to DSCP63, where DSCP0 is the minimum
and DSCP63 is the maximum.
Policing is a mechanism to check the data flow is respecting the traffic contract, providing to "cut" or
to forward the incoming traffic.
• "Disabled" means that no policing is carried out
• "Color-Blind" means that the policing is based upon the Traffic Descriptor (TD), without taking
into account the Priority and CoS
• "Color-Aware", means that the policing takes into account the Traffic Descriptor (TD), the
UserPriority and the CoS, by means of a defined "Color Profile"
According to the traffic contract, to the policing mode, and to the available bandwidth, the priority of
a data flow into the Provider-network is assigned by the traffic scheduler of the system.
In case the policing is in "Color-aware" mode, the Provider-prioritization granularity is made deeper,
taking into account the single VLAN-priorities, that can have assigned to any of them a green or
yellow or red color.
The Table 5, “Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource:” (p. 57) and
Table 6, “Prioritization for OUTFLOW resource with "Stacked-VLAN management” (p. 58) contain
the relationships among Stacked-VLAN, Traffic Descriptor, Policing Mode and Color Profile.

ETS InFlow:

Table 5 Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource:

Traffic Descriptor Policing Mode Color Profile Provider - Coloring


Best effort "Disabled" only "Unbound" YELLOW
"Color-blind" YELLOW or RED
Guaranteed Disabled only Unbound GREEN
Color-blind GREEN or RED
Guaranteed(2) "Disabled" only "Unbound" GREEN
"Color-blind" GREEN or RED

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 57
Menu description 1850 TSS-5C

Table 5 Traffic Descriptor, Policing Mode and Color Profile for INFLOW resource: (continued)

Traffic Descriptor Policing Mode Color Profile Provider - Coloring


Regulated "Disabled" Unbound GREEN
Bound GREEN or YELLOW
"Color-blind" Unbound GREEN or YELLOW or
RED
"Color-aware" Bound as assigned by the
"Color Profile"
Regulated(2) Disabled Unbound GREEN
Color-blind Bound GREEN or YELLOW
Color-aware Unbound GREEN or YELLOW or
RED
Regulated(3) Disabled Unbound GREEN
Color-blind Bound GREEN or YELLOW
Color-aware Unbound GREEN or YELLOW or
RED
Regulated(3) Disabled Unbound GREEN
Color-blind Bound GREEN or YELLOW
Color-aware Unbound GREEN or YELLOW or
RED
Background "Disabled" only "Unbound" YELLOW
"Color-blind" YELLOW or RED

ETHOutFlow

Table 6 Prioritization for OUTFLOW resource with "Stacked-VLAN management

Stacked VLAN
Management Priority Mode VLAN Provider-Prioritization
Unbound - no provider-prioritization
Bound Color-blind the frames are passed without any information
about Provider's colors
Color-aware green packets are assigned to the priority as
defined into the "Stack Priority" field
yellow packets are assigned to the priority as
defined into the "Stack Priority Yellow" field

Select Data -> Color Profile as shown in Figure 15, “Color profile” (p. 59)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
58 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 15 Color profile

The available parameters are:


• User Label - Traffic descriptor name
• Priority 0 to Priority 7 - Prioritization of an Ethernet data flow can be indicated by 8 levels of
User-priority, where Priority 0 is the minimum and Priority 7 the maximum, according to these
conventions:
− green color - Maximum User-priority
− red color - Minimum User-priority
− yellow color - Mean User-priority
The Create link is to configure a new color profile. See3.41 “Create color profile” (p. 223).

Group segregation management


This option is to set the segregation state, in order to exclude the Port from the exchanging of
frames with a given list of ports. The ports to be segregated can be registered over the same VPLS
service. In this way a segregated port can exchange frames only with a non-segregated port.
Segregation is applicable also for Link Aggregation Groups.
This function is used to save the band and resources on the node and on the ports, and also to
improve the security and the privacy of the transmission.
Select Data -> Group Segregation Mng as shown in Figure 16, “Group segregation management”
(p. 59).

Figure 16 Group segregation management

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 59
Menu description 1850 TSS-5C

The Port Segregation Group tab displays the Port Segregation Group Management panel that
contains the following parameters:
• Group Status - Activates the Segregation capability of the node. The default value is Destroy
that deactivates the Segregation capability of the node
• Send - Allows to forward the command in order to activate Create or deactivate Destroy the
Segregation capability of the node.

Queue management
The Queue Management tab displays the following as shown in Figure 17, “Queue profile
management” (p. 59).

Figure 17 Queue profile management

The Queue Profile Management tab provides the following parameters:


• User label - This specifies the user label of the queue profile
Click Create to configure a new Queue Management Profile.

OAM management

The option is used by the operations, administration, and maintenance personnel. It consists of the
following sub-menu options:
• Global Setting
• OAM Resource Configuration
• Proactive Tool
• On-Demand Tool
• Alarm Indication Signal

Global setting
Global Setting contains the following information as shown in Figure 18, “Global setting” (p. 61).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
60 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 18 Global setting

The NE Global Setting tab displays the OAM Global Configuration panel that contains the
following parameters:
• LBM Tx Interval [100 ms]
• LBM Time Out [sec]
Click Save to save all the settings.

OAM resource configuration

The OAM Resource Configuration menu contains the following sub-menu options:
• MD
• MA
• MA MEP List
• MEP
• MIP

MD
The Maintenance Domain menu option contains the following as shown in Figure 19, “OAM
resource configuration - MD” (p. 62).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 61
Menu description 1850 TSS-5C

Figure 19 OAM resource configuration - MD

The Maintenance Domain tab displays the following parameters:


• MD Label
• Format
• Name
• Level
• Status
Select Delete, and Create links to create, or delete the parameter values.

MD
The Maintenance Domain menu option contains the following as shown in Figure 20, “OAM
resource configuration - MD” (p. 62).

Figure 20 OAM resource configuration - MD

The Maintenance Domain tab displays the following parameters:


• MD Label
• Format
• Name
• Level
• Status

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
62 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Select Delete, and Create links to create, or delete the parameter values.

Maintenance association
The Maintenance Association contains the following as shown in Figure 21, “OAM resource
configuration - Maintenance association” (p. 62).

Figure 21 OAM resource configuration - Maintenance association

The Maintenance Association tab displays the Range panel that consists the following
parameters:
• Search Filter
• MD From and To range
• MA From and To range
Select Search to perform the search. See to procedure.
Select Create to create a new Maintenance Association.

Maintenance association MEP list


The Maintenance Association MEP List contains the following as shown in Figure 22, “Maintenance
association MEP list” (p. 64).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 63
Menu description 1850 TSS-5C

Figure 22 Maintenance association MEP list

The MA MEP List tab displays the Range panel that contains the following parameters:

Note: See Maintenance Association for parameter details.

MEP
The MEP contains the following as shown in Figure 23, “MEP” (p. 64).

Figure 23 MEP

The MEP tab displays the Range panel that contains the following parameters:
• Search Filter
• MD From and To range
• MA From and To range
• MEP From and To range
Select Search to start the search, See to Search MEP procedure

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
64 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Select Create to create a new MEP, See to Create MEP procedure.

MIP
When MA is created, MIP is created by default.

The MIP tab displays the Range panel that contains the following parameters:

Table 7 Range panel parameters

Parameter Description
Port identifier Specifies the port identifier.
MD Level A small integer in a field in an OAMPDU that is
used, along with the VID in the VLAN tag, to
identify to which Maintenance Domain among
those associated with the OAMPDU frame’s
VID, and thus to which MA, a OAMPDU
belongs to.
Direction The MEP should have a field to indicate the
direction of the MIP.The values are up and
down.

Click on search to retrieve a list of MIP's.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 65
Menu description 1850 TSS-5C

Figure 24 MIP

Proactive Tool

This option contains the following sub-options:


• Delay Measurement
• Synthetic Loss Measurement Tool

Delay Measurement
The Delay Measurement contains the following as shown in Figure 25, “Proactive delay
measurement” (p. 66).

Figure 25 Proactive delay measurement

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
66 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The Delay Measurement tab displays the Range panel that contains the following parameters:
• Search Filter
• MD-ETH-PRO-DM
• MEP-ETH-PRO-DM
Select Search to start the search.
Select Create to create a new synthetic loss measurement, See to Create Synthetic Loss
Measurement procedure. See3.23 “Administer Proactive Tool Delay Measurement” (p. 145).

Synthetic Loss Measurement Tool


The Synthetic Loss Measurement tool contains the following as shown in Figure 26, “Synthetic loss
measurement” (p. 66).

Figure 26 Synthetic loss measurement

The Synthetic Loss Measurement tab displays the Range panel that contains the following
parameters:
• Search Filter
• MD-ETH-PRO-SLM
• MEP-ETH-PRO-SLM
Select Search to start the search.
Select Create to create a new synthetic loss measurement, See to Create Synthetic Loss
Measurement procedure. See3.24 “Create Synthetic Loss Measurement” (p. 147).

On-Demand Tool
Select Data -> OAM Management -> On-Demand -> Delay Measurement, the Delay
Measurement screen is displayed as shown in Figure 27, “On-Demand Delay Measurement”
(p. 68).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 67
Menu description 1850 TSS-5C

Figure 27 On-Demand Delay Measurement

Click Create to create a new on-demand delay measurement.

EFM tool
Select Data -> EFM tool option from the menu bar.
The EFM tool tab displays the Search Local Port panel.

Figure 28 EFM Tool

Click Search link to search for the available ports.


The boards panel is displayed.
Click boards display on the left pane that displays the local ports available on the right pane.
Click on any of the available port link to select a port name displayed in the Search Local Port
panel.
Click Show to view the EFM tool panel with Configuration, Link Monitoring and Event Log tabs.

E-LAN service management


Select Data -> E-LAN Service Mgnt option as shown in Figure 29, “ELAN service” (p. 69).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
68 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 29 ELAN service

The E-LAN Service tab displays a table existing E-LAN service entries.
The Create link is used to configure a new E-LAN service.

Static Filtering DB
Select Data -> E-LAN Service Mgnt -> DB Filtering ->Static Filtering DB option as shown in
Figure 30, “Static filtering DB” (p. 69).

Figure 30 Static filtering DB

The E-LAN Serivce tab displays the Static Filtering panel that contains the following:
• Filter On - Allows to select the module for purpose of static filtering
• E-LAN Range Specification - Specifies the E-LAN range. The valid range is 1 to 100

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 69
Menu description 1850 TSS-5C

ClickSearch to execute the filter on the criteria provided


ClickCreate for the user to configure another static filtering DB.

Traffic control
Select Data -> Traffic control->Storm Control Profile as shown in Figure 31, “Storm control
profile” (p. 69).

Figure 31 Storm control profile

The Create allows the user to configure another static filtering DB

Traffic filtering profile


Select Data -> Traffic control->Packet Filtering Profile as shown in Figure 32, “Packet filtering
profile” (p. 70).

Figure 32 Packet filtering profile

Create allows the user to configure another static filtering DB

CES management
Select Data -> CES Management->Generic TDM Parameters as shown in Figure 33, “TDM
Parameters” (p. 71).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
70 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 33 TDM Parameters

Click Create to configure another static filtering DB


Save allows the user to save the configuration.

EVC Loopback Management


Select Data -> EVC Loopback Management -> EVC Instance Management as shown in Figure
34, “EVC Instance Management” (p. 71).

Figure 34 EVC Instance Management

Select Data -> EVC Loopback Management -> EVC Filter Instance Management as shown in
Figure 35, “EVC Filter Instance Management” (p. 72).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 71
Menu description 1850 TSS-5C

Figure 35 EVC Filter Instance Management

Create allows the user to configure another EVC Loopback Instance.


Save allows the user to save the configuration.

The description of EVC Loopback Filter tab parameters are as follows:


• User Label - Is the system generated User Label for the EVC Loopback Filter
• Name - Specifies the name of the Filter
• MAC Destination Address - Specifies the MAC destination address
• MAC Destination Address Mask - Specifies the MAC destination address mask
• MAC Source Address - Specifies the MAC source address
• MAC Source Address Mask - Specifies the MAC source address mask
• IP Dscp - Specifies the IP Dscp
• IP Dscp Mask - Specifies the IP Dscp mask
• Row Status - Specifies the row status
• Outer VLAN ID - Specifies the outer VLAN ID
• Outer VLAN ID Mask - Specifies the outer VLAN ID mask
• Inner VLAN ID - Specifies the Inner VLAN ID
• Inner VLAN ID Mask - Specifies the Inner VLAN ID mask
• Priority - Specifies the priority
• Priority Mask - Specifies the Priority mask

2.11.5 Protection
Protection - Allows the operator to manage the available protection systems.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
72 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The following table describes the sub-menu options:

Menus Description
1:1 Tunnel Protection A protection connection dedicated to each networking
connection.
MPLS-TP Ring Protection A protected ring connection to each networking
connection

2.11.6 Alarms
Alarms - Allows the operator to manage entities yield alarms when they malfunction. This section
deals with the configuration of ASAPs (Alarm Severity Assignment Profile).An ASAP is a list of
Alarm probable causes to which Severities Profiles are assigned, predefined or settable by the
operator.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 73
Menu description 1850 TSS-5C

The following table describes the sub-menu options:

Menus Description
CES TCA Profile Mng Allows to configure and display of the active threshold
crossing alarm profile of CES (TCA = Threshold Crossing
Alarm).
ETH TCA Profile Mng Allows to configure and display of the active threshold
crossing alarm profile of ETH.
TDM TCA Profile Mng Allows to configure and display of the active threshold
crossing alarm profile of TDM.
TDM ASAP Mng Allows to configure and display the TDM ASAP (Alarm
Severity Assignment Profile).
Data ASAP M Allows to configure and display the data ASAP.
PDH Alarm Global Mng Allows to configure and display the PDH alarm.
ALM Resynch Allows to update the alarm database to the current alarm
situation.
Condition Log Allows to collect the alarm history report from the NE.
Housekeeping The detection the external environmental issue via
external control input point
Input Points Defines input control point
Output Points Defines output control point

2.11.7 Communication
Communication - Allows the operator to configure and set the external communication for NE
management interfaces.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
74 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The following table describes the sub-menu options:

Menus Description
NE Gen. Config Allows to specify the Site Header information.
NE DIscovery To be updated
In Fiber In Band Management To be updated
DCN Phys. If Allows to specify the supported Layer 3 (network layer) of
the OSI Data Communication Network (DCN).
IP address Allows the operator to enter (add) a new static IP address
the IP routing table, by CP.
LAN management Allows to modify the various network interface
parameters associated with the customer LAN.
Auto Dcn To be updated
NE AutoDiscovery The NE implements the NE Autodiscovery mechanism for
automatic discovering by Network management system
of the NE presence in the network.
OSPF Specifies the Open Shortest Possible Path.
OSPF Area A mechanism that specifies the backbone area of the NE.
OSPF IF Parameter indicates if the authentication is activated (Y)
or un-activated (N) on the OSPF area.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 75
Menu description 1850 TSS-5C

Menus Description
Network Domain Allows the operator to enter (add) a new static IP route in
the IP routing table, to instruct the NE to provide routing
database information that is supported by network layer
of the OSI DCN, to retrieve a list of all immediate OSC
neighbors to the local network element and retrieve the
parameters of a configured OSIAREA that the NE is part
of.
IP Route Allows the operator to enter (add) a new static IP route in
the IP routing table, by CP
NSAP Report This instructs the NE to provide routing database
information that is supported by Layer 3 (network layer) of
the OSI Data Communication Network (DCN).
OSI Mng Retrieves the parameters of a configured OSIAREA that
the NE is part of.
OSI NE Area Allows to configure OSI Network Element area
OSI OS Address Allows to configure OSI OS address
OSI ULC Report Allows to modify OSI upper layers stack parameters that
are common to all the stack interfaces of the NE

NE Gen. Config

The NE Gen. Config menu option has only one sub-menu option:
• NE Discovery

NE discovery
This is used to retrieve the system's output response (site) header. Normally, the output response
header consists of the site identifier (SID) and the current date and time.
Select Communication -> NE Gen. Config -> NE Discovery option as shown in Figure 36, “NE
discovery - Site Header 1” (p. 77).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
76 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

Figure 36 NE discovery - Site Header 1

• The SITE HEADER tab displays the SITE HEADER panel that contains the following
parameters:
• PC - Determines the PC flag that assists in discovery of TIDs of remote NEs connected to a
Gateway NE via OSI over DCC. Selecting PC also provides the NE type and software release
number. This parameter also indicates the PC flag for 1301 autodiscovery version of this
command.
• TID - The Target Identifier of the target network element for this command. 40 hexadecimal
character NSAP address may be used to address an NE with unknown TID.

Click SEARCH hyperlink a second SITE HEADER panel shows the following information:
• Site ID - The site identifier
• Date - This shows the current date in the <year> -<month>-<day> format
• Time - This shows the current time in the <hour>-<minute>-<second> format
• NE Type - Specifies the Product group and Product name
• NE software release number - Specifies the software release number in the defined format. For
Example, R30.20.25.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 77
Menu description 1850 TSS-5C

Figure 37 NE discovery - Site header 2

In fiber in band management


Select Communication -> In Fiber In Band Management as shown in Figure 38, “In fiber in band
management search” (p. 78).

Figure 38 In fiber in band management search

The In Fiber In Band Management tab displays the In Fiber In Band Management Search panel
that contians the following:
• List Boards - The combo-box contains the list of boards that can be selected to perform the
search.
• Only Activate - A check-box that can be enabled/disabled based on the filter criteria. Enable the
check box to search for the borads that are currently active.
Click Search link to filter the boards that are active or inactive as shown in .

DCN physical interface

This menu option contains the following sub-menus:


• IP Address - Retrieves TCP/IP stack parameters. The IP address allows to modify the various
interface parameters associated with the in-band management IP.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
78 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

• LAN manag. - Allows to modify the various network interface parameters associated with the
customer LAN.

IP address
Allows to modify the various network interface parameters associated with the in band management
IP. Select Communication -> DCN Phys. If -> IP Address option as shown in Figure 39, “DCN
physical interface IP address” (p. 78).

Figure 39 DCN physical interface IP address

The NE Generic Configuration tab displays the IP Address Management panel that contains the
following parameters:
• MAC ADDRESS (Medium Access Control address) - This is the MAC address assigned to the
card. Note that this parameter can only be read and cannot be modified.
• IP Address (Internet Protocol address) - This is the IP address of the NE. The entry box allows
to digit the IP address of the NE (value range [1-99, 101-126,128-223] - [0- 255] - [0-255] -
[0-254]).
• Subnet Mask - This is the entry box for subnet mask of the network the NE is connected to
(value range [128-255] - [0-255] - [0-255] - [0-255]). The mask, in binary representation, must
contain a contiguous string of 1s (the network portion) and a contiguous string of 0s (the host
portion).
The Save hyperlink saves the configuration, closes the page and returns to the previous page.

LAN Management
Allows to modify the various customer LAN management parameters.
Select Communication -> DCN Phys. If -> LAN Mang option as shown in Figure 40, “LAN
Management” (p. 80)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 79
Menu description 1850 TSS-5C

Figure 40 LAN Management

The Customer LAN Management tab displays the Customer LAN Management panel that
contains the following parameters:
• OSI Protocol - Determines if the OSI Protocol runs on the customer LAN or not. The values are:
− N (OSI Protocol is disabled on the Customer LAN)
− Y (OSI Protocol is enabled on the Customer LAN)
• Internet Protocol - Determines if the Internet Protocol runs on the customer LAN. The values
are:
− N (Internet Protocol is disabled on the Customer LAN)
− Y (Internet Protocol is enabled on the Customer LAN)
• OSI Area - Specifies which OSI Area the Customer LAN belongs to (“1”, if OSI was disabled
previously, previously existing value, otherwise).
• Integrated ISIS - Determines if the Integrated IS-IS Protocol runs on the customer LAN or not.
The values are:
− N (Integrated IS-IS Protocol is disabled on the customer LAN)
− Y (Integrated IS-IS Protocol is enabled on the customer LAN)
• Proxy Address Resolution Protocol - The values are:
− Y- Proxy Address Resolution Protocol is enabled on the customer LAN
− N - Proxy Address Resolution Protocol is disabled on the customer LAN
• Channel used by- The values are:
− MNGPLANE
− NONE
• IP address of NE - The IP address of the Network Element
• Subnet Mask - The subnet mask of the Network Element
• Gateway address- The gateway address of the Network Element

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
80 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

• MAC address - The Media Access Control address of the Network Element
• Negotiation mode with link partner - The values are AUTO, DISABLED, and RESTART
• Port speed selection - The port speed on the Network Element
• Port duplex mode selection - The port duplex mode selection of the Network Element
• OSPF - Specifies the Open Shortest Possible Path. The values are Y or N
The Save hyperlink closes the page and returns to the previous page.

NE autodiscovery
The NE Auto Discovery displays the following as shown in Figure 41, “NE autodiscovery” (p. 80).

Figure 41 NE autodiscovery

The NE Auto Discovery tab displays the Autodiscovery panel that contains the following
parameters:
• ENABLED - To enable or disable the NE Autodiscovery, use the following supported values:
− Y - NE Auto Discovery mechanism is enabled.
− N - NE Auto Discovery mechanism is disabled.
• STATE - Displays the current status of the autodiscovery protocol.
The supported values are:
− IDLE- Autodiscovery not enabled.
− Ongoing- Autodiscovery enabled, however no response received from the Network
Management System.
− Suceeded- Autodiscovery has succeeded and an acknowledgement is received from the
Network Management System.
− Failed- The Autodiscovery failed as received from the Network Management System.
The Save link is used to save the settings and return to the previous page.

OSPF area
Select Communication -> OSPF Area menu option as shown in Figure 42, “OSPF Area” (p. 82).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 81
Menu description 1850 TSS-5C

Figure 42 OSPF Area

This menu option contains the following:


• Access Identifier OSPFAREA- An OSPFAREA between 1 and 3 can be selected as Access
Identifier.
• OSPF Area ID- specifies the Default OSPF Area ID associated to all the new created OSPF
interface.

Network domain

This menu option contains the following choices:


• IP Route - Allows the operator to enter (add) a new static IP route in the IP routing table, by CP.
• NSAP Report - This instructs the NE to provide routing database information that is supported
by Layer 3 (network layer) of the OSI Data Communication Network (DCN).
• OSI Mng - Retrieves the parameters of a configured OSIAREA that the NE is part of. It contains
the following sub-menu options:
− OSI NE Area - Specifies the OSI Network Element Area
− OSI OS Address - Specifies the OSI OS Address
− OSI ULC Report- Generates the OSI Report

IP route
This option allows the operator to enter (add) a new static IP route in the IP routing table, by CP. If
the AID specifies a STMn then the NEXTHOP parameter should not be specified. If the AID
specifies the LAN, then the NEXTHOP parameter must be specified.
Select Communication -> Network Domain -> IP Route option as shown in Figure 43, “IP route
configuration” (p. 82).

Figure 43 IP route configuration

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
82 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The IP Routing Configuration tab displays the following:


• AID - Specifies the Access Identifier for the IP route
• DESTADDR - Specifies the destination IP address for the IP route
• IP MASK - Specifies the subnet mask for the IP route
• NEXTHOP - Specifies the IP address of the next hop
• METRIC - Specifies the metric value for the IP route
• METRICTYPE - Specifies the metric type for the IP route
• STATUS - Specifies the IP route status
• ADVERTISE - Specifies whether the IP route is leaked into IP routing protocols (OSPF,
Integrated IS-IS). The values are: N (route is only known on the local NE) or Y (route is leaked
into OSPF and integrated IS-IS)
Click Create hyperlink to configure a new IP Route. Refer 3.57 “Create IP routing” (p. 276).

NSAP report
This option instructs the NE to provide routing database information that is supported by Layer 3
(network layer) of the OSI Data CommunicatOSIion Network (DCN).
Select Communication -> Network Domain -> NSAP report option as shown in Figure 44,
“Network service access point panel” (p. 82).

Figure 44 Network service access point panel

The NETWORK SERVICES ACCESS POINT panel that contains the following parameters:
• Lookup Type - Specifies the type of lookup function that will be performed to retrieve
neighboring NEs.
The values are:
− DRCT- Retrieves the NSAPs and the TIDs of all the directly reachable (1 hop away) Level 1
and Level 2 Intermediate Systems (ISs), to which an adjacency is formed
− L1ROU - Retrieves the NSAPs of all the reachable Level 1 ISs within all the areas, including
NEs
− L1ROUTID - Retrieves the NSAPs and the TIDs of all the reachable Level 1 ISs within all the
areas, including NEs

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 83
Menu description 1850 TSS-5C

− L2ROU - Retrieves the area addresses of all the reachable Level 2 ISs, including NEs
The Search hyperlink allows to start the NSAP search procedure.

OSI management

This option retrieves the parameters of a configured OSIAREA that the NE is part of. It contains the
following two sub-menu options:
• OSI NE Area
• OSI OS Address
• OSI Tunnel

OSI NE area
Select Communication -> Network Domain -> OSI Mng -> OSI NE Area option as shown in
Figure 45, “OSI NE area” (p. 83).

Figure 45 OSI NE area

The OSI tab displays the OSI AREA panel that contains the following parameters:
• OSI AREA. - To determine an access Identifier for an OSI area
• Level 3 Initial Domain Part - Assigns the initial domain part of the manual area address (8
hexadecimal characters)
• Level 3 Domain Format Identifier - Assigns the domain format identifier field of the manual
area address (2 hexadecimal characters)
• Level 3 Organization - Assigns the organization field of the manual area address (8
hexadecimal characters)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
84 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

• Level 3 Reserved - Assigns the reserved field of the manual area address (4 hexadecimal
characters)
• Level 3 Routing - Assigns the routing domain and routing area within the routing domain of the
manual area address (8 hexadecimal characters)
• Level 3 System Identifier - This is the system identifier assigned to the card (12 hexadecimal
characters)
The Save hyperlink closes the page and return back to the previous page.

OSI OS address
The OSI OS Address displays the following as shown in Figure 46, “OSI OS address” (p. 84).

Figure 46 OSI OS address

The Overhead Channel Cross Connection tab displays the OS Address panel that contains the
following parameters:
• Operating System - Specifies the operating system for the open system interconnection
management. The values are: OSI and IP
• Main Address - Specifies the main address for the OSI management
• Spare Address - Specifies the spare address for the OSI management
The Save option is used to save the settings and return to the previous page.

2.11.8 Sychronization
Sychronization - Allows the operator to manage the ports dedicated to BITS (Building Integrated
Timing Supply) facilities for clock distribution purposes. A BITS output reference is a DS1 signal.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 85
Menu description 1850 TSS-5C

The following table describes the sub-menu options:

Menus Description
Sync Ethernet Allows the page to retrieve and edit synchronization
resources related to a given shelf
Clock Management To be updated
Outgoing SSM Management To be updated
1588 Allows the page to release switching outgoing
synchronization resources related to a given shelf.
PTP Clock Mode To be updated
PTP Default Clock Cfg To be updated
PTP Clocks To be updated
PTP Ports To be updated
External Interfaces To be updated

2.11.9 System Management


System Management - Contains menu item and submenu for all users and for administrator users.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
86 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The following table describes the sub-menu options:

Menus Description
Initialize and Upgrade To be updated
Initialize System To be updated
With New Release For a general upgrading of the software.
With Old Release For a software refresh
In Service Upgrade Allows to manage the in-service upgrading
Upgrade Status For retrieving the status of the ongoing upgrade
procedure
Software Information Displays the current Network Element Software
information
Start Upgrade For preparing the system for activation of the new
release.
Stop Upgrade For altering the in-service upgrade procedure and reverts
the system to the state before the Start Upgrade option
was issued.
Remove Old Upgrade For making the current release software as permanent
active software.
DataBase Allows Database management

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 87
Menu description 1850 TSS-5C

Menus Description
Perform DB Backup Backs up the primary backup data base to the secondary
backup data base
Cancel DB Backup Cancels (aborts) a database backup currently in progress
Restore DB Copies the backup database stored on secondary backup
database to the primary backup database and resets the
system to activate the new database.
DB Information Reads the database label of the selected backup
database stored on the NE.
Remote File For Data Base Remote File Server management
Perform Copy Copies secondary backup database on the NE from/to
specified locations on a Remote File Server (RFS).
Cancel Copy Copies secondary backup database on the NE from/to
specified locations on a Remote File Server (RFS).
File Information Copies secondary backup database on the NE from/to
specified locations on a Remote File Server (RFS).
Network Element For retrieving general system level configuration
information consisting of: system type, software release
identifier, software release date, matrix size, system
restart status
Set Site Identifier For setting the Site Identifier (SID) code that is compared
to any Target Identifier (TID) value entered in a text field
Lac Specifies that only a manager at time can manage NE
with provisioning rights.
State To be updated
Default To be updated
Manager List Identifies the registration of TMN Upper Manager,
controlling NE
PM Global File Specifies the performance monitoring global file status
Network Time Protocol To be updated
Differential time frequency To be updated
Power Source Management To be updated

2.11.10 Security
Security - Contains menu item and submenu for all users and for administrator users.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
88 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The following table describes the sub-menu options:

Menus Description
User Account To be updated
Change Password Activates the "Change Password" page
Information Activates the "Account Information" page
Administration Specifies the administration of the users
Accounts To be updated
Create an Account To create a new user account
Change an Account To change an existing account
Global Settings Displays the default settings
Default Settings Displays the default settings
Current Sessions Displays the summary of the current sessions
Commands Privileges Displays the list of TL1 commands
MAC/IP Access Control List To be updated
IP ACL on CPU Port To be updated

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 89
Menu description 1850 TSS-5C

Menus Description
SSH/SSL Managementt To be updated
SSH NE Key Management To be updated
Import SSH Public Key To be updated
SSL NE Key Management To be updated
SSL Cert Signing Request (CSR) To be updated
Import SSL Certificate To be updated
SSL Certificate Installation To be updated
Copy Security Remote File To be updated
Management RADIUS To be updated
Configure RADIUS To be updated
Configure Authority To be updated
PNAC Management To be updated
Enable PNAC To be updated
PNAC per port To be updated
Authentication Server Configuration To be updated
Authentication Type To be updated
Authentication Configuration To be updated
Network Element Logs Displays the Audit Log attributes
Log settings Displays the Log Attributes panel to modify the Log
attributes.
IP Message settings Displays the IP Message settings.
Logout Allows to exit the session

2.11.11 Tools
Tools - It opens a Telnet console for TL1 commands

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
90 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Menu description

The following table describes the sub-menu options:

Menus Description
TL1 Console Opens the Telnet console
NE TL1 Param Displays the NE TL1 Parameters

2.11.12 Help
Help - Allows the operator to obtain information about the application.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 91
Menu description 1850 TSS-5C

The following table describes the sub-menu options:

Menus Description
About To be updated
NE TL1 Syntax To be updated

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
92 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Provisioning: Detailed Level Procedures

3 Provisioning: Detailed Level Procedures

3.1 Overview

3.1.1 Purpose
Provides an overview of the detailed level procedures documented in this chapter.

3.1.2 Contents

3.1 Overview 93
Provisioning via ZIC 97
3.2 Accessing ZIC 97
3.3 Log into the system 100
3.4 Log out of the system 101
3.5 Change user password 103
3.6 Change site identifier 104
3.7 Create user account 105
3.8 Change user account 107
3.9 Initialize and Upgrade with a new release 114
3.10 Administer In-Service upgrade 118
3.11 Database Management 119
3.12 Create a MAC/IP ACL 124
3.13 Create an access control element (ACE) 126
3.14 Create IPv4 Access Control Element (ACE) 130
3.15 Create IPv6 Access Control Element (ACE) 134
3.16 Configure Management RADIUS 137
3.17 Configure management radius authority 138
3.18 DB management remote file copy 139
3.19 Administer MAC File Collection 140
3.20 Administer Network Element 141
3.21 Administer LAC Management 142
3.22 Retrieve the Manager List 144

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 93
Overview 1850 TSS-5C

3.23 Administer Proactive Tool Delay Measurement 145


3.24 Create Synthetic Loss Measurement 147
3.25 Administer PM Global File 149
3.26 Administer SSH and SSL 152
3.27 Administer Network time protocol 162
3.28 Set the differential time frequency 166
3.29 Set IP ACL 166
3.30 Retrieve Audit log 170
3.31 Log Settings 171
3.32 Administer IP message settings 172
3.33 Administer Tunnel Protection Switching (1:1) 173
3.34 Create LAG 174
3.35 Accessing the node 182
3.36 Provisioning a Shelf 183
3.37 Port configuration 191
3.38 Create Traffic Descriptor (Data) 215
3.39 Create queue management 218
3.40 Modify queue profile 221
3.41 Create color profile 223
3.42 Create maintenance domain 224
3.43 Modify maintenance domain 226
3.44 Create maintenance association 226
3.45 Modify maintenance association 229
3.46 Create MEP 230
3.47 Configure EFM tool 234
3.48 Configure On-Demand Delay Measurement 238
3.49 Configure Alarm Indication Signal (AIS) 241
3.50 Configure PM Threshold 243
3.51 Create 1:1 tunnel protection 248
3.52 Configure the IP address 256
3.53 Configure LAN Management 258

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
94 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Overview

3.54 Enable Auto DCN 263


3.55 Manage OSPF 268
3.56 Retrieve Network Service Access Point (NSAP) 275
3.57 Create IP routing 276
3.58 Configure OSI Network Element area 279
3.59 Configure Upper Layers Common report 280
3.60 Manage a port 281
(T)MPLS Management 284
3.61 Overview 284
3.62 Create L2 encapsulation profile 284
3.63 Create PHB profile 288
3.64 Create OAM PHB profile 291
3.65 Create MPLS-TP Ring Protection 294
3.66 TMPLS/MPLS-TP DM management 296
3.67 TMPLS Loopback tool management 298
3.68 MPLS-TP MIP discovery 301
3.69 Retrieve queue profile management 303
3.70 Administer TMPLS/MPLS Delay Measurement 305
3.71 Administer MAC Flooding Threshold 309
Tunnel management procedures 310
3.72 Overview 310
3.73 Create head/tail tunnel 310
3.74 Create transit tunnel 319
3.75 Modify Tunnel 322
3.76 Pseudowire management 346
3.77 Modify Pseudowire 348
3.78 Create head/tail pseudowire 358
3.79 Create transit pseudowire 360
Ethernet services 364
3.80 Overview 364
3.81 Create EVPL service 365

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 95
Overview 1850 TSS-5C

3.82 Create EVPLAN service 372


3.83 Create an E-LAN Service 376
3.84 Create VLAN 379
3.85 Administer Static Filtering 382
3.86 Create Storm Control profile 384
3.87 Create Packet Filtering profile 394
3.88 Manage TDM ASAP 403
3.89 Create Generic TDM Parameters 407
3.90 Create CES Pseudowire Management 410
3.91 Alarms menu 411
3.92 Alarm Management 421
3.93 Manage TDM TCA profile 424
Synchronization 427
3.94 Synchronize Ethernet: Clock Management 427
3.95 Outgoing SSM Management 433
3.96 Administer 1588 PTP clock mode 435
PNAC Management 451
3.97 PNAC Management 451

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
96 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Accessing ZIC

Provisioning via ZIC

3.2 Accessing ZIC


3.2.1 Start-up of the craft terminal application
After Login to the windows XP operating system, the desktop is presented to the operator. In order
to activate the ZIC software product the operator has to perform the following sequence, in case of
unsuccessful connection attempt.

