488
Traverse Operations Guide Release TR3.2.3 March 2010 Edition 1

Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

  • Upload
    others

  • View
    4

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Traverse Operations GuideRelease TR3.2.3 March 2010 Edition 1

Page 2: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Copyright © 2010 Force10 Networks, Inc.

All rights reserved. Force10 Networks ® reserves the right to change, modify, revise this publication without notice.

TrademarksForce10 Networks® and E-Series® are registered trademarks of Force10 Networks, Inc. Traverse, TraverseEdge, TraversePacketEdge, TransAccess, are registered trademarks of Force10 Networks, Inc. Force10, the Force10 logo, and TransNav are trademarks of Force10 Networks, Inc. or its affiliates in the United States and other countries and are protected by U.S. and international copyright laws. All other brand and product names are registered trademarks or trademarks of their respective holders. Statement of ConditionsIn the interest of improving internal design, operational function, and/or reliability, Force10 Networks, Inc. reserves the right to make changes to products described in this document without notice. Force10 Networks, Inc. does not assume any liability that may occur due to the use or application of the product(s) described herein.

Page 3: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

OPERATIONS AND MAINTENANCE GUIDE

Contents

Section 1 Fault ManagementChapter 1 Managing Alarms and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Chapter 2 Alarms, Events, and Recommended Actions . . . . . . . . . . . . . . . . . . . . . . . . 1-33Chapter 3 Service Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-137

Section 2 Performance MonitoringChapter 1 Managing Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1Chapter 2 SONET Performance Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21Chapter 3 SDH Performance Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-43Chapter 4 Ethernet Performance Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-63

Section 3 Equipment LED StatusChapter 1 LEDs and Module Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1

Section 4 DiagnosticsChapter 1 Diagnostics Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1Chapter 2 Traverse Transmit and Receive Signal Levels . . . . . . . . . . . . . . . . . . . . . . . 4-3Chapter 3 TraverseEdge 100 Transmit and Receive Signal Levels . . . . . . . . . . . . . . . 4-7Chapter 4 Loopback Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11Chapter 5 Other Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21

Section 5 Test AccessChapter 1 Traverse Test Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1Chapter 2 Traverse Test Access Guidelines for the Spirent BRTU Interface . . . . . . . . 5-21

Section 6 Routine MaintenanceChapter 1 Routine Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1

Page 4: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide

Page ii Force10 Networks Release OPS4.2.3

Chapter 2 Node Database Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23

Section 7 Software UpgradesChapter 1 Release TR3.2.3 Traverse Software Upgrade. . . . . . . . . . . . . . . . . . . . . . . . 7-1Chapter 2 Release TE3.2.x TE-100 System Software Upgrade . . . . . . . . . . . . . . . . . . 7-53

Section 8 Hardware UpgradesChapter 1 Replacing Existing Traverse Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1Chapter 2 Upgrade to a Traverse Front Inlet Fan Tray . . . . . . . . . . . . . . . . . . . . . . . . . 8-33

Section 9 AppendicesAppendix A Module Placement Planning and Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . 9-1

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Index-1

Page 5: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 1 FAULT MANAGEMENTSECTION 1SECTION 1

Contents

Chapter 1Managing Alarms and Events

Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1

Event Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Provisioning events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Performance events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Security events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Normal operational events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Fault events (alarms). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2

Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2Events Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3Event List on the Events Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4

Changing Column Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4Sorting Events List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4

Changing Event Retrieval Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5Viewing Event Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6Grouping Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7Setting Event Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8Event Filters, Source Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8Event Filters, Probable Cause Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9Event Filters, Time Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9Event Filters, Severity Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10Saving and Importing User Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10Alarms Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11Network Alarm Summary Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12Service Affecting Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12Alarm Severity Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12Alarm Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13Alarm Hierarchy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13Traverse Card LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14Customizing Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15Alarm Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15

Alarm Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16Sort by Column . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16

Creating a New Alarm Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17Assigning an Alarm Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19Assigning a Port Alarm Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20Assigning a Subport Alarm Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20

Page 6: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1 Fault Management

Page ii Force10 Networks Release OPS4.2.3

Assigning a Service Path Alarm Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21Suppressing Alarms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23Manually Suppress Port Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24Automatic Suppression of Service CTP Path Alarms . . . . . . . . . . . . . . . . . . . 1-24Viewing Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28

Alarm Tallies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28Detail View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28Map View Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29New Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29Print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29Save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29Set Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30Sort by Column . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30StickyMode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31

Chapter 2Alarms, Events, and Recommended Actions

Alarms/Events, A through C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35Alarms/Events, D through K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-52Hardware Fault Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-71Alarms/Events, L through S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-72Alarms/Events, T through TZ. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-108Alarms/Events U through Z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-116Alarms/Events, TA200 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-119Alarms/Events, TE-206 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-120. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-136

Chapter 3Service Error Codes

Service Activation Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-138Service Error Codes and Recommended Actions . . . . . . . . . . . . . . . . . . . . . . 1-139

Page 7: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 1-1

SECTION 1FAULT MANAGEMENT

Chapter 1 Managing Alarms and Events

Introduction During normal operation of the Force10 product family, various conditions may arise that require attention by network operations. Events and alarms alert you to system operational changes. A user’s ability to view and respond to these alarms correlates to their access role(s) and security levels. For more information, see the TransNav Management System GUI Guide, Section 2—Administrative Tasks, Chapter 1—“Managing Server Security” and Chapter 2—“Managing Node Security,” page 2-13.

Network alarms display at the network Map View level or Network level on the navigation tree. Alarms for node groups display the number of alarms for each group, including the node groups and nodes contained in that group.

Events

Events (other than alarm fault events) are state-less alerts indicating configuration changes, operator actions, performance changes, and other standard operations. If a card (module) does not appear to generate events, contact the System Administrator. The card may be reserved for administrative use.

Alarms

Alarms are fault events indicating abnormal single-state or multi-state conditions requiring system operator attention. A single-state condition example is a hardware device failure. The hardware device is either in the failed condition or not. Each alarm is characterized by alarm severity, service affecting status, and whether the alarm is active or clear. If a condition persists, the alarm is active. If the fault condition is resolved, either automatically or by operator action, the alarm is clear.

This chapter provides information on:• Event Types• Event Logs• Events Tab• Alarms Tab• Network Alarm Summary Window• Customizing Alarms• Suppressing Alarms• Viewing Alarms

For management system references, see the TransNav Management System GUI Guide, Section 8—Maintenance and Testing, Chapter 2—“Alarms.”

Contact the Force10 Technical Assistance Center (TAC) if you need assistance.

Page 8: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementEvent Types

Page 1-2 Force10 Networks Release OPS4.2.3

Event Types Events alert the operator to changes to the system. Each of these changes are logged and can be any one of the following event types:

Provisioning events. The node has made a change to its configuration in response to a request from a management entity.

Performance events. The value of a Performance Management (PM) parameter has crossed a provisioned threshold. This threshold crossing alert (TCA) may indicate service deterioration and require operator attention.

Security events. A user has logged in or out of the node, an attempted login has failed, or a user has made some change to the user account database.

Normal operational events. Normal and expected occurrences, such as initialization completed or control plane connection established with other nodes. They are logged for information only.

Fault events (alarms). Fault conditions that may affect service and require operator attention. Fault events generate and clear events. The system raises an event, such as an alarm, when it first detects a fault condition. While the fault condition persists, the event is active. When the system detects that a fault condition no longer exists, it clears the even. The clearing may be automatic or a result of an operator action (e.g., replacing a bad card).

Event Logs All events (including alarm fault events) are logged on the Traverse General Control Card (GCM) or TraverseEdge 100 system card. The data from the log can be viewed using the node-level CLI or server-level CLI. The events logged are not persistent—reboots clear the logs. For user-accessible, longer-term secure storage, an Event Log is stored on the TransNav server in the /report/output directory. This log provides easy access to information about recent events. Use the Report Scheduler to schedule a report to save the data in the Event Log.

Included in the TransNav server Event Log is the following information:• Type of event (configuration, fault, performance, and security)• Timestamp• Component or subsystem detecting the event• Descriptive text about the event

The Event Log maintains a log of events that occur on the node or server. If the Event Log is on the Traverse General Control Card (GCM) or TraverseEdge 100 System card, the last 300 events are logged. Events are kept for a maximum of 3 days with a maximum limit of 10,000 events possible. If the output file directory is on the TransNav server, the system automatically deletes all files after the value set in the ReportRemovalPeriod (days) parameter is reached. For more information, see the TransNav Management System Server Guide, Section 2—Management Server Procedures, Chapter 3—“Server Administration Procedures,” Setting Up Report Parameters.

Force10 recommends performing regular backups of the log files. Use the Report Scheduler to set up a regularly generated report on events. For details, see the TransNav Management System GUI Guide, Section 2—Administrative Tasks, Chapter 5—“Generating and Viewing Reports,” Generating Reports.

Page 9: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsEvents Tab

Release OPS4.2.3 Force10 Networks Page 1-3

Events Tab The TransNav GUI Events tab displays a list of events for users to quickly view and analyze state-less alerts.

Figure 1-1 Map View, Events Tab

Page 10: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementEvent List on the Events Tab

Page 1-4 Force10 Networks Release OPS4.2.3

Event List on the Events Tab

The event list is context-sensitive (see Events Tab, page 1-3). • Click a specific node in Map View to display only events associated with that node.• Click the map outside of a specific node to display all domain-wide events. The

number of domain-wide events is listed in queried Events. The number of displayed events is displayed in displayed Events. Both fields appear in the lower left of the Events tab.

• In Shelf View, click a specific card or port to display only events associated with that card or port.

• Click outside the shelf to display all events associated with that node.

Changing Column Order

To change the order in which a column is displayed on the Events tab, hold down the Shift key and click and drag a column heading to the desired location.

Sorting Events List

Click a column heading to sort the events list by that category. Column headings can be sorted in ascending or descending order. Click the column heading again to switch from ascending to descending order. Hold down the Shift key and click a second column heading to sort the second category within the first category. Hold down the Shift key and click the second column again to switch between ascending and descending order within the first category.

Command buttons are as follows:• Settings: Specify the time period and refresh interval within which to display

events. Displays the Event Retrieval Settings View (Main) dialog box. See Changing Event Retrieval Settings, page 1-5.

• Refresh: Display events according to Event Retrieval Settings View (Main) dialog box (Figure 1-2).

• Detail View: View highlighted event details. Displays the Event Detail (View Main) dialog box. See Viewing Event Details, page 1-6.

• Set Filters: Set filters to display events. Displays the Event Filter (View Main) dialog box. See Setting Event Filters, page 1-8.

• New Window: Opens an independent Event View dialog box which inherits the event filters set for the Events tab. You can change the filters on this dialog box by clicking Set Filters.

• Print: Print contents of Events tab.• Save: Save event information to a text file.

Page 11: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsChanging Event Retrieval Settings

Release OPS4.2.3 Force10 Networks Page 1-5

Changing Event Retrieval Settings

From the Events tab, click the Settings button to specify the time period and refresh interval within which to display events. The Event Retrieval Setting (View Main) dialog box displays.

Figure 1-2 Event Retrieval Settings (View Main) Dialog Box

The Event Retrieval Settings (View Main) dialog box allows you to set the following information:• Retrieve Events up to: Select the ending time to retrieve events:

– Now (default)– Define. When this is selected, the field is replaced with a date/time entry. Use

the up and down arrows or enter the ending time to retrieve events.• for: Select the amount of time to retrieve events:

– 1 min– 5 min– 15 min (default)– 30 min– 45 min– 1 hr– 2 hr– 4 hr

• Automatic Refresh: Select to automatically retrieve events according to the Retrieve Events up to, for, and every settings. Clear the checkbox to manually retrieve events.

• every: Select the refresh interval. Valid values are:– 1 min– 5 min– 15 min (default)– 30 min– 45 min– 1 hr– 2 hr– 4 hr

• Wrap line in Description Column: Select this checkbox to show the entire description of the event on the Events tab, in the Desc column.

Command buttons are as follows:• Refresh Now: Retrieve events according to the settings in the dialog box.• Ok: Close the dialog box.

Page 12: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementViewing Event Details

Page 1-6 Force10 Networks Release OPS4.2.3

Viewing Event Details

From the Events tab, select an event from the events list. Double-click the selected event or click the Detail View button. The Event Detail (View Main) dialog box displays.

Figure 1-3 Event Detail (View Main) Dialog Box

The Event Detail (View Main) dialog box allows you to view the following information about the selected event:• ID: Event identification number• Probable Cause: Describes the probable cause of the event• Creation Time: Time the event was created• Description: Description of the event• Severity: Severity of the event• Source: Source of the event

Click Done to close the dialog box.

Page 13: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsGrouping Events

Release OPS4.2.3 Force10 Networks Page 1-7

Grouping Events

From the Events tab, select an event from the event list. Hold the Ctrl key down and select other events to add to the group. You can now perform operations on a group of events.

You can perform operations on selected events in two additional ways:• Click the Events menu.• Right-click an event or group of events.

The following shortcut menu is displayed:

Figure 1-4 Events Menu and Events Tab Shortcut Menu

Menu selections are as follows:• Set Filters: Displays the Event Filter (View Main) dialog box.• New Window: Opens an independent Event View dialog box, which inherits the

event filters set for the Events tab. You can change the filters on this dialog box by clicking Set Filters.

• Detail View: View highlighted event details. Displays the Event Detail (View Main) dialog box.

• Settings: Specify the time period and refresh interval within which to display events. Displays the Event Retrieval Settings (View Main) dialog box.

• Refresh: Displays events according to the Event Retrieval Settings (View Main) dialog box.

Page 14: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementSetting Event Filters

Page 1-8 Force10 Networks Release OPS4.2.3

Setting Event Filters

On the Events tab, click Set Filters. The Event Filter (View Main) dialog box displays.

Figure 1-5 Event Filter (View Main) Dialog Box, Source Tab

The Event Filter (View Main) dialog box has the following tabs:• Event Filters, Source Tab, page 1-8• Event Filters, Probable Cause Tab, page 1-9• Event Filters, Time Tab, page 1-9• Event Filters, Severity Tab, page 1-10

After you make changes to any filter, click Apply, then click Done.• Click Apply to apply changes to the filter.• Click Done to close the dialog box.

Event Filters, Source Tab

You can choose to include or exclude events from specific sources from being displayed on the Events tab. Select the Active checkbox to make the Source filter active. Clear the Active checkbox to make the Source filter inactive.

To display events from a specific source, highlight the source in the left box and click the right arrow to move it to the right box. Click Include. To exclude a list of sources, click Exclude. Use the * as a wildcard character. For example, typing Cypress* in the Available Sources box and clicking the right arrow would include all event sources whose name begins with Cypress.

Page 15: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsEvent Filters, Time Tab

Release OPS4.2.3 Force10 Networks Page 1-9

Event Filters, Probable Cause Tab

Click the Probable Cause tab to include or exclude specific event types from displaying on the Events tab.

Figure 1-6 Event Filter (View Main) Dialog Box, Probable Cause Tab

Select the Active checkbox to make the Probable Cause filter active. Clear the Active checkbox to make the Probable Cause filter inactive.

To display a specific event type, highlight the event in the left box and click the right arrow to move it to the right box. Click Include. To exclude a list of event types, click Exclude.

Event Filters, Time Tab

Click the Time tab to specify the time periods within which to display events.

Figure 1-7 Event Filter (View Main) Dialog Box, Time Tab

Select the Active checkbox to make the Time filter active. Clear the Active checkbox to make the Time filter inactive.

Page 16: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementEvent Filters, Severity Tab

Page 1-10 Force10 Networks Release OPS4.2.3

Click one of the three following option buttons:• Before: Display events which occurred before the time specified.• After: Display events which occurred after the time specified.• Between _ and _: Display events which occurred between the times specified.

Click the up arrow to go forward in time and the down arrow to go back in time.

Event Filters, Severity Tab

Click the Severity tab to specify the severity of events to display.

Figure 1-8 Event Filter (View Main) Dialog Box, Severity Tab

Select the Active checkbox to make the Severity filter active. Clear the Active checkbox to make the Severity filter inactive.

Select one or more of the following event severities to display: • Critical• Major• Minor• Warning• Clear• Info

Saving and Importing User Preferences

You can save alarm and event filter and sort settings and import these settings from another user. For details, see the TransNav Management System GUI Guide, Section 2—Administrative Tasks, Chapter 4—“TransNav User Preferences,” Saving and Importing User Preferences.

Page 17: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAlarms Tab

Release OPS4.2.3 Force10 Networks Page 1-11

Alarms Tab The TransNav GUI Alarms tab displays a list of alarms for users to quickly view, analyze, and resolve fault conditions.

If a node or group is in an alarm state, it displays on the Map View object in the color of the highest level alarm severity with a caption indicating the number and type of alarm. (Groups display the color of the most severe alarm present in the nodes or groups within that group.) For example, in Figure 1-9 the node TE100SIGTWO has four critical (4C) alarms, so it is colored red with the caption 4C. The “+” indicates other alarms exist at a lower severity.

For alarms tab definitions, refer to:• Alarm Severity Levels• Alarm Hierarchy • Customizing Alarms

Figure 1-9 Alarms Tab

StickyModeDetail View Set Filters New WindowCommand Command Command

PrintCommand

SaveCommand

View Selector

Sort by Column

Map View

Alarm Caption

Node Object

Alarms

Display

List

Alarms Tab

Page 18: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementNetwork Alarm Summary Window

Page 1-12 Force10 Networks Release OPS4.2.3

Network Alarm Summary Window

The TransNav network alarm summary window shows counts of outstanding Critical (C), Major (M), Minor (m) alarms, and Warnings (W).

Figure 1-10 Network Alarm Summary Window

Network alarms display at the network Map View level or network level on the navigation tree. Groups display the number of alarms for each group, including the groups and nodes contained in that group. To view node group alarms, click the group in the navigation tree or go to the Group Map of the group.

For an explanation of the colors associated with each alarm type, see Alarm Severity Levels.

Service Affecting Status

Two levels of service affecting status are used in the alarm definitions:• Service Affecting (SA): Indicates that a service affecting condition has occurred

and an immediate corrective action is required.• Non-Service Affecting (NSA): Indicates that a non-service affecting condition

has occurred.

Service affecting alarms apply when protection is not available. This same alarm is considered non-service affecting if the equipment or facility is protected and the alarm is raised on the standby equipment or facility. Alarms listed as non-service affecting do not affect service regardless of equipment or facility protection scheme. For more information on how service affecting alarms are conducted, see Alarm Behavior.

Alarm Severity Levels

Some alarms are always service affecting, some are always non-service affecting, and some can be either, depending on the circumstances. An alarm on unprotected equipment or facilities may be critical, whereas, this same alarm is not considered critical if the equipment or facility is protected. Alarms listed as minor or warning are not considered service affecting regardless of the protection scheme.

The following severity levels, from the most severe to the least severe, are defined and used in the alarm and event definitions. Each alarm type is color coded for easy identification:• Critical (red): A severe, service affecting condition has occurred. Immediate

corrective action is imperative, regardless of the time of the day or day of the week.

Alarm Summary

Page 19: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAlarm Hierarchy

Release OPS4.2.3 Force10 Networks Page 1-13

• Major (orange): A hardware or software condition has occurred that indicates a serious disruption of service or the malfunctioning or failure of important circuits. This requires the immediate attention and response of a technician to restore or maintain system capability. The urgency is less than in critical situations because of a lesser immediate or impending effect on service or system performance.

• Minor (yellow): Trouble has occurred that does not have a serious effect on service to customers or trouble in circuits has occurred that is not essential to node operation. Corrective action should be taken in order to prevent a more serious fault.

• Warning (cyan/aqua): A potential or impending service affecting event may occur; no significant effects have been felt. Action should be taken to further diagnose, if necessary, and correct the problem in order to prevent it from becoming a more serious fault.

In general, severity levels of Critical, Major, Minor, and Warning are reported to the Alarms and Events tabs in the GUI. A severity level of Info is reported to the Events tab only.

Alarm Behavior

Alarms are generated depending on the configuration of an alarm and the settings in the SA/NSA parameter. If the SA/NSA parameter in the alarm configuration profile is set to disabled, the alarm will always display the NSA values. If the SA/NSA parameter in the alarm configuration profile is set to enabled, the appropriate values from the condition values are used.

Line alarms, such as RFI, cause the Availability Status of alarms to change to Degrade. Resolve the alarm to clear the availability status.

Alarm Hierarchy

This system conforms to the alarm reporting hierarchy set forth in the Telcordia General Requirements GR-253, ETSI 300-417-3-1, and ITU recommendation G.783.

Page 20: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementTraverse Card LEDs

Page 1-14 Force10 Networks Release OPS4.2.3

Traverse Card LEDs

The locations of common and specific card LEDs is shown in the following graphic.

Figure 1-11 Physical Card LEDs

DS3/E3 OC-N/STM-N Ethernet

DS1, DS3/E3,E1, OC-N/STM-N

and ETH PortIndicators

ETHERNET LINKOSS and Craft

Alarms:CRITICAL/MAJOR

MINOR

Timing:LOCKED/

UNLOCKEDFREE RUN/HOLDOVER

RS-232 Interface(DB-9)

EGCM

ACO ON

10/100BaseTEthernet Interface

(RJ-45)

DS1 VTSwitch

ACO

PWR(Power)

ACTV/STNBY

(Active/Standby)Optical

Port

E1OPS 00015

Page 21: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAlarm Profiles

Release OPS4.2.3 Force10 Networks Page 1-15

Customizing Alarms

The TransNav GUI provides functions for creating new, modifying default, and assigning alarm profiles in order to customize alarm parameter settings (e.g., severity level) based on your network requirements. Refer to the following topics:• Alarm Profiles• Creating a New Alarm Profile• Assigning a Port Alarm Profile

Alarm Profiles Alarm profiles allow users to customize alarms based on severity, service affecting status, and whether to enable or disable (suppress) alarm generation. If a flag is set in the Service Affecting column in the Alarm Profile dialog box for alarms to be reported from an unprotected facility or from equipment or a facility in a protection group, the system uses the alarm severity defined in the Severity SA column. If the flag in the Service Affecting column is not selected, the system uses the alarm severity defined in the Severity NSA column.

Figure 1-12 Alarm Profile Dialog Box

Page 22: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementAlarm Profiles

Page 1-16 Force10 Networks Release OPS4.2.3

Alarm Properties

Select an alarm profile and click Properties to view additional information about the alarm profile selected.

Figure 1-13 Alarm Profile, Properties Screen

Sort by Column

Click a column heading to sort the alarms by that category. The Name and Probable Cause columns can be sorted in alphabetical or reverse alphabetical order. The Severity NSA and Severity SA columns can be sorted in ascending or descending severity. The ServiceAffecting and Enabled columns can be sorted by select/clear. Click the column heading again to switch from one sorting category to the other.

Figure 1-14 Alarm Profile, Properties Screen with Reorganized Columns

Page 23: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsCreating a New Alarm Profile

Release OPS4.2.3 Force10 Networks Page 1-17

Creating a New Alarm Profile

The following procedure describes how to create an Alarm Profile template.

Table 1-1 Creating a New Alarm Profile

Step Procedure

1 In Map View, from the Admin menu, click Alarm Profiles.

Figure 1-15 Alarm Profiles Dialog Box

Page 24: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementCreating a New Alarm Profile

Page 1-18 Force10 Networks Release OPS4.2.3

2 From the Type drop-down list, select the type of alarm profile you want to create:• ds1_ptp: SONET DS1 port• ds3_ptp: SONET DS3/EC1 ports• e1_ptp: SDH E1 port• e3_ptp: SDH E3 port• eop: Ethernet-over-PDH port• eop_ctp: Ethernet-over-PDH port connection termination point• eos: SONET EOS port• eos_ctp: SONET EOS connection termination point• ethernet_ptp: Ethernet port• lag: (Ethernet) Link aggregated group• sdh_eos: SDH EOS port• sdh_eos_ctp: SDH EOS connection termination point• sdh_hp: SDH high order path (VC4 or VC3)• sdh_lp: SDH VC3 low order path• sdh_ptp: SDH port• server: TransNav server platform• shelf: Traverse or TraverseEdge node • sonet_ptp: SONET port• sonet_sts: SONET STS path• sonet_vt: SONET VT path• ta200: TransAccess 200 Mux • te50: TraverseEdge 50

3 Click Add to view the alarm profile, then enter a Name for the alarm profile. The example shown below is an eos_ alarm profile with default values.

Figure 1-16 Alarm Profile Dialog Box

Table 1-1 Creating a New Alarm Profile (continued)

Step Procedure

Page 25: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAssigning an Alarm Profile

Release OPS4.2.3 Force10 Networks Page 1-19

Assigning an Alarm Profile

Choose one of the following topics by object type (e.g., port) to assign an alarm profile:• Assigning a Port Alarm Profile• Assigning a Subport Alarm Profile• Assigning a Service Path Alarm Profile

4 To modify the alarm entry settings, make a selection from the drop-down list or check the box in the row of the following columns:• Severity NSA: Alarm severity when it is non-service affecting.• Severity SA: Alarm severity when it is service affecting; this severity

only applies if ServiceAffecting is selected.• ServiceAffecting: Select to make the alarm service affecting. Clear

the checkbox to make the alarm non-service affecting.• Enabled: Select to enable the alarm. Clear to disable the alarm.

Click Synchronize to synchronize the alarm profile to make it available to other nodes.

Click OK to return to the previous dialog box or click Cancel to cancel the changes.

5 Click Close in the Alarm Profiles dialog box.

6 The Creating a New Alarm Profile procedure is complete.

Table 1-1 Creating a New Alarm Profile (continued)

Step Procedure

Page 26: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementAssigning a Port Alarm Profile

Page 1-20 Force10 Networks Release OPS4.2.3

Assigning a Port Alarm Profile

The following procedure describes how to assign a port alarm profile template to a port.