1
Double-click on the browser icon (e.g., Internet Explorer) on the desktop.

2
The browser opens its main page as shown in Figure 47, “Blank browser (example)” (p. 97).

Figure 47 Blank browser (example)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 97
Accessing ZIC 1850 TSS-5C

3
Enter the IP address of the shelf in the Address field (in the example 151.98.152.196) and
press the "Enter" key and the "Authentication dialog box" as shown in Figure 48,
“Authentication dialog box” (p. 97).

Figure 48 Authentication dialog box

The Authentication dialog box contains the following fields:


• User Identifier - Specifies a unique user ID. According to the specification. It is a sequence
from 5 to 12 case-sensitive alphanumeric characters, where the first character must always
be an alphabetic character. The following special characters are also accepted as valid
characters and will be part of the User Identifier: % (percent sign), + (plus sign), # (pound
sign), and _ (under score).
• Password - Specifies the user's login password. According to the specification, it is a
sequence from 8 to 12 case-sensitive alphanumeric characters. The Password must contain
at least 1 upper alphabetic character, at least 1 lower alphabetic character and at least 1
numeric character. The following special characters are also accepted as valid characters
and can be part of the Password: % (percent sign), + (plus sign), # (pound sign), and _
(under score). The first character of the Password can be an alphabetic, numeric, or a valid
special character.
• Local Time - If not checked, the value of time field (Raise/Clear Time) in Alarm and Condition
tables is displayed as is. Else, if checked, the time value increased/decreased according to
the difference between user PC local time and Network Element time.
Note: Network Element timezone need to be set to UTC+0.
• Language - This is one of the available languages of the manager.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
98 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Accessing ZIC

4
In the Authentication Dialog box, enter your Login and Password.

Note: The entry boxes are case sensitive.


The default Login and Password are the following:
Profile Description
Default User Id UID admin
Default Password Identifier XXXXXXXX
Default User Security Privileges • CONF (Configuration)
• NETADMIN (Network Administration)
• SEC (Security)
• PROV (Provisioning)
• READ (Reading)
• DEBUG (Debugging)
• NOTMOUT (No Inactivity Timeout)
As shown in Figure 49, “Details of the authentication dialog box” (p. 99)

Figure 49 Details of the authentication dialog box

5
Click the Login button or Enter key and a warning message. The ZIC application launches as
shown in Figure 50, “ZIC browser start (example)” (p. 100) loading the NE information.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 99
Log into the system 1850 TSS-5C

Figure 50 ZIC browser start (example)

Starting from left to right, the Page header presents the company logo, the equipment
description, the user ID and the Logout hyperlink which allows to close the session.

END OF STEPS

3.3 Log into the system


3.3.1 Purpose
This procedure provides the steps to establish a session with the Network Element (NE) via Zero
Installation Craft (ZIC) terminal and to log in a specific user to 1850 Transport Service Switch (TSS-
5C).

3.3.2 Before you begin


The User Identifier (UID) and current Password Identifier (PWD) must be known before login to the
system.

3.3.3 General

1
To login to the ZIC application, open the web browser (For example, Internet Explorer), enter
the IP address of the Network Element (NE) in the address bar as shown in Figure 51, “Login
window” (p. 101).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
100 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Log out of the system

Figure 51 Login window

2
Enter the User Identifier and Password in the respective entry boxes, set the Language from
the drop-down list box. The default is English.

3
Enable the Local Time check box for the network element to display the local time.

4
Click Login command button to log into the system, the browser starts loading the ZIC
application.

5
After the maximum number of attempts the user is disabled. Check parameters for spelling and
case-sensitive characters. Go to Step 2 to re-login to the system.

END OF STEPS

3.4 Log out of the system


3.4.1 Purpose
Use this procedure to terminate a ZIC session with the Network Element (NE) and to logout a
specific user.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 101
Log out of the system 1850 TSS-5C

3.4.2 General

1
To logout from the ZIC application, click the Logout hyperlink displayed in the top right corner of
the ZIC application as shown in Figure 52, “ZIC application window ” (p. 101) .

Figure 52 ZIC application window

2
The Logout hyperlink displays the logout panel as shown in Figure 53, “Logout panel” (p. 102) .

Figure 53 Logout panel

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
102 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Change user password

3
Enter the user identifier in the entry box or click Default hyperlink if login as default user.

4
Click Yes to finally logout of the ZIC application.

END OF STEPS

3.5 Change user password


3.5.1 Purpose
Use this procedure to change the user login password details.

3.5.2 Before you begin


Before you begin, the old and the new user password must be known.

A password is case-sensitive and should be 8 to 12 alphanumeric characters with at least four of


the following types:
• At least one character in upper-case
• At least one character in lower-case
• At least one character should be alphanumeric
• At least one character should be a special character. The following special characters are valid:
− % (percent sign)
− + (plus sign)
− # (pound sign)
− _ (underscore sign)

3.5.3 General

1
To change the user password, Select Security -> User Account -> Change Password option
from the menu bar.

2
The Change password menu option displays the Modify Password Identifier panel.

3
The User Identifier and Old Password ID entry boxes displays the UID and PID with which
the user has logged in.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 103
Change site identifier 1850 TSS-5C

4
Enter the new password in the New Password ID entry box. Enter the exactly same password
in the Confirm New Password ID entry box.

Note: The string entered in the New Password ID and Confirm New Password ID entry
boxes should be identical.

5
Click Save to set the newly entered password.

6
The system generates an error message if the newly entered password is violating the
password naming convention. Go to Step 4 to re-enter the correct string.

END OF STEPS

3.6 Change site identifier


3.6.1 Purpose
Use this procedure to change the unique identifier for the NE.

3.6.2 Overview
The site identifier appears on the top left corner of the tree-area and is used as a target while
addressing the Network Element (NE). To retrieve and change the site identifier through TL1, refer
to the 1850 Transport Service Switch (TSS-5C) TL1 User Provisioning Guide.

1
To set the site identifier, select System Management -> DB Management -> Set Site
Identifier option from the menu bar. The ZIC application displays the Set Site Identifier panel
as shown in Figure 54, “Set Site Identifier” (p. 103) .

Figure 54 Set Site Identifier

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
104 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create user account

2
The Set Site Identifier panel displays the following parameters:
• Old Site Identifier-Specifies the old site identifier of the NE
• New Site Identifier-Specifies the new site identifier for the NE

3
Click Double Quotes hyperlink to insert double quotes for the new site identifier.

4
Click Save to save the newly created identifier.

END OF STEPS

3.7 Create user account


3.7.1 Steps

1
To create a user account, select Security -> Administration -> Accounts ->Create Account
to display the User Account screen as shown in Figure 55, “Create user account” (p. 104).

Figure 55 Create user account

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 105
Create user account 1850 TSS-5C

2
Specify the User Account parameters as described in Table 8, “Create user account
parameters” (p. 105)

Table 8 Create user account parameters

Parameter Description
User Identifier Specifies the User name.
Password Identifier Specifies the Password Identifier.
Confirm Password Identifier Confirms the Password Identifier
Password Duration [day] Specifies the duration of applicability of the
password in days. The supported value range is
0 to 999. The default value is 30 days.
Warning on Password Duration [day] Provides the duration for the applicability of the
password in days. The supported value range is
0 to 999. The default value is 7.
Access after Password Duration Specifies the duration after password duration is
complete. The supported value range is 0 to 999.
The default value is 3.
Password Obsolescence Interval [day] Specifies the Password obsolescence interval in
seconds. The supported value range is 0 to 999.
The default value is 3 days.
User Id Duration [day] Specifies the applicability Duration for the User Id
in days. The supported value range is 0 to 999.
The default value is 60 days.
SNMPv3 Privacy Protocol Specifies security for private messages.
The supported values are:
• NOPRIV
• CBCDES
• AES
SNMPv3 Authorization Protocol Specifies security for authentication messages
The supported values are:
• NOAUTH
• HMACMD5

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
106 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Change user account

Table 8 Create user account parameters (continued)

Parameter Description
Available User Access Privileges Provides the available user access privileges.
The supported values are:
• Configure (CONF)
• Network Administrator (NETADMIN)
• Provision (PROV)
• Read-Only (READ)
• Security Administrator (SEC)
• Test (DEBUG)
• No inactivity timeout (NOTMOUT)
User Access Privileges Specifies the assigned User access privileges.
The default value is Read-Only (READ).

3
Click Default to select the default value against each field where the default option is permitted.

4
Click the Disable link for the field to reset the value to 0.

5
While assigning User privileges, click to select the user privilege in the Available User Access
Privileges field and click to assign the user access privilege to the defined user. To remove
the permissions for a user, select the mapped User Access Privilege and click

6
Click Default to select the default user access privilege.

7
Click Save to save the user privileges.

END OF STEPS

3.8 Change user account


3.8.1 Purpose
Use this procedure to change user account.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 107
Change user account 1850 TSS-5C

1
To change a user account, select Security -> Administration -> Accounts->Change Account
to display the User Account screen as shown in Figure 56, “Change user account” (p. 107).

Figure 56 Change user account

2
For details on the user account parameters, please refer Table 8, “Create user account
parameters” (p. 106)

END OF STEPS

3.8.2 Modify user account parameters

1
Navigate to the change user account screen and click Modify Account. The Modify User
Account screen is displayed as shown in Figure 57, “Modify user account” (p. 109).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
108 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Change user account

Figure 57 Modify user account

2
Modify the parameters as described in Table 9, “Modify user account parameters” (p. 109)

Table 9 Modify user account parameters

Parameter Description
User Identifier Specifies the User name.
New User Identifier Specifies the new user name.
New Password Identifier Specifies the new password identifier.
Confirm Password Identifier Confirms the password identifier
Password Duration [day] Specifies the duration of applicability of the
password in days. The supported value range is 0 to
999. The default value is 0.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 109
Change user account 1850 TSS-5C

Table 9 Modify user account parameters (continued)

Parameter Description
Warning on Password Duration [day] Provides the duration for the applicability of the
password in days. The supported value range is 0 to
999. The default value is 0.
Access after Password Duration Specifies the duration after password duration is
complete. The supported value range is 0 to 999.
The default value is 0.
Password Obsolescence Interval Specifies the Password obsolescence interval in
[day] seconds. The supported value range is 0 to 999. The
default value is 0.
User Id Duration [day] Specifies the applicability Duration for the User Id in
days. The supported value range is 0 to 999. The
default value is 60 days.
SNMPv3 Privacy Protocol Specifies security for private messages.
The supported values are:
• NOPRIV
• CBCDES
• AES
SNMPv3 Authorization Protocol Specifies security for authentication messages
The supported values are:
• NOAUTH
• HMACMD5
Password Expiration date and time Specifies the date and time of password expiry.
Last Login Time Stamp Indicates the time stamp for the last login.
Note:Non-editable field.
User State Indicates whether the state of the User is Active or
Inactive.
Note:Non-editable field.
Login Fail Number Specifies the number of failed login attempts.
Note:Non-editable field.
Keep Alive Message Interval [min] Indicates the duration in minutes for the message
interval.
Note:Non-editable field.
Minimum Interval between invalid Indicates the interval span between invalid attempts.
attempts [sec] Note:Non-editable field.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
110 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Change user account

Table 9 Modify user account parameters (continued)

Parameter Description
Maximum Invalid Attempts Indicates the number of invalid attempts.
Note:Non-editable field.
User Session Inactivity Timeout Indicates the user activity timeout duration.
[min] Note:Non-editable field.
Available User Access Privileges Provides the available user access privileges.
The supported values are:
• Configure (CONF)
• Network Administrator (NETADMIN)
• Provision (PROV)
• Read-Only (READ)
• Security Administrator (SEC)
• Test (DEBUG)
• No inactivity timeout (NOTMOUT)
User Access Privileges Specifies the assigned User access privileges. The
default value is Read-Only (READ).

3
While modifying User privileges, click to select the user privilege in the Available User Access
Privileges field and click to assign the user access privilege to the defined user. To remove
the permissions for a user, select the mapped User Access Privilege and click

4
Click Save to save the modifications.

5
Click Inhibit to restrain the current User account settings, confirm by clicking Yes in the dialog
displayed as shown in Figure 58, “Inhibit user permissions” (p. 112)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 111
Change user account 1850 TSS-5C

Figure 58 Inhibit user permissions

6
Click Allow to proceed with the assigned User permissions and click Yes in the dialog
displayed as shown in Figure 59, “Allow User permissions” (p. 112)

Figure 59 Allow User permissions

7
Click Cancel to cancel the modifications and return to the previous screen.

8
Click Delete to undo the changes and remove the user account. The account can also be
deleted via the User Information settings screen.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
112 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Change user account

3.8.3 Modify account default settings

1
To create a user account, select Security -> Administration -> Accounts->Global Settings to
display the Account Default Settings screen as shown in Figure 60, “Modify Account Default
Settings” (p. 112).

Figure 60 Modify Account Default Settings

2
Click with each field to modify the account default settings. Click the Default link provided for
the field to revert to the system defined default value.

3
Click Save to save the updates to the account default settings.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 113
Initialize and Upgrade with a new release 1850 TSS-5C

3.9 Initialize and Upgrade with a new release


3.9.1 Overview
This option starts the background activity on the NE to perform the actual switch over from the
current release to the new release. This option returns a completion message to the user when the
background activity is successfully started.

Note: Migration of all Hardware and Software is supported with a traffic hit of 5 minutes with
an objective of 2 minutes.
In case of configuration using FX interface at slot 4, around 90 seconds of traffic hit occurs
during warm reboot.
In case of configuration using LAG, around 1 second of traffic hit occurs during warm reboot.
In case configuration using R2O2E (Microwave card), 3 to 7 minutes of traffic hit occurs during
warm reboot and in other configurations hitless warm restart occurs within 50 milli seconds.

3.9.2 Steps

1
Select System Management -> Initialize and Upgrade -> Initialize System -> With New
Release as shown in Figure 61, “Initialize and Upgrade with a new release” (p. 113).

Figure 61 Initialize and Upgrade with a new release

2
The Initialize System tab displays the Initialize System panel that shows the Apply hyperlink
that is used to start the new release downloading procedure.

Note: Note: If the IS-IS is provisioned using the following steps for all NEs, In Band
Management over IS-IS will work well after upgrade:
• Upgrade the Software
• Enable PPPoE on the NNI1 for CPE2 via IBM3. Enable PPPoE on the NNI1 for CPE3
via IBM
Note:When this step is complete all In Band Management traffic will be operationally
down.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
114 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Initialize and Upgrade with a new release

• Ensure that the PC is connected to CPE1 out band interface, and the PC gateway is
CPE1 out band IP.
• Enable IS-IS protocol on the out band and NNI1 for CPE1, so that CPE2 can be
managed with the in band IP.
• Enable the IS-IS protocol on the NNI2 for CPE2, so that CPE3 can be managed with
the in band IP

END OF STEPS

3.9.3 Retrieving current sessions

1
Select Security -> Administration -> Current Session as shown in Figure 62, “Retrieve the
current sessions” (p. 114).

Figure 62 Retrieve the current sessions

2
The page displays a table with information about current session.

The columns of the table are:


• Action - Contains the Log Off User hyperlink which allows to close the session
• User Identifier - Specifies a unique user ID (example: admin)
• Session - Specifies by a unique identifier allocated to a client connection that distinguishes
that connection from other connections in the system
• Address - Specifies the address where the user is connecting from. It is the port/IP address
that is being used for access.
• Last login timestamp - Specifies by a quoted string the last recorded Login time of a user.
This time is displayed every time a user logs in

3
Click Refresh to refresh the page.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 115
Initialize and Upgrade with a new release 1850 TSS-5C

3.9.4 Administering Command Privileges

1
Select Security -> Administration -> Command Privileges as shown in Figure 63,
“Command Privileges” (p. 115).

Figure 63 Command Privileges

The page the command security privileges assigned to the specified TL1 command. The
columns of the table are :
• Action - contains the hyperlinks in order to modify the security privilege. The manager
actions related to these hyperlinks are:
− The Modify hyperlink activates the following Modify Command Access Privileges page.
• Command Identifier - Specifies the TL1 command code. The value for the parameter can be
any one of the TL1 command codes, in upper or lower case excluding the following TL1
command codes (that is the commands for factory default):
− ALW-USER-SECU - Allows to reinstate users, so the user can again establish a session
with the system

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
116 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Initialize and Upgrade with a new release

− ACT-USER - Authenticates a session established with the system by logging in an


existing user through a User Identifier and a Password Identifier
− CANC-USER - Unauthenticates a session with the addressed NE (identified by optional
TID parameter)., whether or not that session was previously authenticated by an ACT-
USER command, by logging off the user
− CANC-USER-SECU - Unauthenticates a session with the addressed NE (identified by
optional TID parameter)., whether or not that session was previously authenticated by an
ACT-USER command, by logging off the specified user
− DLT-USER-SECU - Deletes user profiles in the User Security Database, for the specified
User Identifier (UID)
− ED-CMD-SECU - This is used by an user with security administrator privileges to change
the command access security level (CAP - Command Access Privilege) assigned to a TL1
command
− ED-USER-SECU - This is used by a user with security administrator privileges to edit the
existing user profile entry, identified by the User Identifier (UID), in the User Security
Database
− ENT-USER-SECU - This is used to create a new user profile in the User Security
Database
− INH-USER-SECU - Allows a user with security administrator privileges to inhibit (that is,
disable) existing users (without deleting the user account), so the users can be denied to
get an authorized session with the system (that is, the inhibited users cannot log on).
• Command Access Privilege - Allows to chose the User access privilege(s) granted to the
user

3
Click Modify to modify the command privileges and click Save to save the modification as
shown in

Figure 64 Modify Command Access Privileges

4
Click Cancel to return to the previous screen without saving.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 117
Administer In-Service upgrade 1850 TSS-5C

3.10 Administer In-Service upgrade


3.10.1 Steps

1
Select System Management -> Initialize and Upgrade -> In-Service Upgrade -> Upgrade
Status menu as shown in Figure 65, “In-Service Upgrade Status” (p. 117).

Figure 65 In-Service Upgrade Status

The In-Service Upgrade Status tab displays status of the in-service upgrade. The status are:
• Initialize New Completed (INITNC) - Indicates the INIT-SYS-NEW system initialization
process completed successfully and the system is restarted on the new release
• Initialize New In Progress (INITNIP) - Indicates the INIT-SYS-NEW system initialization
process is in progress
• Initialize Old Completed (INITOC) - Indicates the INIT-SYS-OLD system initialization
process completed successfully and the system is restarted on the previous release
• Initialize Old In Progress (INITOIP) - Indicates the INIT-SYS-OLD system initialization
process is in progress
• No Status In Progress (NOSTAIP) - Indicates that no generic in-service upgrade procedure
is in progress or has been attempted
• Status Completed (STAC) - Indicates that the STA-ISU command completed successfully
and is awaiting the issuance of the INIT-SYS-NEW command
• Status In Progress (STAIP) - Indicates that an in-service upgrade procedure is in progress
• Stop Completed (STPC) - Indicates that the STP-ISU command completed successfully

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
118 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Database Management

3.10.2 Start In-Service upgrade


The system performs a series of consistency checks on the actual configuration to make sure that
the system is in a state that can successfully be upgraded to the new release. During command
execution, the system remains in-service and continues to provide protection switching and alarm
reporting functionality on the current release. To assure that the consistency checks are done on a
consistent NE database, TL1 commands that would alter the NE configuration are rejected during
the ongoing consistency checks.

1
Select System Management -> Initialize and Upgrade -> In-Service Upgrade -> Start
Upgrade.

2
The In-Service Upgrade tab displays the Start In-Service Upgrade panel that shows the
status of the in-service upgrade.

3
Click Apply to initiate the In-Service upgrade.

END OF STEPS

3.10.3 Stop In-service upgrade


Use this service to halt/stop the in-service upgrade procedure and reverts the system to the state
before the Start Upgrade command was issued. The downloaded new release software is removed
from the NE.

1
Select System Management -> Initialize and Upgrade -> In-Service Upgrade -> Stop
Upgrade. The status of the in-service upgrade is displayed.

2
Click Apply to stop the In-Service upgrade.

END OF STEPS

3.11 Database Management


3.11.1 Overview
An NE maintains all its configuration in a volatile memory database. Non-volatile disk backup
databases are maintained implicitly by the NE, and explicitly by operator commands. The NE is able
to restore its memory database from the contents of a disk backup database at restart time or
triggered by an operator command.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 119
Database Management 1850 TSS-5C

The NE provides mechanisms to transfer a locally stored disk database backup to an RFS and vice
versa.
The NE allows operator to reset its memory and primary backup database to a factory installed
default configuration.
The volatile memory database is maintained by the NE and reflects the NE configuration, its alarm
states and conditions. Two non-volatile disk database types exist for the NE: the primary backup
database and the secondary backup data base.
The primary backup database is maintained implicitly by the NE during its normal operation. At any
time, it reflects the state of the NE's volatile memory database. Updating the primary backup
database occurs online without interrupting the NE's normal service operation.

3.11.2 Perform DB backup


This option backs up the whole NE provisioning and configuration database, excluding
Performance Monitoring History Data, current alarm situation, and event log data; in addition to the
database, also writes the system type, the software release identifier, the site identifier, the backup
date and time stamp to the secondary backup database. The system also writes a CRC (Cyclic
Redundancy Check) to the secondary backup database.

1
Select System Management -> DB Management -> Data Base -> Perform DB Backup.

Figure 66 Perform DB Backup

2
Click Yes to confirm. The DB backup is completed and the system displays a completion
message as shown in Figure 67, “Perform DB backup complete” (p. 121)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
120 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Database Management

Figure 67 Perform DB backup complete

END OF STEPS

3.11.3 Cancel DB Backup


If an in-progress database backup is canceled, a message indicates the cancellation is generated
for this action and the system may mark via the database header the backed-up data on the
secondary backup database as "invalid" (depending on the timing of the cancellation) so that it
cannot be inadvertently used for a subsequent database restoration or remote database backup.

1
Select System Management -> DB Management -> Data Base -> Cancel DB Backup as
shown in Figure 68, “Cancel DB Backup” (p. 121).

Figure 68 Cancel DB Backup

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 121
Database Management 1850 TSS-5C

2
Click Yes to confirm cancellation.

END OF STEPS

3.11.4 Restore DB
The database restoration operation verifies the System Type, software release identifier, the date
and time of the backup creation, and Site ID (SID) of the system against the corresponding data
stored along with the secondary backup database. A database restoration with a System Type
mismatch cannot be performed. A database restoration with a software release identifier or SID
mismatch cannot be performed unless the command mode parameter is set to FRCD. A database
restoration with backup creation date and time different from the most recent backup created on the
system cannot be performed unless the command mode parameter is set to FRCD.

1
Select System Management -> DB Management -> Data Base -> Restore DB as shown in
Figure 69, “Restore DB” (p. 121).

Figure 69 Restore DB

2
Select the Command mode and click Apply to restore the Database configuration.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
122 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Database Management

Table 10 Restore DB parameters

Parameter Description
Command Mode Assigns the command mode of the action.
The supported values are:
• Forced - The database restoration operation is
performed regardless both the BACKUP-DATE,
BACKUP-TIME indicated for the secondary backup
database is older/prior to the BACKUP-DATE,
BACKUP-TIME on the system (represented in label of
the Active Local Primary Hard disk Database) and the
SID indicated on the STBY DB does not match the
SID of the system.
The software release identifier indicated for the
secondary backup database does not match the
software release identifier indicated for the system.
• Normal - The command is denied if there is a
mismatch between the SID, the software release
identifier, system type or the backup time stamp of the
system and the information stored in the secondary
backup database.

END OF STEPS

3.11.5 DB information

1
Select System Management -> DB Management -> Data Base -> DB Information as shown
in Figure 70, “DB Information” (p. 123).

Figure 70 DB Information

2
The Database tab displays the Database Label panel that contains:

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 123
Create a MAC/IP ACL 1850 TSS-5C

• Access Identifier - It allows to identify the database. The values are:


− Primary backup database (ACTDSKDB)
− Secondary backup database (STDBYDB)

3
Click Default to set the Primary backup database (ACTDSKDB).

4
Click Retrieve to recover the information about the selection made by Access Identifier.

Table 11 System DB backup Information parameters

Parameter Description
Access Identifier Identifies the database. The values are: Primary
backup database (ACTDSKDB) or Secondary
backup database (STDBYDB)
System type Identifies the system software for the database at the
specified location or the equipment label.
Release Identification Identifies the release ID of the system after the
database restore command is completed, i.e. the
equipment release.
Site Identifier Indicates the SID of the system as provisioned.
Backup Date For Primary backup database, identifies the date when
the backup was created. For Secondary backup
database, identifies the date when the last backup was
created. The date is in the format of <YYYY>-<MM>-
<DD>
Backup Time For Primary backup database, identifies the date when
the backup was created. For Secondary backup
database, identifies the date when the last backup was
created. The date is in the format of <HH>-<MM>-<SS>
Cyclic Redundancy Check Indicates the 8-digit hexadecimal value of the 32-bit
Cyclic Redundancy Check stored on the backup media

END OF STEPS

3.12 Create a MAC/IP ACL


3.12.1 Purpose
Use this procedure to create a MAC ACL.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
124 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create a MAC/IP ACL

1
Select Security -> Administration->MAC/ IP Access Control List from the menu bar as
shown in Figure 71, “MAC Access Control List Management” (p. 124).

Figure 71 MAC Access Control List Management

2
Click Create to create a MAC /IP Access Control List. The MAC ACL creation screen is
displayed as shown in Figure 72, “Create a MAC Access Control list” (p. 125).

Figure 72 Create a MAC Access Control list

3
Enter the MAC/IP and ACL name in the field provided and Click Save. To Cancel the MAC/IP
ACL creation, Click Cancel.

4
The MAC ACL is created.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 125
Create an access control element (ACE) 1850 TSS-5C

3.12.2 Modify or Delete a MAC Access Control List

1
To modify a MAC ACL, Select the ACL to be modified as shown in Figure 73, “Modify a MAC
Access Control List” (p. 125)

Figure 73 Modify a MAC Access Control List

2
In the section under MAC/IP Access Control List Management specify the unique name and
Select True under apply change. Click Save. A pop-up dialog box is displayed requesting to
apply the changes to the MAC ACL name. Click Yes to apply the changes.

3
Click Save in the MAC/IP ACL Management screen to save the modifications.

4
To Delete a MAC/IP ACL, Select ACL to be deleted and click Delete.

5
Click Yes in the pop-up to confirm deletion.

END OF STEPS

3.13 Create an access control element (ACE)


3.13.1 Purpose
Use this procedure to create an ACE.

An ACE cannot be modified when the ACL is associated with a port. An Operator is not allowed/
permitted to configure the order (rank) for an Access Control Element. The order of Access Control
Element in an Access Control List is automatically assigned by NE, it depends on ACE type and
operation order. To create an ACE with classifier destination MAC and action permit:

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
126 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create an access control element (ACE)

Select Security -> Administration > MAC/IP Access Control List. The screen is refreshed to
display the MAC Access Control Element Management screen. An ACE can be created for a
created MAC ACL. Click editACE under Apply changes to create the MAC ACE. The screen is
refreshed to display the ACE screen. Click Create to create the MAC ACE. In the order of
execution within the ACL as shown in Figure 74, “Create MAC ACE” (p. 126), enter the Order
number for the ACE and click Send. The screen is refreshed to display the MAC ACL
Management parameters as shown in Figure 77, “MAC ACE with action Deny” (p. 129)

Figure 74 Create MAC ACE

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 127
Create an access control element (ACE) 1850 TSS-5C

Figure 75 New access control list

Click Cancel to return to the previous screen without saving.


Click Save to save the changes.

Figure 76 MAC ACE with action Permit

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
128 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create an access control element (ACE)

Figure 77 MAC ACE with action Deny

Use the following parameters to configure MAC ACE:

Table 12 Create MAC ACE parameters

Parameter Description
User Label Is the system generated User Label for the MAC ACE.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
Status Indicates if the ACE is in service.
The supported parameters are:
• active: indicates that the MAC ACE is active.
• notInService: indicates that the MAC ACE is not
active.
The default value isnotInService.
MAC Source Specifies the Valid 48 bit MAC address.
MAC Destination Specifies the Valid 48 bit MAC address.
Ethernet Type Indicates the valid ethertype address.
Ethernet Type Bit Mask Indicates the valid Ethernet Type Bit Mask address.
Ace order Indicates the priority for the ACE.
MAC source MASK Indicates the source mask value of the ACE.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 129
Create IPv4 Access Control Element (ACE) 1850 TSS-5C

Table 12 Create MAC ACE parameters (continued)

Parameter Description
MAC destination MASK Indicates the destination mask for the ACE.
VID Indicates the VLAN Id of the ACE
VID bitmask Indicates the valid VLAN ID bitmask.

2
Click Save to save the ACE or Click Save&Exit to save the ACE created and exit from the
screen. Click Cancel to return to the previous screen without saving.

END OF STEPS

3.14 Create IPv4 Access Control Element (ACE)


3.14.1 Purpose
Use this procedure to create IPv4 Access Control Element.

1
Select Security->Adminsitration->MAC/IP Access Control List from the menu bar. The
Access Control List Management screen is displayed as shown in Figure 78, “Access control
list management” (p. 130)

Figure 78 Access control list management

2
Click on Configure from ACE the Access Control Element Management screen is shown in
Figure 79, “Access Control Element Management ” (p. 131)and then select CreateIPv4
hyperlink to configure a new IPv4 ACE as shown in Figure 80, “Create an IPv4 ACE” (p. 131)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
130 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create IPv4 Access Control Element (ACE)

Figure 79 Access Control Element Management

Figure 80 Create an IPv4 ACE

3
Use the following parameters to Create an IPv4 ACE as shown in Table 13, “IPv4 ace
parameters” (p. 132).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 131
Create IPv4 Access Control Element (ACE) 1850 TSS-5C

Table 13 IPv4 ace parameters

Parameters Description
User Label Is the system generated User Label for the MAC
ACE.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
State Indicates if the ACE is in service.
The supported parameters are:
• active: indicates that the MAC ACE is active.
• notInService: indicates that the MAC ACE is not
active.
The default value isnotInService.
IPv4 SA Specifies the source IP address. The default value is
0 for the four hexadecimal octet format.
IPv4 SA Mask Specifies the source IP address mask. The default
value is 1 for the four hexadecimal octet format.
IPv4 DA Specifies the destination IP address. The default
value is 0 for the four hexadecimal octet format.
IPv4 DA Mask Specifies the destination IP address mask. The
default value is 1 for the four hexadecimal octet
format.
Protocol ID Indicates the value of the protocol identifier. The
default value is 256.
The protocol identifier options are:
• ICMP- Internet Control Message Protocol for IPv6
• IP- IP over IP encapsulation
• TCP- Transmission Control Protocol
• UDP- User Datagram Protocol
• IGP- Interior Gateway Protocol
• GRE- Generic Routing Encapsulation
The default value 256 is used to indicate Any
protocol. When the option Any Protocol is set to N,
the operator must insert a possible value into [0-255]
directly.
Note: ICMP is valid only for IPv4 and not ICMPv6.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
132 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create IPv4 Access Control Element (ACE)

Table 13 IPv4 ace parameters (continued)

Parameters Description
TCP Source Port Specifies the source TCP port. The values range
from [0-65537], the default value is 65537 (i.e., Don’t
care).
TCP Max Source Port Specifies the maximum source TCP port. The
possible values range from [0-65535], the default
value is zero.
TCP Destination Port Specifies the destination source TCP port. The
possible values range from [0-65537], the default
value is 65537 (i.e., Don’t care).
TCP Max Destination Port Specifies the maximum destination TCP port. The
possible values range from[0- 65535], the default
value is zero.
UDP Source Port Specifies the source UDP port. The possible values
range from [0-65537], the default value is 65537 (i.e.,
Don’t care).
UDP Max Source Port Specifies the maximum source UDP port. The
possible values range from [0-65535], the default
value is zero.
UDP Destination Port Specifies the destination UDP port. The possible
values range from [0-65537], the default value is
65537 (i.e., Don’t care)
UDP Max Destination Port Specifies the maximum destination UDP port. The
possible values range from [0- 65535], the default
value is zero.
Note: The values related to UDP port are editable
when the protocol type is UDP and TCP. These
values are non-editable for other types and the
default values are displayed.
The values related to the UDP port are editable when the protocol type is UDP or TCP. All other
types are non-editable and will display only the default options.

The use of ANY flag set to Y, allows the user to configure the following options:
• If IPv4 SA/DA is set to all Zeroes, then the attributes can be modified
• If IPv4 SA/DA MASK is set to all Zeroes, then any IPv4 SA/DA address will match.
• If the optional parameter is set to default value Don't care, then the field is locked and can be
opened by changing the flag to N.
The user must set non-null values for IPv4 SA or IPv4 DA. If the values are set to the default
setting of 0, the ACE will be considered invalid.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 133
Create IPv6 Access Control Element (ACE) 1850 TSS-5C

4
Click Cancel to restore the original settings.

5
Click Save to configure the new IPv4 ace settings.

END OF STEPS

3.15 Create IPv6 Access Control Element (ACE)


3.15.1 Purpose
Use this procedure to Create an IPv6 Access Control Element (ACE)

1
Select Security->Adminsitration->MAC/IP Access Control List from the menu bar. The
Access Control List Management screen is displayed as shown in Figure 78, “Access control
list management” (p. 130)

Figure 81 Access Control List Management

2
Click on Configure from ACE the Access Control Element Management screen is shown in
Figure 82, “Access Control Element Management ” (p. 135) and then selectCreateIPv6
hyperlink to configure a new IPv6 ACE as shown in Figure 83, “Create an IPv6 ACE” (p. 135)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
134 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create IPv6 Access Control Element (ACE)

Figure 82 Access Control Element Management

Figure 83 Create an IPv6 ACE

3
Use the following parameters to Create an IPv6 ACE as shown in Table 14, “IPv6 ace” (p. 136)
.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 135
Create IPv6 Access Control Element (ACE) 1850 TSS-5C

Table 14 IPv6 ace

Parameters Description
User Label Is the system generated User Label for the MAC ACE.
Action Indicates the state of the ACE.
The supported values are
• Permit
• Deny
State Indicates if the ACE is in service.
The supported parameters are:
• active: indicates that the MAC ACE is active.
• notInService: indicates that the MAC ACE is not
active.
The default value is notInService.
IPv6 SA Specifies the source IP address. The default value is 0
for the sixteen hexadecimal octet format.
IPv6 SA Mask Specifies the source IPv6 address mask. The default
value is 1s for the four hexadecimal octet format.
IPv6 DA Specifies the destination IP address. The default value
is 1s for the sixteen hexadecimal octet format.
IPv6 DA Mask Specifies the destination IPv6 address mask. The
default value is 1s for the sixteen hexadecimal octet
format.
Protocol ID Indicates the value of the protocol identifier. The default
value is 256.
The protocol identifier options are:
• ICMP- Internet Control Message Protocol for IPv6
• ICMPv6- Internet Control Message Protocol for IPv6
• IP- IP over IP encapsulation
• TCP- Transmission Control Protocol
• UDP- User Datagram Protocol
• IGP- Interior Gateway Protocol
• GRE- Generic Routing Encapsulation
The default value 256 is used to indicate Any protocol.
When the option Any Protocol is set to N, the operator
can insert a possible value into [0-255] directly.
Note: ICMPv6 is valid for IPv6 and not for ICMP.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
136 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure Management RADIUS

The use of ANY flag set to Y, allows the user to configure the following options:
• If IPv6 SA/DA is set to all Zeroes, then the attributes can be modified
• If IPv6 SA/DA MASK is set to all Zeroes, then any IPv6 SA/DA address will match.
The user must set non-null values for IPv6 SA or IPv6 DA. If the values are set to the default
setting of 0, the ACE will be considered invalid.

4
Click Cancel to restore to the original settings.

5
Click Save to configure the new IPv6 ace settings.

END OF STEPS

3.16 Configure Management RADIUS


3.16.1 Steps

1
Select Security -> Administration -> Management RADIUS -> Configure RADIUS as shown
in Figure 84, “Configure RADIUS” (p. 136).

Figure 84 Configure RADIUS

2
Following details are required:
• Server Number - Select the Server number from the drop down
• Status - Select the status Enable or Disable
• IP Address - Enter the valid IP Address
• Port - Enter the port number in the range of 1-65000

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 137
Configure management radius authority 1850 TSS-5C

• Secret Key - Enter the Secret Key

3
Click Save to save the changes.

END OF STEPS

3.17 Configure management radius authority


3.17.1 Steps

1
Select Security -> Administration -> Management Radius -> Configure Authority as shown
in Figure 85, “Configure radius authority” (p. 137)

Figure 85 Configure radius authority

2
Following details are required:
• Authority Order - Select Local or Radius
• Retries - The number of retires, the value ranges form 0-100
• Timeout - The time-out in seconds, the value ranges from 0-1000

3
Click Save to save the changes.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
138 8DG24624AGAATQZZA Issue 7
1850 TSS-5C DB management remote file copy

3.18 DB management remote file copy


3.18.1 Purpose
Use this procedure to perform copy.

1
Select System Management -> DB Management -> Remote File -> Perform Copy.

Figure 86 DB management remote file copy

2
Specify the parameters as described in Table 15, “Database Management Copy Remote file”
(p. 139)

Table 15 Database Management Copy Remote file

Parameter Description
From Determines the location from which the DM remote file is to
be copied.
The supported values are:
• Database backup on a Remote File Server (RFSDB)
• Secondary backup Database (STBYDB)
• Software Generic on a Remote File Server (RFSSW)
• Local NE PM Global File collection (LOCPMGLB)
• Local NE Daily Log File (LOCDAILYLOG)
• Local NE MAC Global file collection (LOCMACGLB)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 139
Administer MAC File Collection 1850 TSS-5C

Table 15 Database Management Copy Remote file (continued)

Parameter Description
To Determines the location to which the DM remote file is to be
copied.
The supported values are:
• Database Backup on a Remote File Server (RFSDB)
• Secondary backup Database (STBYDB)
• Standby Software Generic on the NE (STBYSW)
• Remote File Server PM Global File Collection
(RFSPMGLB)
• Daily Log File on remote server (RFSDAILYLOG)
• Remote file server MAC file collection (RFSMACGLB)
User The user identifier used for the ftp connection on the RFS
Password The user password used for the ftp connection on the RFS
Host The IP address of the host (the Remote File Server)
Port The port number to connect to. Most schemes designate
protocols that have a default port number.
URL Path The details of how the specified resource (i.e. the directory
where the file(s) reside) can be accessed.

3
Click Apply to apply the configuration settings.

END OF STEPS

3.19 Administer MAC File Collection


3.19.1 Purpose
Use this procedure to administer MAC file collection.

1
Click Data -> FDB Operations -> MAC File Collection to display the MAC File Collection
screen as shown in Figure 87, “MAC File Collection” (p. 141)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
140 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer Network Element

Figure 87 MAC File Collection

2
The MAC file collection status provides the collection state.

3
Click Refresh to refresh the MAC file collection status.

4
Specify the MAC address, select the board, VPLS instance and MAC learning type.

5
Click Start Collection to view the list of MAC files.

END OF STEPS

3.20 Administer Network Element


3.20.1 Purpose
This option retrieves general system level configuration information consisting of: system type,
software release identifier, software release date, matrix size, system restart status.

3.20.2 Steps

1
Select System Management -> DB Management -> Network Element as shown in Figure
88, “Network Element” (p. 142).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 141
Administer LAC Management 1850 TSS-5C

Figure 88 Network Element

Use Table 16, “Network Element” (p. 142) to understand the parameters on this screen.

Table 16 Network Element

Parameter Description
Access Identifier Identifies the entity for which the output data are
retrieved.
The supported values are:
• ACTSW: The active software generic on the NE
• STBYSW: The standby software generic on the NE
Provision Mode Specifies the provisioning mode
Region Specifies the region
Release Date Identifies the date of the system software release in
the format of <YY>-<MM>-<DD>
Release Identification Identifies the release ID of the system software.
System Restart Process Status Identifies the status of any system restart process.
The supported values are:
• COMPLETE
• IN-PROGRESS
System Type Identifies the system type (i.e. 1850 TSS-5C)
User Label Identifies the system User label i.e 1850 TSS -5C

END OF STEPS

3.21 Administer LAC Management


3.21.1 Purpose
Use this procedure to manage LAC.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
142 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer LAC Management

1
Select System Management -> DB Management -> Lac -> State as shown in Figure 89,
“LAC state Management” (p. 142).

Figure 89 LAC state Management

The LAC state tab displays the Lac State Management panel that contains the following
parameters:
• LAC current state - Specifies the current LAC state. The default value is GRANTED
• LAC state - Specifies the LAC state. The values are REQUESTED or DENIED

3
Click Save to save the configuration.

END OF STEPS

3.21.2 LAC Default

1
Select System Management -> DB Management -> Lac -> Default as shown in Figure 90,
“LAC default” (p. 144)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 143
Retrieve the Manager List 1850 TSS-5C

Figure 90 LAC default

The Lac Default Management tab displays the Lac Default Management panel that contains
the following parameter:
• Lac timer - Specifies the Lactimer values. The valid range is 1-30

3
Click Save to save the timer configuration.

END OF STEPS

3.22 Retrieve the Manager List


3.22.1 Steps

1
Select System Management -> DB Management -> Manager List as shown in Figure 91,
“Retrieve the Manager list” (p. 145).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
144 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer Proactive Tool Delay Measurement

Figure 91 Retrieve the Manager list

2
The Manager List tab displays the Manager List panel that displays the Current Manager
List. The default value is EML.

END OF STEPS

3.23 Administer Proactive Tool Delay Measurement


3.23.1 Purpose
Use this procedure to administer delay measurement.

1
Click Data -> OAM Management -> Proactive Tool -> Delay Measurement from the menu
bar as shown in Figure 92, “Proactive delay measurement” (p. 146).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 145
Administer Proactive Tool Delay Measurement 1850 TSS-5C

Figure 92 Proactive delay measurement

2
Click Create to create a DM tool as shown in Figure 93, “Create delay measurement tool”
(p. 146)

Figure 93 Create delay measurement tool

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
146 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create Synthetic Loss Measurement

Use the following parameters to configure Delay Measurement:

Table 17 Configure Delay Measurement

Parameter Description
MEP Select MEP ID
Priority Indicates the priority range between 0 to 7
Status Indicates the current status of the DM. The default
value is notInService. The supported values is
Inservice and notInService.
DM Mode Indicates the current mode of the DM. The default
value is disabled. The supported values are enabled,
2-way DM, 1-way DM and disabled
Destination Select the Destination as MEP ID or Mac Address.
Provide the MEP ID or the Mac Destination address
as per the destination selection
Period Indicates the current mode of the DM.The default
value is Interval1min.
Framesize Specify the Frame Size as Random or a value
between 0,64 and 9600.

3
Click Save to save the DM configuration or click Cancel to return to the previous screen without
saving.

END OF STEPS

3.24 Create Synthetic Loss Measurement


3.24.1 Purpose
Use this procedure to create a Synthetic Loss Measurement.

1
Select Data -> OAM Management -> Proactive Tool -> Synthetic Loss Measurement Tool
from the menu bar as shown in Figure 94, “Proactive Synthetic Loss Measurement” (p. 148).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 147
Create Synthetic Loss Measurement 1850 TSS-5C

Figure 94 Proactive Synthetic Loss Measurement

2
Click Create to create a Synthetic Loss Measurement tool, as shown in Figure 95, “Create
Synthetic Loss Measurement” (p. 148).

Figure 95 Create Synthetic Loss Measurement

Use the following parameters to configure Synthetic Loss Measurement:

Table 18 Configure Synthetic Loss Measurement

Parameter Description
MEP Select t the MEP ID

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
148 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer PM Global File

Table 18 Configure Synthetic Loss Measurement (continued)

Parameter Description
Priority Indicates the priority range between 0 to 7.
Destination MEP ID Provide the Destination MEP ID as per the
destination selection
Destination MAC Address Provide the Destination MAC Address as per the
destination selection
Interval Select the interval in seconds or minutes. The
default value is 100ms.
The supported values are:
• 100ms
• 10ms
• 3.3ms
• 1ms
• 500us
• 100us
Status Indicates the current status. The default value is
notInService. The supported values are active and
notInService.

3
Click Save to save the Synthetic Loss Measurement configuration or click Cancel to return to
the previous screen without saving.

END OF STEPS

3.25 Administer PM Global File


3.25.1 Steps

1
Select System Management ->PM Global file as shown in Figure 96, “PM Global file”
(p. 150).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 149
Administer PM Global File 1850 TSS-5C

Figure 96 PM Global file

The PM Global File tab displays the following panels:


• Performance Monitoring Global File Collection Status panel
• Start Performance Monitoring Global File Collection panel

Table 19 Performance Monitoring Global File Collection status parameters

Parameter Description
Collection State Specifies the current state for the file collection status.
The supported values are:
• EMPTY - No Performance Monitoring File Collection is
available.
• READY - A Performance Monitoring File Collection is
available
• INPREP - A Performance Monitoring File Collection is
currently in the process of preparing.
• FTRUNNING - File Transfer is currently running

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
150 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer PM Global File

Table 19 Performance Monitoring Global File Collection status parameters (continued)

Parameter Description
Monitor Date Start Monitor date, specifies the start date of the PM collection
period for which the Performance Monitoring File Collection
is prepared or will be prepared currently. The supported
value format is { MONTH - DAY : {01-12} - {01-31} }.
Monitor Time Start Specifies the start time of the PM collection period for which
the Performance Monitoring File Collection is prepared or
will be prepared currently. The supported value format for
Monitor time is { HOUR - MINUTE : {00-23} - {00-59} }.
Monitor Date End Specifies the End date of the PM collection period for which
the Performance Monitoring File Collection is prepared or
will be prepared currently. The supported value format for
Monitor end date is { MONTH - DAY : {01-12} - {01-31} }.
Monitor End Time Specifies the End time of the PM collection period for which
the Performance Monitoring File Collection is prepared or
will be prepared currently. The supported value format for
Monitor End Time is { HOUR - MINUTE-SECONDS :
{00-23} - {00-59}-{00-59} }

Table 20 Start Performance Monitoring Global File Collection

Parameter Description
Monitor Date Monitor date, specifies the (starting) date of the PM
collection period for which PM data is to be collected. The
supported value format is { MONTH - DAY : {01-12} -
{01-31}, ALL }.
Monitor Time Monitor Time, specifies the (starting) time of the PM
collection period for which PM data is to be collected. This
parameter affects the 15MIN values only. The supported
value format is { HOUR - MINUTE : {00-23} - {00-59}, ALL }.
Force Specifies if the initiation of the Performance Monitoring File
Collection preparation is forced in case there is an existing
file preparation process in progress.
The supported values are:
• Y - Yes, the file preparation shall be forced.
• N - No, the file preparation shall be not forced

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 151
Administer SSH and SSL 1850 TSS-5C

3.26 Administer SSH and SSL


3.26.1 Steps

Use this procedure to generate a new Public/Private key pair during SSH-2 authentication phase for
clients to have a credential for connection. The SSH key can be created when the NE is in a secure
or unsecure mode. The key could be used with the NE in the next SSH session in a secure mode.

1
Click Security -> Administration ->SSH / SSL Management->SSH NE Key Management
from the main menu. The SSH NE Key is displayed as shown in Figure 97, “Initialize SSH”
(p. 151)

Figure 97 Initialize SSH

2
The Key Type indicates the algorithm used to generate the specified NE key pair. Click to
Select the Key type as RSA or DSA or Click Default to specify RSA.

Note: When Key Type parameter is DSA the only allowed Key Length value is 1024.

3
The key length indicates the length for generation of the NE key pair. The default value is 1024.
The valid range is 768 to 2084.

4
Click Generate to generate the new NE key pair as shown in Figure 98, “SSH Key Generation”
(p. 153)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
152 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer SSH and SSL

Figure 98 SSH Key Generation

5
Click Transfer public keys to NMS to launch the Copy Security Remote file as shown in
Figure 99, “Copy Security Remote file” (p. 153) for administrator control. The administrator is
allowed to copy security sensible files or data from a local file system (NE) to a remote file
server.

Figure 99 Copy Security Remote file

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 153
Administer SSH and SSL 1850 TSS-5C

Note: The From and To parameters are also visible when navigating from Security ->
Administration -> Copy Security Remote file from the main menu.

The following types of transfer are supported by the Copy security remote file:
• NE Public SSH Key from NE to RFS
• NMS Public SSH Key from RFS to NE
• NE Public SSL Key from NE to RFS
• NE CSR file in PEM format from NE to RFS
• NE CSR file in TEXT format from NE to RFS
• NE X509 Certificate file in PEM format from RFS to NE
• NE X509 Certificate file in TEXT format from RFS to NE
• User Activity Log (UAL) File in text zipped format from NE to RFS
In the Copy Security Remote file screen specify the following parameters:

Table 21 Copy Security Remote file

Parameter Description
From Specifies the entity to be transferred.
The supported value is:
• LOCSSHKEY- Local NE SSH Public Key
• RFSSSHKEY - Remote NMS SSH Public Key
• LOCSSLKEY - Local NE SSL Public Key
• LOCCSRPEM - Local NE CSR File in PEM format
• LOCCSRTEXT - Local NE CSR File in Text format
• RFSX509PEM - Remote NE X509 Certificate File, signed
by NMS, in PEM format
• RFSX509TEXT - Remote NE X509 Certificate File, signed
by NMS, in Text format

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
154 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer SSH and SSL

Table 21 Copy Security Remote file (continued)

Parameter Description
To Specifies the entity that is created as the result of the
command completion.
The supported values is:
• RFSSSHKEY - Remote NE SSH Public Key
• LOCSSHKEY - Local NMS Public Key
• RFSSSLKEY - Remote NE SSL Public Key
• RFSCSRPEM - Remote NE CSR File in PEM format
• RFSCSRTEXT - Remote NE CSR File in Text format
• LOCX509PEM - Local NE X509 Certificate File, signed by
NMS, in PEM format
• LOCX509TEXT - Local NE X509 Certificate File, signed
by NMS, in Text format
User Indicates the user identifier for the sftp connection on the
RFS.
Password Indicates the user password for the sftp connection on the
RFS.
Host Indicates the IP address of the host (the Remote File
Server).
Port Indicates the port number to connect. The default port
number for sftp is 22.
URL path Provides the details of how the specified resource (i.e. the
directory where the file(s) reside) can be accessed.

6
Click Apply to copy the security remote file.

7
To import the SSH public key, Click Security -> Administration ->SSH / SSL Management-
>Import SSH Public Key from the main menu. The screen is refreshed to display Copy
Security Remote file. Refer Table 21, “Copy Security Remote file” (p. 154) for details.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 155
Administer SSH and SSL 1850 TSS-5C

3.26.2 SSL NE Key Management

1
Click Security -> Administration ->SSH / SSL Management->SSL NE Key Management
from the main menu. The SSL NE Key is displayed as shown in Figure 100, “Initialize SSL”
(p. 155).

Figure 100 Initialize SSL

2
The key type indicates the algorithm used to generate the specified NE key pair. Click to Select
the Key type as RSA or DSA or Click Default to specify RSA.

3
The key length indicates the length for generation of the NE key pair. The default value is 1024.
The valid range is 512 to 4096.

4
Click Generate to generate the new NE key pair as shown in Figure 101, “SSL Key
Generation” (p. 157).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
156 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer SSH and SSL

Figure 101 SSL Key Generation

5
Click Transfer public key to NMS to launch the Copy Security Remote file as shown in for
administrator control. The administrator is allowed to copy security sensible files or data from a
local file system (NE) to a remote file server.

Figure 102 Copy Security Remote file

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 157
Administer SSH and SSL 1850 TSS-5C

Note: The From and To parameters are also visible when navigating from Security ->
Administration -> Copy Security Remote file from the main menu.

The following types of transfer are supported by the Copy security remote file:
• NE Public SSH Key from NE to RFS
• NMS Public SSH Key from RFS to NE
• NE Public SSL Key from NE to RFS
• NE CSR file in PEM format from NE to RFS
• NE CSR file in TEXT format from NE to RFS
• NE X509 Certificate file in PEM format from RFS to NE
• NE X509 Certificate file in TEXT format from RFS to NE
• User Activity Log (UAL) File in text zipped format from NE to RFS
In the Copy Security Remote file screen specify the following parameters:

Table 22 Copy Security Remote file of SSL

Parameter Description
From Specifies the entity to be transferred.
The supported value is:
• LOCSSHKEY- Local NE SSH Public Key
• RFSSSHKEY - Remote NMS SSH Public
Key
• LOCSSLKEY - Local NE SSL Public Key
• LOCCSRPEM - Local NE CSR File in PEM
format
• LOCCSRTEXT - Local NE CSR File in Text
format
• RFSX509PEM - Remote NE X509
Certificate File, signed by NMS, in PEM
format
• RFSX509TEXT - Remote NE X509
Certificate File, signed by NMS, in Text
format

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
158 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer SSH and SSL

Table 22 Copy Security Remote file of SSL (continued)

Parameter Description
To Specifies the entity that is created as the
result of the command completion.
The supported values is:
• RFSSSHKEY - Remote NE SSH Public
Key
• LOCSSHKEY - Local NMS Public Key
• RFSSSLKEY - Remote NE SSL Public Key
• RFSCSRPEM - Remote NE CSR File in
PEM format
• RFSCSRTEXT - Remote NE CSR File in
Text format
• LOCX509PEM - Local NE X509 Certificate
File, signed by NMS, in PEM format
• LOCX509TEXT - Local NE X509
Certificate File, signed by NMS, in Text
format
User Indicates the user identifier for the sftp
connection on the RFS.
Password Indicates the user password for the sftp
connection on the RFS.
Host Indicates the IP address of the host (the
Remote File Server).
Port Indicates the port number to connect. The
default port number for sftp is 22.
URL path Provides the details of how the specified
resource (i.e. the directory where the file(s)
reside) can be accessed.

6
Click Apply to copy the security remote file.

7
To import the SSL public key, Click Security -> Administration ->SSH / SSL Management
->Import SSL Public Key from the main menu. The screen is refreshed to display Copy
Security Remote file Table 21, “Copy Security Remote file” (p. 154) for details.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 159
Administer SSH and SSL 1850 TSS-5C

3.26.3 Administer Certificate Signing Request

1
Click Security -> Administration ->SSH / SSL Management->SSL Cert. Signing Request
(CSR) from the main menu. The Certificate Signing Request screen is displayed as shown in
Figure 103, “SSL Certificate Signing request” (p. 159).

Figure 103 SSL Certificate Signing request

2
Specify the Certificate Signing Request parameters as per table Table 23, “Certificate signing
request” (p. 160)

Table 23 Certificate signing request

Parameter Description
CN IP Address Represents the domain name of the server. The default
value is the NE IP Address. For example,
CN=151-98-32-56. The supported value range is
{0-255}-{0-255}-{0-255}-{0-255}.
Organization Name Specifies the legal name the organization. For example,
Nokia.
Organization Unit Specifies the division of the organization handling the
certificate. For example, Optics Division.
Location Specifies the city where the organization is located. For
example, Milan.
State Specifies the state or region where the organization is
located. For example, Italy.
Note:The state name should not be abbreviated.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
160 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer SSH and SSL

Table 23 Certificate signing request (continued)

Parameter Description
Country Indicates the two-letter ISO code of the country where
the organization is locates, For example, IT.
Mail Specifies the email address used to contact the
organization. For example, TSS320.R5.0@nokia.com is
the default value.

3
Click Save to save the CSR or Click Transfer CSR to transfer the CSR using the Copy Security
Remote File screen as described in Table 21, “Copy Security Remote file” (p. 154)

4
To import the SSL public key, Click Security -> Administration ->SSH / SSL Management
->Import SSL Certificate from the main menu. The screen is refreshed to display Copy
Security Remote file Table 21, “Copy Security Remote file” (p. 154) for details.

5
To Install the SSL Certificate, Click Security -> Administration ->SSH / SSL Management-
>SSL Certificate Installation as shown in Table 21, “Copy Security Remote file” (p. 154).

Figure 104 SSL Certificate Installation

6
Click Apply.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 161
Administer Network time protocol 1850 TSS-5C

3.27 Administer Network time protocol


3.27.1 Purpose
This procedure provides the instructions to retrieve the NTP server IP address, provision NTP
servers, and delete NTP servers. It also provides instructions to enable and disable the NTP
synchronization. NTP servers are used for time of day synchronization, when the NTP protocol is
enabled. If no NTP server is entered and the NTP protocol is enabled, the time-of-day clock
synchronizes with the last known internal clock frequency.
When NTP is enabled, the NE internal time-of-day clock uses the calculated Coordinated Universal
Time (UTC) from the selected NTP server, modified by the user-provisioned offset. All messages,
event reports, logs, and events that carry time stamps use the following time of day: NTP UTC time
+ provisioned offset.

The NE supports the following time-of-day synchronization modes:


• Non-synchronized, free-running mode - NTP is not enabled, and the NE is not synchronized to
an NTP server and is instead using its own internal clock as a source.
• Synchronized mode - The NE is using the NTP protocol to synchronize to an NTP server. The
NE is polling the NTP server and periodically making corrections to its internal clock so as to
maintain the same clock update to synchronize its clock.
• Non-synchronized, holdover mode - NTP is enabled and the NE has lost NTP server connectivity
and is using the last known clock update to synchronize its clock.

3.27.2 Steps

1
Select System Management -> Network Time Protocol option from the menu bar. The
system displays the Time and Date and Network Time Protocol panel parameters as shown in
Figure 105, “Network Time Protocol” (p. 163).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
162 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer Network time protocol

Figure 105 Network Time Protocol

Table 24, “Network Time Protocol parameters” (p. 163) provides description of network time
protocol parameters.

Table 24 Network Time Protocol parameters

Parameter Description
Current NTP Server Synchronization Specifies if the NTP server. synchronization is
enabled or disabled.
Current Offset Specifies the offset for the UTC.
Current Operating Mode Specifies the current operating mode. The
default value is FREE-RUNNING.
Date Date, identifies the new system date in the
format Year-Month-Day with supported value
ranges {05-25}-{01-12}-{01-31}
Time Identifies the new system time in the format
<HH>-<MM>-<SS>. The value entered should
be the actual desired local time to be displayed
by the NE.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 163
Administer Network time protocol 1850 TSS-5C

2
Select the Date and time from the Date and time drop-down.

3
Click Save to save NTP server configuration.

4
Click Create to set up the new NTP server settings as shown in Figure 106, “Create NTP”
(p. 163).

Figure 106 Create NTP

5
The NTP Server Address provision panel displays the Server IP Address parameter. Enter the
server IP address to provision the NTP server synchronization. The default range is [0-99, 101-
126, 128-233], [0-255], [0-255], [0-255].

6
The Network Time Protocol panel now displays the NTP Server Synchronization drop-down list
box. The values are either NULL or ENABLED.

7
The user can also set the New Offset for the Network Time Protocol. Click Save to store the
configuration settings.

8
Enable the IP Address check box to select the server IP address and click Create hyperlink to
configure the network time protocol.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
164 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer Network time protocol

9
Select the Network Time Protocol to be deleted and click Delete.

END OF STEPS

3.27.3 Modify Network Time Protocol

Use this procedure to modify network time protocol.

1
Select System Management -> Network Time Protocol option from the menu bar. The
system displays the Time and Date and Network Time Protocol panel parameters as shown in
Figure 107, “Modify NTP” (p. 164).

Figure 107 Modify NTP

2
Select the date and time from the Date and Time drop-down.

3
Select a value from the NTP Server Synchronization drop-down to modify the current NTP
server synchronization. Available values are ENABLED and DISABLED.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 165
Set the differential time frequency 1850 TSS-5C

4
Click Save to save the NTP server configuration.

5
Select the NTP configuration to be deleted and click Delete.

END OF STEPS

3.28 Set the differential time frequency


3.28.1 Purpose
Use this procedure to set the differential time frequency.

1
Select System Management -> Differential time Frequency option from the menu bar as
shown in Figure 108, “Set differential time frequency” (p. 165).

Figure 108 Set differential time frequency

2
Set the Frequency in Khz. The supported value range is 25000, 16384 and 77760.

3
Click Save to save the modifications.

END OF STEPS

3.29 Set IP ACL


3.29.1 Steps

1
Select Security -> Administration -> IP ACL option from the menu bar as shown in Figure
109, “Manage IP ACL” (p. 167).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
166 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Set IP ACL

Figure 109 Manage IP ACL

2
Click Create to create the IP ACL rule.

3
Specify the parameters as described in Table 25, “IP ACL Inputs” (p. 167).

Table 25 IP ACL Inputs

Parameter Description
IP Address Specifies the IP address added to the IP ACL.
The supported value range is {0-255}-{0-255}-{0-255}-{0-
255}
Max TCP Source port Determines the Maximum TCP Source port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Max TCP Destination Port Determines the maximum Destination Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Max UDP source Port Determines the Maximum UDP Source Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Max UDP Destin. Port Determines the Maximum UDP Destination Port. The
default value is 0. The supported value range is 0 to
65535.
Note: The default value 0 indicates don't care.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 167
Set IP ACL 1850 TSS-5C

Table 25 IP ACL Inputs (continued)

Parameter Description
IP Protocol Specifies the protocol field in the IP packet header. The
default value is 255. The supported value range is 0 to
255.
IP Mask Determines the IP subnet mask. The default value is
255-255-255-255.
Min TCP Source Port Determines the Minimum TCP Source port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Min TCP Destin. Port Determines the minimum Destination Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Min UDP Source Port Determines the Minimum UDP Source Port. The default
value is 0. The supported value range is 0 to 65535.
Note: The default value 0 indicates don't care.
Min UDP Destin. Port Determines the Minimum UDP Destination Port. The
default value is 0. The supported value range is 0 to
65535.
Note: The default value 0 indicates don't care.

END OF STEPS

3.29.2 Modifying IP ACL

1
Select Security -> Administration -> IP ACL option from the menu and click on the IP ACL to
modify as shown in Figure 110, “Modify IP ACL” (p. 168).

Figure 110 Modify IP ACL

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
168 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Set IP ACL

2
Modify the parameters.

3
Click Save to save the changes or click Cancel to return to the previous screen without saving.

END OF STEPS

3.29.3 Viewing IP ACL details

1
Select Security -> Administration -> IP ACL option from the menu and click on the details link
for the IP ACL to view the details as shown in Figure 111, “Viewing IP ACL details” (p. 168).