Assigning a Subport Alarm Profile

The following procedure describes how to assign a port alarm profile template to a DS3 Transmux subport.

Table 1-2 Assigning a Port Alarm Profile

Step Procedure

1 In Shelf View, select a card port.

2 Click the Config tab.

3 From the Alarm Profile drop-down list, select a port (ptp) alarm profile template.

4 Click Apply.

5 The Assigning a Port Alarm Profile procedure is complete.

Table 1-3 Assigning a Subport Alarm Profile

Step Procedure

1 In Shelf View, select a DS3 Transmux card port.

2 Click the Config tab.

3 From the Subport row, Alarm Profile column list, select a port (ptp) alarm profile template matching the embedded signal subport type (e.g., ds1_ptp).

4 Click Apply.

5 The Assigning a Subport Alarm Profile procedure is complete.

Page 27: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAssigning a Service Path Alarm Profile

Release OPS4.2.3 Force10 Networks Page 1-21

Assigning a Service Path Alarm Profile

The following procedure describes how to assign a path alarm profile template to a service connection termination point within an end-to-end transport path.

Table 1-4 Assigning a Service Path Alarm Profile

Step Procedure

1 From any view, click the Service tab.

Figure 1-17 Service Tab

2 Select a service. Right-click and select Show TxRx Path to display the Path Display for Services screen.

3 Click the CTP tab to display the CTP dialog box.

Figure 1-18 Path Display for Services Screen

Page 28: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementAssigning a Service Path Alarm Profile

Page 1-22 Force10 Networks Release OPS4.2.3

4 From the Path Display for Service screen, in either the Tx or Rx table row, select an Active Hop. Your selection displays in the EndPoint field of the CTP screen.

Figure 1-19 Path Display for Services Screen, CTP Tab

Table 1-4 Assigning a Service Path Alarm Profile (continued)

Step Procedure

3

Page 29: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsSuppressing Alarms

Release OPS4.2.3 Force10 Networks Page 1-23

Suppressing Alarms

The TransNav GUI provides an alarm suppression function through the administrative state of an object. When the administrative state of a containing object is set to suppress alarms, then any object contained within obeys the parent object without consideration of its own current administrative state.

Refer to the following topics:• Manually Suppress Port Alarms• Automatic Suppression of Service CTP Path Alarms

5 From the Alarm Profile parameter, select one of the following profile values:• useParent: The alarm profile of the containing object (Parent) based

on the following (superset and subset) definitions:– Port: Contains line and path alarms and is the superset.– High order path: Contains high and low order path alarms and is a

subset of port profiles.– Low order path: Contains only low order path alarms and is a finer

subset of high order path profiles.– STS path. Contains STS and VT path alarms and is a subset of

port profiles.– VT path: Contains only VT path alarms and is a finer subset of

STS path profiles.• default: The default alarm profile matching the CTP object type.• <user-defined>: Depending on the CTP object type, a user-defined

alarm profile of one of the following path alarm profile types:– sdh_hp– sdh_lp– sonet_sts– sonet_vt

6 Click Apply.

7 The Assigning a Service Path Alarm Profile procedure is complete.

Table 1-4 Assigning a Service Path Alarm Profile (continued)

Step Procedure

Page 30: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementManually Suppress Port Alarms

Page 1-24 Force10 Networks Release OPS4.2.3

Manually Suppress Port Alarms

The following procedure describes how to manually suppress port (line and path) alarms. Alarm suppression occurs also for all objects contained within the port.

Automatic Suppression of Service CTP Path Alarms

The automatic in service state on the CTPs is inherited from the optical port on the Traverse node where the CTP resides. If the automatic in service setting on the port is changed, the service must be de-activated, then re-activated for the changes to take effect. If the automatic in service feature is enabled on a port that is in a protection group, the enable and disable actions must be performed on the working port.

To start the countdown of the automatic in service timer on the CTP, the following criteria must be met:• the admin state of the service must be locked• the automatic in service setting on the port must be enabled• the originating service endpoint (CTP) cannot have any alarms

When these criteria are met, the automatic in service timer on the CTP is set to the value defined on the node and begins to count down. When the service is unlocked, the automatic in service timer value is set to zero.

The Alarm Suppression of CTPs on a service can be locked and unlocked individually. This action does not control the automatic-in-service state on the CTPs. The admin state on the CTPs is driven by the admin state on the service. When the admin state of the service is locked, the admin state of all CTPs in the service are also locked, however, the CTPs still appear unlocked. The lock icon displayed next to “Alarm Suppression” indicates whether alarms on the CTP are suppressed or not.

If the CTP is on a DS1-MUX, DS3-TMX, STS1-TMX or VT-MUX service, only the STS endpoint values display. Each STS endpoint has 28 VT1.5 endpoints associated with it. If the timer on any single VT1.5 endpoint reaches 0, the service will unlock. This could be misleading. To see all 28 VT1.5 with alarms, unlock the service.

Table 1-5 Manually Suppress Port Alarms

Step Procedure

1 In Shelf View, select the card port.

2 Click the Config tab to display the Card Configuration dialog box.

3 Click the Lock icon at the bottom left portion of the screen to change the administrative state to locked and click Apply.

4 The Manually Suppress Port Alarms procedure is complete.

Page 31: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAutomatic Suppression of Service CTP Path Alarms

Release OPS4.2.3 Force10 Networks Page 1-25

The following procedure describes how service CTP (connection termination point) path alarms are automatically suppressed.

Table 1-6 Automatically Suppress Service CTP Path Alarms

Step Procedure

1 Is a parent object of the CTP already suppressing alarms?• Yes: Stop. CTP alarms are already being suppressed in accordance

with the parent object.• No: Go to the next step.

2 From any view, click the Service tab. Select a service. Right-click and select Admin State and Lock to lock the service.

Figure 1-20 Service Tab

3 Select the same service and select Show TxRx Path.

Figure 1-21 Service Tab, Show TxRx Path

Page 32: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementAutomatic Suppression of Service CTP Path Alarms

Page 1-26 Force10 Networks Release OPS4.2.3

4 The Path Display for Services screen displays. Click the CTP tab to display the CTP screen at the bottom of the screen.

Figure 1-22 Path Display for Services Screen

5 From the Path Display for Service screen, on either the Tx or Rx table row, select a service endpoint value in the Active Hop column. Your selection inserts into the EndPoint field in the CTP screen and the CTP Status button is activated.

Figure 1-23 CTP Tab with Endpoint Data

6 Click the CTP Status button to display the CTP Status dialog box.

Figure 1-24 CTP Status Dialog Box, Received Path Overhead Tab

The Path Overhead tab displays with label and path trace information for the transmitted or received signal selected. Click Refresh to update the information.

Table 1-6 Automatically Suppress Service CTP Path Alarms (continued)

Step Procedure

Page 33: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsAutomatic Suppression of Service CTP Path Alarms

Release OPS4.2.3 Force10 Networks Page 1-27

7 Click the Automatic In Service tab.

Figure 1-25 CTP Status Dialog Box, Automatic In Service Tab

Automatic in service state: Indicates if the CTP is set to automatically suppress alarms and performance monitoring reports. Valid values are:• Enabled: Alarms and performance monitoring reports will be

automatically suppressed. • Disabled: Alarms and performance monitoring reports will be

reported.

Remaining automatic in service time: Indicates the amount of time remaining before the CTP port is unlocked. When 0 minutes is reached, alarms and performance monitoring reports will no longer be automatically suppressed. New alarms will restart the counter if 0 minutes has not been reached. The amount of time is set at the node level.

The CTP value is independent of the port unlocking.

Click Refresh to refresh the information displayed. Click Close to return to the Path Display for Service screen.

8 Click Apply.

9 The Automatically Suppress Service CTP Path Alarms procedure is complete. De-activate, then reactivate the service to enable the changes.

Table 1-6 Automatically Suppress Service CTP Path Alarms (continued)

Step Procedure

Page 34: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementViewing Alarms

Page 1-28 Force10 Networks Release OPS4.2.3

Viewing Alarms

The TransNav GUI displays alarm information for users to view, analyze, and resolve fault conditions quickly. The alarms shown can be for different levels of object granularity: by node group (includes all the nodes and groups within that group) all nodes, one node, a card, a port, or a service connection termination point (CTP) within an end-to-end transport path.

Note: If a map for a group is displayed, only the alarms for nodes within that group display in the alarm summary list.

The following procedure describes how to view alarms described in Figure 1-9.

Table 1-7 Viewing Alarms

Step Procedure

1 Which alarms to view?• All nodes. In Map View, click the Alarms tab to view the alarm list

and functions. Go to Step 3.• Node. In Map View, select a node.• Card. In Shelf View, select a card.• Port. In Shelf View, select a port.• Service CTP.

– Click the Services tab.– Right-click on a service and select Show TxRx Path.– Select an Active Hop.

2 Click the Alarms tab to view the alarm list and functions.

3 Choose one (or more) of the following viewing functions:• Alarm Tallies, go to the next step• Detail View, go to Step 5• Map View Display, go to Step 7• New Window, go to Step 8• Print, go to Step 9• Save, go to Step 10• Set Filters, go to Step 11• Sort by Column, go to Step 12• StickyMode, go to Step 13

4 Alarm Tallies

Look in the lower-left corner of the Alarms tab to see the alarm tallies as follows:• Raised Alarms: The number of alarms raised by the system.• Displayed Alarms: The number of alarms in the display list.

Go to Step 14.

5 Detail View

From the alarm list, select an alarm.

Page 35: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsViewing Alarms

Release OPS4.2.3 Force10 Networks Page 1-29

6 Click Detail View to display the Alert Detail (View Main) dialog box and view highlighted alarm details.

Go to Step 14.

7 Map View Display

The Map View displays in the upper half of the GUI screen.

If a node is in an alarm state, it displays on the Map View node object in the color of the highest level alarm severity with a caption indicating the number and type of alarm. For example, in Figure 1-9, the node TE100SIGTWO has four critical (4C) alarms, so it is colored red with the caption 4C. The “+” indicates other alarms exist at a lower severity.

For definitions of the severity levels, see Alarm Severity Levels, page 1-12.

Go to Step 14.

8 New Window

From the Alarms tab, click New Window to open a new alarm window.

Note: Multiple alarm windows can be opened, each with independently configurable filters.

Go to Step 14.

9 Print

Click Print to print the contents of the Alarms tab alarms list.

Go to Step 14.

10 Save

Click Save to save alarm information to a text file.

Go to Step 14.

Table 1-7 Viewing Alarms (continued)

Step Procedure

Page 36: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementViewing Alarms

Page 1-30 Force10 Networks Release OPS4.2.3

11 Set Filters

From the Alarms tab, click Set Filters to set the alarm filters.

Note: Alarms can be filtered by Source, Probable Cause, Time, Severity, and Acknowledged By categories.

Figure 1-26 Alarm Filter Dialog Box

Go to Step 14.

12 Sort by Column

Click a column heading to sort the alarms by that category. The AlarmID, Source, ProbCause (probable cause), Time, and AckBy (acknowledged by) columns can be sorted in alphanumeric or reverse alphanumeric order. The Severity column can be sorted in ascending or descending severity. The SA (ServiceAffecting) column can be sorted by select/clear. Click the column heading again to switch from one sorting category to the other.

Go to Step 14.

Table 1-7 Viewing Alarms (continued)

Step Procedure

Page 37: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing Alarms and EventsViewing Alarms

Release OPS4.2.3 Force10 Networks Page 1-31

13 StickyMode

Selecting this check box freezes the current alarm screen. Alarms remain in the order displayed at the time the check box was selected, regardless of a change in severity level. For example, if alarms are currently sorted by decreasing severity level, critical alarms display first, followed by major, minor, and so on. New alarms are not reported, but deleted alarms are removed (when a node is deleted, all of its alarms are deleted). If the StickyMode check box is clear, when a critical alarm is cleared, it moves to the bottom of the list. If the StickyMode check box is selected, that alarm remains at the top of the list, while its severity changes from Critical to Clear.

Force10 recommends that you open a new window before you select StickyMode so new alarms continue to be reported.

14 Do you want to perform another alarm display function?• Yes. Go to Step 3.• No. The Viewing Alarms procedure is complete.

Table 1-7 Viewing Alarms (continued)

Step Procedure

Page 38: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementViewing Alarms

Page 1-32 Force10 Networks Release OPS4.2.3

Page 39: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 1-33

SECTION 1SECTION 1FAULT MANAGEMENT

Chapter 2 Alarms, Events, and Recommended Actions

Introduction During normal operation of the Force10 product family, various conditions may arise that require attention by network operations. Events and alarms alert you to Traverse and TE-206 system operational changes.