Figure 111 Viewing IP ACL details

2
Click Cancel to return to the previous screen.

END OF STEPS

3.29.4 Deleting IP ACL

1
Select Security -> Administration -> IP ACL option from the menu.

2
Click to select the IP ACL to be deleted and click Delete.

3
A dialog is displayed confirming deletion. Click Yes to proceed or click No to cancel deletion.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 169
Retrieve Audit log 1850 TSS-5C

3.30 Retrieve Audit log


3.30.1 Steps

1
Select Security -> Administration -> Network Element Logs as shown in Figure 112, “Audit
Log” (p. 169).

Figure 112 Audit Log

The Retrieve Audit Log page contains the Retrieve Audit Log panel with the following
parameters:
• From - Specifies the beginning date and time used to filter the response messages. By
means the drop down list it is possible to change data and time
• To - Specifies the ending date and time used to filter the response messages. By means the
combo-boxes it is possible to change data and time
• UID - The check-box allows to select the user identifier:
− ALL
− Admin

3
Check the check-box provided for Set user identifier and select the User Identifier from the
drop-down.

4
Click on hyperlink Retrieve to retrieve the audit logs

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
170 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Log Settings

3.31 Log Settings


3.31.1 Steps

1
Select Security -> Administration -> Log Settings as shown in Figure 113, “Log Settings”
(p. 170).

Figure 113 Log Settings

The Modify Log Attributes page describes the TL1 commands and the Modify Log
Attributes panel that contains:
• Current Log File Max Size [Mbyte] - Specifies the size, in 1 Megabyte blocks, of the
Security Log File system's disk buffer.
• New Log File Max Size [Mbyte] - 1 Megabyte blocks, of the Security Log File system's disk
buffer. When the SECULOG has reached a maximum size, the SECULOG wraps reducing its
size to the 70% of its max size discarding the oldest events (30%). The Default hyperlink
allows to set the relevant value automatically
• Current Warning Message - The provisioned user-logon warning message is shown
• Warning Message - Allows to provision user-logon warning message. The Default hyperlink
allows to set the relevant warning message automatically

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 171
Administer IP message settings 1850 TSS-5C

• New Warning Message - Allows to provision a new user-logon warning message. The
Default allows to set the relevant warning message automatically. The Set Empty allows
deletion of the entry field.
• Current Log Events - Specifies the current log event
• Available Log Events - Specifies the list of events that, upon their occurrence, are included
in the security log (i.e., events that are specified for logging, if they occur). The values are:
• Authentication Event (EIUA) - Login, Logout, invalid user authentication attempts and the
alarms/alerts generated due to the invalid authentication attempts
• Changes to the User's Security Accounts (EUSP) - Specifies the details of the changes
made in a user's security profiles and attributes
• Changes to the NE/NS Security Configuration (ESCC) - Specifies the details of changes
made in the NE/NS security configuration
• Changes to NE/NS resources (ECMR) - Specifies the creation and modification of NE/NS
resources performed via standard operations and maintenance procedures. This does not
address creations and modifications carried offline. Commands creating log events of this
type are all the commands not mentioned in the lists above, having Y in the security field of
the command security table.
• All Events (ALL) All events
• New Log Events - This shows the log events for the command. The entry box has the
Default to set the User access privileges forecast for the account.
They can be copied or removed from one of the entry box using the left or right arrow buttons
available between the two entry boxes.
Click Save to save the settings.

END OF STEPS

3.32 Administer IP message settings


3.32.1 Steps

1
Select Security -> Administration -> IP Message Settings as shown in Figure 114, “IP
message settings” (p. 172).

Figure 114 IP message settings

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
172 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer Tunnel Protection Switching (1:1)

2
Specify the IP message interval time in seconds and the Multiple IP messages as Yes or No.

3
Click Save to save the changes.

END OF STEPS

3.33 Administer Tunnel Protection Switching (1:1)


3.33.1 Purpose
Use this procedure to manage the Tunnel Protection Switching (1:1).
The protection scheme used by the Network Element (NE) is based on the 1:1 Automatic Protection
Switching (APS) defined for the Tunnel facilities. The system supports that no signal failure in the
switch fabric and control subsystem impacts the service.

3.33.2 Steps

1
Select Protection -> 1:1 Tunnel Protection option from the menu bar. The window displays
protected and protecting equipment as shown in Figure 115, “1:1 Tunnel protection” (p. 172).

Figure 115 1:1 Tunnel protection

2
The tunnel protection window displays 1:1 protection details.

3
Enter the fast facility protection from and to values and click Search.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 173
Create LAG 1850 TSS-5C

3.34 Create LAG


3.34.1 Purpose
The system supports the Link Aggregation (LAG) at the Ethernet side, as specified in IEEE Std.
802.3ad-2000; it is a technique to aggregate many data streams into a single logical link. The
resulting aggregate link will be treated by the system (with regard to instances about STP, IGMP,
network protections, etc.), as a single link. It permits to overcome the bandwidth limitation of the
single Ethernet interfaces, or to protect the traffic.
Permitted port rates to be aggregated are 100 Mbps and 1 Gbps (10 Mbps and 10 Gbps are for
future release). The max number of ports (LAG-size) to be aggregated is 8; (LAG stands for Link
Aggregation Group). Links may be anytime added or removed to/from the bundle. Ports to be
aggregated can be either located on the same board and also on different boards.

3.34.2 General

Its management in the network is based upon the communication, between the aggregate partner
pieces of equipment, of LACP messages (Link Aggregation Control Protocol). The LACP packets
transport information about set-up, aggregation capability, links failures, automatic reconfiguration
after failure, etc. The benefits of Link Aggregation feature are:
• Bandwidth limitation overcoming.
• Load balancing (the traffic is distributed over the constituting links).
• Reliability increasing (in case that a link of the aggregate fails, its traffic will be automatically
distributed over the other links of the aggregate).

The conditions for Link Aggregation option are the followings:


• All involved ports must work at the same rate.
• All involved ports must have the same configurations, regarding AutoNegotiation and Flow
Control.
• All aggregated links must be point-to-point (Multicast is not allowed).
• All involved interfaces must work in full-duplex modality.
• All involved ports must be Local (Remote ports are not allowed).
• Actor and Partner ports (local and far sides) must be of the same type.

3.34.3 Link Aggregation Management

Use the following procedure to creating a Link Aggregator:

1
Click LAG Group (Link Aggregation Management Group) icon from the tree area as shown in
Figure 116, “Aggregation management tree” (p. 175) expand. The Link Aggregation Mng
screen is displayed in the right hand side frame as shown in .

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
174 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create LAG

Figure 116 Aggregation management tree

2
Select one of the LAG-x (Link Aggregation Group) icon and the client area displays.
Table 26, “Link aggregation parameters ” (p. 175) provides description of link aggregation
parameters.

Table 26 Link aggregation parameters

Parameter Description
Name Allows to set the name of the LAG; the only suffix after "#"
can be set by the user, with an integer in the 1 to 16 range
Admin State This item can be set only after creation, in “Configure
Aggregator” option,. The values are:
• enable the LAG is in-service
• disable the LAG is out-of-service
User Label Allows to indicate the LAG by means of a name defined by
the user.
Size Allows to set the size of the LAG, i.e. number of
Aggregated Ports; possible values are integers in the 1 to 8
range
Actor Admin Key Allows to indicate the LAG “Key”, the parameter identifying
this LAG; integer in the 1 to 65535 range
Type Refers about the type of port (read only field, fixed by the
system to ieee8023adLag)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 175
Create LAG 1850 TSS-5C

Table 26 Link aggregation parameters (continued)

Parameter Description
EthClient Type (read only Indicates the transported layer. The values are:
field)
• ets: for Ethernet Transparent System
• etb: for Ethernet Bridge System
Actor System Priority Allows to indicate the LAG Priority. This parameter,
together with the LAG Mac-Address, forms the “System
Identifier”. The lowest System Identifier value will be
elected as the “Master” of the link, i.e. the one that will drive
the actions in case of events such as failures, switches, etc.
The valid range is 0-65535
Maximum MRU Specifies the maximum receiving unit that allows to adjust
the of packet transfer in control channel in octets. The
value ranges from 1574 to 9242 (R1.0) or from 1574 to
10240 (From R4.0).
Encaps Method Refers about the method of MAC packets encapsulation
inside the underlying physical layer. The options are:
• ethernetV2: default mode, set by the system
• IEEE8023: not yet operative
Frame Distribution The default value is C000

3
Enter the LAG Name in the field provided for name.

4
Enter the User name for the LAG in the field provided for User Label.

5
Specify the Actor Admin Key.

6
Specify the Actor System Priority.

7
Specify the Maximum MRU.

8
Click Hash Input to select the New Hashing Key Mask as shown in Figure 117, “Hash Input”
(p. 177)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
176 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create LAG

Figure 117 Hash Input

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 177
Create LAG 1850 TSS-5C

Figure 118 Mask 1

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
178 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create LAG

Figure 119 Mask 2

9
Click Save to save the LAG configuration.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 179
Create LAG 1850 TSS-5C

3.34.4 Modify a Link Aggregation Configuration

1
Click LAG Group (Link Aggregation Management Group) icon from the tree area and expand.
Select the LAG Group.

2
In the Link Aggregation Mng screen select the LAG to modify and click Configuration. Click LAG
in the Link Aggregator configuration screen
Table 27, “Modify LAG parameters” (p. 179) provides description of modify lag parameters.

Table 27 Modify LAG parameters

Parameter Description
Link Aggregation Configuration
Name Allows to set the name of the LAG. The only suffix after
"#" can be set by the user, with an integer in the range
1-16.
Note:This is a non-editable field
Type Indicates the type of port (read only field, fixed by the
system to "ieee8023adLag")
Note:This is a non-editable field.
User Label Indicates the LAG by means of a name defined by the
user
Actor Admin Key Indicates the LAG "Key", the parameter identifying this
LAG; integer in the range 1 -65535
Actor System Priority Indicates the LAG Priority. This parameter, together with
the LAG Mac Address, forms the "System Identifier".
The lowest System Identifier value will be elected as the
"Master" of the link, i.e. the one that will drive the
actions in case of events such as failures, switches, etc.
Possible values are integers in the range 0-65535
Actor System ID A read-only field fixed by the system indicates the
"System Identifier", composed of the LAG Mac Address
and the above Actor System Priority. The LAG having
the lowest LAG-System Identifier value will be elected
as the "Master" of the LAG link, i.e. the one that will
drive the actions in case of events such as failures,
switches, etc.
Actor Op. key A read-only field fixed by the system indicates the actual
operational value of LAG-key for this LAG.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
180 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create LAG

Table 27 Modify LAG parameters (continued)

Parameter Description
Maximum MRU Allows to set the Maximum Recieve Unit (MRU) size of
the largest packet which can be sent on this LAG
interface, specified in octets. The value ranges from
1574 to 9242 (R1.0) or from 1574 to 10240 (From
R4.0).
Protocol Profile The entry field indicates the name of the 2-bytes
provider (S-VLAN-Prototypal) contained into the S-Vlan
ethernet frames afferent to the current Port.
Asap Name An entry field displays the name of alarms profile to be
associated to the current Port. The Select hyperlink
allows to start the selection procedure. After the
selection procedure, the chosen value will be reported.
Frame Distribution Hashing key facilitates handling of traffic distribution
from a generic NNI port (MPLS or Bridge port) toward
UNI access with a better granularity criteria. The default
value is C000.
Admin State Allows to set the Administration status. Possible values
are: enable (the LAG is in-service) or disable (the LAG
is out-of-service)
Oper. State The read-only field indicates the current operational
status of the Port, information about the actual state of
the Aggregation Port regarding the traffic; possible
values: up (the traffic on Aggregation Port is active) or
down (the traffic on Aggregation Port is inactive).
Bandwidth Indicates the actually used Bandwidth of the LAG, after
that Aggregated Ports have been associated to this
LAG. It is the sum of Aggregated Ports rate
Available Band Indicates the available Bandwidth of the LAG
LACP type Indicates if the Link Aggregation Control Protocol is ON
(i.e. lacpOn is active on this aggregator) or OFF
(IacpOff inactive); read only field, fixed by the system.
LACP Enabled Specifies if the LACP is enabled or disabled.
Size Allows to set the size of the LAG, i.e. number of
Aggregated Ports. The values are integers in the range
1 to 8
Encaps Method The entry field indicates the method of MAC packets
encapsulation inside the underlying physical layer.
Possible options are: ethernetV2 (default mode, set by
the system) or IEEE8023 (not yet operative).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 181
Accessing the node 1850 TSS-5C

3
Click Save and Continue to apply the previous settings and restart with new configuration.

4
Click Save and Exit to save the modification and return to the previous screen.

5
Click Cancelto exit the screen without saving.

6
To delete a LAG: Delete all LAG related traffic, unbind all ports and change ADMIN state to
disable. Navigate back to the LAG Group (Link Aggregation Management Group) icon from the
tree area and expand. Click to select the LAG Group. In the Link Aggregation Mng tab, select
the LAG configuration to be deleted and click Delete.

END OF STEPS

3.35 Accessing the node


3.35.1 Steps

1
To access the node, click on the System Identifier in the Tree menu in the left panel and click on
the Node tab in the screen displayed as shown in Figure 120, “Accessing the node” (p. 181).
The provisioned Racks are listed.

Figure 120 Accessing the node

2
Click on the Rack to view the Rack details as shown in

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
182 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Provisioning a Shelf

Figure 121 Provisioned Rack

Note: The Rack details can also be viewed by clicking on the Rack name in the Tree
Menu.

3
Click UP to return to the Node screen.

END OF STEPS

3.36 Provisioning a Shelf


3.36.1 Steps

1
Select SHELF-x-x: yyyy node from the tree area. The tree expands and shows the shelf
composition subtree and select one of the SHELF-x-x; yyy nodes from the tree area as shown
in Figure 122, “Accessing the Shelf” (p. 184).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 183
Provisioning a Shelf 1850 TSS-5C

Figure 122 Accessing the Shelf

2
The Rack x > Shelf x-x tab displays the UP Rack-x > Shelf-x and panel that consists of the
following parameters:

The UP Rack x Shelf x panel resumes the shelf info and displays the following read-only fields:
• Access Identifier - Specifies the equipment entity.
• Current Provisioned Type - Specifies the equipment entity.
• Actual Type - Specifies the physically equipped entity type (see Current Provisioned Type).
• Primary/secondary state - Specifies the primary and secondary service state.
• Shelf ID - Specifies, for the Shelf Types, the provisioned shelf identification value. It can
range from 1-31.
• Shelf Role - Specifies, for the Shelf Types, the provisioned shelf role. The value is: MAIN
(main shelf of the NE)

The Restart panel resets the specified equipment entity and displays the following fields:
• Phase - Allows to select the type of restart. The values are:
− Warm - Reload of dynamic and static data (db and sw). This field is used with AID = ALL
for normal full reset of the NE.
− Power-On
• Mode- Specifies if the restart is normal or forced

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
184 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Provisioning a Shelf

Note: In case AID is SHELF, the Restart section has only Phase=POWER-ON, and
MODE=FRCD.

3
To Restart Shelf, Core and I/0 card select the Phase and Mode of the card as shown in “
Steps” (p. 0).

4
Click Apply. The following window pops up for confirmation as shown in “ Steps” (p. 0).

5
Click Yes to start the restart function and No to exit.

6
Select the Shelf parameters as described in step 2 and click Apply to save and configure the
settings.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 185
Provisioning a Shelf 1850 TSS-5C

The table contains the following details relevant to the shelf:


• Board - Lists all the shelf slots.
• Resource - Specifies the access identifier of the shelf/shelves (type and position). It is also
shown in the tree. The values are:
• MDL (generic AID of a traffic bearing equipment that is not yet provisioned). The relevant row
is provided with the provision hyperlink to start the provisioning procedure.

8
Click on the Equipment tab to view the application view of the shelf and slots as shown in
Figure 123, “Equipment view” (p. 185).

Figure 123 Equipment view

9
Resources can be modified via the Shelf screen or via the tree menu.

END OF STEPS

3.36.2 Provisioning Boards

1
The Rack x > Shelf x > Board xx tab page presents two panels and a table. The Rack x >
Shelf x > Board xx panel contains the following parameters:

Table 28 Board configuration parameters

Parameter Description
Access Identifier Specifies the Equipment Access Identifier, identifies the
equipment entity access identifier.
Provisioned Type Specifies the type of the shelf actually provisioned.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
186 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Provisioning a Shelf

Table 28 Board configuration parameters (continued)

Parameter Description
Actual Type Specifies the Physically equipped module type (see Current
Provisioned Type)
Primary state Specifies the primary and secondary service state.

Figure 124 Board xx configuration (PD)

2
Click on the View hyperlink provided for alarms to view the associated alarms for the board.
The Alarms Report for the PD board are displayed as shown in “Provisioning Boards” (p. 0).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 187
Provisioning a Shelf 1850 TSS-5C

Click Close to return to the previous screen.

3
Click on the View hyperlink provided for Conditions to view the associated conditions as shown
in Figure 125, “Conditions” (p. 189)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
188 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Provisioning a Shelf

Figure 125 Conditions

Click Close to return to the previous screen.

4
Click provision hyperlink to provision the SFP/XFP module for the selected board.

5
Select the SFP/XFP module from the Provisioned Type drop-down list box, the SFP details are
provided, in this instance SFP-1-1-2-7 as shown in Figure 126, “SFP details ” (p. 190)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 189
Provisioning a Shelf 1850 TSS-5C

Figure 126 SFP details

Specify the board parameters as follows:

Table 29 Board parameters

Parameters Description
Access Identifier Specifies the access identifier of the selected module
Actual Type Specifies if the board is configured or not
Provisioned Type Specifies the type of equipment to be provisioned
Primary state Specifies the primary state of the equipment. The supported
values are:
• IS
• OOS
Command Mode Specifies the command mode of the equipment. The supported
values are:
• NORM
• FRCD
Alarm Profile Indicates the alarm profile.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
190 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

6
Click Save to save the settings, the tree area displays the XFP module provisioned on the
selected facility.

7
Click Create hyperlink to configure the Ethernet port for the selected module.

8
The Rack xx > Shelf xx > Board xx > Module xx > Port xx displays the following tabs:
• Physical
• Quality of Service-This tab is displayed only if the Admin State parameter value is set to “up”.
• PM data-This tab is displayed only if the Admin State parameter value is set to “up”.
• PNAC

END OF STEPS

3.37 Port configuration


3.37.1 Physical tab

1
The PHYSICAL tab displays the following panels as shown in Figure 127, “Port Configuration”
(p. 190)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 191
Port configuration 1850 TSS-5C

Figure 127 Port Configuration

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
192 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

END OF STEPS

State
In this panel the settings of the resource can be modified by means of the following parameters:
• Admin state - Allows to set the administrative state. The choices are: up = active state or down
= not active state.
• Last change - Specifies the date and time when the resource had been managed last time.
• Operational state - Specifies the actual state of the resource.
• MAU Operational state - Specifies the actual state of the Medium Access Unit (MAU).
• Alarm Severity Profile - Specifies the ASAP label that is in use for the resource.

Ethernet Port
• Connector present - Indicates if the interface has a physical connector. The values are: true or
false.
• Type - Indicates the type of port (fixed to "ethernetCsmacd"). The values fixed:
ethernetCsmacd.
• Speed - Indicates the actual configured rate. The values are: 1000000 (1 Gb/s) or 10000000 (10
Gb/s).
• Alias - Indicates the friendly name for the interface that can be set by the user.
• Encapsulation mode - Indicates the method of MAC packets encapsulation inside the
underlying physical layer. The values are: ethernetV2 (default) or IEEE8023.
• Maximum MTU/MRU - Indicates the Maximum Transmit Unit/Maximum Receive Unit size of the
largest packet that can be sent/received on the interface, specified in octets. The value ranges
from 1574 to 9242 (R1.0) or from 1574 to 10240 (From R4.0).
• Promiscuous mode - Indicates indicating whether this interface has to inspect the packets'
MAC addresses. The values are: true or false.
• FCS discard errored frame - Indicates the insertion or removal of GFP-FCS (Frame Check
Sequence) field into the optional field FCS of the GFP frame. The values are: true or false.
• Client type - Indicates the transported layer. The values are: ets (for Ethernet Transparent
System), etb (for Ethernet Bridge System) or LinkAgg (for Link Aggregation System).
• Underlie layer - Indicates the associated layer. The allowable values are: mau (for Ethernet
Transparent System), vconc (virtual concatenation to permit the setting of the "virtual-
concatenation granularity" mode) or sdh (to permit the setting of the "Rate-Limiting" mode.
NOTE: this value is given only in the case that the concatenation number for the VC4 is equal to
1).
• Link up/down trap - Indicates whether linkUp / linkDown traps (notification upon the changing of
the node operational state from up to down and vice versa) should be generated for this
interface. possible options: enabled / disabled the associated layer. The values are: enabled or
disabled.
• Physical address

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 193
Port configuration 1850 TSS-5C

Ethernet Port Mirroring

The Ethernet port mirroring allows duplicating traffic of a mirrored port in a service and sending a
copy of this traffic to another dedicated port without affecting the service. In order to configure the
port mirroring feature, specify the mirrored port, mirroring port, and mirroring direction (ingress,
egress). The speed of mirroring port is recommended to be greater than that of mirrored port.
• Mirror Type - Displays the type. The allowable types are no mirroring, mirroring input,
mirroring output.
• Mirrored port - Select the Ethernet port from the list whose traffic has to be duplicated.

Note: Only local ports support port mirroring. The mirrored port and the mirroring port must be
different ports and the ifAdminStatus of one local port must not be “DOWN” before it is
selected as mirrored port.

MAU

The panel has the Save hyperlink in order to save the settings.
• MAU panel - Allows to change the settings of the resource and displays the following
parameters:
• MAU identifier - Specifies a number assigned by the system. The value is: 1.
• Front Panel Port - Specifies a number assigned by the system; it is the identifier of the physical
port on the front of the PIM. The value is: <8 digit number>.
• State - Specifies the MAU current status. The values are: operational or shutdown.
• Jack Type List - Specifies the available connectors type. The values are: RJ45 for FE port or
fiberLC for GBE port.
Note: Use AN-enable for GE interworking between the TSS-5C and TSS-320.
• Jabber type - Specifies the state of the jabber process (checking about abnormal data
transmissions longer than the max permissible packet length).
• Default Type - Specifies the type of physical I/F. The values are:
• b1000BaseXFD for 1GE (1000Mbps) LAN
• Auto-negotiation supported - Indicates if the auto-negotiation is supported or not. The values
are: true or false.
• Auto-negotiation enabled - Indicates if the auto-negotiation is enabled or not. The values are:
enabled or disabled.
• Autonegotiation state - Indicates the state.
• bfdxPause
• bfdxBPause
• b1000baseXFD
The panel has the following hyperlinks:
Save link - To save the settings.
Enable autonegotiation - To change the last described field without using other page command.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
194 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Flow Management
• Flow management panel - Allows to change the settings of the resource and displays the
following parameters:
• VLAN Profile Protocol
• Egress Shaping Management panel
• (T)MPLS Management panel - Click CREATE MPLSIF link to create new MPLSIF.

3.37.2 Configure Port Scheduling and Shaping

1
Navigate to the Port in the main menu and click on the port, the port management screen is
displayed.

2
Specify the Egress scheduling rate in Kbps. Click Enableto enable egress port shaping.
Clicking Disable will disable the egress port shaping.

Note: The NE has the capability of supporting a total of four MPLS ports (including the
main board and the 08FXK board).

END OF STEPS

3.37.3 Configure MPLSIF

1
Click on MPLSIF under the TMPLS Management section to configure MPLSIF as shown in
Figure 128, “Configure MPLSIF” (p. 196) and described in Table 30, “Configure MPLSIF
parameters” (p. 196).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 195
Port configuration 1850 TSS-5C

Figure 128 Configure MPLSIF

Table 30 Configure MPLSIF parameters

Parameter Description
MEP Specifies the Maintenance Entity Point. For enabling MEP function,
the direction of MEP is according to the direction of Tunnel Segment.
The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group Identifier. This parameter
must be unique in the system

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
196 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Table 30 Configure MPLSIF parameters (continued)

Parameter Description
MEP ID Specifies the Maintenance Entity Point Identifier. This parameter is
unique inside MEG ID. If provisioned, this parameter must be different
from EXP MEP ID. The MEP ID is in the range 1 to 8191
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
The default value is EF.
CV Rx It enables/disables (ENABLE/DISABLE) capability to detect the Loss
of Continuity (LOC) alarm, associated to Sink Tunnel Segment
Termination. ENABLE value is not applicable if DIR=UNIDIRIN
CV PHB Specifies the CV packet transmission for PHB profile
CV Period Specifies the period (1/Frequency) of CV packet transmission

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 197
Port configuration 1850 TSS-5C

Table 30 Configure MPLSIF parameters (continued)

Parameter Description
CV Tx Specifies the period (1/Frequency) of CV packet transmission
EXP MEP ID Specify the MEP EXP ID in the value range of 1 to 8191.
Proactive DM Determines whether Proactive DM is enabled or disabled. When
Proactive DM is set to enabled, the PRODM performance monitoring
parameters can be configured.
Proactive DM Specifies the DM interval in terms of 1s, 10s, 1m and 10m.
Period
Proactive DM Determines the length of the Proactive DM Packet.
Packet Length

2
Click Save to save the MPLSIF configuration.

3
To configure PRODM Performance Monitoring parameters, click on the PRODM performance
monitoring tab and configure the PRODM Performance Monitoring parameters as described in
Step 17 to Step 29.

END OF STEPS

3.37.4 Quality of Service tab

1
The Quality of Service tab displays the following as shown in

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
198 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 129 Quality of Service tab

2
The Quality of service tab displays the VT for the selected port. Specify the VT range and click
Search/Refresh to retrieve the VT profile.

3
Click on the VT Index number to display the modify the VT parameters.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 199
Port configuration 1850 TSS-5C

Figure 130 Modify a Virtual Transport profile

4
Click on the Queue to modify the VT queue profile as shown in Figure 131, “Modify VT Queue”
(p. 201)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
200 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 131 Modify VT Queue

5
Select the Queue Type Strict Priority or Weighted Bandwidth.

6
Specify the Committed Rate when queue type is Weighted Bandwidth.

7
Specify the shaping as true or false and the peak rate in Kb/sec.

8
Specify the associated queue profile.

9
Click Save to save the changes or Cancel to return to the previous screen without saving.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 201
Port configuration 1850 TSS-5C

10
Click Cancel to cancel and return to the previous screen.

11
Click Save to save the profile changes.

12
Disfrute
Click Deactivate to deactivate the profile.

END OF STEPS

3.37.5 PM Data tab

1
Press statistics button in CES PW management.

2
Click the PM data tab, the Performance Monitoring screen is displayed as shown in Figure
132, “Performance Monitoring Data” (p. 201).

Figure 132 Performance Monitoring Data

The Performance Monitoring tab displays the following functional tabs:


• Maintenance Rx
• Maintenance Tx
• Current Data

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
202 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

• History Data

3
Click the Maintenance Rx tab to display the Maintenance Rx parameters as shown in Figure
133, “Maintenance Rx tab” (p. 202)

Figure 133 Maintenance Rx tab

4
Specify the Maintenance Rx/Tx parameters as described in Table 31, “Maintenance Rx/Tx
parameters” (p. 203)

Table 31 Maintenance Rx/Tx parameters

Parameter Description
Polling Period (sec) Provides an increment or decrease in the current value.
Select the up/down buttons to modify the existing value.
Number of Retries Provides an increment or decrease in the number of
retries. Select up/down arrow buttons to modify the
existing value.
Polling Window (sec) Polling Window value changes if the Polling Period and
Number of Retries values are modified.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 203
Port configuration 1850 TSS-5C

Table 31 Maintenance Rx/Tx parameters (continued)

Parameter Description
Polling row Indicates the polling interval as 15m or 24h.
Note:Only applicable to Current PM data
Direction Indicates the direction as Rx .
Note:Only applicable to Current PM data
Start or Stop Starts or stops the increment or decrease.

5
Click the Current Data tab to view the performance counters and create PM as shown in Figure
134, “Current Data” (p. 204).

Figure 134 Current Data

The Current Data tab displays the following panels:


• Performance Monitoring
• Polling Management

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
204 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 135 Create PM

6
Click Create PM to create. Specify the PM and Polling Management parameters and click Start/
Stop to increment or decrease the counters.

END OF STEPS

Performance Monitoring panel

The Performance Monitoring panel displays the following parameters:


• Interface - Specifies the name of the interface.
• Granularity Period - Specifies the granularity period for monitoring the performance. The values
are 15m to 24h.
• Direction - Specifies the direction. The values are Rx and Tx.
• Threshold Profile- Specifies the PM threshold profile based on the granularity period.

Polling management
The Polling Management panel has the same parameters as shown in Table 31, “Maintenance
Rx/Tx parameters” (p. 203).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 205
Port configuration 1850 TSS-5C

3.37.6 CES PM Tab

1
Click the PM data tab the Performance Monitoring screen is displayed as shown in the following
figure.

Figure 136 CES Performance Monitoring Data

The Performance Monitoring tab displays the following functional tabs:


• Maintenance Rx
• Current Data
• History Data

2
Click the Maintenance Rx tab to display the Maintenance Rx parameters as shown in the
following figure.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
206 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 137 CES Maintenance Rx Tab

3
Specify the Maintenance Rx parameters as described in Table 31, “Maintenance Rx/Tx
parameters” (p. 203)

4
Click the Current Data tab to view the performance counters and create PM as shown in the
following figure.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 207
Port configuration 1850 TSS-5C

Figure 138 CES Current Data Tab

5
Click the History Data tab the Performance Monitoring screen is displayed as shown in the
following figure.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
208 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 139 CES History Tab

The History Data tab displays the history details of rlsrlsl2/ETHLocPort#1#1 port.

6
Specify the following PM parameters as described in the following table:

Table 32 PM Parameters Tab

Parameter Description
Missing Packets Number of missing packets (as detected via
control word sequence number gaps).
Packets Re-Order Number of packets detected out of
sequence (via control word sequence
number), but successfully re-ordered
Jitter Buffer Underruns Number of times a packet needed to be
played out and the jitter buffer was empty.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 209
Port configuration 1850 TSS-5C

Table 32 PM Parameters Tab (continued)

Parameter Description
MisOrder Dropped Number of packets detected out of order (via
control word sequence numbers), and could
not be re-ordered, or could not fit in the jitter
buffer.
Malformed Packets Number of packets detected with
unexpected size, or bad header’s stack.
Errored Seconds The counter associated with the number of
Error Seconds encountered. Any malformed
packet, seq. error, LOPS and similar are
considered as error seconds.
Severely Errored Seconds The counter associated with the number of
Severely Error Seconds encountered.
Unavailable Seconds The counter associated with the number of
Unavailable Seconds encountered. Any
consecutive ten seconds of SES are
counted as one UAS.

END OF STEPS

3.37.7 In Fiber In Band

1
After configuration of the MPLSIF, the In fiber In Band tab is displayed as shown in Figure 140,
“MPLSIF Ethernet Port Management” (p. 211)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
210 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 140 MPLSIF Ethernet Port Management

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 211
Port configuration 1850 TSS-5C

2
Click on the In Fiber In Band tab, the screen is refreshed to display the In Fiber In band
configuration screen as shown in Figure 141, “In Fiber In Band Management” (p. 211)

Figure 141 In Fiber In Band Management

3
Modify and click Save to save the In fiber in band management settings or click Cancel to
return to the previous screen.

4
Click Activate to activate the In fiber In Management setting as shown in Figure 142, “Activate
In Fiber In Band Management” (p. 213)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
212 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Port configuration

Figure 142 Activate In Fiber In Band Management

5
Click Deactivate to deactivate the In Fiber In Band Management.

END OF STEPS

3.37.8 PNAC tab

1
Click the PNAC tab to configure PNAC parameters. Refer the 3.97 “PNAC Management”
(p. 451) section for configuration and management of PNAC parameters.

END OF STEPS

3.37.9 Port Management restrictions

The following are the port management restrictions:


• Main board: 6FE ports are guaranteed (1~6), 2 GE ports are guaranteed (7~8).
• Option slot 1: any option board can be assigned in the slot with full capacity.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 213
Port configuration 1850 TSS-5C

• Option slot 2: if O16E1/OTRI board, full capacity; is not allowed (not blocked by SW, if assigned,
port 1~2 can be used); in case the OTRI board is used, and in the future STM-1 CES is used,
the FE port 15 and 16 on main board should not be used (note: not blocked by SW). For slot 2
O8FEK is allowed full capacity.
• If the OTRI board is used in the first (or second) option slot, the GE port 9 (or 10) on main board
cannot be used.
• Option slot 2 for OFXK is allowed if the assigned ports 11-16 on main board are blocked.

Table 33 FE port arrangement (Scenario R4.0)

Configura- Main Slot Main 1st Option slot 1st Usage 2nd Option slot 2nd Usage
tion Usage

1 12 11~16 not 8 OFEK/O8FXK OK 8 6: main


O8FEK/ 11~16
O8FXK

2 12 15/16 not 8 OK 4 OTRI 2 main


O8FEK/O8FXK 15/16

3 12 11~16 not OTRI OK 8 6 main


O8FEK/ 11~16
O8FXK

4 12 OK 8 OK 2 0
O8FEK/O8FXK O16E1/R202E

5 12 11~16 not 2 OK 8 11~16 not


O16E1/R2O2E O8FEK/
O8FXK

6 12 OK 2 OK 2 OK
O16E1/R2O2E O16E1/R2O2E

7 12 15/16 not 2 OK OTRI 2 main


O16E1/R2O2E 15/16

8 12 OK 4 OTRI OK 2 OK
O16E1/R2O2E

9 12 15/16 not 4 OTRI OK 4 OTRI 2 main


15/16

Note: Always put the option board which needs higher FE capacity in option slot Requested
FE capacity: O8FEK/O8FXK > OTRI > O16E1.

Table 34 GE port arrangement (Scenario R4.0)

Configuration Main slot usable GE 1st option slot 2nd option slot
ports
1,4,5,6 7, 8, 9,10 Not OTRI Not OTRI
3,8 7, 8, 10 OTRI with GE Not OTRI
2,7 7, 8, 9 Not OTRI OTRI with GE

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
214 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create Traffic Descriptor (Data)

Table 34 GE port arrangement (Scenario R4.0) (continued)

Configuration Main slot usable GE 1st option slot 2nd option slot
ports
9 7, 8 OTRI with GE OTRI with GE

Note: The NE supports a total of four GE switches.

3.38 Create Traffic Descriptor (Data)


3.38.1 Purpose
1850 Transport Service Switch (TSS-5C) ZIC (Zero-Installation Craft Terminal) Data supports (in
mutually exclusive mode) the following workings modalities.

1
Select Data -> Traffic Descriptor from the menu bar as shown in Figure 143, “Traffic
descriptor” (p. 215).

Figure 143 Traffic descriptor

2
Select Create to configure a new Traffic Descriptor as shown in Figure 144, “Create traffic
descriptor” (p. 216).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 215
Create Traffic Descriptor (Data) 1850 TSS-5C

Figure 144 Create traffic descriptor

Click any entry under the User Label column to view the current status of the traffic descriptor.

3
Table 35, “Traffic descriptor parameters” (p. 216) provides description of Traffic descriptor
panel parameters:

Table 35 Traffic descriptor parameters

Parameter Description
User Label Indicates the label for Traffic Descriptor

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
216 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create Traffic Descriptor (Data)

Table 35 Traffic descriptor parameters (continued)

Parameter Description
Service Type Indicates the Traffic codification, according to international
standard conversion:
The Service Type drop-down list has the following options:
• guaranteedService
Serves High priority traffic for mission critical applications
that require loss–less delivery and minimal delay.
Guaranteed SLA denotes BW (CIR = PIR > 0), that is
always available regardless of any congestion conditions.
Traffic delivered using Guaranteed BW, is policed to the CIR
value with a burst window equal to the CBS.
• guaranteedService2
• regulatedService
Serves Medium priority traffic. The portion of bandwidth
between CIR and PIR (aka EIR) are partially available
under congestion conditions.
• regulatedService1
• regulatedService3
• regulatedService4
• bestEffortService
Serves Low priority traffic. Best Effort denotes BW (PIR >
CIR = 0), which may or may not be available per network
operator's reservation for Best Effort policy. It may therefore
be unavailable under congestion conditions
• backGroundService
• anyServiceClass
Note: Null traffic descriptor parameters encompassing PIR,
CIR, CBS, and PBS are all equal to zero (Starting from
Release 6.1.10).
CIR -Committed This is the guaranteed rate (expressed in kb/sec) of the data
Information Rate [kb/sec] flow (Effective Bandwidth) and it ranges from 0 to PIR value.
PIR - Peak Information This is the peak rate (expressed in kb/sec) up to which the
Rate [kb/sec] source can transmit and it ranges from 3 to physical-line-rate
of the relative Port
CBS - Committed Burst This is the committed number of bytes for which the source
Size [bytes] may transmit the CIR. The supported value range is 0 to 64
MBytes. A value greater than MTU (e.g. 2000) is advisable
PBS - Peak Burst Size This is the maximum number of bytes for which the source
[bytes] may transmit the PIR; it ranges from 2048 to 64 MBytes.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 217
Create queue management 1850 TSS-5C

4
Click Cancel to return to the previous screen without saving.

5
Click Save & Exit to create a new Traffic Descriptor in the following described and leave the
page

6
Click Save & Continue to create a new Traffic Descriptor in the following described and create
another one.

7
The Traffic Descriptor tab displays the table that contains different traffic descriptor entries.
Click any entry under the User Label column to view the current status of the traffic descriptor.

The Traffic Descriptor panel displays the same parameters described for Create Traffic
Descriptor except the following parameter:
• State - Specifies the current state of the Traffic Descriptor.

9
Click Cancel to return to the previous page.

10
Click Deactivate to deactivate the active state of the traffic descriptor.

11
Click Save to store the changes.

12
Click Delete to remove the existing entries set for the parameters.

END OF STEPS

3.39 Create queue management


3.39.1 Purpose

Use this procedure to configure the Queue Management.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
218 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create queue management

1
Select Data -> Queue Management from the menu bar as shown in Figure 145, “Queue
profile management” (p. 218).

Figure 145 Queue profile management

2
Select the Show ghost objects check-box to configure the Queue Profile with ghost objects.
• User Label - specifies the user label of the Queue Profile.
• Status - specifies the status of the Queue Profile. It is visible only when the "Show ghosts
objects" is checked.

3
Click Create to configure a new Queue Profile as shown in Figure 146, “Create queue profile”
(p. 219).

Figure 146 Create queue profile

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 219
Create queue management 1850 TSS-5C

4
Table 36, “Queue profile - new parameters” (p. 219) provides the description of Create Queue
Profile panel parameters:
Table 36, “Queue profile - new parameters” (p. 219) provides description of queue profile
parameters.

Table 36 Queue profile - new parameters

Parameter Description
User Label Specifies the canonical name assigned to WRED profile.
UpTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets is 100
percent. This implies that all Green packets beyond this
point will be dropped. The default value is 90
LowTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets starts to
rise above 0. The default value is 70
Max Prob of Green Pkts Specifies the drop probability (0 to 100) of Green packets
increases steadily from 0 (at Queue Profile Green Lower
Threshold) up to Queue Profile Green Drop Max
Probability (at Queue Profile Green Lower Threshold). The
default value is 80
UpTh Yellow Pkts Specifies the percentage of the buffer utilized after which
the drop probability of Yellow packets is 100 percent. This
implies that all packets beyond this point will be dropped.
The default value is 60
LowTh Yellow Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Yellow packets starts to
rise above 0. The default value is 50
Max Prob of Yellow Pkts Specifies the drop probability (0 to 100) of Yellow packets
increases steadily from 0 (at Queue Profile Yellow Lower
Threshold) up to Queue Profile Green Drop Max
Probability (at Queue Profile Yellow Lower Threshold). The
default value is 80

5
Click Save to store the settings and return to the previous page.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
220 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify queue profile

6
Click Cancel to revoke the changes and return to the previous page.

END OF STEPS

3.40 Modify queue profile


3.40.1 Purpose

Use this procedure to modify the existing Queue Profile.

1
Click User Label hyperlink as shown in Figure 145, “Queue profile management” (p. 219), to
modify the Queue Profile as shown in Figure 147, “Queue profile management” (p. 220).

Figure 147 Queue profile management

2
Table 37, “Modify queue profile parameters” (p. 222) provides the description of Modify Queue
Profile panel parameters:

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 221
Modify queue profile 1850 TSS-5C

Table 37 Modify queue profile parameters

Parameter Description
Index Defines the Queue Profile Index to be modified
User Label The label for the Modify queue profile instance
UpTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets is 100
percent. This implies that all Green packets beyond this
point will be dropped. The default value is 90
LowTh Green Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Green packets starts
to rise above 0. The default value is 70
Max Prob of Green Pkts Specifies the drop probability (0 to 100) of Green
packets increases steadily from 0 (at Queue Profile
Green Lower Threshold) up to Queue Profile Green
Drop Max Probability (at Queue Profile Green Lower
Threshold). The default value is 80
UpTh Yellow Pkts Specifies the percentage of the buffer utilized after which
the drop probability of Yellow packets is 100 percent.
This implies that all packets beyond this point will be
dropped. The default value is 60
LoTh Yellow Pkts Specifies the percentage (0 to 100) of the buffer utilized
after which the drop probability of Yellow packets starts
to rise above 0. The default value is 50
Max Prob of Yellow Pkts Specifies the drop probability (0 to 100) of Yellow
packets increases steadily from 0 (at Queue Profile
Yellow Lower Threshold) up to Queue Profile Green
Drop Max Probability (at Queue Profile Yellow Lower
Threshold). The default value is 80

3
Click Cancel to return to the previous page.

4
Click Save to apply the changes and return to the previous page.

5
Click Deactivate to set the status to "not In Service" value.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
222 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create color profile

6
Click Delete to remove the selected Queue Profile.

END OF STEPS

3.41 Create color profile


3.41.1 Purpose

Use this procedure to create a new color profile.

1
Select Color Profile from the Data menu as shown in Figure 148, “Color profile” (p. 222) .

Figure 148 Color profile

2
The Color Profile tab displays the table that contains the existing color profiles.

3
Click Create to configure a new color profile as shown in Figure 149, “Color profile creation”
(p. 223) .

Figure 149 Color profile creation

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 223
Create maintenance domain 1850 TSS-5C

4
Table 38, “Color profile parameters ” (p. 223) provides description of Color Profile panel
parameters:

Table 38 Color profile parameters

Parameters Description
Color Profile Mode Specifies the color profile mode. The default
value is Priority
User Label Specifies the label for the new color profile
Priority Bits 0 to 7 Specifies the priority bits. The valid range is
0-7. The values are:
• green
• yellow
• red

5
Click Cancel to cancel the settings and return to the previous page.

6
Click Save & Exit to save the settings and return to the previous page.

7
Click Save & Continue to save the settings and continue to create another color profile.

END OF STEPS

3.42 Create maintenance domain


3.42.1 Purpose

Use this procedure to Create/Modify/Delete a Maintenance Domain.

1
Select Data -> OAM Management -> OAM Resource config. -> MD from the menu bar as
shown in Figure 150, “Maintenance domain” (p. 225).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
224 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create maintenance domain

Figure 150 Maintenance domain

2
Click Create to configure a new Maintenance Domain.

3
Click the radio button to select the existing Maintenance Domain entry.

4
Table 39, “Maintenance Domain Parameters” (p. 225) provides description of Modify
Maintenance Domain panel parameters:

Table 39 Maintenance Domain Parameters

Parameter Description
MD Label Specifies the maintenance domain label.
The default values is MD#1
Name Specifies the name for the maintenance
domain
MHFCreation The values are:
• defMHFdefault
Status Specifies the maintenance domain status.
The values are:
• up
• down
Format Specifies the MD format. The values are:
• charString
• None
Level Specifies the maintenance domain levels.
The valid range is from Level0 to Level7

5
Click Save to save the settings and return to the previous panel.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 225
Modify maintenance domain 1850 TSS-5C

6
Click Cancel to cancel the settings and return to the previous panel.

7
Click Delete to remove the select the Maintenance Domain entry from the tabular list.

END OF STEPS

3.43 Modify maintenance domain


3.43.1 Purpose
Use this procedure to modify the existing maintenance domain.

1
Select the maintenance domain entry from the panel as shown in Figure 150, “Maintenance
domain” (p. 225).

2
See Table 39, “Maintenance Domain Parameters” (p. 225)that provides details on the domain
parameters, select the MD to modify and update the parameters.

END OF STEPS

3.44 Create maintenance association


3.44.1 Purpose

Use this procedure to configure the Maintenance Association.

1
Select Data -> OAM Management -> OAM Resource config. -> MA from the menu bar as
shown in Figure 151, “OAM resource config. - maintenance association” (p. 227).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
226 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create maintenance association

Figure 151 OAM resource config. - maintenance association

2
Table 40, “Maintenance association - range parameters” (p. 227) provides description of
Range panel parameters:

Table 40 Maintenance association - range parameters

Parameter Description
Search Filter Specifies the search criteria. The values are
Show all or Specify Criteria
MD From To Specifies the MD range from 1-8
MA From To Specifies the MA range from 1-128

3
Click Search to filter the Maintenance Association based on the range selected.

4
Click Create to configure a new Maintenance Association. The following screen is displayed as
shown in “Purpose” (p. 0).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 227
Create maintenance association 1850 TSS-5C

5
Table 41, “Maintenance association - create parameters” (p. 228) provides description of
Create Maintenance Association panel parameters:

Table 41 Maintenance association - create parameters

Parameter Description
MD Specifies the MD number. The values are MD#1 and
MD#2
MA Index Specifies the index for new Maintenance Association
MA Name Specifies the new name for Maintenance Association
Format Specifies the format for new Maintenance Association.
Status Specifies the current status. The values are:
• Up
• Down
MHFCreation The values are:
• defMHFdefault
CCM Interval The values are:
• interval100ms
• interval10ms
• interval3.33ms
• interval10s
• Interval1s
• interval1min
• interval10min
Vpn Id Specifies the Vpn Id of the equipment

6
Click Save to save the settings and return to the previous panel.

7
Click Cancel to cancel all the settings and return to the previous panel.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
228 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify maintenance association

3.45 Modify maintenance association


3.45.1 Purpose
Use this procedure to modify the existing maintenance association.

1
Click Search to view the existing or newly created maintenance association.

2
Table 42, “Maintenance association - Modify ” (p. 228) provides description of the maintenance
association parameters.

Table 42 Maintenance association - Modify

Item Description
MA Index Specify index value for new maintenance association
MA Name Specifies the new label for maintenance association
MHFCreation Specifies the MHF creation value.
Vid Specifies the VLAN id of the equipment
Status Specifies the current status. The values are:
• Up
• Down
Format Specifies the format for new Maintenance Association.
The values are:
• charString
CCM Interval The values are:
• Interval1s
• interval10s
• interval1min
• interval10min
• interval10ms
• interval3.33ms
• Interval100ms

3
Click Save to store the modified values for the maintenance association.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 229
Create MEP 1850 TSS-5C

4
Click Cancel to quit without altering the parameter values.

END OF STEPS

3.46 Create MEP


3.46.1 Purpose
Use this procedure to configure a new MEP.

1
Select Data -> OAM Management -> OAM Resource config. -> MEP from the menu bar as
shown in Figure 152, “OAM management - MEP” (p. 229).

Figure 152 OAM management - MEP

2
Table 43, “MEP - range panel parameters” (p. 230) provides description of Range panel
parameters:

Table 43 MEP - range panel parameters

Parameter Description
Search Filter Specifies the search criteria. The supported value
is Specify Criteria.
MD From To Specifies the MD range from 1-512
MA From To Specifies the MA range from 1-512
MEP From To Specifies the MEP range from 1-8191

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
230 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create MEP

3
Click Create to configure a new MEP. The following screen is displayed as shown in Figure
153, “Create MEP” (p. 230)

Figure 153 Create MEP

4
Table 44, “MEP parameters” (p. 231) provides description of Create MEP panel parameters:

Table 44 MEP parameters

Parameter Description
MA Label Specifies the MA label for the MEP
MEP Identifier Specifies the MEP identifier for the MEP. The MEP ID is in
the range 1 to 8191.
MEP Association Specifies the MEP Association for the MEP.. The MEP
Association supports:
• Port
• pw
If Index Specifies the If Index value for the MEP
LTM/ CCM Priority Specifies the LTM Priority. The default valid range is 0-7

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 231
Create MEP 1850 TSS-5C

Table 44 MEP parameters (continued)

Parameter Description
Status Indicates the current status.
The values are:
• Up
• Down
Direction Indicates the MEP Direction.
The values are:
• Up
• Down
Active Specifies the MEP active state.
The values are:
• True
• False
CCIEnable Specifies the MEP CCIEnable state:
• True
• False
LBM Section
LBM priority Specifies the LBM Priority. The valid range is 0-7
Tx LBM Message Indicates the transmission of the LBM message. The value
range is 1-1024.
LBM Packet Length Specifies the LBM packet length. The maximum supported
bytes is 1564 and the default value is 64 bytes.

5
Click Cancel to revoke all the settings and return to the previous panel.

6
Click Save to save the settings. Click Search to display the new MEP list. The following screen
is displayed as shown in Figure 154, “OAM resource config - mep ” (p. 233).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
232 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create MEP

Figure 154 OAM resource config - mep

7
Select the radio button and Click the Activate hyperlink to activate the configured MEP list.
The MEP Identifier, Direction, If Index, CCIEnable, Active, Status, LinkTrace, LoopBack,
CCMDB, LPT (Link Pass Through) parameters are displayed.

Note: The priority values (1- Background, 3-Regulated(2), 5-Regualated(1)) for Ethernet
OAM packets sent by UP MEP on UNI are not allowed if the NNI TUSEG’s PHB profile is
selected from PHB range 1 (i.e. 5P3D mode).

END OF STEPS

3.46.2 Modify MEP

1
To modify an MEP, navigate to the MEP screen and click Search to display the configured
MEPs.

2
Click on the MEP to modify, the Modify MEP screen is displayed. Modify the MEP parameters
as described in Table 44, “MEP parameters” (p. 231)

3
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.

4
To Delete an MEP, check the checkbox provided for the configured MEP and click Delete.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 233
Configure EFM tool 1850 TSS-5C

3.47 Configure EFM tool


3.47.1 Procedure
Use this procedure to configure the available local ports.

1
Select Data → EFM tool option from the menu bar.
The EFM tool panel is displayed with the Configuration and Link Monitoring tabs. By default
the Configuration tab is opened.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
234 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure EFM tool

Figure 155 Configure EFM tool

Enter the appropriate parameters.


Click Save on the bottom left pane of the panel to save the changes.
Click Cancel to undo the changes and return back to the Search Local Port panel.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 235
Configure EFM tool 1850 TSS-5C

2
Click the Link Monitoring tab to display the Link Monitoring parameters as shown in Figure
156, “Link monitoring” (p. 235). Link monitoring tools are used for detecting and indicating link
faults under a variety of circumstances.

Figure 156 Link monitoring

3
Specify the Link Monitoring parameters as described in Table 45, “Link monitoring parameters”
(p. 237).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
236 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure EFM tool

Table 45 Link monitoring parameters

Parameter Description
Errored Symbol Period Event Specifies the number of symbol errors that occurred
(errored symbols per second) during a specified period that exceeded a threshold.
These are coding symbol errors.
Errored Frame Period Event Specifies the number of frame errors within the last N
(errored frames per N frames) frames that exceeded a threshold.
Errored Frame Event (errored Specifies the number of frame errors detected during
frames per second) a specified period that exceeded a threshold.
Errored Frame Seconds (errored Specifies the number of errored seconds (one
secs per M seconds) second intervals with at least one frame error) within
the last M seconds that exceeded a threshold

4
Click Event Log tab to display the Event Log panel as shown in Figure 157, “Event log”
(p. 237).

Figure 157 Event log

5
Click Show Log hyperlink to display the Figure 158, “Show event log” (p. 238).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 237
Configure On-Demand Delay Measurement 1850 TSS-5C

Figure 158 Show event log

6
Click Refresh to refesh the values.

END OF STEPS

3.48 Configure On-Demand Delay Measurement


3.48.1 Steps

To configure On-Demand DM:

1
Select Data -> OAM Management -> On Demand Tool -> Delay Measurement, the Delay
Measurement screen is displayed as shown in Figure 27, “On-Demand Delay Measurement”
(p. 68).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
238 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure On-Demand Delay Measurement

Figure 159 On-Demand Delay Measurement

2
Click Create to create the On-Demand DM as shown in Figure 160, “Create On-Demand Delay
Measurement” (p. 239).

Figure 160 Create On-Demand Delay Measurement

3
Click Select, to select the MEP Id.

4
Select the Priority between 0 to 7 from the drop-down.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 239
Configure On-Demand Delay Measurement 1850 TSS-5C

Note: The status field is not enabled.

5
Select the Destination as MEP ID or Mac Address. Provide the MEP ID or the Mac Destination
address as per the destination selection.

6
Enter the number of samples (pkts) between the value range of 1 to 100.

7
Select the Period in terms of Intervals.

8
Specify the Frame Size as Random or a value between 64 and 9600.

9
Click Save to save the On Demand DM configuration or click Cancel to return to the previous
screen without saving.

END OF STEPS

3.48.2 Modify On-Demand DM

1
Navigate to the Delay Measurement Tool screen, select the Search Filter. Specify the MEP-
ETH-OD-DM To and From values and click Search/Refresh to display the configured On-
Demand DM's in this range as shown in Figure 161, “Modify On-Demand DM” (p. 239)

Figure 161 Modify On-Demand DM

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
240 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure Alarm Indication Signal (AIS)

2
Select the DM to modify and update the parameters as explained in Create On-demand DM.

3
Click Save to save the DM modification or click Cancel to return to the previous screen without
saving.

4
To Delete a On-Demand DM, click Search/Refresh to locate the available configured DM's,
select and Delete.

END OF STEPS

3.49 Configure Alarm Indication Signal (AIS)


3.49.1 Steps

To configure the Alarm Indication Signal:

1
Select Data -> OAM Management -> Alarm Indication Signal, the Alarm Indication Signal
screen is displayed as shown in Figure 162, “Alarm Indication Signal” (p. 240).

Figure 162 Alarm Indication Signal

2
Click Create to create an AIS as shown in Figure 163, “Alarm Indication Signal” (p. 242)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 241
Configure Alarm Indication Signal (AIS) 1850 TSS-5C

Figure 163 Alarm Indication Signal

3
Click Select to select the MEP ID.

4
Select AIS Enable as True or False.

5
Select the Priority between the range of 1 and 7.

6
Select the Client MEL between the range of 0 and 7.

7
Select the Period in terms of Interval.

8
Click Save&Activate to save the configuration and activate the AIS or Click Cancel to return to
the previous screen without saving.

END OF STEPS

3.49.2 Modify AIS

1
Navigate to the AIS screen as described under Create AIS. Select the Search Filter from the
drop-down. Specify the From and To MEP values and click Search/Refresh as shown in
Figure 164, “Modify Alarm Indication Signal” (p. 243).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
242 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure PM Threshold

Figure 164 Modify Alarm Indication Signal

2
Select the AIS to modify and update the parameters as explained in Create AIS.

3
Click Save to save the AIS modification or click Cancel to return to the previous screen without
saving.

4
To Delete a AIS, click Search/Refresh to locate the available configured AIS, select and Delete.

END OF STEPS

3.50 Configure PM Threshold


3.50.1 Steps

To configure the PM Threshold:

1
Click Data ->PM Threshold as shown in Figure 165, “Performance Monitoring Threshold”
(p. 244).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 243
Configure PM Threshold 1850 TSS-5C

Figure 165 Performance Monitoring Threshold

2
Click Create to create an Ethernet Port Threshold as shown in Figure 166, “Create PM
Threshold” (p. 245)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
244 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure PM Threshold

Figure 166 Create PM Threshold

3
Specify a User Label and select the Granularity in intervals on minutes or hours.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 245
Configure PM Threshold 1850 TSS-5C

4
Specify the Enable value of the Rx Profile parameters as True or False and specify the Clear
and Raise criteria for each Rx Profile.

5
Specify the Enable value of the Tx Profile parameters as True or False and specify the Clear
and Raise criteria for each Tx Profile.

6
Click Save and Activate to create the PM threshold profile and activate or click Cancel to
return to the previous screen without saving.

END OF STEPS

3.50.2 Modify a PM threshold

1
Navigate to the PM Threshold screen as described in the Create PM Threshold section. Under
the Eth Port Threshold, click to select the PM threshold instance to modify, the Modify
Threshold Profile screen is displayed as shown in Figure 167, “Modify PM Threshold” (p. 245).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
246 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure PM Threshold

Figure 167 Modify PM Threshold

2
Modify the User Label or the Rx and Tx profiles and click Save to save the modifications or
click Cancel to return to the previous screen without saving.

3
To Delete a PM Threshold, click to select the configured PM threshold under the Eth Port
Threshold section, click Delete and confirm Deletion.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 247
Create 1:1 tunnel protection 1850 TSS-5C

3.51 Create 1:1 tunnel protection


3.51.1 Purpose
Use this procedure to configure Fast Facility Protection Group Management.

1
Select Protection -> 1:1 Tunnel Protection from the menu bar as shown in Figure 168, “Fast
facility protection group management” (p. 247).

Figure 168 Fast facility protection group management

2
Click Create to configure a new Fast Facility Protection Group as shown in Figure 169, “Fast
facility protection group - create” (p. 248).

Figure 169 Fast facility protection group - create

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
248 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create 1:1 tunnel protection

Table 46, “Fast facility protection group parameters” (p. 248) provides description of Create
Fast Facility Protection Group panel parameters:

Table 46 Fast facility protection group parameters

Parameter Description
Working Tunnel Specifies the working tunnel for the FFP group. Click Select to
obtain it from the list
Protecting Tunnel Specifies the Protecting Tunnel for the FFP group. Click Select
to obtain it from the list
Layer Select the Layer from the combo-box. The default value is
TUNNEL
Revert Tim (min) Specifies the revert time in minutes. The valid range is 0-12 and
the single WTR=51 hours (3060 minutes) is also supported.
Protection Type Specifies the protection type. The default values is APSBIDIR.
The values available are:
• APSBIDIR
• DHOME-COLON
Revertive Specifies the revertive values for the FFP group.
The options are:
• Yes- The revertive option can be configured by selectingY
• No- The non-revertive option can be configured by SelectingN
Note: Default value is Y.
Hold Off Time (msec) Specifies the hold off time. The valid range is 0-10000
milliseconds

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 249
Create 1:1 tunnel protection 1850 TSS-5C

Table 46 Fast facility protection group parameters (continued)

Parameter Description
APS PHB Specifies the APS PHB profile for the FFP group.
The supported values are:
• EXP0
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• EXP7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
Label Allows to define a label for the tunnel.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
250 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create 1:1 tunnel protection

Table 46 Fast facility protection group parameters (continued)

Parameter Description
DHOMEAPS Specifies the type of the APS indication transmitted for
dual-homing.
The supported values are:
• NONE - No Dual-homing APS indication is transmitted.
• R-APS - Only R-APS packet is transmitted as Dual-homing
APS indication
• CCMFLAG - Only CCM packet with flag bit set is transmitted
as Dual-homing APS indication
• BOTH - Both R-APS and CCM packet with flag bit set are
transmitted as Dual-homing APS indications

4
Click Save to store all the settings and return to the previous page.

5
Click Cancel to revoke all the settings and return to the previous page.

END OF STEPS

3.51.2 Configure NE Autodiscovery


Use the following procedure to configure NE Autodiscovery:

1
Select Communication -> NE Gen. Config -> NE Discovery option as shown in Figure 170,
“NE discovery - Site Header 1” (p. 251). Select PC from the drop-down.

Figure 170 NE discovery - Site Header 1

Table 47, “NE Autodiscovery” (p. 252) provides description of NE autodiscovery parameters.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 251
Create 1:1 tunnel protection 1850 TSS-5C

Table 47 NE Autodiscovery

Parameter Description
Site Identifier Target IDentifier of the target network
element for this command. 40
hexadecimal character NSAP address
may be used to address an NE with
unknown TID.
Date Shows the current date in the <year>
-<month>-<day> format
Time Shows the current time in the
<hour>-<minute>-<second> format

END OF STEPS

3.51.3 Retrieve NE TL1 Syntax


Retrieves the syntax of any TL1 command and related information. The window contains the
following entry field:
• NE TL1 HEADER - Allows to enter the TL1 command for which the syntax information is
required. 1-40 VALID TL1 command characters are supported.

3.51.4 Create Line MSP


When NE provisions two OTRI boards in designated neighbor slots (slot 3 and 4 or slot 5 and 6 or
slot 7 and 8), then on port 1 of both the boards, after provisioning STM-1 SFPs separately, a 1+1
STM-1 MSP group can be established by the user. This is also valid for port 2 of both the boards.
The protection switching can be configured as revertive or non-revertive and uni-directional or bi-
directional (i.e., both directions of transmission are respectively, switching separately or jointly),
provided the other end of the MSP link supports the necessary features.

3.51.5 Steps

1
Configure OTRI pack on Slot 3, Slot 4, and STM-1 SFP.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
252 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create 1:1 tunnel protection

Figure 171 Configure OTRI on slot 3 and slot 4

2
In slot 4 of OTRI pack choose STM-1 port.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 253
Create 1:1 tunnel protection 1850 TSS-5C

Figure 172 Configure MSP

3
Select Protection tab. In Protected Access Identifier select slot 3 STM-1 port as protected port.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
254 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create 1:1 tunnel protection

4
The following screen is displayed after the configuration is complete.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 255
Configure the IP address 1850 TSS-5C

END OF STEPS

3.52 Configure the IP address


3.52.1 Steps

Use the following procedure to configure the IP address of the DCN Physical interface.

1
Select Communication -> DCN Phys. If -> IP Address option.
Result: NE Generic Cfg panel is displayed as shown in

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
256 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure the IP address

Table 48 IP address settings

Parameter Description
MAC ADDRESS (Medium Access Control address) - This is the MAC
address assigned to the card. Note that this parameter
can only be read and cannot be modified.
IP Address (Internet Protocol address) - This is the IP address of
the NE. The entry box allows to digit the IP address of
the NE. The supported value range is {1-99,
101-126,128-223}- {0-255} - {0-255} - {0-254}.
Subnet Mask The entry box for subnet mask of the network to which
the NE is connected. The supported value range is
{128-255} - {0-255} - {0-255} - {0-255}. The mask, in
binary representation, must contain a contiguous string
of 1s (the network portion) and a contiguous string of
0s (the host portion).

2
Click Save to save the configuration settings.

END OF STEPS

3.52.2 Modify IP address

To modify the IP address:

1
Select Communication -> DCN Phys. If -> IP Address option.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 257
Configure LAN Management 1850 TSS-5C

2
Modify the IP address and the subnet mask as described in Table 48, “IP address settings”
(p. 257) and click Save to save the IP address.

END OF STEPS

3.53 Configure LAN Management


3.53.1 Steps

Use the following procedure to configure LAN Management:

1
Select Communication -> DCN Phys. If -> LAN manag. The Customer LAN Management
tab displays the Customer LAN Management panel as shown in Figure 173, “DCN physical
interface page - LAN management” (p. 257).

Figure 173 DCN physical interface page - LAN management

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
258 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure LAN Management

Table 49 Customer LAN Management

Parameter Description
OSI Protocol OSI. Determines if the OSI Protocol will be run
on the customer LAN or not.
The supported values are:
• N: OSI Protocol is disabled on the Customer
LAN
• Y: OSI Protocol is enabled on the Customer
LAN
Internet Protocol Determines if the Internet Protocol will be run on
the customer LAN.
The supported values are:
• N (Internet Protocol is disabled on the
Customer LAN)
• Y (Internet Protocol is enabled on the
Customer LAN)
Integrated ISIS Determines if the Integrated IS-IS Protocol will
be run on the customer LAN or not.
The supported values are:
• N: Integrated IS-IS Protocol is disabled on the
Customer LAN.
• Y: Integrated IS-IS Protocol is enabled on the
Customer LAN.
Note: The IS-IS over PPPoE tunnel label should
be unique in the CPE.
Proxy Address Resolution Protocol Proxy Address Resolution Protocol. Determines
if the ARP proxy is enabled or disabled on the
Customer LAN.
The supported values are:
• Y - Proxy Address Resolution Protocol is
enabled on the customer LAN
• N - Proxy Address Resolution Protocol is
disabled on the customer LAN
Gateway Address The default gateway router's IP address. The
supported value range is (1-199, 101-126,
128-223) - (0-255) - (0-255) - (1-254). The
default gateway address is 0-0-0-0 or the
previously existing value.
MAC address The Media Access Control address of the
Network Element.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 259
Configure LAN Management 1850 TSS-5C

Table 49 Customer LAN Management (continued)

Parameter Description
Port Speed Selection Determines the Port speed.
The supported port speed values are:
• 10: 10Mb/s port speed
• 100: 100Mb/s port speed
The default port speed selection is 100 or the
previously existing value.
OSPF Determines whether or not the OSPF protocol
will be functional on the Customer LAN.
The supported values are:
• Y : OSPF is enabled on the Customer LAN
• N : OSPF is disabled on the Customer LAN
The default OSPF value is N or the previously
existing value.
OSI area Determines to which OSI Area the Customer
LAN belongs. The supported value is 1.
Subnet Mask The subnet mask of the network to which the NE
is connected. The supported value range for
subnet mask is (128-255) - (0-255) - (0-255) -
(0-255). The default value is 255-255-255-255 or
the previously existing value.
IP Address of NE The internet protocol address of the NE. The
supported value range for the IP address is
(1-99, 101-126, 128-223) - (0-255) - (0-255) -
(1-254). The default IP address is 10-10-10-10 or
the previously existing value.
Note:Values 0-0-0-0 as IP address is not
supported.
Channel used by Determines the Management Channel in use.
The supported values are:
• MNGPLANE
• NONE
Port Duplex Mode Selection Determines the port duplex mode selection
The support port duplex mode values are:
• Half Duplex Mode
• Full Duplex Mode
The default port duplex value is Full or the
previously existing value.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
260 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure LAN Management

2
Click Save to save the configuration.

END OF STEPS

3.53.2 Modify a customer LAN

1
Navigate to the Customer LAN screen and click on the Customer LAN to modify. Modify the
Customer LAN parameters as described in table Table 50, “Modify a Customer LAN” (p. 260)

Table 50 Modify a Customer LAN

Parameter Description
IP Determines if the Internet Protocol will be run on
the customer LAN.
The supported values are
• Y:Internet Protocol is enabled on the Customer
LAN
• N: Internet Protocol is disabled on the
Customer LAN
LANIP Determines the IP address of the NE. The
address 0-0-0-0 is not allowed. Neither the
network nor the host portion of the address when
viewed in binary format may be all 0s or all 1s.
The supported value range is {1-99,
101-126,128-223} - {0-255} - {0-255} - {1-254}.
The default value is 10-10-10-10 or the
previously existing value.
LANMASK Determines the subnet mask of the network the
to which the NE is connected. The mask, in
binary representation, must contain a contiguous
string of 1s (network) and a contiguous string of
0s (host). The supported values are {128-255} -
{0-255} - {0-255} - {0-255}. The default value is
255-255-255- 255 or the previously existing
value.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 261
Configure LAN Management 1850 TSS-5C

Table 50 Modify a Customer LAN (continued)

Parameter Description
LANGW Is the default gateway router's IP address.
Leading zeros are allowed. A value of 0-0-0-0
disables the functionality associated with the use
of a default gateway. Neither the network nor the
host portion of the address when viewed in
binary format may be all 0s or all 1s. The
supported value range is {1-99,
101-126,128-223} - {0-255} - {0-255} - {1-254}
{0}-{0}-{0}-{0}. The default value is 0 - 0 - 0 - 0 or
the previously existing value.
OSI Protocol OSI. Determines if the OSI Protocol will be run
on the customer LAN or not.
The supported values are:
• N: OSI Protocol is disabled on the Customer
LAN
• Y: OSI Protocol is enabled on the Customer
LAN
Internet Protocol Determines if the Internet Protocol will be run on
the customer LAN.
The supported values are:
• N (Internet Protocol is disabled on the
Customer LAN)
• Y (Internet Protocol is enabled on the
Customer LAN)
Integrated ISIS Determines if the Integrated IS-IS Protocol will
be run on the customer LAN or not.
The supported values are:
• N: Integrated IS-IS Protocol is disabled on the
Customer LAN.
• Y: Integrated IS-IS Protocol is enabled on the
Customer LAN.
Note: The IS-IS over PPPoE tunnel label should
be unique in the CPE.
OSI area Determines to which OSI Area the Customer
LAN belongs. The supported value is 1.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
262 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Enable Auto DCN

Table 50 Modify a Customer LAN (continued)

Parameter Description
Subnet Mask The subnet mask of the network to which the NE
is connected. The supported value range for
subnet mask is (128-255) - (0-255) - (0-255) -
(0-255). The default value is 255-255-255-255 or
the previously existing value.
IP Address of NE The internet protocol address of the NE. The
supported value range for the IP address is
(1-99, 101-126, 128-223) - (0-255) - (0-255) -
(1-254). The default IP address is 10-10-10-10 or
the previously existing value.
Note:Values 0-0-0-0 as IP address is not
supported.
Gateway Address The default gateway router's IP address. The
supported value range is (1-199, 101-126,
128-223) - (0-255) - (0-255) - (1-254). The
default gateway address is 0-0-0-0 or the
previously existing value.
MAC address The Media Access Control address of the
Network Element.