This chapter includes an alphabetic list of the following alarms, events, and recommended actions.• Alarms/Events, A through C• Alarms/Events, D through K• Hardware Fault Detection• Alarms/Events, L through S• Alarms/Events, T through TZ• Alarms/Events U through Z• Alarms/Events, TE-206

Each alarm or event contains the following information:• The alarm or event as viewed on the Alarms or Events tab in the TransNav GUI.• The Alarm Profile which contains the alarm or event. This is provided in case you

want to change the service affecting status, severity, or enabled status of the alarm.• Alarm or event definition/probable cause.• Alarm or event Service Affecting or Non-Service Affecting status by default on the

Alarm Profile.• Alarm or event default severity when it is Service Affecting (unprotected), and its

severity when it is Non-Service Affecting (protected).• Recommended action when the alarm or event is received.

To view alarms associated with a node group, select the node group in the navigation tree or click on the Group Map for the node group. Only the alarms associated with that node group, including the nodes and node groups included in that node group hierarchy, display in the TransNav GUI alarm summary.

If a card (module) does not appear to generate alarms, contact your system Administrator. The card may be reserved for administrative use.

Note: The Traverse backplane provides hardware support for sixteen environmental alarm inputs and eight environmental alarm outputs. The environmental telemetry inputs and outputs are supported by the optional Environmental Alarm Module (EAM)

Page 40: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault Management

Page 1-34 Force10 Networks Release OPS4.2.3

located on the main backplane. These alarms are defined using the TransNav management system. Refer to the Traverse Installation and Commissioning Guide or the TraverseEdge 100 User Guide for details on environmental alarm connections.

Note: For Loss of Signal alarms, see the information in Section 4—Diagnostics, Chapter 2—“Traverse Transmit and Receive Signal Levels,” page 4-3 or Chapter 3—“TraverseEdge 100 Transmit and Receive Signal Levels,” page 4-7.

Contact the Force10 Technical Assistance Center (TAC) if you need assistance.

Page 41: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-35

Alarms/Events, A through C

Table 1-8 Alarms, Events and Recommended Actions, A through C

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

ACO: Alarm Cut Off shelf The audible alarm is cut off (silenced) because the operator pressed the ACO/LED control button.

– Info Info (Informational; no action required.)

ACO_CLEAR: Clear Alarm Cut Off

shelf Alarm cutoff is now clear. – Info Info (Informational; no action required.)

ADMINTASK: Administrative task

server An administrative task was executed.

– Info Info (Informational; no action required.)

AIRCOND: Air Conditioning System Fail

shelf Air conditioning system failed. – Minor Minor Check and repair the air conditioning equipment, as necesary.

AIRDRYR: Air Dryer Fail shelf Air dryer failed. – Minor Minor Check and repair the air dryer equipment, as necesary.

AIS-L: Alarm Indication signal – Line

ds1_ptpds3_ptp(ds_ptp)e3_ptp1

ta200te50te206 node

The input signal on a DS1, DS3, or EC-1 interface contains an AIS.

SA Critical Critical Check the equipment (module/port) upstream.

Clear upstream alarms.

shelf The locally received BITS signal contains an AIS. This indicates a remote BITS failure.

SA Critical Minor Check the BITS upstream.

Clear upstream alarms.

sonet_ptp The locally received OC-N signal contains an AIS. This indicates a remote OC-N level failure.

SA Critical Minor Check the equipment (module/port) upstream.

Clear upstream alarms.

Page 42: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-36Force10 N

etworks

Release O

PS4.2.3

AIS-P: Alarm indication signal – Path

ds3_ptp(ds_ptp)e3_ptpta200te50

The STS signal demultiplexed from the DS3 or EC-1 contains an AIS. This AIS can result from an upstream failure along the STS path.

SA Critical Critical Check the equipment (module/port) upstream.

Clear upstream alarms.

Verify your payload connections.

sonet_ptpsonet_sts te206 node

The STS signal demultiplexed from the OC-N/STM-N contains an AIS. This AIS can result from an upstream failure along the STS path.

SA Critical Minor Check the equipment upstream.

Clear upstream alarms.

Verify your payload connections.

AIS-P-TX: Alarm indication signal – Path, Transmit

te206 node The STS signal demultiplexed from the OC-N/STM-N contains an AIS. This AIS can result from a downstream failure along the STS path.

SA Critical Minor Check the equipment upstream.

Clear downstream alarms.

Verify your payload connections.

AIS-S: Alarm indication signal – Service

ds3_ptp(ds_ptp)e3_ptpsdh_ptpsonet_ptpsonet_service

An upstream failure occurred at the Service layer.

– Warning Info Check the equipment upstream.

Clear upstream alarms.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 43: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-37

AIS-V: Alarm indication signal – VT

ds1_ptpds3_ptp(ds_ptp)e3_ptpshelfsonet_ptpsonet_vtsonet_stste206 node

An upstream failure occurred at the VT path layer.

SA Critical Minor Check the equipment upstream.

Clear upstream alarms.

Verify your VT payload connections.

ta200te50

An upstream failure occurred at the VT path layer.

SA Critical Critical Check the equipment upstream.

Clear upstream alarms.

Verify your VT payload connections.

sdh_ptp See TU-AIS. n/a n/a n/a See TU-AIS.

AIS-VC: Alarm indication signal - VC

e1_ptpsdh_ptp

An upstream failure occurred at the VC path layer.

SA Critical Minor Check the equipment upstream.

Clear upstream alarms.

Verify your VC payload connections.

ALS: Automatic laser shutdown ethernet_ptpsdh_ptpsonet_ptp

Transmitter of the optical interface has been turned off automatically after detection of LOS on the receiver.

– Critical Minor Transmitter has been shutdown per G.664. Check remote port transmitter state and fiber and resolve LOS condition.

ALS-TX-OFF: Transmitter automatically disabled

ethernet_ptpsdh_ptpsonet_ptp

Event logged against the optical interface upon ALS alarm condition.

– Info Info (Informational; no action required.)

APS-AIS-P: Automatic protection ( multiplex section protection - MSP) Administrative Unit switching Alarm Indication Signal – Path

shelf A protection switch has occurred due to an AIS-P alarm.

– Info Info See AIS-P.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 44: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-38Force10 N

etworks

Release O

PS4.2.3

APS-LOP-P: Automatic protection switching (multiplex section protection - MSP) Loss of Pointer – Path

shelf A protection switch has occurred due to an LOP-P alarm.

– Info Info See LOP-P.

APS-SDBER-P: Automatic protection switching (multiplex section protection - MSP) Signal Degrade Bit Error Rate – Path

shelf A protection switch has occurred because of an SDBER-P alarm.

– Info Info See SDBER-P.

APS-SFBER-P: Automatic protection switching (multiplex section protection - MSP) Signal Fail Bit Error Rate – Path

shelf A protection switch has occurred because of an SFBER-P alarm.

– Info Info See SFBER-P.

APS-UNEQ-P: Automatic protection switching (multiplex section protection - MSP) Unequipped – (High Order) Path

shelf A protection switch has occurred because of an UNEQ STS path alarm.

– Info Info See UNEQ-P.

APSAISCLEAR: Automatic protection switching (multiplex section protection - MSP) Alarm Indication Signal Clear

shelf A protection switch which occurred because of an AIS alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APSB: Automatic protection switch (multiplex section protection - MSP) byte failure

sonet_ptpsdh_ptp

1+1 linear APS reports this alarm if the bidirectional mode is set and the APS K1/K2 bytes are in an invalid state.

– Minor Minor Check for OC-N module failures.

Examine the incoming SONET overhead with an optical test set to confirm inconsistent or invalid K bytes.APSBF: Automatic protection

switch byte failuresonet_ptpsdh_ptp te206 node

APSCFGMIS: Automatic protection switch (multiplex section protection - MSP) configuration mismatch

sonet_ptpsdh_ptp

1+1 linear APS reports this alarm if bidirectional mode is set and K2 bits 6-8 are any of these values: 0,1,2,3.

– Minor Minor • Check that the fiber is connected properly to the remote node.

• Check that a remote 1+1 linear PG exists.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 45: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-39

APSCM: Automatic protection switch (multiplex section protection - MSP) channel mismatch

sonet_ptpsdh_ptpte206 node

1+1 linear APS reports this alarm if the bidirectional mode is set and the APS K1/K2 bytes are in an invalid state.

– Minor Minor Check for OC-N module failures.

Examine the incoming SONET overhead with an optical test set to confirm inconsistent or invalid K bytes.

APSIMP: Improper automatic protection switching (multiplex section protection - MSP) code

sonet_ptpsdh_ptp

1+1 linear APS reports this alarm if the bidirectional mode is set and the APS K1/K2 bytes are in an invalid state. .

– Minor Minor Reseat the modules at the near end and upstream nodes.

Examine the incoming SONET overhead with an optical test set to confirm invalid K bytes.

APSINC: Inconsistent automatic protection switching (multiplex section protection - MSP) code

sonet_ptpsdh_ptp

On a 2F BLSR, the automatic protection switching codes are inconsistent. Three consecutive frames do not contain identical APS bytes, giving the receiving equipment conflicting commands about switching.

– Minor Minor Check for other alarms, especially BERSD-L and BERSF-L. Clear these alarms.

Verify the local receive optical levels, as well as the upstream transmit optical levels.

Clean the optical connectors.

Reseat the modules at the near end and upstream nodes.

Check the protection mode for the far-end node.

APSLOPCLEAR: Automatic protection switching (multiplex section protection - MSP) Loss of Pointer Clear

shelf A protection switch that occurred because an LOP-P alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APSLOS: Automatic protection switching (multiplex section protection - MSP) Loss of Signal

shelf A protection switch has occurred because of an LOS alarm.

– Info Info See LOS.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 46: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-40Force10 N

etworks

Release O

PS4.2.3

APSLOSCLEAR: Automatic protection switching (multiplex section protection - MSP) Loss of Signal Clear

shelf A protection switch that occurred because an LOS alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APSMM: Automatic protection switch (multiplex section protection - MSP) mode mismatch

sonet_ptpsdh_ptp te206 node

There is a mismatch of the protection switching schemes at the two ends of the span.

– Minor Minor Check protection modes at both ends. Verify that both ends are set for bidirectional or unidirectional.

APSPATHCLEAR: Automatic protection switching (multiplex section protection - MSP) Path Clear

shelf A protection switch that occurred because a path alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APSPDI: Automatic protection switching (multiplex section protection - MSP) Path Defect Indication

shelf A protection switch has occurred because of a PDI alarm.

– Info Info See PDI.

APSPDICLEAR: Automatic protection switching (multiplex section protection - MSP) Path Defect Indication Clear

shelf A protection switch that occurred because a PDI alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APS-PROTECT: Auto Switch to Working

te206 node A protection switch to the working facility that occurred because of an alarm clearing or Wait-To-Restore timer expiration.

Info (Informational; no action required.)

APSREL: Automatic protection switching (multiplex section protection - MSP) release

shelf The alarm condition that caused an automatic protection switch has been cleared. This occurs when a protection group has been configured as non-revertive.

– Info Info (Informational; no action required.)

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 47: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-41

APSSDCLEAR: Automatic protection switching (multiplex section protection - MSP) Signal Degrade Clear

shelf A protection switch that occurred because a SDBER-P alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APSSFCLEAR: Automatic protection switching (multiplex section protection - MSP) Signal Fail Clear

shelf A protection switch that occurred because a SFBER-P alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APSUNEQCLEAR: Automatic protection switching (multiplex section protection - MSP) Unequipped Clear

shelf A protection switch that occurred because an UNEQ STS path alarm has been cleared.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

APS-WORK: Auto Switch to Protect

te206 node A protection switch to the protection faciilty that occurred because of an alarm on the working facility.

Info Check the working facility for alarms.

APSWTR: Transition to Wait to Restore mode (multiplex section protection - MSP)

shelfte206 node

Traffic is in the process of switching back to working channels. This occurs when a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group has been configured as revertive.

– Info Info If frequent protection switching occurs, check the revertive WTR period setting.

AU-AIS: Administrative Unit Alarm Indication Signal

ds3_ptpsdh_hpsdh_ptp

The STM signal demultiplexed from the STM-N contains an AIS. This AIS can result from an upstream failure along the STM path.

SA Critical Minor Check the equipment upstream.

Clear upstream alarms.

Verify your payload connections.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 48: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-42Force10 N

etworks

Release O

PS4.2.3

AU-LOP: Administrative Unit Loss of Pointer

ds3_ptpsdh_hpsdh_ptp

Valid AU pointer bytes are missing from the SDH overhead.

SA Critical Minor Check the cabling and physical connections on the reporting card.

Verify cross-connects.

Check network timing synchronization.

Verify that the expected bandwidth and received bandwidth are the same.

If the alarm persists, replace the module.

AUTHFAIL: OSPF authentication key or type mismatch

shelf An OSPF packet has been received whose authentication key or type conflicts with this node’s authentication key or type.

– Minor Minor Retry authentication with new key or type.

AUTOPRV: Auto provisioning error

sonet_ptpsdh_ptp

A signal failure has occurred on the ring and the user has added new cross-connect data. When the system attempts to auto provision the squelch tables, they cannot be updated, triggering the alarm.

– Minor Minor Clear the signal failure.