END OF STEPS

3.54 Enable Auto DCN


3.54.1 Steps
Use this procedure to Enable Auto Dcn.

1
Select Rack1 > Shelf1 > Board2 > Module10 from the tree area as shown in Figure 174,
“Accessing the Module” (p. 264).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 263
Enable Auto DCN 1850 TSS-5C

Figure 174 Accessing the Module

Click Save.

2
On the left navigation tree select SFP-1-1-2-8 > Port.
Result: The Ethernet Port Management is shown.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
264 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Enable Auto DCN

Figure 175 Ethernet Port Management

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 265
Enable Auto DCN 1850 TSS-5C

3
Click CREATE MPLSIF-1-1-2-8.
Result: MPLSIF Ethernet Port Management is created.

4
From State section set the value for Admin. State to up from the drop down list.

5
Click Save.
Result: Administrative status, set by management. The values are up or down.

6
Select Communication -> DCN Phys. If -> IP Address option.
Result: The IP address of Network Element is shown.

Figure 176 IP address of Network Element

7
Enter the IP addess of NE.
Click Save to save the configuration settings.

Note: See3.52 “Configure the IP address” (p. 256)for more details.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
266 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Enable Auto DCN

8
Select Communication -> DCN Phys. If -> LAN manag.
Result: The Customer LAN Management is as shown.

Figure 177 Customer LAN Management

9
Enter the values for Customer LAN Management parameters.
Click Save to save the configuration settings.

Note: See 3.53 “Configure LAN Management” (p. 258) for more details.

10
Select Communication -> DCN Phys. If -> Auto Dcn.
Result: The Auto Dcn list panel as shown in Figure 178, “Auto Dcn List” (p. 268).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 267
Manage OSPF 1850 TSS-5C

Figure 178 Auto Dcn List

Parameter Description
Access IDentifier Specifies the Access Identifier for the
selected port
DCN Enabled Determines DCN remote setup can be
enabled/disabled per port
The supported values are:
• N (DCN remote setup is disabled per port)
• Y (DCN remote setup is enabled per port)
NAT State The supported values are:
• ACTIVE
• DEACTIVE
Operation Click Apply Change to save the changes.
Click Apply Changes to enable the DCN

Note: Only one port can be enabled at one time.

END OF STEPS

3.55 Manage OSPF


3.55.1 Purpose

Use this procedure to Create the OSPF Area.

1
Select Communication -> OSPF -> OSPF Area from the menu bar. The OSPF Area tab is
displayed as shown in Figure 179, “OSFP Area” (p. 269)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
268 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Manage OSPF

Figure 179 OSFP Area

2
Click Create to configure a OSPF Area as shown in Figure 180, “Configure OSPF” (p. 269)

Figure 180 Configure OSPF

3
Select the Access Identifier (AID) OSPF Area - the supported value range is 1 to 3.

4
Select the OSPF Area ID. The supported value range is {0-255} - {0-255} - {0-255} - {0-255}.

5
Click Save to save the settings and return to the previous page.

6
Click Cancel to return to the previous screen without saving.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 269
Manage OSPF 1850 TSS-5C

3.55.2 Modify OSPF Area

Use this procedure to modify OSPF Area.

1
Click OSPF Area hyperlink to modify OSPF Area

Figure 181 Configure OSPF Area

2
Select the OSPF Area ID. The supported value range is {0-255} - {0-255} - {0-255} - {0-255}.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
270 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Manage OSPF

3
Click the drop-down menu for Md5 Enable field.

The supported values are:


• Y- MD5 is enabled
• N-MD5 is disabled

The following fields are displayed if Md5 Enable value is Y.


• Md5 Key: The value ranges from 1 - 16 characters.
Key used for MD5 128 bit hash value key calculation. This parameter is mandatory if KEYID
is entered. The string shall be uppercase, lowercase alphanumeric characters or alternatively
the NULL character. The system default value is NULL.
• Md5 Key Id: The value ranges from 1- 255.
MD5 Key ID used for MD5 128 bit hash value key calculation. This parameter is mandatory if
MD5 KEY is entered.

4
Click Save to store all the settings and return to the previous page.

5
Click Cancel to revoke all the settings and return to the previous page.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 271
Manage OSPF 1850 TSS-5C

3.55.3 Administer OSPF IF

Use this procedure to manage the OSPF If area.

1
Select Communication -> OSPF -> OSPF IF from the menu bar.

Figure 182 OSPF IF

2
Click Select to select the Access Identifier (AID) type.
Result: The AID Type selection window appears.

3
Click one of the radio buttons to select the AID type from the AID type selection window.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
272 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Manage OSPF

Result: Click Send to save the settings.

4
If LAN-1 is selected in AID Type selection window, the following screen appears.
Result:

5
If MPIFIB is selected in AID Type selection window, the following screen appears.
Result:

Select the Lists Boards from the drop-down list.


Check on Only Activate box to select active boards.
Click on one of the boards. The board is selected.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 273
Manage OSPF 1850 TSS-5C

6
Click the drop-down menu for Authentication field.

The supported values are:


• No Authentication
• In By Area
• MD5

The following fields is displayed if MD5 is selected for the Authentication field.
• Key ID: The value ranges from 1- 255.
• Key value: The value ranges from 1 - 16 characters.

7
Click Save to store all the settings and return to the previous page.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
274 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Retrieve Network Service Access Point (NSAP)

3.56 Retrieve Network Service Access Point (NSAP)


3.56.1 Steps

1
Select Communication-> Network Domain-> NSAP to view the Network Service Access Point
screen as shown in Figure 183, “Network Service Access Point” (p. 274)

Figure 183 Network Service Access Point

2
Click the drop-down menu provided for the lookup type field to select the lookup type.

The supported values are:


• DRCT - retrieves the NSAPs and the TIDs of all the directly reachable (1 hop away) Level 1
and Level 2 Intermediate Systems (ISs).
• L1ROU - retrieves the NSAPs of all the reachable Level 1 ISs within all the areas, the NE is
part of, including NEs and Gateway NEs.
• L1ROUTID - retrieves the NSAPs and the TIDs of all the reachable Level 1 ISs within all the
areas, the NE is part of, including NEs and Gateway NEs.
• L2ROU - retrieves the area addresses of all the reachable Level 2 ISs, including NEs and
Gateway NEs.

3
Click Search to retrieve the available NSAPs. The available NSAPs are retrieved as shown
below:

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 275
Create IP routing 1850 TSS-5C

Figure 184 Retrieve Network Service Access Point

END OF STEPS

3.57 Create IP routing


3.57.1 Purpose

Use this procedure to configure the IP Routing.

1
Select Communication -> Network Domain -> IP Routing option from the menu bar, the is
displayed as shown in Figure 185, “IP routing configuration” (p. 276).

Figure 185 IP routing configuration

2
The above table displays the existing IP route entry along with its attributes.

3
Click Create hyperlink to configure a new IP route as shown in Figure 186, “IP routing creation”
(p. 277) .

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
276 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create IP routing

Figure 186 IP routing creation

4
Table 51, “IP routing parameters ” (p. 277) provides the description of IP Routing panel
parameters:

Table 51 IP routing parameters

Parameter Description
Access Identifier Access Identifier, specifies the in-band management interface or
Management LAN. The supported values are:
LAN-1: Customer LAN
MPIFIBPORT: {1}-{1}-{2,3,4}-{1-20}. Refers to the Management
Plane In-Fiber In-Band interface associated to local port.
Destination Address This is the IP address of the destination host or network (in the
format nnn-nnn-nnn-nnn). If MASK parameter is not all '1' (i.e., a
network route is specified), the host portion of DESTADDR must
be all '0'. The supported value range is {1-99, 101-126,
128-223}-{0-255}-{0-255}-{0-254}
IP Mask Indicates the IP subnet mask of the route (in the format
nnn-nnn-nnn-nnn. The supported value range is {0-255}-{0-255}-
{0-255}-{0-255}.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 277
Create IP routing 1850 TSS-5C

Table 51 IP routing parameters (continued)

Parameter Description
Nexthop The IP address of the next interface in the route in the format
nnn-nnn-nnn-nnn. The supported value range is {1-99,
101-126, 128-223}-{0-255}-{0-255}-{0-254}.
Metric This is the cost metric of the route. The valid range is 1- 65535

5
Enter the Access Identifier for the new IP route. Click Select to choose the AID type. The
supported values are MPIFIBPORT, and LAN.

6
Select one of the radio button to choose the AID value and click Send hyperlink, the choice are
added in the relevant field of the previous page. Cancel hyperlink allows to leave the window.

7
Enter the Destination Address and Subnet mask for the IP route to be configured.

8
Enter the Metric value and set the Advertise value to either Y or N.

9
Click Save & Exit to save the settings and return to the window.

10
Click Save to store the settings and return to the previous panel.

11
Click Cancel to revoke all the settings and return to the previous page.

END OF STEPS

3.57.2 Delete a static IP route configuration

To delete a static IP route configuration:

1
Select the IP configuration to delete and click Delete. A dialog is displayed, requesting
conformation. Click Yes to proceed or No to cancel deletion.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
278 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Configure OSI Network Element area

3.58 Configure OSI Network Element area


3.58.1 Steps

Use the following procedure to configure the OSI Network Element area:

1
Select Communication -> Network Domain -> OSI Mng -> OSI NE Area option as shown in
Figure 187, “OSI NE area” (p. 278).

Figure 187 OSI NE area

Table 52 OSI NE Area parameters

Parameter Description
OSI AREA Determines an access Identifier for an OSI area.
Level 3 Initial Domain Part Assigns the initial domain part of the manual area
address (6 hexadecimal characters). It is
constituted by the AFI, IDI and IDI PAD fields of the
NSAP address.
Level 3 DFI DFI part of the NSAP address (fourth octet) 2
hexadecimal character.
Level 3 Organization Assigns the organization field of the manual area
address (6 hexadecimal characters)
Level 3 Reserved Assigns the reserved field of the manual area
address (4 hexadecimal characters)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 279
Configure Upper Layers Common report 1850 TSS-5C

Table 52 OSI NE Area parameters (continued)

Parameter Description
Level 3 Routing Assigns the routing domain and routing area within
the routing domain of the manual area address (8
hexadecimal characters)
Level 3 System Identifier This is the system identifier assigned to the card
(12 hexadecimal characters)

2
Click Save to save the configuration and return to the previous screen

END OF STEPS

3.59 Configure Upper Layers Common report


3.59.1 Steps

Use the following procedure to configure the OSI Network Element area:

1
Select Communication -> Network Domain -> OSI Mng -> OSI ULC Report option as shown
in Figure 188, “OSI NE area” (p. 280).

Figure 188 OSI NE area

2
Click to select the Layer 3 IS Level, to provision the IS level. The supported values are Level
1IS and Level 2IS.

3
Click Saveto save the OSI ULC report.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
280 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Manage a port

3.60 Manage a port


3.60.1 Steps

Use this procedure to manage a port.

1
Select Rack XX> Shelf XX> Board XX> Module XX from the tree area.
Result:

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 281
Manage a port 1850 TSS-5C

Parameter Description
Port specifies a port.
Primary state Specifies the primary state to which the
equipment is set.
Admin state Allows to set the Administration status.
The choices are:
• up= active state
• down= not active state
Operational state Specifies the actual state of the resource.

2
Click Save to save the configuration.

END OF STEPS

3.60.2 Section OAM


The Operation and Maintenance section displays the following parameters.

Parameter Description
MEP Specifies the Maintenance Entity Point. For
enabling MEP function, the direction of MEP is
according to the direction of Tunnel Segment.
The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group
Identifier. This parameter must be unique in
the system.
MEP ID Specifies the Maintenance Entity Point
Identifier. This parameter is unique inside
MEG ID. If provisioned, this parameter must
be different from EXP MEP ID. The MEP ID is
in the range 1 to 8191
CV Rx Enabling/disabling capability to detect the Loss
Of Continuity (LOC) alarm, associated to Sink
MPLS Section Termination.
CV Tx Enabling/disabling capability to detect the Loss
Of Continuity (LOC) alarm at remote node,
associated to Source Section Termination.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
282 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Manage a port

Parameter Description
CV Period Specifies the period (1/Frequency) of CV
packet transmission
Protection Switch for DDM-SD This parameter enables/disables the
Protection Switch feature for Signal Degrade
detected on the basis of the optical power
monitored by Digital Diagnostic Monitoring
(DDM) capable SSF/TSF. The System
behavior is detailed in OAM RRS Core
Alarm Profile The Alarm Severity Assignment Profile (ASAP)
name to use with this facility.
EXP MEP ID Expected MEP values associated to Sink PW
Segment Termination, also called Peer
MEP-ID.
L2ENCAPPROF Aid L2 encapsulation profile AID to be used in
case of mapping of MPLS over Ethernet when
a switched network is present.
Click Save to save the configuration.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 283
Overview 1850 TSS-5C

(T)MPLS Management

3.61 Overview

3.61.1 Purpose

Use the following procedures that allows the user to manage the (T)MPLS domain:
• Global Network - Allows to manage all the parameters assigned to T-MPLS.
• L2 Encapsulation Profile - Allows to manage the L2 Encapsulation Profile.
• Quality of Service - Allows to manage the quality of service.
• Tunnel Management - Allows to manage the tunnel management.
• PW Management - Allows to manage the T-MPLS Pseudowire.
• Ethernet Services XC - Allows to manage the Client Services based on T-MPLS.

3.61.2 Contents

3.61 Overview 284


3.62 Create L2 encapsulation profile 284
3.63 Create PHB profile 288
3.64 Create OAM PHB profile 291
3.65 Create MPLS-TP Ring Protection 294
3.66 TMPLS/MPLS-TP DM management 296
3.67 TMPLS Loopback tool management 298
3.68 MPLS-TP MIP discovery 301
3.69 Retrieve queue profile management 303
3.70 Administer TMPLS/MPLS Delay Measurement 305
3.71 Administer MAC Flooding Threshold 309

3.62 Create L2 encapsulation profile


3.62.1 Purpose

Use this procedure to create a new L2 Encapsulation Profile.

1
Select (T)MPLS -> L2 Encapsulation Profile from the menu bar as shown in Figure 189,
“Layer 2 encapsulation profile management” (p. 285).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
284 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create L2 encapsulation profile

Figure 189 Layer 2 encapsulation profile management

2
Select the check-box from the table to choose the existing Layer 2 Encapsulation Profile. Table
53, “Layer 2 encapsulation profile management parameters” (p. 285) provides the description of
Layer 2 Encapsulation Profile Management parameters:

Table 53 Layer 2 encapsulation profile management parameters

Parameter Description
Access Identifier Specifies the access identifier to the
L2ENCAP profile stored in the system. The
values are in the range L2ENCAPPORF
1-32. An hyperlink on this object is present
only if the L2ENCAP Profile can be modified,
that is when the L2ENCAP Profile is not the
default one or is not in use
MAC Destination Address Specifies the Medium Access Control
Address to be used in the case of mapping
of MPLS over Ethernet when a switched
network is present
Tagged Flag Specifies the Tagged/Untagged flag
VLAN-ID Specifies the VLAN identifier to be used in
case of mapping of MPLS over Ethernet
when a switched network is present (802.1Q
mapping)
Priority Specifies the priority value for Tagged
Ethernet frame
The values available are:
• 0-7
• 0xFF
Drop Eligible Specifies Drop Eligible indication according
to 802.1ad

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 285
Create L2 encapsulation profile 1850 TSS-5C

Table 53 Layer 2 encapsulation profile management parameters (continued)

Parameter Description
In-Use Specifies if the L2ENCAP Profile is
referenced by a Tunnel Segment or
Pseudowire Segment

3
Click Delete that deletes the selected L2ENCAP Profile.

4
Click Create to configure a new Layer 2 Encapsulation Profile.

5
Table 54, “L2 encapsulation profile - create parameters” (p. 286) provides the description of
Create L2 Encapsulation Profile panel parameters:

Table 54 L2 encapsulation profile - create parameters

Parameter Description
MAC Destination Address Specifies the Medium Access Control
Address to be used in the case of mapping
of MPLS over Ethernet when a switched
network is present
The values are 12 hexadecimal characters
Tagged Flag Specifies the Tagged/Untagged flag
This parameters is mandatory if
TAG=TAGGED, otherwise it is not valid.
VLAN Identifier Specifies the VLAN identifier to be used in
case of mapping of MPLS over Ethernet
when a switched network is present (802.1Q
mapping). The parameter is mandatory if
Tagged Flag=TAGGED, otherwise it is not
valid
Priority Specifies the priority value for Tagged
Ethernet frame. It is not valid if Tagged
Flag=UNTAGGED
The parameter is invalid if TAG=
UNTAGGED
Drop Eligible Specifies Drop Eligible indication according
to 802.1ad. It is not valid if Tagged
Flag=UNTAGGED

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
286 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create L2 encapsulation profile

6
Click Save to store the all the settings and return to Figure 189, “Layer 2 encapsulation profile
management” (p. 285).

7
Click Cancel to revoke all the changes and return to Figure 189, “Layer 2 encapsulation profile
management” (p. 285).

8
Click Access Identifier link.

9
Enter the 12 different hex-decimal values for the MAC destination address.

10
Set the Tagged Flag to either Tagged or Untagged. If TAG=TAGGED, then VLANID, Priority,
and Drop Eligible required valid values.

11
Table 55, “L2 encapsulation profile - modify” (p. 286) provides the description of Modify L2
Encapsulation Profile panel parameters:

Table 55 L2 encapsulation profile - modify

Parameter Description
Access Identifier Specifies the L2 Encapsulation Profile to
modify
MAC Destination Address Specifies the Media Access Control Address
to be used in case mapping of MPLS over
Ethernet when a switched network is
present. In case of mapping of MPLS over
Ethernet when a switched network is present
Tagged Flag Specifies the Tagged/Untagged flag
VLAN Identifier Specifies the VLAN identifier to be used in
case of mapping of MPLS over Ethernet
when a switched network is present (802.1Q
mapping). The parameter is mandatory if
Tagged Flag=TAGGED, otherwise it is not
valid
Priority Specifies the priority value for Tagged
Ethernet frame. It is not valid if Tagged
Flag=UNTAGGED

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 287
Create PHB profile 1850 TSS-5C

Table 55 L2 encapsulation profile - modify (continued)

Parameter Description
Drop Eligible Specifies Drop Eligible indication according
to 802.1ad. It is not valid if Tagged
Flag=UNTAGGED
In-Use Specifies if the L2 Encapsulation Profile is
referenced by a Tunnel Segment or
Pseudowire Segment

12
Click Cancel that returns to Figure 189, “Layer 2 encapsulation profile management” (p. 285)

13
Click Save that applies the previous selection and return to Figure 189, “Layer 2 encapsulation
profile management” (p. 285).

END OF STEPS

3.63 Create PHB profile


3.63.1 Purpose

Use this procedure to create a new PHB Profile.

1
Select TMPLS-TP/T-MPLS -> Quality of Service -> PHB Profile. Click Create to configure a
new PHB Profile as shown in Figure 190, “PHB profile create” (p. 288).

Figure 190 PHB profile create

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
288 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create PHB profile

2
The Per Hop Behavior Profile Management panel contains EXP Bit i that associates a PHB
class to the MPLS packets with EXP=i, where i=0 to 7.

3
Click Create new 8P0D profile hyperlink to configure a new PHB profile as shown in Figure
191, “8P0D PHB profile - create” (p. 288) .

Figure 191 8P0D PHB profile - create

4
Set the EXP bits for individual CoS values. The valid range is 0-7.

5
Click Cancel to revoke all the changes and return to the previous page.

6
Click Save to store the all the settings and return to the previous page.

7
Select the configured PHB Profile from the table. Click.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 289
Create PHB profile 1850 TSS-5C

Delete to remove from the list.

8
Click on the Access Identifier hyperlink, to display the following page as shown in Figure 192,
“Modify PHB profile management” (p. 289).

Figure 192 Modify PHB profile management

9
Table 56, “Modify a PHB profile” (p. 290) provides the description to Modify a PHB Profile .
The panel contains the following parameters:

Table 56 Modify a PHB profile

Parameter Description
Access Identifier It defines the PHB Profile to modify
EXP Bit 0 to 7 It associates a PHB class to the MPLS
packets with EXP=i where i= 0 to 7

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
290 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create OAM PHB profile

Table 56 Modify a PHB profile (continued)

Parameter Description
In Use Specifies if the PHB is referenced by a
Tunnel Segment or Pseudowire Segment.

10
Click Cancel to return to the previous page.

11
Click Save to apply changes and return to the previous page.

END OF STEPS

3.64 Create OAM PHB profile


3.64.1 Purpose
Use this procedure to create a new PHB Profile.

1
Select TMPLS/MPLS-TP -> Quality of Service -> OAM PHB Profile from the menu bar
Figure 190, “PHB profile create” (p. 288).

Figure 193 OAM PHB profile management

The OAM PHB Profile Management tab displays one table.


The table displays the information the following fields:
• A column containing a check box, used to manage the deletion of a OAMPHBProfile. The
PHB Profile must not be the default one (no check box in the column) or In Use one (no
check allowed).
• Access Identifier - it specifies the access identifier to the OAMPHB profile stored in the
system. The allowable values are in the range OAMPHB (1-8).
• Type i - it reports the association between the I type packet and a PHB value, where i= 1 to
8.
• Profile In Use - it specifies if the OAMPHB is referenced by a Tunnel Segment or
Pseudowire Segment.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 291
Create OAM PHB profile 1850 TSS-5C

2
Click Create new OAM PHB profile hyperlink to configure a new PHB profile as shown in
Figure 191, “8P0D PHB profile - create” (p. 289) .

Figure 194 OAM PHB profile - create

The Create OAM PHB Profile panel contains OAM Type i that associates a PHB class to the
OAM packet with Type = i, where i= 1 to 8.

3
Select the OAM Type from the drop-down box. The available options are: EF, HIGH2, AF21,
AF22, AF41, AF42, DE-G, DE-Y
Click Save to store the settings and return to the previous page.

4
Click Cancel to revoke all the changes and return to the previous page.

5
Select the previously configured PHB Profile from the table and click Delete to remove from the
list.

6
Click on the Access Identifier hyperlink, to display the following page as shown in Figure 192,
“Modify PHB profile management” (p. 290).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
292 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create OAM PHB profile

Figure 195 Modify OAM PHB profile management

7
Table 56, “Modify a PHB profile” (p. 290) provides the description of Modify a PHB Profile
panel contains:

Table 57 Modify a PHB profile

Parameter Description
Access Identifier It defines the PHB Profile to modify
EXP Bit 0 to 7 It associates a PHB class to the MPLS
packets with EXP=i where i= 0 to 7
In Use Specifies if the PHB is referenced by a
Tunnel Segment or Pseudowire Segment

8
Click Cancel to return to the previous page.

9
Click Save to apply changes and return to the previous page.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 293
Create MPLS-TP Ring Protection 1850 TSS-5C

3.65 Create MPLS-TP Ring Protection


3.65.1 Purpose

Use this procedure to create MPLS-TP Fast Facility Protection Group.

1
Select Protection -> MPLS-TP Protection from the menu bar as shown in Figure 196,
“MPLS-TP Ring Protection” (p. 293).

Figure 196 MPLS-TP Ring Protection

2
Click Create to configure a new Create MPLS-TP Fast Facility Protection Group as shown in
Figure 197, “Create a new MPLS-TP Fast Facility Protection Group” (p. 294).

Figure 197 Create a new MPLS-TP Fast Facility Protection Group

Table 58, “MPLS-TP Fast Facility Protection Group Parameters” (p. 295) provides description
of Create MPLS-TP Fast Facility Protection Group panel parameters:

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
294 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create MPLS-TP Ring Protection

Table 58 MPLS-TP Fast Facility Protection Group Parameters

Parameter Description
Node ID Specifies the Node ID for the MPLS-TP FFP group ranging from
1 to 127
Protection Specifies the Protection for the MPLS-TP FFP group.
Click Select to obtain it from the list.
The Filter by panel is displayed:
The Filter by panel contains From and To fields.
• ID: The value ranges from 1-10000
• Instance: The value ranges from 1-65535
• Ingress IP: The value ranges from 0-255
• Egress IP: The value ranges from 0-255
East Port
East Neighbour ID Specifies the Neighbour ID for the MPLS-TP FFP group ranging
from 1 to 127
Layer Select the Layer from the combo-box. The default value is
TUNNEL
Revert Tim (min) Specifies the revert time in minutes. The valid range 0-4320 in
step of one minutes is supported.
User Name Enter the name of the user.
Alarm Profile Specifies the Alarm for MPLS-TP FFP group. ClickSelect to
obtain the list of Alarms
Select one of the following radio button from the ASAP
SELECTION pannel:
• ASAPFFP-0
• ASAPFFP-1
• ASAPFFP-2
• ASAPFFP-3
• ASAPFFP-4
Ring ID Specifies the Ring ID for the MPLS-TP FFP group ranging from
0 to 15
APS Code Specifies the APS Code for the MPLS-TP FFP group ranging
from 0 to 15
West Port
West Neighbour ID Specifies the Neighbour ID for the MPLS-TP FFP group ranging
from 1 to 127

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 295
TMPLS/MPLS-TP DM management 1850 TSS-5C

Table 58 MPLS-TP Fast Facility Protection Group Parameters (continued)

Parameter Description
Hold Off Time Specifies the hold off time. The valid range is 0-100, in units of
(100msec) 100milliseconds

3
Click Save to store all the settings and return to the previous page.

4
Click Cancel to revoke all the settings and return to the previous page.

END OF STEPS

3.66 TMPLS/MPLS-TP DM management


3.66.1 Retrieve active DM session
Use this procedure to retrieve the active DM session.

1
Select TMPLS/MPLS-TP -> TMPLS/MPLS-TP OAM -> Delay Measurement Tool from the
menu bar.
Result: The TMPLS/MPLS-TP Delay Measurement Tool window is displayed.

2
Enter the DM Tool range in the From and To text field and click Search to retrieve the DM tool
information.

3
Click Refresh to reset the text field for entering another range.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
296 8DG24624AGAATQZZA Issue 7
1850 TSS-5C TMPLS/MPLS-TP DM management

4
To create a new Delay Measurement, click Create.
Result: The TMPLS Create Delay Measurement Tool window is displayed.

5
Click Select TUSEG to enter Resource. Select the Per Hop Behavior from the drop-down list.
The values are EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y, AF1, AF2, AF3, AF4, DE,
LOW2.

Note: Considering DM OAM packets are drop ineligible (Green), AF21, AF41, DE-Y are
not allowed.

6
Specify the Number of Samples required.

7
Select the Period for which the data is to be retrieved. The values are 1s, 10s, 1m, and 10m.

8
Enter the Frame Length in the text field. The valid range is 82-9600.

9
Click Save to save the settings and create another DM tool.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 297
TMPLS Loopback tool management 1850 TSS-5C

10
Click Cancel to return to the previous page without creating the DM tool.

END OF STEPS

3.67 TMPLS Loopback tool management


3.67.1 Retrieve active LB session
Use this procedure to create TMPLS loopback tool.

1
Select TMPLS/MPLS-TP -> TMPLS/MPLS-TP OAM -> MPLS-TP Loopback Tool->
Loopback Tool from the menu bar.
Result: The Active LB Session Retrieval window is displayed.

2
Enter specific range in the From and To field for the LB Tool to Search for the existing list.

3
Click Create to configure new Loopback Tool.
Result: The Create TMPLS Loopback Measurement Tool window is displayed.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
298 8DG24624AGAATQZZA Issue 7
1850 TSS-5C TMPLS Loopback tool management

Select one of the following:


• TUSEG: Enter the values range from 1-100
• PWSEG: Enter the values range from 1-100
• MPLS Port: Select one of the options from the Board Selection drop down list .

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 299
TMPLS Loopback tool management 1850 TSS-5C

5
Select the Per Hop Behaviour. The values are EF, HIGH2, AF21, AF22, AF41, AF42, DE-G,
DE-Y, AF1, AF2, AF3, AF4, DE, LOW2.

Note: Considering Loopback OAM packets are drop ineligible (Green), AF21, AF41, DE-Y
are not allowed.

6
Select the Bi-directional connectivity verification value as either Disable or Enable.

Note: Bi-directional connectivity verification could be Enabled for loopback MIP.

7
Enter the Destination MEP-ID and select the MIP values.

Select one of the following radio button for Destination panel:


• MAC Address: Enter the MAC address
• Mep Id: Enter the Mep Id
• MIP
− ICC-LB: Enter the value
− NODE ID: The Value ranges from 0-255
− PORT: The Value ranges from 1,1,2-4,1-10
− TTL: The Value range from 1-255

9
Enter the Number of Samples. The value range is [1:1024].

10
Select the Periodvalue. The value range [10:100].

11
Enter the Frame length .The value range is [82:9600]. The default value is 82 (bytes).

12
Click Save to save the settings and Cancel to exit the window without saving.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
300 8DG24624AGAATQZZA Issue 7
1850 TSS-5C MPLS-TP MIP discovery

3.68 MPLS-TP MIP discovery


3.68.1 Purpose

Use this procedure to Create MPLS-TP DISCOVERY LB tool.

1
SelectTMPLS/MPLS-TP -> TMPLS/MPLS OAM->MPLS-TP LoopbackTool->MIP Discovery.
from the menu bar.
Result:

Figure 198 Create MPLS-TP DISCOVERY LB tool

2
Click to select the Resource Tunnel Segment (TUSEG ) or Psuedowire Segment (PWSEG)
Port.
Result:

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 301
MPLS-TP MIP discovery 1850 TSS-5C

Figure 199 Tunnel Segment Search

TUSEG: Enter the values range from 1-100

Figure 200 Psuedowire Segment Search

PWSEG: Enter the values range from 1-100

3
Select the PHB profile as applicable from the drop-down.

4
Select TTL either Single or Range from 1 to 255.

5
Select the Direction Egress, or Ingress from the check box.

6
Click Create & start to MPLS-TP DISCOVERY LB tool.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
302 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Retrieve queue profile management

7
Click Cancel to return to the previous screen without saving.

END OF STEPS

3.69 Retrieve queue profile management


3.69.1 Purpose
Use this procedure to retrieve a queue profile.

1
Select Data -> Queue Management option from the menu bar that displays the queue
management tab as shown in Figure 201, “Queue profile management” (p. 302).