AUTO-TX-ON: Transmitter automatically enabled

ethernet_ptpsdh_ptpsonet_ptp

Event against the optical interface when the transmitter has been turned on automatically.

– Info Info (Informational; no action required.)

BADPKTRX: Received an OSPF packet that cannot be parsed

shelf OSPF packet cannot be parsed. – Minor Minor Check configuration and PM.

BATDSCHRG: Battery is discharging

shelf Battery is discharging. – Minor Minor Check and follow your method of procedures.

BATTERY: Battery has failed shelf Battery has failed. – Minor Minor Check and follow your method of procedures.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 49: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-43

BERSD-L: Bit ErrorRate signal degrade – Line

ds3_ptp(ds_ptp)e3_ptp1

The BER on the incoming EC-1 line has exceeded the signal degrade threshold.

SA Warning Warning Check cable connectors and module ports.

If an EC-1 module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Check the remote (source) Transmit and cable connection.

shelfte50

The BER on the incoming BITS has exceeded the signal degrade threshold.

– Warning Warning Check cable connectors.

sonet_ptpte206 node

• The BER on the incoming OC-N line has exceeded the signal degrade threshold.

• A connector in the OC-N optical link could be dirty.

• An OC-N module hardware problem could exist.

• Fiber could be bent or damaged.

SA Warning Warning Verify the local receive optical levels, as well as the upstream transmit levels.

Verify good optical connections.

Clean optical cable connectors and module ports.

If an OC-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Check the remote (source) Transmit and fiber connection.

Check fiber for bends or damage.

If the problem persists, contact Force10 ’s Technical Assistance Center (TAC).

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 50: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-44Force10 N

etworks

Release O

PS4.2.3

BERSD-P: Bit Error Rate signal degrade – Path

ds3_ptp(ds_ptp)e3_ptp1

The STS signal demultiplexed and dropped from the EC-1 has exceeded its signal degrade threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an EC-1 module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

sonet_ptpsonet_stste206 node

The STS signal demultiplexed and dropped from the OC-N/STM-N has exceeded its signal degrade threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an OC-N/STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 51: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-45

BERSD-V: BitError Rate signal degrade – VT Path

ds1_ptpds3_ptp(ds_ptp)e3_ptp1

The VT signal demultiplexed and dropped from the DS1 has exceeded its signal degrade threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

sonet_ptpsonet_stssonet_vtshelfte206 node

The VT signal demultiplexed and dropped from the OC-N has exceeded its signal degrade threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

sdh_ptp See LP-BERSD. n/a n/a n/a See LP-BERSD.

BERSD-VC: Bit Error Rate signal degrade – VC Path

e1_ptpsdh_ptp

The VC signal demultiplexed and dropped from the STM-N has exceeded its signal degrade threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 52: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-46Force10 N

etworks

Release O

PS4.2.3

BERSF-L: Bit Error Rate signal fail – Line

ds3_ptp(ds_ptp)e3_ptp1

The BER on the incoming EC-1 line has exceeded the signal fail threshold.

SA Warning Warning Check cable connectors and module ports.

shelfte50

The BER on the incoming BITS has exceeded the signal fail threshold.

– Warning Warning Check cable connectors.

sonet_ptp te206 node

• The BER on the incoming OC-N line has exceeded the signal fail threshold.

• A connector in the OC-N optical link may be dirty.

• An OC-N module hardware problem may exist.

• Fiber could be bent or damaged.

SA Warning Warning Verify the local receive optical levels, as well as the upstream transmit levels.

Verify good optical connections.

Clean optical cable connectors and module ports.

If an OC-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Check the remote (source) Transmit and fiber connection.

Check fiber for bends or damage.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 53: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-47

BERSF-P: Bit Error Rate signal fail – Path

ds3_ptp(ds_ptp)e3_ptp1

The STS signal demultiplexed and dropped from the EC-1 has exceeded its signal fail threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an EC-1 module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

sonet_ptpsonet_stste206 node

The STS signal demultiplexed and dropped from the OC-N has exceeded its signal fail threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an OC-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 54: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-48Force10 N

etworks

Release O

PS4.2.3

BERSF-V: Bit Error Rate signal fail – VT/VC Path

ds1_ptpds3_ptp(ds_ptp)e3_ptp1

The VT/VC signal demultiplexed and dropped from the module has exceeded its signal fail threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

sonet_ptpsonet_vtsonet_stste206 node

The VT signal demultiplexed and dropped from the OC-N has exceeded its signal fail threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

shelf The VT signal demultiplexed and dropped from the OC-N has exceeded its signal fail threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

sdh_ptp See LP-BERSF. n/a n/a n/a See LP-BERSF.

BERSF-VC: Bit Error Rate signal fail – VC Path

e1_ptpsdh_ptp

The VC signal demultiplexed and dropped from the STM-N has exceeded its signal fail threshold.

SA Warning Warning Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

BITSA-FRC: Forced switch - Derived DS1 System BITS 1

shelf A forced switch is in process. – Warning Warning Clear the Forced switch command.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 55: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-49

BITSA-LOCK: Lockout - Derived DS1 System BITS 1

shelf A lockout is in process on this timing reference.

– Warning Warning Clear the Lockout switch command.

BITSA-MAN: Manual switch - Derived DS1 System BITS 1

shelf A manual switch is in process. – Warning Warning Clear the Manual switch command.

BITSB-FRC: Forced switch - Derived DS1 System BITS 2

shelf A forced switch is in process. – Warning Warning Clear the Forced switch command.

BITSB-LOCK: Lockout - Derived DS1 System BITS 2

shelf A lockout is in process on this timing reference.

– Warning Warning Clear the Lockout switch command.

BITSB-MAN: Manual switch - Derived DS1 System BITS 2

shelf A manual switch is in process. – Warning Warning Clear the Manual switch command.

BITSGEN: BITS event shelf Unused. – Info Info Unused.

BITSRBOC: BITS RBOC detect shelf Unused. – Info Info Unused.

BLOCK-TO-FWD: Ethernet Transition from Block to Forward

te206 node Major

BLSR_NOT_SYNC: BLSR ring is out of sync

server One of the nodes in the BLSR/MS-SPRing is out of sync with the other nodes in the ring possibly due to invalid K bytes.

SA Critical Critical Check for OC-N/STM-N module failures. Examine the incoming SONET/SDH overhead with an optical test set to confirm inconsistent or invalid K bytes.

Issue an init command to re-initialize the ring.

BLSR_SYNC_UNKNOWN: BLSR unknown error

server BLSR/MS-SPRing synchronization status is unknown.

– Warning Warning Check for OC-N/STM-N module failures. Examine the incoming SONET/SDH overhead with an optical test set to confirm inconsistent or invalid K bytes.

Issue a sync command to re-synchronize the ring.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 56: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, A through C

Page 1-50Force10 N

etworks

Release O

PS4.2.3

BOARDFAIL: Board failure alarm ta200 The OMX3 or PM13 board may not be seated correctly in the chassis or has failed.

SA Critical Critical Check that the module is inserted correctly into the chassis. Otherwise, run diagnostics to test the state of the module.

BPSIG: The backplane cannot communicate with other modules

shelf • Module defect.• Backplane slot defect.

SA Critical Minor Replace the module. If the same alarm persists, try another slot in the shelf.

CFGERR: OSPF configuration parameter mismatch)

shelf A packet was received whose configuration parameters conflict with the node’s configuration parameters.

– Minor Minor Check the configuration.

CLEAR: Clear switch request shelf A Clear switch command has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Info Info (Informational; no action required.)

CLFAIL: Cooling fan failure shelf The cooling fan or the power source may have a defect.

– Minor Minor Check the state of the cooling fan or the power.

CLFAN: Fan failed shelf The cooling fan is defective. – Minor Minor Check the state of the cooling fan or the power source. Replace the fan unit, as necesary.

CLRLOOP: Clear loopback ds1_ptpds3_ptp(ds_ptp)e1_ptpe3_ptpeopeop_ctpethernet_ptpsonet_ptpsdh_ptp

A loopback has been cleared. – Warning Warning (Informational; no action required.)

CMTFLT: Commit Failure te206 node Connection to TE-206 from TransNav GUI failed.

Info Info Manually commit the software.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 57: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, A

through C

Release O

PS4.2.3Force10 N

etworks

Page 1-51

COM: Communication failure server The management server cannot synchronize with the node.

– Warning Warning Check that the node name was entered exactly as configured with the node-level CLI (the node name is case-sensitive).

ta200te50

The management server cannot synchronize with the node.

SA Warning Warning Check that the node name was entered exactly as configured with the node-level CLI (the node name is case-sensitive).

CONTROL: Control alarm on MPS IM

te50 The control signal is not present. SA Critical Critical Check connectivity and the multi-protocol serial (MPS) interface module (IM) alarm monitor configuration.

CTS: Clear to send on MPS IM te50 A clear to send (CTS) signal is not yet received on the MPS IM alarm monitoring system.

SA Critical Critical Check connectivity and configuration.

Table 1-8 Alarms, Events and Recommended Actions, A through C (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 58: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-52Force10 N

etworks

Release O

PS4.2.3

Alarms/Events, D through K

Table 1-9 Alarms, Events and Recommended Actions, D through K

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

DBCRPT: Database corruption servershelf

The active database fails to start. – Minor Minor This alarm will not be visible due to action taken by the software to recover from this condition. If the alarm generates, contact Force10 ’s Technical Assistance Center (TAC).

DBFAIL: Database failed servershelf

A failure has occurred on the active database upon GCM initialization or some other temporary loss of connectivity. The database is inaccessible as a result of connection failures or abnormal shutdown of database software.

SA Critical Minor If this condition does not resolve itself in a few minutes, contact Force10 ’s Technical Assistance Center (TAC).

DBMIS: Database version mismatch

servershelf

The database engine software version is incompatible with the node software as a result of improper upgrade of software. This condition will not occur during normal upgrade.

Some database operations will fail, but the node is still usable.

SA Critical Minor • Verify that the software version is correct.

• Contact Force10 ’s Technical Assistance Center (TAC).

DBRED: Redundant Database failed

servershelf

A redundant database failure has occurred as a result of a standby GCM reboot, a connection failure, or abnormal shutdown of database software.

SA Minor Minor • If the standby GCM is rebooting, the condition will clear when the active GCM goes hot.

• Otherwise, reboot the standby GCM and allow time for the GCMs to go hot.

• If no resolution, contact Force10 ’s Technical Assistance Center (TAC).

Page 59: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-53

DBSIGN: Database signature mismatch

ds3_ptpe1_ptpe3_ptpethernet_ptpsdh_ptpsonet_ptpservershelfta200te50

The database content does not match the node commissioning parameter values. The database is unusable.

The commissioning parameters may have not been provisioned.

A GCM may have been moved from one node to another node.

This alarm is only visible via the node-level CLI when the TransNav server will not connect to the node due to improper commissioning.

SA Major Minor • If the TransNav server connects, and this alarm is present, verify commissioning parameters, then reboot the node.

• If the TransNav server does not connect to the node, use the Craft port on the active GCM to commission the node via CLI, verify commissioning parameters, then reboot the node.

DCCFAIL: Data Communications Channel fail

ds3_ptp(ds_ptp)

Not supported on EC-1. NSA Major Major Not supported; no action required.

ds3_ptp(ds_ptp)e3_ptp1

sonet_ptpsonet_stssdh_hpsdh_lpsdh_ptp

• The DCC on the incoming OC-N has failed.

• The OC-N port is not connected or the fiber is cut along the path.

• The remote link is not active.

NSA Major Minor • Check the OC-N interface. • Check for a fiber cut and OC-N LOS

alarms.• Verify the remote OC-N interface has

Control Data enabled and is active. Filter local alarms as necessary until remote link comes active.

te206 The DCC on the TE-206 has failed.

Info Minor Verify the DCC interface is active.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 60: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-54Force10 N

etworks

Release O

PS4.2.3

DOWN1: Out of service ds1_ptpds3_ptp(ds_ptp)e1_ptpe3_ptpethernet_ptpservershelfsonet_ptpsdh_ptpsonet_serviceta200te50

Unused. – Minor Minor Unused.

DQL1: Degraded quality level ds3_ptpds_ptpe3_ptpshelfsonet_ptpsdh_ptp

The incoming signal has a degraded quality level.

– Minor Minor Check and clean connections.

DS1AIS: Alarm indication signal - DS1

ds1_ptpta200te50te206

The DS1 input contains an AIS. SA Critical Critical Inspect and clear alarms from the upstream asynchronous equipment.

DS1AIS-TX: Alarm Indication Signal - transmit, DS1

te206 The DS1 output signal contains an AIS.

SA Minor Info Inspect and clear alarms from the downstreamasynchronous equipment.

DS1 Loss of frame - DS1DS1LOF: Loss of frame - DS1

ds1_ptpte206

The DS1 input contains a LOF which is a mismatch of the line format between the Traverse and the upstream asynchronous equipment.

SA Critical Critical If the Line format on the Traverse sets to SF or ESF, verify the line forma (SF, ESF) of the incoming signal from the upstream asynchronous device.

If the Line format on the Traverse sets to Unframed, call Force10 ’s Technical Assistance Center (TAC).

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 61: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-55

DS1LOS: Loss of signal - DS1 ds1_ptp The DS1 input contains an LOS. SA Critical Critical Inspect and clear alarms from the upstream asynchronous equipment.

DS1RAI: Remote alarm indication

ds1_ptpte50te206

• The far-end node has detected a defect signal on an incoming DS1.

• The local node is sending a bad DS1 signal towards the DS-X.

– Warning Warning Verify that the connections between the DS-X and the DS1 module are secure.

Verify that the DS1 signal entering the far end of the SONET network is error-free.

DS1RAI-TX: Remote alarm indication transmitted

te206 • The near-end node has detected a defect signal on an outgoing DS1.

• The local node is sending a bad DS1 signal towards the DS-X.

– Warning Warning Verify that the connections between the DS-X and the DS1 module are secure.

Verify that the DS1 signal exiting the near end of the SONET network is error-free.

DS3AIS: Alarm indication signal - DS3

ds3_ptpds_ptpta200te50 te206

The DS3 input signal contains an AIS.

SA Critical Critical Inspect and clear alarms from the upstream asynchronous equipment.

DS3AIS-TX: Alarm Indication Signal - transmit, DS3

te206 The DS3 output signal contains an AIS.

SA Minor Minor Inspect and clear alarms from the downstreamasynchronous equipment.

DS3FEAC-AIS: te206 The DS3 FEAC channel is receiving AIS indication.

Info Check upstream equipment for the source of AIS.

DS3FEAC-EQPT: DS3 FEAC Equipment Failure

te206 The DS3 FEAC channel is receiving Equipment Failure indication.

Info Check upstream equipment for source of Equipment Failure.

DS3FEAC-IDLE: DS3 FEAC Idle Signal

te206 The DS3 FEAC channel is receiving Idle indication.

Info Check upstream equipment for source of Idle.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 62: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-56Force10 N

etworks

Release O

PS4.2.3

DS3FEAC-LOF: DS3 FEAC Loss of Frame

te206 The DS3 FEAC channel is receiving Loss of Frame indication.

Info Check upstream e.

DS3FEAC-LOS: DS3 FEAC Loss of Signal

te206 The DS3 FEAC channel is receiving Loss of Signal indication.

Info Check upstream equipment for source of Loss of Signal.

DS3LOF: Loss of frame, DS3 te206 The DS3 input contains a LOF that is a mismatch of the line format between the Traverse and the upstream asynchronous equipment.

SA Critical Critical If the Line format on the Traverse sets to SF or ESF, verify the line forma (SF, ESF) of the incoming signal from the upstream asynchronous device.

If the Line format on the Traverse sets to Unframed, call Force10 ’s Technical Assistance Center (TAC).

DS3RAI: Remote alarm indication

ds3_ptpds_ptpta200te50te206

• The far-end node has detected a defect signal on an incoming DS3.

• The local node is sending a bad DS3 signal towards the DS-X.

– Warning Warning Verify that the connections between the DS-X and the DS3 module are secure.

Verify that the DS3 signal entering the far end of the SONET network is error-free.

DS3RAI-TX: Remote alarm indication transmitted

te206 • The near-end node has detected a defect signal on an outgoing DS3.

• The local node is sending a bad DS3 signal towards the DS-X.

– Warning Warning Verify that the connections between the DS-X and the DS3 module are secure.

Verify that the DS3 signal exiting the near end of the SONET network is error-free.

DSR: Data set ready on MPS IM te50 The data set ready signal is not yet received on the MPS IM alarm monitoring system.

SA Critical Critical Check the node, connectivity, and the configuration.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 63: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-57

DTR: Data terminal ready on MPS IM

te50 The data terminal ready signal is not yet received on the MPS IM alarm monitoring system.

SA Critical Critical Check the DTE and modem connectivity and the configuration.

E1AIS: Alarm indication signal - E1

e1_ptpta200te50

The E1 input contains an AIS. SA Critical Critical Inspect and clear alarms from the upstream asynchronous equipment.

E1LOMCAS: Alarm indication signal - E1

e1_ptp Loss of Multiframe CAS. – Critical Critical Check the interface.

E1LOMCRC: Alarm indication signal - E1

e1_ptp Loss of Multiframe CRC. – Critical Critical Check the interface.

E1RAI: Remote alarm indication

e1_ptp • The far-end node has detected a defect signal on an incoming E1.

• The local node is sending a bad E1 signal towards the E-X.

– Warning Warning Verify that the connections between the E-X and the E1 module are secure.

Verify that the E1 signal entering the far end of the SDH network is error-free.

te50 SA Critical Critical

E3 AIS: Alarm indication signal - E3

e3_ptp The E3 input contains an AIS. SA Critical Critical Inspect and clear alarms from the upstream asynchronous equipment.

E3 RAI: Remote alarm indication

e3_ptp • The far-end node has detected a defect signal on an incoming E3.

• The local node is sending a bad E3 signal towards the E-X.

– Warning Warning Verify that the connections between the E-X and the E3 module are secure.

Verify that the E3 signal entering the far end of the SDH network is error-free.

EFMFAIL: EFM failure shelf EFM (ingress or egress) failure; parity or other error.

SA Critical Critical Reboot card and consult Force10 ’s Technical Assistance Center (TAC), if alarm persists.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 64: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-58Force10 N

etworks

Release O

PS4.2.3

ENGINE: Engine failure shelf Internal queue engine failure. – Minor Minor Reboot card and consult Force10 ’s Technical Assistance Center (TAC), if alarm persists.

ENGOPRG: Engine operating shelf Internal queue engine is operating again.

– Minor Minor Monitor for further internal queue engine failures.

EQCOMM1: Communication link failed

shelf The link is down. SA Critical Critical Check the link connections.

EQFRCSW1: Forced protection switch – Equipment

shelf A forced protection switch command has been executed on a 1:1 equipment protection group.

– Warning Warning If the reason for executing the forced switch command no longer exists, clear the switch command.

EQHICPU: Equipment high CPU usage

shelf NSA Major Major

EQINS: Equipment inserted te206 A new cassette has been inserted into the node

Info Informational only. No action required.

EQINV: Equipment invalid shelf te206

An invalid piece of equipment has been used.

– Critical Critical Plug in a valid piece of equipment.

EQLOCK1: Protection lockout – Equipment

shelf A lockout protection switch command has been executed on a 1:1 equipment protection group.

– Warning Warning If the reason for executing the lockout switch command no longer exists, clear the switch command.

EQMANSW1: Manual protection switch – Equipment

shelf A manual protection switch command has been executed on a 1:1 equipment protection group.

– Warning Warning If the reason for executing the manual switch command no longer exists, clear the switch command.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 65: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-59

EQMIS: Equipment mismatch shelf te206

Type of equipment plugged in does not match the provisioned type or the module is not allowed in the slot.

Note: GCM, Enhanced GCM, and GCM with integrated optics are considered different module types.

SA Critical Minor Determine if the TransNav server or the node contains the correct module configuration. Please refer to Appendix A—“Module Placement Planning and Guidelines” for module placement details.

If the TransNav server contains the correct module configuration, replace the module with the correct module type. The alarm should be cleared.

If the node contains the correct module configuration, lock, restart, and delete the module. During auto discovery, the correct configuration information will be forwarded to the TransNav server and the alarm should be cleared.

EQPT: Equipment malfunction / failure.

server te206

A hardware failure has occurred. SA Critical Critical Check and reseat equipment. If this fails to clear the alarm, replace the equipment if necessary.

shelf te206

A hardware failure has occurred on the reporting module.

SA Critical Minor Reseat the module. If this fails to clear the alarm, replace the module if necessary.

EQRMV: Equipment removed shelfte206

A module is not properly seated or it has been removed.

SA Critical Minor Plug in the correct module or delete the module using the TransNav system if that slot is not being used.

ERFI-V: Enhanced (two bit) Remote failure indication – VT Path

ds1_ptp The VT signal demultiplexed from the DS1 contains ERFI-V (RFISVR-V, RFICON-V, and RFIPAY-V).

The far-end node has detected path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms such as LOP-V, AIS-V, PLM-V, TIM-V, and UNEQ-V from the far-end node.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 66: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-60Force10 N

etworks

Release O

PS4.2.3

ETHRING-FAIL: Invalid Ethernet Ring Configuration

te206 A root bridge has not been configured for the ETHRING.

Info Configure a root bridge for the ETHRING.

EXER_SWITCH: Exercise switch on remote node

shelf Checking status of remote node via exercise command (using K1/K2 bytes) for 1+1 bidirectional protection group.

– Info Info (Informational only; no action required.)

EXPLGS: Explosive gas shelf Explosive gas detected. – Minor Minor Check and follow your method of procedures.

EXTA-REF1-ALM: Primary reference in alarm

shelf Primary reference for Derived DS1 System SASE 1 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

EXTA-REF2-ALM: Secondary reference in alarm

shelf Secondary reference for Derived DS1 System SASE 1 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

EXTA-REF3-ALM: Third reference in alarm

shelf Third reference for Derived DS1 System SASE 1 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

EXTA-REF4-ALM: Fourth reference in alarm

shelf Fourth reference for Derived DS1 System SASE 1 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 67: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-61

EXTB-REF1-ALM: Primary reference in alarm.

shelf Primary reference for Derived DS1 System SASE 2 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

EXTB-REF2-ALM: Secondary reference in alarm

shelf Secondary reference for Derived DS1 System SASE 2 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

EXTB-REF3-ALM: Third reference in alarm

shelf Third reference for Derived DS1 System SASE 2 is alarmed due to source signal failure or unavailability due to a LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

EXTB-REF4-ALM: Fourth reference in alarm

shelf Fourth reference for Derived DS1 System SASE 2 is alarmed due to source signal failure or unavailability due to an LOS, LOF or AIS-L alarm.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

FANCOMM: Fan tray communication failure

shelf Communication failure with the fan tray.

– Minor Minor Reseat the fan tray.

FANCOND: Fan tray condition shelf EEPROM failure or thermistor failure.

– Warning Warning Replace the fan tray.

FANFLTR: Fan filter shelf Temperature has exceeded 49 ºC.

– Minor Minor Check that the temperature of the room is not abnormally high.

Replace the fan tray air filter.

FANRMV: Fan tray removed shelf Fan tray has been removed. – Minor Minor Install the fan tray.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 68: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-62Force10 N

etworks

Release O

PS4.2.3

FEP1: Far-end protection failure sonet_ptpsdh_ptpte206

An APS switching channel signal failure has occurred on the protect module coming into the node.

– Minor Minor Check the equipment on the other end of the fiber.

FILE_UPLOAD: Single file transfer

shelf File upload is in process. – Info Info (Informational only; no action required.)

FIRDETR: Fire detector failure shelf Fire detection equipment has failed.

– Minor Minor Check fire detection equipment and power source.

Check and follow your method of procedures.

FIRE2: Fire shelf Fire detected. – Minor Minor Check and follow your method of procedures.

FLOOD2: Flood shelf Flood detected. – Minor Minor Check and follow your method of procedures.

FOPR: Failure of protocol - receive

eoseopsdh_eos

LCAS has detected unexpected behavior by the remote LCAS peer.

SA Critical Critical Check remote peer for proper configuration.

FOPT: Failure of protocol - transmit

eoseopsdh_eos

LCAS has detected unexpected behavior by the remote LCAS peer.

SA Critical Critical Check remote peer for proper configuration.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 69: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-63

FORCE_ONLINE ta200 The selected module is forced online. A 50 ms ‘hit’ occurs on the T1 traffic during the switch.

Redundancy is disabled while a force protection switch is active. Any failures to the on-line module are not protected. Therefore, the status LED will be turned yellow to indicate a maintenance condition is active.

SA Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FORCED: Forced protection switching

shelf te206

A forced protection switch has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FORCED_ON_PROT: Forced protection switch on protecting unit

shelf te206

A forced protection switch has been performed on a protection group.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FORCED_ON_SECT1: Forced protection switch on optimized 1+1 APS working section 1

shelf A forced switch has been performed on the optimized 1+1 APS bi-directional working section 1.

Note: Section 1 and 2 are equal working sections, each with a permanent traffic bridge.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 70: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-64Force10 N

etworks

Release O

PS4.2.3

FORCED_ON_SECT2: Forced protection switch on optimized 1+1 APS working section 2

shelf A forced switch has been performed on the optimized 1+1 APS bi-directional working section 2.

Note: Section 1 and 2 are equal working sections, each with a permanent traffic bridge.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FORCED_ON_WORK: Forced protection switch on working unit

shelf te206

A forced protection switch has been performed on the working unit.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FORCED-EAST: Forced switch applied on east facility

shelf A forced protection switch has been performed on the east facility.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FORCED-WEST: Forced switch applied on wast facility

shelf A forced protection switch has been performed on the west facility.

– Warning Warning Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FUSE: Fuse failure shelf A fuse has failed. – Minor Minor Check and follow your method of procedures.