Figure 201 Queue profile management

2
The Queue Profile Management tab displays the existing user label as DEFAULT.

3
Click Default to display the Modify Queue Profile screen as shown in Figure 202, “Modify
Queue Profile” (p. 304)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 303
Retrieve queue profile management 1850 TSS-5C

Figure 202 Modify Queue Profile

4
Table 59, “Queue profile management parameters ” (p. 304) provides description of the queue
profile parameters.

Table 59 Queue profile management parameters

Parameter Description
User Label Specifies the queue profile user label
UpTh Green Pkts Specifies the Upper threshold of green packets in the queue.
The default value is 75.
Note:This field is non-editable.
LowTh Green Pkts Specifies the Lower threshold green packets in the queue.
The default value is 50.
Note:This field is non-editable.
Max Prob of Green Pkts Specifies the maximum dropping probability of green packets
in the queue. The default value is 100.
Note:This field is non-editable.
UpTh Yellow Pkts Specifies the Upper threshold of yellow packets in the queue.
The default value is 37.
Note:This field is non-editable.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
304 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer TMPLS/MPLS Delay Measurement

Table 59 Queue profile management parameters (continued)

Parameter Description
LowTh Yellow Pkts Specifies the Lower threshold of yellow packets in the queue.
The default value is 25.
Note:This field is non-editable.
Max Prob of Yellow Pkts Specifies the maximum dropping probability of yellow packets
in the queue. The default value is 100.
Note:This field is non-editable.

5
Click Cancel to return to the previous screen without saving.

END OF STEPS

3.70 Administer TMPLS/MPLS Delay Measurement


3.70.1 Steps

1
Select TMPLS/MPLS-TP -> TMPLS/MPLS OAM -> Delay Measurement Tool as shown in
Figure 203, “Delay Measurement tool” (p. 305).

Figure 203 Delay Measurement tool

2
To Search for an existing DM Tool, enter the measurement range From and To and click
Search/Refresh.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 305
Administer TMPLS/MPLS Delay Measurement 1850 TSS-5C

3
Click Create to create a Delay Measurement as shown in Figure 204, “Create Delay
Measurement tool” (p. 305)

Figure 204 Create Delay Measurement tool

The supported Delay Measurement tool parameters are as described in Table 60, “Delay
Measurement Tool parameters” (p. 306).

Table 60 Delay Measurement Tool parameters

Parameter Description
Resource AID Indicates the AID of the Terminated TMPLS facility where
the DM-Tool has to be configured.
The supported values are:
• TUSEG-1-1-{1-1024} (Tunnel Segment)
• PWSEG-1-1-{1-1024}(PW Segment)
Note:
• The default is that a value is required and the field
cannot be left blank.
• The TUSEG involved must have DIR=BIDIR
• The TUSEG involved must have TYPE=TERMINATED
• The TUSEG involved must have MEP=ENABLED

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
306 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer TMPLS/MPLS Delay Measurement

Table 60 Delay Measurement Tool parameters (continued)

Parameter Description
PHB Indicates the PHB value associated to DMM packets.
The supported PHB values in range 1 are{EF, HIGH2,
AF21, AF22, AF41, AF42, DE-G, DE-Y}
The supported PHB values in range 2 are {EF, HIGH2,
AF1, AF2, AF3, AF4, DE, LOW2}
The default PHB value is EH.
Note:DM-PHB is not supported for on-demand 2-way
delay measurement over TMPLS interface The chosen
DM-PHB must be present in the PHB profile used by the
Terminated TMPLS Tunnel/PW referenced by AID
parameter.
Sender DM Tool MEP point that sends DMM packets and make
measurement when receives back DMR packets received
from the symmetrical tool RDMT.
Period Indicates the period for the transmission of DMM packets.
The supported values are 1s, 10s, 1m, 10m. The default
value is 1m.
Send Packet Number Indicates the number of DMM packets to send. The
Integer value is 32. The default value is 1.
Note: The system can send a maximum of 100 DMM
packets for this DM-Tool.
Packet Length Indicates Length in byte of DMM packet to send.
Packet length 0 indicates a random length between 82
and 9600 bytes. The default value is 82.
Note:The packet length supported on one MPLF
interface will be subject to the MTU/MRU configured on
the Ethernet port.

4
Click to select the Resource as either Tunnel Segment (TUSEG) or Pseudowire Segment
(PWSEG) Port.

5
If TUSEG is selected, a dialog is displayed where the Tunnel Segment can be located and
selected. Click to select the TUSEG From and To range and click Search.

6
If PWSEG is selected, a dialog is displayed where the Pseudowire Segment can be located and
selected. Click to select the pwsegFrom and pwsegTo range and click Search.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 307
Administer TMPLS/MPLS Delay Measurement 1850 TSS-5C

7
Click to select the port as resource.

8
Select the PHB profile as applicable from the drop-down.

9
Select the Number of Samples for the Sender DM Tool.

10
Select the sender Period.

11
Select the Frame length in bytes or the random range from bytes to MTU.

12
Click Save to save the configuration or click Cancel to return to the previous screen without
saving.

END OF STEPS

3.70.2 Modifying Delay Measurement


Use the following procedure to modify the Sender Delay Measurement tool parameters.

1
Navigate to the Delay Measurement Tool screen. Under the Active DM Sessions Retrieval,
specify a DM Tool value between 1 and 100.

2
Click Search/Refresh to locate the DM tool to modify and select.

3
Modify the DM tool parameters as required. Refer Table 60, “Delay Measurement Tool
parameters” (p. 306) for parameter descriptions.

4
Click Save to save the modifications or click Cancel to return to the previous screen without
saving.

END OF STEPS

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
308 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Administer MAC Flooding Threshold

3.70.3 Deleting a Delay Measurement

1
Navigate to the Delay Measurement tool.

2
Enter the From and To DM Tool values and click Search/Refresh.

3
Click to select the DM tool to be removed and click Delete.

END OF STEPS

3.71 Administer MAC Flooding Threshold


3.71.1
Use the following procedure to set the MAC Flooding Threshold:

1
Select Data -> MAC Management option from the menu bar that displays the queue
management tab as shown in Figure 205, “MAC Flooding Threshold” (p. 308).

Figure 205 MAC Flooding Threshold

2
Specify the number of MAC Address per port between the value range 1 to 65535.

3
Click Save, to save the MAC Flooding threshold.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 309
Overview 1850 TSS-5C

Tunnel management procedures

3.72 Overview

3.72.1 Purpose
This section describes the procedures for creating tunnels.

3.72.2 Contents

3.72 Overview 310


3.73 Create head/tail tunnel 310
3.74 Create transit tunnel 319
3.75 Modify Tunnel 322
3.76 Pseudowire management 346
3.77 Modify Pseudowire 348
3.78 Create head/tail pseudowire 358
3.79 Create transit pseudowire 360

3.73 Create head/tail tunnel


3.73.1 Purpose

Use this procedure to create a new Head/Tail Tunnel.

1
Select (T)MPLS/MPLS-TP -> Tunnel Management from the menu bar as shown in Figure
206, “Tunnel management - filter by panel” (p. 311).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
310 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create head/tail tunnel

Figure 206 Tunnel management - filter by panel

2
Select Tunnel Location from the drop-down list to filter Tunnel information. It specifies where
the search must be executed.

The values are:


• ALL
• LOCAL

3
Select Tunnel Type from the drop-down list that specifies the type of Tunnel to be filtered. The
values are:
• Tunnel ID
• Tunnel AID

4
Enter ID, Instance, Ingress IP, and Egress IP range in the From and To boxes for the Tunnel
Ranging Filter.

5
Click Search to filter the Tunnel details based on the selected parameter values as shown in
Figure 207, “Tunnel management - search” (p. 312).

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 311
Create head/tail tunnel 1850 TSS-5C

Figure 207 Tunnel management - search

6
Click Create Head/Tail Tunnel to create a new terminated Tunnel as shown in Figure 208,
“Tunnel management” (p. 312).

Figure 208 Tunnel management

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
312 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create head/tail tunnel

Note:
• The In label of one tunnel is unique among all tunnels in the same NEs.
• The out label of one tunnel can be same as that of other tunnel. But if two or more
tunnels are connected to the same NE, the out label of those tunnels shall be different
from each other.

7
Re-set the tunnel segment parameters or leave as default.

8
Table 61, “Tunnel segment parameters ” (p. 312) provides description of the Tunnel Segment
parameters

Table 61 Tunnel segment parameters

Parameters Description
MPLS Port Specifies the AID of the provisioned port that is a server of the
MPLS Tunnel Segment.
Direction Specifies the tunnel segment direction. The values are:
• BIDIR
In Label Specifies the expected Label for incoming segment associated to
Sink Tunnel Segment. This parameter is not relevant if
DIR=UNIDIROUT. The label value must be unique in the system
and in the range {16-131071}
PHB Profile Specifies the AID of PHB Profile resource
L2 Encapsulation Specifies the L2 Encapsulation profile AID to be used in case of
Profile mapping of MPLS over Ethernet when a switched network is
present. This parameter is relevant only if port parameter refers to
Local MPLS Interface.
FFP MPLS-TP Ring Allows to select the FFP MPLS-TP ring.
Protection Switch for Used to enable the protection switching also when DDM-SD is
DDM-SD detected at the Tunnel termination point, where aTSF is
generated.
The supported values are:
• Enable
• Disable
Type Specifies the type of Tunnel Segment. It is TERMINATION.
User Name Specifies the Tunnel Segment User name

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 313
Create head/tail tunnel 1850 TSS-5C

Table 61 Tunnel segment parameters (continued)

Parameters Description
Out Label Specifies the transmitted Label for outgoing segment associated
to Source Tunnel Segment. This parameter is not relevant if
DIR=UNIDIRIN. The label value must be unique on MPLS port
basis and in the range {16-1048575}.
Alarm Profile Specifies the AID of alarm profile resource
Alarm Severity Assignment Profile (ASAP) name to be used for
the created or edited the TUSEG.
TCA Profile TCA profile name to be used for the created and edited TUSEG.
Operation and Maintenance
MEP Specifies the Maintenance Entity Point. For enabling MEP
function, the direction of MEP is according to the direction of
Tunnel Segment. The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group Identifier. This parameter
must be unique in the system
OAM Type Specifies the OAM type
MEP ID Specifies the Maintenance Entity Point Identifier. This parameter
is unique inside MEG ID. If provisioned, this parameter must be
different from EXP MEP ID. The MEP ID is in the range 1 to 8191.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
314 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create head/tail tunnel

Table 61 Tunnel segment parameters (continued)

Parameters Description
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
The default value is EF.
CV PHB Specifies the CV packet transmission for PHB profile

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 315
Create head/tail tunnel 1850 TSS-5C

Table 61 Tunnel segment parameters (continued)

Parameters Description
CV & SLM Tools Specifies the Loss and Synthetic measurement loss tools.
The values supported are:
• CV-LM
• SLM CV
If SLM CV is selected the SLM CV panel is displayed as shown in
Table 62, “SLM CV parameters” (p. 317).
EXP MEP ID If provisioned, this parameter must be different from MEP ID.
Proactive DM The parameter defines the command option for proactive DM.
The values supported are: Enable, Disable.
Note: The default value is Disable.
Proactive DM PHB Specifies the PHB value associated to DMM packets. x
{EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y}
• {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y}- PHB
range 1
• {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2}- PHB range 2
Proactive DM Period Specifies the period for the transmission of the DMM packets.
The values supported are:
• 1s
• 10s
• 1m
• 10m
The default value is 1s.
Proactive DM Payload The parameter defines the command option for proactive DM
Length [bytes] Payload length

Cross Threshold Specifies the cross threshold limit for Proactive LM. The
supported values range from: 2 to 10.
The default value is 10.
Clear Threshold Specifies the clear threshold limit for the Proactive LM. The
supported values range from: 2 to 10.
The default value is 10.
CV Rx It enables/disables (ENABLE/DISABLE) capability to detect the
Loss of Continuity (LOC) alarm, associated to Sink Tunnel
Segment Termination. ENABLE value is not applicable if
DIR=UNIDIRIN.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
316 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create head/tail tunnel

Table 61 Tunnel segment parameters (continued)

Parameters Description
CV Period Specifies the period (1/Frequency) of CV packet.
CV Tx Specifies the period (1/Frequency) of CV packet transmission.

If SLM CV is selected from the CV & SLM Tools parameter, the SLM CV panel is displayed as
shown in Table 62, “SLM CV parameters” (p. 317).

Table 62 SLM CV parameters

Parameters Description
SLM CV Rx Specifies the synthetic loss measurement
CV packet Reception.
SLM CV Tx Specifies the synthetic loss measurement
CV packet Transmission.
Signal DEG Cross Threshold Specifies the cross threshold limit for
Proactive LM. The supported values range
from: 2 to 10.
The default value is 10
Signal DEG Clear Threshold Specifies the clear threshold limit for the
Proactive LM. The supported values range
from: 2 to 10.
The default value is 10
Packet Loss Probability Specifies the packet Loss Probability
Signal DEG RDI Status Specifies the signal DEG RDI Status
CV Period Specifies the period (1/Frequency) of CV
packet transmission

Note: CV RX/CV TX must be enabled or disabled together.

Note: Loopback Tool, AIS, CSF, Proactive/On-demand Delay Measurement, and


Proactive Synthetic Loss Measurement are supported only on VPWS.

9
Click Save to save all the parameters settings to configure new tunnel segment.

10
Click Cancel to return to the previous window without saving the settings.

11
Click Create Transit Tunnel to create a swapped tunnel.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 317
Create head/tail tunnel 1850 TSS-5C

12
Click Search to filter the Tunnel details based on the selected parameter values as shown in
Figure 207, “Tunnel management - search” (p. 312)

13
The table displays the check box that is used to manage the deletion of a Tunnel, only when the
status is OFF or the tunnel is not involved in a protection or the tunnel does not contains
pseudowires, otherwise the check box is disabled. Table 63, “Tunnel management parameters
” (p. 317) provides description of tunnel management parameters:

Table 63 Tunnel management parameters

Parameter Description
Access Identifier Specifies the Tunnel Identifier
Access Control Domain Specifies if the Tunnel is LOCAL
(Management Plane) or CP (Control Plane)
Direction Specifies the direction of the Tunnel (BIDIR)
Role Specifies the role (HEAD, TRANSIT, or TAIL)
of the Tunnel
Admin Status Specifies the administrative status (ON,
OFF) of the Tunnel
Oper Status Specifies the Operation status (UP).
State Specifies the operative status (UP, DOWN)
of the Tunnel
Tunnel Segment Specifies the tunnel segment for the MPLS
port

14
Click Delete to delete the selected Tunnel.

15
Click Access Identifier to modify a Tunnel.

16
Click General to display and modify the general information of a Tunnel.

17
Click Path to display and modify the path of a Tunnel.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
318 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create transit tunnel

18
Click PWs to display the pseudowires related to a Tunnel.

END OF STEPS

3.74 Create transit tunnel


3.74.1 Purpose

Use this procedure to create a new Transit Tunnel.

1
Select Create Transit Tunnel from the TMPLS/MPLS-TP Tunnel Management panel as shown
in Figure 209, “Tunnel segment - from and to” (p. 318).

Figure 209 Tunnel segment - from and to

Enter the following Tunnel Segment From and Tunnel Segment To parameter values:
• MPLS Port - Specifies the AID of the provisioned port that is a server of the MPLS Tunnel
Segment.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 319
Create transit tunnel 1850 TSS-5C

3
Click Select to select the MPLS Port as shown in Figure 210, “MPLS port - select” (p. 319).

Figure 210 MPLS port - select

4
Select the Board Selection drop-down box to choose the MPLS Port and Click Search to find
the selected MPLS port details.

5
Click Cancel to return to the previous panel.
• Direction - Specifies the Tunnel Segment Direction (BIDIR or UNIDIRIN)
• User Name - Specifies the Tunnel Segment User name
• In Label - Specifies the expected Label for incoming segment associated to Sink Tunnel
Segment. This parameter is not relevant if DIR=UNIDIROUT. The label value must be unique
in the system and in the range {16-131071}
• Out Label - Specifies the transmitted Label for outgoing segment associated to Source
Tunnel Segment. This parameter is not relevant if DIR=UNIDIRIN. The label value must be
unique on MPLS port basis and in the range {16-1048575}
• PHB Profile - Specifies the AID of PHB Profile resource

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
320 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create transit tunnel

6
Click Select to choose the PHB Profile as shown in Figure 211, “PHB profile - select” (p. 320).

Figure 211 PHB profile - select

7
Select the radio button to choose the PHB Profile and click Apply & Exit.

8
Click Cancel to return to the previous panel.

9
Select the Alarm Profile from the ASAP SELECTION list and click Send.

10
Click Cancel to return to the previous panel.
• Primary State - Specifies the administrative state, IS/OOS (default IS)
• L2 Encapsulation Profile - Specifies the L2 Encapsulation profile AID to be used in case of
mapping of MPLS over Ethernet when a switched network is present. This parameter is
relevant only if port parameter refers to Local MPLS Interface

11
Click Select to choose the L2 Encapsulation Profile as shown in Figure 212, “L2 encapsulation
profile - select” (p. 321).

Figure 212 L2 encapsulation profile - select

12
Select the L2 Encapsulation Profile and click Apply & Exit from the window.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 321
Modify Tunnel 1850 TSS-5C

13
Click Cancel to return to return to the previous panel.
• Cross-Connection Type - Identifies the type of cross-connect. 1WAY identifies an
unidirectional cross-connection between the selected FROM and TO facility Tunnel
Segments. 2WAY identifies bi-directional cross-connection between the selected FROM and
TO facility Tunnel Segments

14
Select the 1WAY or 2WAY cross-connection from the Cross-Connection Type drop-down list.

15
Click Save to store the all the settings and return to the previous page.

16
Click Cancel to revoke all the changes and return to the previous page.
This operation creates the cross-connection and automatically the Tunnel.

END OF STEPS

3.75 Modify Tunnel


3.75.1 Steps

1
Select the Filter by parameters, or the Tunnel Ranging filters as the search criteria for
configured Tunnels. To view all the configured Tunnels, select Tunnel Location and Tunnel Type
as shown in

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
322 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Figure 213 Locate configured tunnels

2
Click on the Tunnel AID to view the Tunnel parameters as shown in Figure 214, “Modify tunnel
segment” (p. 324)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 323
Modify Tunnel 1850 TSS-5C

Figure 214 Modify tunnel segment

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
324 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Note:
• The In label of one tunnel is unique among all tunnels in the same NEs.
• The out label of one tunnel could be same as that of other tunnel. But if two or more
tunnels are connected to the same NE, the out label of those tunnels shall be different
from each other.
• LPT, AIS, CSF, proactive/on-demand DM, proactive SLM are supported only on VPWS.
• In MA’s MEP list, no more than one MEP can belong to the same NE.

3
Table 64, “Tunnel management - modify” (p. 324) provides description of Tunnel Management
parameters:

Table 64 Tunnel management - modify

Parameter Description
Tunnel
Access Identifier Specifies the AID of LSP Tunnel
Access Control Domain Specifies the Control Plane as LOCAL or ALL
Identifier Specifies the Tunnel Identifier
Description Specifies the Tunnel Description
Direction Specifies the LSP Tunnel path topology.
The supported values:
• Bidirectional
Role Specifies the Tunnel position role
Tunnel Segment To Specifies the TO entity
Admin status Specifies the Tunnel administrative status, set by management.
The values are ON/OFF
Oper status Specifies the Tunnel operative status. The values are UP/DOWN

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 325
Modify Tunnel 1850 TSS-5C

Table 64 Tunnel management - modify (continued)

Parameter Description
Traffic Descriptor Specifies the Traffic Descriptor Identifier for the assigned
bandwidth profile to the LSP Tunnel
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Tunnel Segment
AID Specifies the Tunnel Segment AID
Type Specifies the type of Tunnel Segment is SWAP.
MPLS port Specifies the AID of the provisioned port that is a server of the
MPLS Tunnel Segment
L2 Encapsulation Profile Specifies the L2 Encapsulation profile AID to be used in case of
mapping of MPLS over Ethernet when a switched network is
present. This parameter is relevant only if port parameter refers
to Local MPLS Interface
Direction Specifies the path.
The supported values:
• Bidirectional
User Name Specifies the User name for the tunnel segment
In label Specifies the expected Label for incoming segment associated
to Sink Tunnel Segment. This parameter is not relevant if
DIR=UNIDIROUT. The label value must be unique in the system
and in the range {16-131071}
Out label Specifies the transmitted Label for outgoing segment associated
to Source Tunnel Segment. This parameter is not relevant if
DIR=UNIDIRIN. The label value must be unique on MPLS port
basis and in the range {16-1048575}
PHB profile Specifies the AID of PHB Profile resource
Alarm Profile Specifies the Alarm Severity Assignment Profile (ASAP) name to
use with this Tunnel Segment

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
326 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Table 64 Tunnel management - modify (continued)

Parameter Description
Acces Control Domain Specifies the Control Plane as LOCAL or ALL
DDM Protection switch Specifies the whether the protections switch is enabled or
for SD disabled.
Tunnel AID Specifies the AID of LSP Tunnel
Primary State Indicates the primary state.
Operation and Maintenance
MEP Specifies the Maintenance Entity Point. For enabling MEP
function, the direction of MEP is according to the direction of
Tunnel Segment. The values are ENABLE or DISABLE
MEP ID Specifies the Maintenance Entity Point Identifier. This parameter
is unique inside MEG ID. If provisioned, this parameter must be
different from EXP MEP ID. The MEP ID is in the range 1 to
8191.
MEG ID Specifies the Maintenance Entity Group Identifier. This
parameter must be unique in the system
CV PHB Specifies the CV packet transmission for PHB profile

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 327
Modify Tunnel 1850 TSS-5C

Table 64 Tunnel management - modify (continued)

Parameter Description
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range 2)
The default value is EF.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
328 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Table 64 Tunnel management - modify (continued)

Parameter Description
CV Rx It enables/disables (ENABLE/DISABLE) capability to detect the
Loss of Continuity (LOC) alarm, associated to Sink Tunnel
Segment Termination. ENABLE value is not applicable if
DIR=UNIDIRIN
CV Tx Specifies the period (1/Frequency) of CV packet transmission
CV Period Specifies the period (1/Frequency) of CV packet transmission
EXP MEP ID Specifies the EXP MEP ID.
Proactive DM
Proactive DM Specifies whether Proactive DM is enabled or disabled.
Proactive DM PHB Specifies whether the Proactive DM PHB is enabled or disabled.

4
Click Select to select the MPLS Port

5
Select the radio button to choose the MPLS Port Access Identifier and click Apply & Exit.

6
Click Cancel to return to the previous panel.

7
Click Select to choose the PHB Profile.

8
Select the PHB Profile access identifierand click Apply & Exit.

9
Click Cancel to return to the previous panel.

10
Click Select to choose the Alarm Profile.

11
Select the Alarm Profile from the ASAP SELECTION list and click Send.

12
Click Cancel to return to the previous panel.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 329
Modify Tunnel 1850 TSS-5C

13
Click Select to choose the L2 Encapsulation Profile.

14
Select the previously created L2 Encapsulation Profile and click Apply & Exit from the window.

15
Click Cancel to return to return to the previous panel.

16
Table 65, “Operation and maintenance parameters” (p. 329) provides the description of
Operation And Maintenance frame parameters:

Table 65 Operation and maintenance parameters

Parameter Description
MEP Specifies the Maintenance Entity Point. For enabling MEP
function, the direction of MEP is according to the direction of
Tunnel Segment. The values are ENABLE or DISABLE
MEG ID Specifies the Maintenance Entity Group Identifier. This
parameter must be unique in the system
MEP ID Specifies the Maintenance Entity Point Identifier. This
parameter is unique inside MEG ID. If provisioned, this
parameter must be different from EXP MEP ID. The MEP ID is
in the range 1 to 8191.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
330 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Table 65 Operation and maintenance parameters (continued)

Parameter Description
OAM PHB Profile Specifies the PHB OAM Profile AID for OAM packets
The supported values are:
• OAMTYPE1
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE2
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE3
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE4
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE5
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE6
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE7
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)
• OAMTYPE8
- {EF, HIGH2, AF21, AF22, AF41, AF42, DE-G, DE-Y} (PHB
range 1)
- {EF, HIGH2, AF1, AF2, AF3, AF4, DE, LOW2} (PHB range
2)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 331
Modify Tunnel 1850 TSS-5C

Table 65 Operation and maintenance parameters (continued)

Parameter Description
CV PHB Specifies the CV packet transmission for PHB profile
CV RX It enables/disables (ENABLE/DISABLE) capability to detect the
Loss of Continuity (LOC) alarm, associated to Sink Tunnel
Segment Termination. ENABLE value is not applicable if
DIR=UNIDIRIN
CV TX It enables/disables (ENABLE/DISABLE) transmission of CV
packets, associated to Source Tunnel Segment Termination.
ENABLE value is not applicable if DIR=UNIDIRIN
CV Period Specifies the period (1/Frequency) of CV packet transmission
EXP MEP ID Specifies Expected MEP values list, integer associated to Sink
Tunnel Segment Termination, also called Peer MEP ID

17
Click Performance Monitoring to configure the Performance Monitoring parameters. The
default screen is the PM report screen.

The following are the Performance Monitoring Performance Monitoring parameters:


• PM Report
• PM Initialization
• PM Mode
• PM Set

18
Configure the PM report parameters as described in Figure 215, “PM report” (p. 333)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
332 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Figure 215 PM report

Table 66 Performance monitoring report

Parameter Description
Access Identifier Specifies the Access Identifier for the selected port.
Monitor level Specifies at which level the monitoring report is
required. The values are DN, DNORCMPL, UP, and
UPORNCMPL. The default value is 1-UP.
Monitored parameter type Specifies the parameter type to be monitored. The
values are MINP, MINB, MONP, MONB and ALL
Time period Specifies the time interval for the which the report is
being generated. The values are 15-MIN, 1-DAY, or
ALL. The default value is 15-min
Number of 15-minute Historical Specifies for how many 15-MIN reports are required.
Register The values are ALL, or 0-31 days a month. The
default is 0.
Number of 1-Day Historical Register Specifies how many 1-DAY reports are required. The
supported values are ALL or 0-7. The default is 0.
Monitor Date Specifies the Date, Month, and Day to retrieve the
PM report.
Monitor Time Specifies the Time, Hour, & Minutes to retrieve the
PM report.

19

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 333
Modify Tunnel 1850 TSS-5C

The Retrieve link allows the user to retrieve the performance monitoring report after selecting
the parameters values. Click Retrieve to retrieve PM parameters as shown in Figure 216,
“Retrieve PM results” (p. 333)

Figure 216 Retrieve PM results

20
Click Cancel to revoke all the changes and return to the previous page.

21
Click on PM Initialization to view the Initialize Performance Monitoring screen as shown in
Figure 217, “Initialize PM” (p. 335)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
334 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Figure 217 Initialize PM

22
Specify the Initialize PM parameters as described in

Table 67 Initialize PM parameters

Parameter Description
Access Identifier Specifies the Access Identifier for the selected
tunnel.
Monitored Counter Type Specifies the counter parameter type to be
monitored. The default values is ALL.
Time period Specifies the time interval for the which the report
is reset. The values are 15-MIN or 1-DAY. The
default value is 15-min.

23
Click Save to save the parameter setting or click Cancel to return to the previous screen.

24
Click PM Mode to view the Performance Monitoring Mode screen as shown in Figure 218,
“Performance Monitoring mode” (p. 336)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 335
Modify Tunnel 1850 TSS-5C

Figure 218 Performance Monitoring mode

25
Configure the parameters as described in Table 68, “Performance Monitoring mode
parameters” (p. 336).

Table 68 Performance Monitoring mode parameters

Parameter Description
Access Identifier Specifies the Access Identifier for the selected
tunnel.
Time Period Specifies the time interval for the which the report is
retrieved. The values are 15-MIN, 1-DAY, or BOTH.
The default value is BOTH.

26
Click Retrieve to retrieve the Performance Monitoring Mode results.

27
Click Cancel to return to the previous screen without saving.

28
Click on PM Set to view the Set Performance Monitoring screen as shown in Figure 219, “Set
Performance Monitoring ” (p. 337)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
336 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Figure 219 Set Performance Monitoring

29
Figure 219, “Set Performance Monitoring ” (p. 337) describes the Set performance monitoring
parameters:

Table 69 Set Performance Monitoring parameters

Parameter Description
Access Identifier Specified the Tunnel Segment AID.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 337
Modify Tunnel 1850 TSS-5C

Table 69 Set Performance Monitoring parameters (continued)

Parameter Description
PM State Specify the PM state as On, Off or Disabled.
• ON - PM collection for all MONTYPE is enabled.
This command resets counters. Current data
and History data are retrievable.
• OFF - PM collection for all MONTYPE is
disabled. Current data and History data are
retrievable.
• DISABLED - PM collection for all MONTYPE is
disabled. Current data and History data are not
retrievable.
While creating the Tunnel Segment, the PM state
is set to OFF by default.
Note:
• When PMSTATE changes from ON to
DISABLED, counters are not retrievable
because resources are released.
• When PMSTATE changes from ON to OFF,
collection is stopped but counters are
retrievable.
• When PMSTATE changes from OFF to ON,
counters are cleared (0) and collection starts
again.
• When PMSTATE changes from OFF to
DISABLE, counters are not retrievable because
resources are released.
• When PMSTATE changes from DISABLE to
OFF (or ON) , counters resources are allocated
for data collection.
• When TUSEG is deleted collection is stopped
and counters resource are released.
• If PM collection is enabled then this parameter
can be OFF or DISABLED.
• If PM collection is OFF then this parameter can
be ON or DISABLED
• If PM collection is DISABLED then this
parameter can be ON or OFF.
• (PMSTATE=ON) can be enabled for a maximum
of 512 PM counters

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
338 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Table 69 Set Performance Monitoring parameters (continued)

Parameter Description
Time Period Time Period, identifies the accumulation time
period for performance monitoring information
(1-day or 15-minute collection register).
The supported values are:
• 15-DAY
• 1-DAY
• BOTH

30
Click Save to save the PM setting or click Cancel to return to the previous screen without
saving.

31
To configure PRODM Performance Monitoring parameters, click on the PRODM performance
monitoring tab and configure the PRODM Performance Monitoring parameters as described in
Step 17 to Step 29.

32
The Alarms panel contains the following hyperlink:

33
Click View that shows all the alarms related to the specified Tunnel Segment'

END OF STEPS

3.75.2 Configure E1 Performance Monitoring for ETSI

1
Click Performance Monitoring to configure the Performance Monitoring parameters. The
default screen is the PM report screen.