FWMIS: Firmware mismatch te206 The current running firmware revision does not match the current running software revision.

Major Perform a firmware upgrade to resolve the mismatch.

GENFAIL2: Generator failure shelf Generator has failed. – Minor Minor Check and follow your method of procedures.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 71: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-65

GFPLOF: Loss of frame shelf Generic Framing Procedure (GFP) framing problem on the incoming bit stream.

SA Critical Minor • Inspect all VC bundle facilities.• Check remote sites for module

removal/failure alarms or disabled Ethernet transmitter.

• Check the cable and interface.

GIDERR: LCAS group ID mismatch

shelf A link capacity adjustment scheme (LCAS) group ID member of the VC bundle shows one of the following conditions are present on the path:

• LOP• LOM• AIS• LOS

The VC bundle continues to operate.

SA Critical Minor • Inspect all VC bundle facilities.• Check remote sites for module

removal/failure alarms or disabled Ethernet transmitter.

• Check the cable and interface.

GIDM: Group ID mismatch eossdh_eoseop

Group ID mismatch. SA Critical Critical The expected group ID does not match the received group ID.

H4-LOM: H4 Loss of multiframe

ds3_ptpsdh_hpsdh_lpsdh_ptpsonet_ptpsonet_sts

H4 Loss of multiframe. SA Critical Minor Incoming STS should contain VTs.

HIAIR: High airflow shelf High airflow detected. – Minor Minor Check and follow your method of procedures.

HIHUM: High humidity shelf Humidity is too high. – Minor Minor Check and follow your method of procedures.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 72: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-66Force10 N

etworks

Release O

PS4.2.3

HITEMP: High temperature shelf Temperature is too high. – Minor Minor Check that the temperature in the room is not abnormally high.

Ensure that nothing prevents the fan tray from passing air through the Traverse shelf.

Ensure that blank faceplates are inserted in empty slots in the Traverse shelf to help airflow. Blank faceplates must be ordered separately.

Check the condition of the air filter to see if it needs replacement. • If the filter is clean, take the fan tray

assembly out of the Traverse shelf. • Reinsert the fan tray, making sure the

back of the fan tray connects to the rear of the Traverse shelf.

If the fan does not run or the alarm persists, replace the fan tray.

HIWTR: High Water shelf The water level has exceeded the threshold.

– Minor Minor Check and follow your method of procedures.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 73: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-67

HP-BERSD: Bit error rate signal degrade - High order Path

ds3_ptpsdh_hpsdh_ptp

The STM signal demultiplexed and dropped from the STM-N has exceeded its signal degrade threshold.

– Warning Warning Examine the network for other high order path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

HP-BERSF: Bit error rate signal degrade - High order Path

ds3_ptpsdh_hpsdh_ptp

The STM signal demultiplexed and dropped from the STM-N has exceeded its signal fail threshold.

– Warning Warning Examine the network for other high order path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate theproblem.

Check cable connectors and module ports.

If an STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

HP-LOM: High order path Loss of multiframe

sdh_eossdh_eos_ctp

An error is detected in the paths multiframe indicator.

SA Critical Critical This is an eos_ctp member alarm. If not using LCAS, check that EOS member order matches that of the remote EOS.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 74: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-68Force10 N

etworks

Release O

PS4.2.3

HP-MND: High order path Member not deskewable

sdh_eossdh_eos_ctp

Differential Delay exceeded on EOS member and the member was removed from the group.

SA Critical Critical This is an eos_ctp member alarm.

Check the EOS member status to determine which paths have exceeded the delay and reroute them.

HP-SQM: High order path Sequence ID mismatch

sdh_eossdh_eos_ctp

The member sequence number is in error.

SA Critical Critical This is an eos_ctp member alarm.

If non-LCAS, check that the order of members in the remote EOS matches the local order

HP-PLM: Payload label mismatch received - High order Path

ds3_ptpsdh_hpsdh_ptp

• Invalid C2 byte (signal label byte) in the SDH path overhead.

• The payload does not match what the signal label is reporting.

SA Critical Minor Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

HP-RDI: Remote Defect Indication - High order Path

ds3_ptpsdh_hpsdh_ptp

Valid STM-N framing is not detected or AU-AIS (or MS-AIS) is received from the source.

– Warning Warning Check STM-N framing source.

See AU-AIS.

See MS-AIS.

HP-RFI: Remote Failure Indication - High order Path

sdh_hpsdh_ptp

• The signal demultiplexed from the STM-N contains a remote failure indication.

• The far-end node has detected path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms from the far-end node.

HP-RFICON: Remote failure indication, connectivity defect - High order Path

ds3_ptpsdh_hpsdh_ptp

Far end path has an HP-UNEQ or HP-TIM alarm.

– Warning Warning Verify your payload connections.

Check for far end alarms, especially HP-UNEQ and HP-TIM.

Refer to the recommended actions for HP-UNEQ and HP-TIM.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 75: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, D

through K

Release O

PS4.2.3Force10 N

etworks

Page 1-69

HP-RFIPAY: Remote failure indication, payload defect - High order Path

ds3_ptpsdh_hpsdh_ptp

Far end path has a HP-PLM alarm.

– Warning Warning Verify your payload connections.

Check for far end alarms, especially HP-PLM.

Refer to the recommended actions for HP-PLM.

HP-RFISVR: Remote failure indication, server defect - High order Path

ds3_ptpsdh_hpsdh_ptp

Far end path has an AU-AIS or AU-LOP alarm.

– Warning Info Verify your payload connections.

Check for far end alarms, especially AU-AIS and AU-LOP.

Refer to the recommended actions for AU-AIS and AU-LOP.

HP-TIM: Trace identifier mismatch - High order Path

ds3_ptpsdh_hpsdh_ptp

The expected path trace string (J1 byte in the SDH path overhead) does not match the received path trace string.

SA Critical Minor Check configuration of path source or cross-connect.

Match the path trace string on both ends of the path.

HP-UNEQ: Unequipped - High order Path

ds3_ptpsdh_hpsdh_ptp

No payload is received on an activated service.

SA Critical Minor Check your connection.

Connect your proper payload.

Check the service source.

HWFAULT: Hardware fault shelf

te206

A hardware fault has occurred.

This corresponds to the CASFA alarm on the TE-206 node.

SA Critical Critical See Hardware Fault Detection, page 1-71 for further details. Take appropriate action, as necessary.

IDLE: Idle signal detection ds1_ptpds3_ptp(ds_ptp)e1_ptpe3_ptp eop eop_ctp

Service is not provisioned over the interface.

SA Warning Warning Check the interface. On eop and eop_ctp members, affects DS1 and DS3 port members only.

Check the far-end node.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 76: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, D through K

Page 1-70Force10 N

etworks

Release O

PS4.2.3

INCOMPATSW: Incompatible software

servershelf

Software is incompatible between modules that are attempting communication with each other.

– Critical Critical Check the current software versions and compatibility IDs of the modules.

One module’s current software version must be at least the compatibility ID (the lowest software version the other module can work with) of the other module.

Perform software upgrade as necessary for software compatibility.

INTRUDER: Intrusion shelf – Minor Minor

INDICATION: Indication Alarm on MPS IM

te50 SA Critical Critical

KBYTE: Default K byte sonet_ptpsdh_ptp

Far end protection mode mismatch. K1/K2 bytes not sent. For example, a BLSR may have one node configured as a UPSR, and a node in a UPSR would not send the two valid K1/K2 bytes expected by a BLSR system.

– Minor Minor Check protection mode for far-end node.

1 Not supported in this release.

2 Environmental alarm inputs are customized by each operator.

Table 1-9 Alarms, Events and Recommended Actions, D through K (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 77: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsH

ardware Fault D

etection

Release O

PS4.2.3Force10 N

etworks

Page 1-71

Hardware Fault Detection

Figure 1-27 Hardware Fault Detection for NGE, NGE Plus, and EoPDH Cards

Figure 1-28 Hardware Fault Detection for 10GbE and GbE-10 Cards

Page 78: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-72Force10 N

etworks

Release O

PS4.2.3

Alarms/Events, L through S

Table 1-10 Alarms, Events and Recommended Actions, L through S

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

LBC: TXlaser bias current threshold violation

ethernet_ptpsdh_ptpsonet_ptpshelf

TXlaser bias current threshold violation.

For Ethernet only: brief generation of this alarm occurs after a 1:1 equipment PG protection switch because the transmit laser is off on the standby card prior to PG protection switch.

– Warning Warning Check laser bias.

LBCNRML1: Laser bias current normalized threshold crossing alert.

shelf Power level out of range. – Warning Warning Measure power level using optical power meter; replace module if below threshold.

LCAS-INACTIVE: eop Remote system not using LCAS NSA Warning Warning Informational for EOP DS1 and DS3 ports only; no action required

LCAS-REM: LCAS remove vc bundle Ethernet over SONET (EOS) event to indicate a failed member was removed from operation in an LCAS-enabled VC bundle. (Location: Near-end, Direction: received)

– Info Info Check for LCAS (GIDERR, SSF) or member path alarms and proceed as directed.

LCAS-RES: LCAS restore vc bundle EOS event to indicate member was restored to operation in an LCAS-enabled VC bundle. (Location: Near-end, Direction: received)

– Info Info Informational; no action required.

LEAK2: Leak shelf Leak detected. – Minor Minor Check and follow your method of procedures.

Page 79: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-73

LFD: Loss of Frame Delineation eossdh_eoseop

GFP has lost sync. SA Critical Critical Check the paths associated with the EOS or EOP members for alarms.

LINKFAIL: Link failure ethernet_ptpte206 node

• Transmitter/receiver failure.• Fiber connection lost.• A module along the path has

been removed.

SA Critical Critical Check connectors, cables, and modules.

Check Ethernet port configuration, Integrity Status parameter for details. See the TransNav Management System GUI Guide, Section 5—Equipment, Chapter 4—“Ethernet Equipment,” Ethernet Equipment.

LNKBCPTY: Link broadcast message parity error

shelf Unused. – Minor Minor Unused.

LNKBLKCNT: Link block count error

shelf Unused. – Minor Minor Unused.

LNKBLKPTY: Link block parity error

shelf Unused. – Minor Minor Unused.

LNKCRC: Link CRC error shelf Unused. – Minor Minor Unused.

LNKCSUM: Link checksum error

shelf Unused. – Minor Minor Unused.

LNKDOWN: Link down shelf Unused. – Info Info Unused.

LNKERR: Unrecognized link error

shelf Unused. – Minor Minor Unused.

LNKOVFL: Link overflow shelf Unused. Minor Minor Unused.

LNKPAPTY: Link path alarm parity error

shelf Unused. – Minor Minor Unused.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 80: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-74Force10 N

etworks

Release O

PS4.2.3

LNKRXCORR: Link receive corruption

shelf Unused. – Minor Minor Unused.

LNKRXDROP: Link receive drop

shelf Unused. – Minor Minor Unused.

LNKRXLEN: Link receive length error

shelf Unused. – Minor Minor Unused.

LNKRXSTAT: Link receive stat count error

shelf Unused. – Minor Minor Unused.

LNKTXCORR: Link transmit corruption

shelf Unused. – Minor Minor Unused.

LNKTXDROP Link transmit drop

shelf Unused. – Minor Minor Unused.

LNKUP1: Link up shelf The link is now up. – Info Info Informational; no action required.

LO-LBC: TX laser bias current exceeds low alarm threshold

sonet_ptp SFP optic alarm. Set when TX Bias current is below low alarm level as a result of a possible component failure.

– Warning Warning Contact Force10 ’s Technical Assistance Center (TAC).

LO-OPR: Optical power received exceeds low alarm threshold

sonet_ptp SFP optic alarm. as a result of a possible input level problem at the patch panel OR the need to clean the fibers.

– Warning Warning • Check receive input level at patch panel.

• Clean fibers if necessary.

LO-OPT: Optical power transmitted exceeds low alarm threshold

sonet_ptp SFP optic alarm. Set when TX Bias current is below low alarm level as a result of a possible component failure.

– Warning Warning Contact Force10 ’s Technical Assistance Center (TAC).

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 81: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-75

LO-TEMP: Internal temp exceeds low alarm threshold

sonet_ptp SFP optic alarm. Set when internal temperature is below low alarm level as a result of a possible component failure.

– Warning Warning Contact Force10 ’s Technical Assistance Center (TAC).

LO-VCC: Internal voltage exceeds low alarm threshold

sonet_ptp SFP optic alarm. Set when internal supply voltage is below low alarm level as a result of a possible component failure.

– Warning Warning Contact Force10 ’s Technical Assistance Center (TAC).

LOA: Loss of Alignment eoseopsdh_eos te206 node

Differential Delay exceeded on active EOS member.

SA Critical Critical Check the EOS or EOP member status to determine which paths have exceeded the delay and reroute them.

LOCKOUT: Lockout automatic protection switching

shelf te206 node

A lockout protection switch command has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCKOUT-LPS: Lockout of Protection Ring

shelf A lockout protection ring command has been performed on a BLSR protection ring.