The following are the Performance Monitoring Performance Monitoring parameters:


• PM Report
• PM Initialization
• PM Mode
• PM Set

2
Configure the PM report parameters as described in Table 70, “Retrieve Performance
Monitoring parameters for E1” (p. 340)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 339
Modify Tunnel 1850 TSS-5C

The following E1 PM parameters are applicable only for ETSI:

Table 70 Retrieve Performance Monitoring parameters for E1

Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Monitored parameter type Identifies the parameter whose PM data register is
being initialized. The supported value is ALL (All
monitored types). ES-E1, SES-E1, SEFS-E1,
UAS-E1,CSS-E1, PCV-E1, LES-E1,
BES-E1,DM-E1,LCV-E1are valid for E1 facility, Near
End and ES-E1, SES-E1, UAS-E1are valid for E1
facility, Far End.
The supported values are:
• ALL: All monitored parameter types (valid for all E1
facilities).
• ES-E1 Errored Seconds E1 (Near End and Far
End)
• SES-E1 Severely Errored Seconds E1 (Near End
and Far End)
• UAS-E1:Unavailable Seconds E1 (Near End and
Far End)
• SEFS-E1: The number of Severely Errored
Framing Seconds (Near End)
• BES-E1: The number of Bursty Errored Seconds
(Near End)
• LES-E1: The number of Line Errored Seconds
(Near End)
• PCV-E1: The number of Path Coding Violations
(Near End)
• LCV-E1: The number of Path Coding Violations
(Near End)
• PCV-E1: The number of Controlled Slip Seconds
(Near End)
• DM-E1 : The number of Degraded Minutes (Near
End)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
340 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Table 70 Retrieve Performance Monitoring parameters for E1 (continued)

Parameter Description
Monitor level specifies the discrimination level of PM parameter
values to be reported for the specified monitored
parameter (MONTYPE). The format of MONLEV is
<LEVEL> - DIRECTION>
The supported values are:
• {0-4294967295} - DN <LEVEL>Down, Only PM
data for the specified MONTYPE that is less-than
or equal-to (≤ ) the value of <LEVEL> is reported.
• 0-4294967295}- DNORNCMPL <LEVEL> Down Or
Not Complete, Only PM data for the specified
MONTYPE that is ≤ the value of <LEVEL> or that
does not have a VLDTY flag of CMPL.
• {0-4294967295} - UP <LEVEL> Up, Only PM data
for the specified MONTYPE that is greater-than or
equal-to ( ≥ ) the value of <LEVEL> is reported.
• {0-4294967295} UPORNCMPL <LEVEL> Up Or
Not Complete, Only PM data for the specified
MONTYPE that is ≥ the value of <LEVEL> or that
does not have a VLDTY flag of CMPL.
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 341
Modify Tunnel 1850 TSS-5C

Table 70 Retrieve Performance Monitoring parameters for E1 (continued)

Parameter Description
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers
Monitor date Specifies the (starting) date of the PM collection
period for which PM data is to be reported. The
supported format is { MONTH - DAY : {01-12} -
{01-31} }. The default value is the current date.
The supported values are:
• 15-MIN: 15 minutes registers
• 1-DAY: 24 hour registers
• BOTH 15 minutes and 24 hour registers
Monitor Time If the time period of {15-MIN, BOTH} is entered,
specifies the (starting) time of the PM collection
period for which PM data is to be retrieved. If time
period of 1-DAY is entered, the monitor time is
ignored. The minutes {0-14}, {15-29}, {30-44}, and
{45-59} specifies the first, second, third, and fourth
respective 15-minute period within the specified
hour.
Number of 15-minute historical Specifies the number of previous 15-minute
registers historical PM registers to retrieve in addition to that
specified by Monitor Date and Monitor Time.
The supported values are:
• 0-31: 0-31 previous historical 15-minute PM data
registers
• ALL: All previous historical 15-minute PM data
registers
Number of 1-day historical registers Specifies the number of previous 1-day historical PM
registers to retrieve in addition to that specified by
Monitor Date and Monitor Time.
The supported values are:
• 0-6: 0-6 previous historical 1-day PM data registers
• ALL: All previous historical 1-day PM data registers

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
342 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Configure the initialize register parameters using the following E1 PM parameters applicable for
ETSI:

Table 71 Initialize Register parameters with E1

Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Monitored parameter type Identifies the parameter whose PM data register is
being initialized. The supported value is ALL (All
monitored types).
Monitor Value Specifies the value to be set in the register specified
by LOCN and TMPER.
The only supported values is 0.
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 343
Modify Tunnel 1850 TSS-5C

Configure the PM mode parameters using the following E1 parameters applicable for ETSI:

Table 72 Retrieve Performance Monitoring mode parameters for E1

Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers
Monitor Time If the time period of {15-MIN, BOTH} is entered,
specifies the (starting) time of the PM collection
period for which PM data is to be retrieved. If time
period of 1-DAY is entered, the monitor time is
ignored. The minutes {0-14}, {15-29}, {30-44}, and
{45-59} specifies the first, second, third, and fourth
respective 15-minute period within the specified
hour.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
344 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Tunnel

Configure the E1 set PM mode parameters as applicable for ETSI:

Table 73 Set Performance Monitoring mode parameters for E1

Parameter Description
AID Identifies the entity access identifier. Only valid SDH
Facility or the AID combinations are allowed, all
other shall be rejected.
The supported value is E1-{1}-{1}-{3,4}-{1-16} (E1
contained in a CES module).
Location Specifies the PM registers location to be initialized.
The supported values are:
• NEND: Near End registers
• FEND: Far End registers
• BIDIR: Bidirectional registers
• ALL: Near End, Far End and Bidirectional registers
Mode Type Specifies the PM mode type to be enabled or
disabled.
The supported values are:
• ALL: PM for all applicable parameters configured
• P: PM for E1 parameters is configured..
• ALL: Receive and transmit direction
The default value is RCV.
PM State Specifies whether the PM data collection for the
specified mode type is enabled or disabled.
The supported value are:
• ON: PM for the specified MODETYPE is enabled
• OFF: PM enabled and not counting for the
specified MODETYPE
• DISABLED: PM for the specified Mode type is
disabled, non-existent
Note:When the PMSTATE=OFF, the related
counters will be frozen with the current value.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 345
Pseudowire management 1850 TSS-5C

Table 73 Set Performance Monitoring mode parameters for E1 (continued)

Parameter Description
Direction Specifies the direction of the signal being monitored
(receive or transmit).
The supported values are:
• RCV:Receive direction
• TRMT: Transmit direction. valid for E1 facilities for
LOCN not equal BIDIR. Valid for OT, AUn and TUn
facilities for LOCN not equal BIDIR.
• ALL: Receive and transmit direction
The default value is RCV.
Time Period Specifies whether the 15-minute or 1-day (24 hour)
PM collection register is to be initialized.
The supported value are:
• 15-MIN 15 minutes registers, only valid for LOCN
not equal BIDIR
• 1-DAY 24 hour registers

END OF STEPS

3.76 Pseudowire management


3.76.1 Purpose

Use the following procedure to manage Transit and Head/Tail Pseudowire:

1
Select (T)MPLS -> PseudoWire from the menu bar as shown in Figure 220, “Pseudowire
management” (p. 347).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
346 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Pseudowire management

Figure 220 Pseudowire management

2
Select ALL from the Pseudowire Resource drop-down list box to filter the pesudowire.

3
Set the PW Ranging Filter by entering a valid range in the From and To entry boxes.

Enable the PW AID Filter check-box to enter access identifier index. The panel displays the
following hyperlinks:
• Search - That executes a search operation based on the selected filters.
• 3.78 “Create head/tail pseudowire” (p. 358) - that is used to create a terminated pseudowire.
• 3.79 “Create transit pseudowire” (p. 360) - that is used to create a swapped Pseudowire.

5
Click Search to execute the search on ALL and all the shelves (i.e. SHELF 1-1).

6
After executing the Search operation, Table 74, “Pseudowire management - Search
parameters” (p. 347) provides the description of Pseudowire Management tab parameters:

Table 74 Pseudowire management - Search parameters

Parameter Description
Access Identifier Specifies the Pseudowire identifier
Tunnel Access Identifier Specifies the Tunnel Pseudowire identifier

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 347
Modify Pseudowire 1850 TSS-5C

Table 74 Pseudowire management - Search parameters (continued)

Parameter Description
Role Specifies the role (HEAD, TRANSIT, or TAIL)
of the Pseudowire
Status Specifies the administrative status (ON,
OFF) of the Pseudowire
State Specifies the operative status (UP, DOWN)
of the Pseudowire

7
Click Delete which deletes the selected check box for Pseudowire.

8
Click Access Identifier which modifies a Pseudowire.

END OF STEPS

3.77 Modify Pseudowire


3.77.1 Steps

1
Click any Access Identifier link from the values displayed after filtering as shown in Figure
221, “Modify Pseudowire” (p. 349).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
348 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Pseudowire

Figure 221 Modify Pseudowire

Note:
• The In label of one PW is unique among all PWs in the same NEs.
• The out label of one PW could be same as that of other PW. But if two or more PWs
are connected to the same NE, the out label of those PWs shall be different from each
other.

2
Table 75, “Pseudowire panel parameters” (p. 350) provides the description of Pseudowire/
Pseudowire Segment panel parameters:

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 349
Modify Pseudowire 1850 TSS-5C

Table 75 Pseudowire panel parameters

Parameter Description
Access Identifier Specifies the Access Identifier of the Pseudowire
Role Specifies the Pseudowire position role. For Pseudowire originated
from local node the HEAD is used, on transit nodes TRANSIT and
on destination nodes TAIL are used
Tunnel AID Specifies the identifier of the Tunnel to which the PW belongs
Description Specifies Pseudowire description
PWSEG From Specifies the FROM entity
PWSEG To Specifies the To entity
Admin Status Specifies the Pseudowire administrative status, set by
management. The values are On and OFF
VT Head Specifies pointer to head Virtual Transport
Operative Status Specifies the Pseudowire operative status. The values are
UP/DOWN
TD ID Specifies the Traffic Descriptor Identifier for the assigned
bandwidth profile to the Pseudowire
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Pseudowire Segment Description
Panel
Access Identifier Specifies the AID of Pseudowire Segment
Port Specifies the AID of the provisioned port or Tunnel Segment
Type Specifies the type of Pseudowire Segment is SWAP.
Access Control It is local or Control Plane
Domain
User Name Specifies Pseudowire Segment User name

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
350 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Pseudowire

Table 75 Pseudowire panel parameters (continued)

Parameter Description
Direction Specifies Pseudowire Segment Direction (BIDIR)
PHB Profile Specifies the AID of the PHB Profile resource
In Label Specifies the expected Label for incoming segment associated to
Sink Pseudowire Segment. The label value must be unique in the
system. The valid range is 16-131071
Out Label Specifies transmitted Label for outgoing segment associated to
Source Pseudowire Segment. The label value must be unique in
the system. The valid range is 16-1048575
Control Word (CW) It enables/disables capability to insertion/stripping of the Control
Word, associated to Termination Pseudowire Segment
Primary State Specifies the primary state.
The supported values are:
• In-Service (IS) - normal operational state of the interface (not
failed condition)
• Out-Of-Service - Management (OOS-MA): the interface has
been placed out of service by a management action. Otherwise
it performs normally.
• Out-Of-Service- Autonomous (OOS-AU): the interface is out of
service because of a failure and cannot perform its function
(alarms are present).
• Out-Of-Service - Autonomous (OOS-AUMA): the interface is out
of service because of both management action and failure
(normally used to suppress alarms while clearing the failure
cause)

3
Click Performance Monitoring to configure the Performance Monitoring parameters. The
default screen is the PM report screen.

The following are the Performance Monitoring parameters:


• PM Report
• PM Initialization
• PM Mode
• PM Set

4
Configure the PM report parameters as described in Figure 222, “PM Report” (p. 352)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 351
Modify Pseudowire 1850 TSS-5C

Figure 222 PM Report

Table 76 Performance Monitoring Report

Parameter Description
Access Identifier Specifies the Access Identifier for the selected port.
Monitor level Specifies the discrimination level of PM parameter
values to be reported for the specified monitored
counters (MONTYPE). The format of MONLEV is
<LEVEL> - <DIRECTION>
The supported values are:
• DN - Down, Only PM data for the specified
MONTYPE that is less-than or equal-to ( ≤) the
value of < LEVEL> is reported.
• DNORNCMPL - Down Or Not Complete, Only PM
data for the specified MONTYPE that is the ≤ value
of <LEVEL>or that does not have a VLDTY flag of
CMPL.
• UP - Up, Only PM data for the specified
MONTYPE that is greater-than or equal-to (≤) the
value of < LEVEL> is reported.
• UPORNCMPL - Up Or Not Complete, Only PM
data for the specified MONTYPE that is ≥ the value
of <LEVEL> or that does not have a VLDTY flag of
CMPL.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
352 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Pseudowire

Table 76 Performance Monitoring Report (continued)

Parameter Description
Monitored parameter type Identifies the type of monitored registers that are
being retrieved. The MONTYPE = ALL allows to
specify the set of all PM counters supported by the
TUSEG facility.
The supported values are:
• ALL - All activated counters for specified AID
• MINP - MPLS Incoming Number of Packets
• MINB - MPLS Incoming Number of Bytes
• MONP - MPLS Outgoing Number of Packets
• MONB - MPLS Outgoing Number of Bytes
The default value is All.
Time period Specifies the time interval for the which the report is
being generated. The values are 15-MIN, 1-DAY, or
ALL. The default value is 15-min
Number of 15-minute Historical Specifies the number of previous 15-minute
Register historical PM registers to retrieve in addition to that
specified by MONDAT and MONTM.
The register specified with MONDAT and MONTM
will be the first output followed by the NUMMIN
previous registers values are:
• 0 :No previous historical 15-minute PM data
registers are required
• 1-32 :1-32 previous historical 15-minute PM data
registers
• ALL: All previous historical 15-minute PM data
registers
Number of 1-Day Historical Register Specifies the number of previous 1-day historical PM
registers to retrieve in addition to that specified by
MONDAT and MONTM. :
The register specified with MONDAT and MONTM
will be the first output followed by the NUMDAY
previous registers values are
• 0 :No previous historical 1-Day PM data registers
are required
• 1-7 previous historical 1-day PM data registers
• ALL: All previous historical 1-day PM data registers
Monitor Date Monitor date, specifies the (starting) date of the PM
collection period for which PM data is to be reported.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 353
Modify Pseudowire 1850 TSS-5C

Table 76 Performance Monitoring Report (continued)

Parameter Description
Monitor Time Specifies the (starting) time of the PM collection
period for which PM data is to be retrieved. If
TMPER of 1-DAY is entered, the value of MONTM is
ignored (i.e., an entered value is validated, but does
not affect the command execution). The minutes
{0-14}, {15-29}, {30-44} resp. {45-59} specifies the
first, second, third respective the fourth 15-minute
period within the specified hour.

5
The Retrieve link allows the user to retrieve the performance monitoring report after selecting
the parameters values. Click Retrieve to retrieve PM parameters as shown in Figure 223,
“Retrieve PM Results” (p. 354)

Figure 223 Retrieve PM Results

6
Click Cancel to revoke all the changes and return to the previous page.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
354 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Pseudowire

7
Click on PM Initialization to view the Initialize Performance Monitoring screen as shown in
Figure 224, “Initialize PM” (p. 354)

Figure 224 Initialize PM

8
Specify the Initialize PM parameters as described in

Table 77 Initialize PM parameters

Parameter Description
Access Identifier Specifies the Access Identifier for the selected
Pseudowire.
Monitored counter type Specifies the counter parameter type to be
monitored. The default values is ALL.
Time period Specifies the time interval for the which the report
is reset. The values are 15-MIN or 1-DAY. The
default value is 15-min.

9
Click Save to save the parameter setting or click Cancel to return to the previous screen.

10
Click PM Mode to view the Performance Monitoring Mode screen as shown in Figure 225,
“Performance Monitoring mode” (p. 356)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 355
Modify Pseudowire 1850 TSS-5C

Figure 225 Performance Monitoring mode

11
Configure the parameters as described in

Table 78 Performance Monitoring mode parameters

Parameter Description
Access Identifier Specifies the Access Identifier for the selected
Pseudowire port.
Time Period Specifies the time interval for the which the report is
retrieved. The values are 15-MIN, 1-DAY, or BOTH.
The default value is BOTH.

12
Click Retrieve to retrieve the Performance Monitoring Mode results.

13
Click Cancel to return to the previous screen without saving.

14
Click on PM Set to view the Set Performance Monitoring screen as shown in Figure 226, “Set
Performance Monitoring ” (p. 357)

The Set PM mode is defined as follows:


• ON: PM collection is enabled: current data are available and counting, history data are
available, current data and history data are retrievable
• OFF: PM is enabled and not counting: current data are available and not counting, history
data are available but always 0 if the whole period OFF, current data and history data are
retrievable.
• DISABLED: PM is disabled: current data and history data are not available and retrievable.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
356 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Modify Pseudowire

Figure 226 Set Performance Monitoring

15
Table 79, “Set Performance Monitoring parameters” (p. 357) describes the Set performance
monitoring parameters:

Table 79 Set Performance Monitoring parameters

Parameter Description
Access Identifier Specified the Pseudowire Segment AID.
PM State Specify the PM state as On, Off or Disabled.
Time Period Select the interval as 15min, 1-Day or both.

16
Click Save to save the PM setting or click Cancel to return to the previous screen without
saving.

17
The Alarms panel contains the following hyperlink:

18
Click View that shows all the alarms related to the specified Tunnel Segment'.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 357
Create head/tail pseudowire 1850 TSS-5C

3.78 Create head/tail pseudowire


3.78.1 Purpose

Use this procedure to manage a new Head/Tail Pseudowire.

1
Click (T)MPLS -> PseudoWire Management from the menu bar as shown in Figure 227,
“Pseudowire segment” (p. 357).

Figure 227 Pseudowire segment

2
Table 80, “Pseudowire segment parameters” (p. 358) provides the description of Pseudowire
Segment parameters:

Table 80 Pseudowire segment parameters

Parameter Description
Port Specifies the AID of the provisioned port or Tunnel Segment
Type Specifies the type of Pseudowire Segment is SWAP.
Direction Specifies the Pseudowire Segment direction. The supported value is
BIDIR.
In Label Specifies the expected Label for incoming segment associated to Sink
Pseudowire Segment. The parameter is not relevant if DIR=UNIDIROUT.
The label value must be unique in the system. The valid range is
16-131071
PHB Profile Specifies the AID of PHB Profile resource

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
358 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create head/tail pseudowire

Table 80 Pseudowire segment parameters (continued)

Parameter Description
Primary State Specifies the primary state. The default is IS
The supported values are:
• In-Service (IS) - normal operational state of the interface (not failed
condition)
• Out-Of-Service - Management (OOS-MA): the interface has been
placed out of service by a management action. Otherwise it performs
normally.
• Out-Of-Service- Autonomous (OOS-AU): the interface is out of service
because of a failure and cannot perform its function (alarms are
present).
• Out-Of-Service - Autonomous (OOS-AUMA): the interface is out of
service because of both management action and failure (normally used
to suppress alarms while clearing the failure cause)
User Name Specifies the Pseudowire Segment User name
Out Label Specifies transmitted Label for outgoing segment associated to Source
Pseudowire Segment. The parameter is not relevant if DIR=UNIDIRIN.
The label value must be unique in the system. The valid range is
16-1048575
Control Word It enables/disables capability to insertion/stripping of the Control Word,
(CW) associated to Termination Pseudowire Segment. This parameter is valid
only if TYPE=TERMINATION

Note:
• The In label of one PW is unique among all PWs in the same NEs.
• The out label of one PW can be same as that of other PW. But if two or more PWs are
connected to the same NE, the out label of those PWs shall be different from each
other.

3
Click Select to choose the Port.

4
Select the board from the Board Selection drop-down list box to search for TUSEG port.

5
Click Cancel to cancel the selection and return to the previous panel.

6
Click Select to choose the PHB Profile as shown in Figure 228, “PHB profile- select” (p. 360)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 359
Create transit pseudowire 1850 TSS-5C

Figure 228 PHB profile- select

7
Select the radio button to choose the PHB Profile and click Apply & Exit.

8
Click Cancel to return to the previous panel.

9
Click Cancel to return to the previous page.

10
Click Save to store the settings and return to previous page.

11
Click Cancel to revoke the changes and return to previous page.

END OF STEPS

3.79 Create transit pseudowire


3.79.1 Purpose
Use this procedure to create a new Transit Pseudowire.

1
Select Create Transit Pseudowire from the Tunnel Management panel .

2
Table 81, “Pseudowire segment from - to parameters” (p. 360) provides the description of
Pseudowire Segment From and Pseudowire Segment To parameters:

Table 81 Pseudowire segment from - to parameters

Parameter Description
Port Specifies the AID of the provisioned port or Tunnel Segment

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
360 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create transit pseudowire

Table 81 Pseudowire segment from - to parameters (continued)

Parameter Description
Type Specifies the type of Pseudowire Segment is SWAP.
Direction Specifies the Pseudowire Segment direction. The supported value is
BIDIR.
User Name Specifies the Pseudowire Segment User name
In Label Specifies the expected Label for incoming segment associated to Sink
Pseudowire Segment. The parameter is not relevant if DIR=
UNIDIROUT. The label value must be unique in the system. The valid
range is 16-131071
Out Label Specifies transmitted Label for outgoing segment associated to Source
Pseudowire Segment. The parameter is not relevant if DIR=UNIDIRIN.
The label value must be unique in the system. The valid range is
16-1048575
PHB Profile Specifies the AID of PHB Profile resource
Primary State Specifies the primary state. The default is IS
The supported values are:
• In-Service (IS) - normal operational state of the interface (not failed
condition)
• Out-Of-Service - Management (OOS-MA): the interface has been
placed out of service by a management action. Otherwise it performs
normally.
• Out-Of-Service- Autonomous (OOS-AU): the interface is out of service
because of a failure and cannot perform its function (alarms are
present).
• Out-Of-Service - Autonomous (OOS-AUMA): the interface is out of
service because of both management action and failure (normally
used to suppress alarms while clearing the failure cause)

3
Select the board from the Board Selection drop-down list box to search for the TUSEG port.

4
Click Cancel to return to the previous panel.

5
Click Select to choose the PHB Profile.

6
Select the Access Identifier to choose the PHB Profile.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 361
Create transit pseudowire 1850 TSS-5C

7
Click Cancel to return to the previous panel.

8
Click Cancel to return to return to the previous panel.

9
The Cross-Connection panel displays the following parameters:
• Cross-Connection Type - Identifies the type of cross-connect. 1WAY identifies an
unidirectional cross-connection between the selected FROM and TO facility Pseudowire
Segments. 2WAY identifies a bi-directional cross-connection between the selected FROM
and TO facility Pseudowire Segments.

10
Click Save to store the all the settings.

11
Click Cancel to revoke all the changes.

END OF STEPS

3.79.2 In Fiber In band Management

1
Select Communication -> In Fiber In Band Management as shown in Figure 229, “In fiber In
band Management” (p. 361).

Figure 229 In fiber In band Management

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
362 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create transit pseudowire

The In Fiber In Band Management screen displays the In Fiber In Band Management Search
panel with the following options:
• List Boards - The combo-box contains the list of boards that can be selected to perform the
search.
• Only Activate - A check-box that can be enabled/disabled based on the filter criteria. Enable
the check box to search for the borads that are currently active.

2
Select the board and click Search to filter the boards that are active or inactive.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 363
Overview 1850 TSS-5C

Ethernet services

3.80 Overview

3.80.1 Purpose
Carrier Ethernet Services are connectivity services based on Ethernet User Network Interfaces
(UNI) and packet formats.
They are proposed as an alternative to traditional leased line services as well as layer 3 services
(IP/MPLS) services, such as Virtual Private Networks (VPN).
The target of these services is to allow the service providers to migrate their customers toward a
packet optimized network, to provision services much faster and with far greater bandwidth
flexibility.

The ZIC (from Rel.3.0 onward) manage two basic Carrier Ethernet Services:
• EVPL - A point-to-point connectivity service.
• EVPLAN - A point-to-multipoint connectivity service.
Common for both of these services is the use of a standardized User Network Interface (UNI)
based on Ethernet, where service payload data is transported in Ethernet packets using PW
(EVPL) and E-LAN (EVPLAN)

3.80.2 Contents

3.80 Overview 364


3.81 Create EVPL service 365
3.82 Create EVPLAN service 372
3.83 Create an E-LAN Service 376
3.84 Create VLAN 379
3.85 Administer Static Filtering 382
3.86 Create Storm Control profile 384
3.87 Create Packet Filtering profile 394
3.88 Manage TDM ASAP 403
3.89 Create Generic TDM Parameters 407
3.90 Create CES Pseudowire Management 410
3.91 Alarms menu 411
3.92 Alarm Management 421
3.93 Manage TDM TCA profile 424

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
364 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create EVPL service

3.81 Create EVPL service


3.81.1 Purpose

Use this procedure to create the EVPL Service.

1
Select Connections -> Ethernet Services XC -> EVPL from the menu bar as shown in Figure
230, “EVPL service” (p. 364).

Note: Confirm each EVPL flow with bidirectional XC before the upgrade operation, that is
for UNI -> NNI and NNI -> UNI. Operators can check by searching EVC.

Figure 230 EVPL service

The EVPL Service tab provides the following parameters:


Menus Description
From XC Id Specifies the cross-connection Id for the selected EVPL service.
To XC Id Specifies the target to establish EVPL service.

2
Click Search to view the EVPL Service list.
Result: The ETS Flow involved is listed as shown in the Figure 231, “EVPL Service list”
(p. 366).
From Release 6.1.10, eight EVPLs can be provisioned with the same PW. For example, Figure
231, “EVPL Service list” (p. 366) shows five EVPLs.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 365
Create EVPL service 1850 TSS-5C

Note:
• VLAN operation (that is VLAN pop, push, swap) are same for all EVPLs, and they are
located on the same UNI interface.
• NNI to UNI xc must be created with specific TD. All TD parameter (CIR, PIR, CBS, and
PBS) must be zero for NNI to UNI xc.
• For NNI to UNI xc, TD service type Anyservice will drop all flows in a PW. Other TD will
drop a specific flow with corresponding TD which is inserted in the upstream. For
example, node A uses TD service type =RegulatedService for an xc from UNI to NNI,
node B should create a NNI to UNI xc with TD service type= RegulatedService to drop
this flow.

Figure 231 EVPL Service list

3
From the figure Figure 231, “EVPL Service list” (p. 366), click on the link ETSInflow#1.

4
The ETS Inflow Management tab is displayed as shown in the figure Figure 232, “ETS Inflow
management” (p. 367).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
366 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create EVPL service

Figure 232 ETS Inflow management

5
The ETS Inflow Management panel parameters are described in the following table:

Table 82 ETS Inflow Management

Parameter Description
State Specifies the state. The values are active or
inactive.
User Label Specifies the associated User label.
Service Type Specifies the service type. The value is
Ethernet.
Flow type Specifies the flow type. The value is Unicast
Traffic descriptor Specifies the operation mode.
Layer 2 control frames (0x) Specifies the protocol frames that can
accede the port.
Policing mode Refers to the policing of the incoming ETS
tarffic. The values are disabled, or color
blind.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 367
Create EVPL service 1850 TSS-5C

Table 82 ETS Inflow Management (continued)

Parameter Description
Color Profile Specifies the association between incoming
EVPL priorities and forwarded frames
coloring
VLAN Pop Select Enabled or disabled from the
drop-down.
Classification mode Specifies the classification mode.
Classifier Criteria Specifies the Classifier criteria. The values
are outer VLAN id, outer PRI, and untagged.

Note: Multiple Classifier to one ETS flow


The association between Ethernet classifier, ETS flow and PW are as follows:
• Multiple classifiers are associated to one ETS flow.
• Multiple ETS Flows can be associated to one PW through multiple VPWS cross-
connection.
• The Traffic Descriptor is independent to each ETS Flows.
• All the ETS Flows will be in the same UNI port.

6
Click Create to configure a new EVPL Service as shown in Figure 233, “EVPL service - create”
(p. 369).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
368 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create EVPL service

Figure 233 EVPL service - create

Note: From R6.1.10 onwards the TD of existing NNI->UNI service are converted to
anyservice type to indicate that it includes all the traffic without special classification. The
preliminary upgrade condition for EPVL service: all existing EVPL flow must be
provisioned with bidirectional Ethernet Service XC. The upgrade may be failed if there is
unidirectional EVPL service when upgrading from releases prior to R6.1.10.
Detailed request to provision is as follows:
• When ServiceType of TD used in XC is anyserviceclass on the way NNI -> UNI XC,
that means Multiple Flow to one PW is not implemented. Each PW can associate only
one flow.
• For NNI to UNI xc, TD service type Anyservice will drop all flows in a PW. Other TD will
drop a specific flow with corresponding TD which is inserted in the upstream. For
example, node A uses TD service type =RegulatedService for an xc from UNI to NNI,
node B should create a NNI to UNI xc with TD service type= RegulatedService to drop
this flow.
• One UNI > NNI XC at least has been present on node before create NNI > NNI XC for
multiple flow creation.

7
Table 83, “EVPL service parameters” (p. 370) provides the description of Create EVPL service
parameters.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 369
Create EVPL service 1850 TSS-5C

Table 83 EVPL service parameters

Parameter Description
Topology Specifies the topology to establish the service. The values are:
UNI-NNI and NNI-UNI
Transport link (PW) Specifies the Transport link (PW) values. The options are 1-100.
Ingress Specifies the input port
Note: Ingress is displayed when the value UNI-NNI is selected
from the Topology drop-down.
Egress Specifies the input port
Note: Egress is displayed when the value NNI-UNI is selected
from the Topology drop-down.
Service Label Specifies the name or label for the new service
ETH UNI to TMPLS NNI EVC termination
Traffic descriptor Specifies the operation mode.
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Note: Topology classifier on the right hand side of the figure
Figure 233, “EVPL service - create” (p. 369) is disabled when
UNI-NNI is selected from the Topology drop-down.
Topology classifier Specifies the classifier for the selected topology.
Layer 2 control frames Specifies the protocol frames that can accede the port
(0x)

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
370 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create EVPL service

Table 83 EVPL service parameters (continued)

Parameter Description
Policing Mode Refers to the policing of the incoming ETS traffic. Default value
is either disabled or colorBlind
Values are:
• disabled
• colorBlind
• ColorAware
• ColorAwareNoCoupling
• ColorAwareWithCoupling
Color Profile Specifies the association between incoming EVPL priorities and
forwarded frames coloring
VLAN Pop If enabled, it pops out the EVPL shim fields of the Ethernet
frame.
E-LAN Select an ELAN type.
VLAN Push If enabled, it pushes in the EVPL shim fields of the ethernet
frame.
The options are:
• Enabled
• Disabled
VLAN Id Specifies the VLAN ID to be entered.
Priority Mode Select priority mode by selecting either value or transperent
value Select the priority value from drop-down.

8
Click Cancel to return to the previous window without saving the changes.

9
Click Save & exit to save the changes and return to the previous window.

10
Click Save & continue to save the changes and create a new service.

11
After successful service creation of EVPL/ELAN ETS flow cross connection shall be created in
NE. It is possible to see the ETS Flow properties or modify them, as shown in the Figure 232,
“ETS Inflow management” (p. 367)

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 371
Create EVPLAN service 1850 TSS-5C

12
Click Save to save the configuration.

END OF STEPS

3.82 Create EVPLAN service


3.82.1 Purpose

Use this procedure to create the EVPLAN Service.

1
Select Connections -> Ethernet Services XC -> EVPLAN Service from the menu bar as
shown in Figure 234, “EVPLAN service” (p. 371).

Figure 234 EVPLAN service

The EVPLAN Service tab provides the following parameters:


Menus Description
From XC Id Specifies the cross-connection Id for the selected EVPLAN
service
To XC Id Specifies the target to establish EVPLAN service

2
Click Search to view the EVPLAN service list.

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
372 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create EVPLAN service

3
Click Create to configure a new EVPLAN service as shown in Figure 235, “EVPLAN service -
create” (p. 372).

Figure 235 EVPLAN service - create

Note:
• EVPLAN does not support classification based on TUNNEL/PW EXP value in NNI-
>UNI service. From R6.1.10 onwards the TD of existing NNI->UNI service are
converted to anyservice type to indicate it includes all the traffic without special
classification. Only anyservice TD can be used for NNI->UNI EVPLAN service.
• NNI -> UNI EVPLAN service can be created successfully only if at least one UNI ->
NNI EVPLAN service is present.

4
Table 84, “EVPLAN service parameters” (p. 374) provides the description to create EVPLAN
service parameters.

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 373
Create EVPLAN service 1850 TSS-5C

Table 84 EVPLAN service parameters

Parameter Description
Topology Specifies the topology to establish the service. The values are:
UNI-NNI and NNI-UNI
E-LAN service Specifies the E-LAN service to be established
Ingress Specifies the input port
Service Label Specifies the name or label for the new service
ETS flow to E-LAN section
Traffic descriptor Specifies the operation mode.
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
Topology classifier Specifies the classifier for the selected topology
Layer 2 control frames Specifies the protocol frames that can accede the port
(0x)
Policing mode Refers to the policing of the incoming ETS tarffic. The values are
disabled, color blind, color Aware, ColorAwareNoCoupling,
or ColorAwareWithCoupling.
Color profile Specifies the association between incoming EVPL priorities and
forwarded frames coloring
VLAN pop If enabled, it pops out the EVPL outer VLAN TAG of the ethernet
frame. The values are Enabled, or Disabled.
E-LAN to ETS flow section

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
374 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create EVPLAN service

Table 84 EVPLAN service parameters (continued)

Parameter Description
Traffic descriptor Specifies the operation mode.
The supported values are:
• CIR (MPLS Committed Information Rate): it is the max rate
(Kbyte/sec) with high priority guaranteed for the
Tunnel/pseudowire packets delivery.
• CBS (MPLS Committed Burst Size): it is the max burst size
(byte) with high priority guaranteed for the Tunnel/pseudowire
packets delivery
• PIR (MPLS Peak information rate): it is the max peak rate
allowed (Kbyte/sec) for the Tunnel/pseudowire
• PBS (MPLS Peak Burst Size): it is the max burst rate allowed
(byte) for the Tunnel/pseudowire
VLAN push If enabled, it pushes the outer VLAN TAG in the ethernet frame.
The values are Enabled, or Disabled.
VLAN Id Specifies the VLAN Id.
Note: This field is populated only when VLAN Push is enabled.
Priority mode Specifies the Priority mode.
The supported values are:
• value
• transparent
Note: This field is populated only when VLAN Push is enabled.
Value Specifies the Frame Priority.
Note: This field is populated only when VLAN Push is enabled.

5
Click Cancel to return to the previous window without saving the changes.

6
Click Save & exit to save the changes and return to the previous window.

7
Click Save & continue to save the changes and create a new service.

END OF STEPS

Release 6.1 Nokia – Proprietary and Confidential


Use pursuant to applicable agreements
September 2017
Issue 7 8DG24624AGAATQZZA 375
Create an E-LAN Service 1850 TSS-5C

3.83 Create an E-LAN Service


3.83.1 Purpose

Use this procedure to create new E-LAN service.

1
Select Data -> E-LAN Service Mgnt menu option as shown in Figure 236, “E-lan service”
(p. 375).

Figure 236 E-lan service

2
Enter the range in the From and To entry boxes and click view.

3
Click Create to configure a new E-LAN service as shown in Figure 237, “E-lan service -
configuration” (p. 377).

Nokia – Proprietary and Confidential Release 6.1


Use pursuant to applicable agreements
September 2017
376 8DG24624AGAATQZZA Issue 7
1850 TSS-5C Create an E-LAN Service

Figure 237 E-lan service - configuration

4
Table 85, “E-lan service - configuration” (p. 377) provides the description of configuration panel
parameters.

Table 85 E-lan service - configuration

Parameter Description
Service # Specifies the number for the service
Mac Learning Specifies the Mac learning for the service.
The values are True or False
Vpn Id Specifies the Virtual Private Network
Identifier for the Ethernet LAN service

5
Click Save to save the settings and return to the previous window.

6
Click Cancel to cancel the changes and return to the previous window.

7
Click the UNI Port Binding tab to create the port binding as shown in Figure 238, “UNI port