– Warning Warning Clear “Lockout Protection Ring” from the BLSR protection group.

LOCK_WORK1: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK10: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 82: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-76Force10 N

etworks

Release O

PS4.2.3

LOCK_WORK11: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK12: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK13: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK14: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK2: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK3: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 83: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-77

LOCK_WORK4: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK5: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK6: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK7: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK8: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCK_WORK9: Lockout automatic protection switching

shelf A lockout protection switch command has been performed on a working module in a 1:N Transmux equipment protection group.

– Warning Warning If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 84: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-78Force10 N

etworks

Release O

PS4.2.3

LOF: Loss of frame ds1_ptpds3_ptp(ds_ptp)e1_ptpe3_ptpeop eop_ctp ta200te50

Framing problem on the incoming signal.

SA Critical Critical Inspect all facilities related to the STS link.

Check remote sites for module removal/failure alarms.

Check the cable and interface.

ethernet_ptp Generic Framing Procedure (GFP) framing problem on the incoming bit stream.

SA Major Major Inspect all facilities related to the STS Bundle.

Check remote sites for module removal/failure alarms or disabled Ethernet transmitter.

Check the cable and interface.

shelf Framing problem on the incoming BITS.

– Minor Minor Inspect all facilities related to the BITS.

Check remote sites for BITS alarms.

Check the cable connection.

sonet_ptpsdh_ptp te206 node

Framing problem on the incoming OC-N signal.

On TE-206, framing problem on the incoming and outgoing OC-N signal.

SA Critical Minor Inspect all facilities related to the OC-N link.

Verify the local receive optical levels, as well as the upstream transmit optical levels.

Clean the optical connectors.

Check the upstream node for OC-N module failure/removal.

Verify good optical connections to the local and far-end OC-N modules.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 85: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-79

LOG: Loss of Group eopsdh_eos

Loss of Group. SA Critical Critical Check the paths associated with the EOS or EOP members for alarms.

LOGINFAIL: Login failed servershelf

Login attempt has failed. – Info Info • Try again.• Check the login log; contact your

system administrator – persistent login failures could indicate possible hacking.

LOGINSUCC: Login successful servershelf

Login has succeeded. – Info Info Informational; no action required.

LOGINTERM: Login terminated

servershelf

Login has terminated. – Info Info Informational; no action required.

LOL: Loss of link te50 SA Critical Critical

LOM1: Loss of Multiframe, Rx path

ethernet_ptpsdh_ptpshelfeopeop_ctpte206 node

Unused on Traverse.

For TE-206 nodes, this is Loss of Multiframe on Transmit.

SA Critical Minor Unused on Traverse.

te50 SA Warning Warning

LOMCRC: Loss of Multiframe, CRC

eopeop_ctp

Loss of Multiframe CRC on the incoming signal

SA Warning Warning This is an EOP member alarm for E1 port members only. Informational: indicates an incoming LOM condition.

LOM-P: Loss of Multiframe synchronization - STS

eoseos_ctp

An error is detected in the paths multiframe indicator.

SA Critical Critical This is an eos_ctp member alarm. If not using LCAS, check that the EOS member order matches that of the remote EOS.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 86: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-80Force10 N

etworks

Release O

PS4.2.3

LOM-V: Loss of Multiframe synchronization - VT

eoseos_ctpeop_ctp

An error is detected in the path’s multiframe indicator.

SA Critical Critical This is an eos_ctp or eop_ctp member alarm. If not using LCAS, check that the EOS or EOP member order matches that of the remote EOS or EOP.

Note: This alarm does not apply for Gigabit Ethernet cards.

LOP-P: Loss of Pointer – Path ds3_ptp(ds_ptp)e3_ptpsonet_ptpsonet_sts te206 node

Valid H1/H2 pointer bytes are missing from the STS path overhead.

SA Critical Minor Check the cabling and physical connections on the reporting module.

Verify cross-connects.

Check network timing synchronization.

Verify that the expected bandwidth and received bandwidth are the same.

If the alarm persists, replace the module.

ethernet_ptp1 Valid pointer bytes are missing. SA Critical Minor Check the cabling and physical connections on the reporting module.

ta200te50

Valid pointer bytes are missing. SA Critical Critical Check the cabling and physical connections on the reporting module.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 87: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-81

LOP-V1: Loss of Pointer – VT ds1_ptpds3_ptp(ds_ptp)e3_ptpshelfsonet_ptpsonet_vtsonet_sts te206 node

Valid pointer bytes are missing from the VT overhead.

SA Critical Minor Check the cabling and physical connections on the reporting module.

Verify cross-connects.

Check network timing synchronization.

If the alarm persists, replace the module.

ta200te50

Valid pointer bytes are missing from the VT overhead.

SA Critical Critical Check the cabling and physical connections on the reporting module.

Verify cross-connects.

Check network timing synchronization.

If the alarm persists, replace the module.

sdh_ptp See TU-LOP. n/a n/a n/a See TU-LOP.

LOP-VC1: Loss of Pointer – VC e1_ptpsdh_ptp

Valid pointer bytes are missing from the VC overhead.

SA Critical Minor Check the cabling and physical connections on the reporting module.

Verify cross-connects.

Check network timing synchronization.

If the alarm persists, replace the module.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 88: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-82Force10 N

etworks

Release O

PS4.2.3

LOS: Loss of signal ds1_ptpds3_ptp(ds_ptp)e1_ptpe3_ptpta200te50

• Loss of signal on a port interface input.

• The cabling may not be correctly connected to the module, or no signal exists on the line.

• Upstream equipment failure or cable cut may cause this alarm.

SA Critical Critical Check the cable and interface.

Verify that the port is in service.

Use a test set to confirm that a valid signal exists on the line.

shelf Loss of signal on BITS 1 or 2. – Minor Minor Check the cable and interface.

sonet_ptpsdh_ptpte206 node

• OC-N loss of signal. • Fiber may not be correctly

connected to the module, or no signal exists on the line.

• Upstream equipment failure or fiber cut may cause this alarm.

SA Critical Minor Check the upstream node for OC-N module failure/removal.

Check the fiber connection.

Verify the receive optical levels.

Verify good optical connections to the local and far-end OC-N modules.

LP-BERSD: Bit error rate signal degrade - Low order Path

sdh_hpsdh-lpsdh_ptp

The STM signal demultiplexed and dropped from the STM-N has exceeded its signal degrade threshold.

– Warning Warning Examine the network for other low order path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 89: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-83

LP-BERSF: Bit error rate signal degrade - Low order Path

sdh_hpsdh-lpsdh_ptp

The STM signal demultiplexed and dropped from the STM-N has exceeded its signal fail threshold.

– Warning Warning Examine the network for other low order path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

If an STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

LPBKEQPT: Equipment loopback active

ds1_ptpds3_ptpe1_ptpethernet_ptpsdh_ptpsonet_ptp

Equipment is in active loopback state.

– Warning Warning Validate this state.

Clear loopback, as required.

LPBKFACILITY: Facility loopback active

ds1_ptpds3_ptpe1_ptpe3_ptp eopeop_ctpethernet_ptpsdh_ptpshelfsonet_ptp te206 node

Facility is in active loopback state.

– Warning Warning Validate this state.

Clear loopback, as required.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 90: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-84Force10 N

etworks

Release O

PS4.2.3

LPBKINBAND: Inband loopback active

ds3_ptpeop eop_ctp

An inband loopback is active. – Warning Warning Validate this state. On EOP ports, occurs on DS1 and DS3 members only.

Clear loopback, as required.

LPBKTERM: Terminal loopback active

ds1_ptpds_ptpe1_ptpe3_ptpethernet_ptpsdh_ptpshelfsonet_ptp te206 node

A terminal loopback is active. – Warning Warning Validate this state.

Clear loopback, as required.

LP-LOM: Low order path Loss of multiframe synchronization

sdh_eos sdh_eos_ctp

An error is detected in the paths multiframe indicator.

SA Critical Critical This is an eos_ctp member alarm.

If not using LCAS, check that EOS member order matches that of the remote EOS.

Note: This alarm does not apply for Gigabit Ethernet cards.

LP-MND: Low order path Member not de-skewable

sdh_eos sdh_eos_ctp

Differential Delay exceeded on EOS member and the member was removed from the group.

SA Critical Critical This is an eos_ctp member alarm.

Check the EOS member status to determine which paths have exceeded the delay and reroute them.

Note: This alarm does not apply for Gigabit Ethernet cards.

LP-PLM: Payload label mismatch received - Low order Path

sdh_hpsdh-lpsdh_ptp

• Invalid byte in the Low Order path overhead.

• The payload does not match what the signal label is reporting.

SA Critical Minor Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 91: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-85

LP-RDI: Remote Defect Indication - Low order Path

sdh_hpsdh-lpsdh_ptp

Valid STM-N framing is not detected or AU-AIS is received from the source.

– Warning Warning Check STM-N framing source.See AU-AIS.

LP-RFI: Remote Failure Indication - Low order Path

sdh_hpsdh-lpsdh_ptp

• The signal demultiplexed from the STM-N contains a remote failure indication.

• The far-end node has detected path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms from the far-end node.

LP-RFICON: Remote failure indication, connectivity defect - Low order Path

sdh_hpsdh-lpsdh_ptp

Far end path has an LP-UNEQ or LP-TIM alarm.

– Warning Warning Verify your payload connections.

Check for far end alarms, especially LP-UNEQ and LP-TIM.

Refer to the recommended actions for LP-UNEQ and LP-TIM.

LP-RFIPAY: Remote failure indication, payload defect - Low order Path

sdh_hpsdh-lpsdh_ptp

Far end path has a LP-PLM alarm.

– Warning Warning Verify your payload connections.

Check for far end alarms, especially LP-PLM.

Refer to the recommended actions for LP-PLM.

LP-RFISVR: Remote failure indication, server defect - Low order Path

sdh_hpsdh-lpsdh_ptp

Far end path has an AU-AIS or AU-LOP alarm.

– Warning Info Verify your payload connections.

Check for far end alarms, especially AU-AIS and AU-LOP.

Refer to the recommended actions for AU-AIS and AU-LOP.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 92: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-86Force10 N

etworks

Release O

PS4.2.3

LP-SQM: Low order path Sequence ID mismatch

sdh_eossdh_eos_ctp

The member sequence number is in error.

SA Critical Critical If non-LCAS, check that the order of members in the remote EOS matches the local order.

Note: This alarm does not apply for Gigabit Ethernet cards.

LP-TIM: Trace identifier mismatch - Low order Path

ssdh_hpsdh-lpsdh_ptp

The expected path trace string does not match the received path trace string.

SA Critical Minor Check configuration of path source or cross-connect.

Match the path trace string on both ends of the path.

LP-UNEQ: Unequipped - Low order Path

sdh_hpsdh-lpsdh_ptp

No payload is received on an activated service.

SA Critical Minor Check your connection.

Connect your proper payload.

Check the service source.

LSDBOVFL1: Exceeded maximum number of LSAs

shelf Unused. – Minor Minor Unused.

LSM1: Loss of sync message shelf Unused. – Minor Minor Unused.

LWBATVG: Battery is low shelf The battery is low. – Minor Minor Recharge the battery.

LWFUEL: Low fuel shelf The fuel level is low. – Minor Minor Refuel.

LWHUM: Low humidity shelf The humidity is low. – Minor Minor Check your method of procedures.

LWPRES: Low cable press shelf Cable pressure is low. – Minor Minor Check your method of procedures.

LWTEMP: Low temperature shelf The temperature is too low. – Minor Minor Check the environment for temperature drop.

Check your method of procedures.

LWWTR: Low water shelf The water level is too low. – Minor Minor Check your method of procedures.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 93: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-87

MANUAL: Manual protection switching

shelte206 node

A manual protection switch has been executed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Info Info Informational; no action required.

MAN_ON_PROT: Manual protection switching

shelfte206 node

A manual protection switch has been executed on the protecting port of a protection group.

– Info Info Informational; no action required.

MAN_ON_WORK: Manual protection switching

shelfte206 node

A manual protection switch has been executed on a working port of a protection group.

– Info Info Informational; no action required.

MAN-TX-OFF: Transmitter manually disabled

ethernet_ptpsdh_ptpsonet_ptp

Operator disabled the optical laser.

– Info Info Informational; no action required.

MAN-TX-ON: Transmitter manually enabled

ethernet_ptpsdh_ptpsonet_ptp

Operator enabled the optical laser.

– Info Info Informational; no action required.

MAXAGE1: Maximum age shelf Unused. – Minor Minor Unused.

MISC: Misc (default) shelf – Minor Minor

MND: PDH member not de-skewable.

eop eop_ctp

Differential Delay exceeded on EOP member; the member was removed from the group.

SA Critical Minor This is an eop and eop_ctp member alarm. Check the EOP member status to determine which paths have exceeded the delay and reroute them.

MND-P: Member not de-skewable - STS

eoseos_ctp

Differential Delay exceeded on EOS member and the member was removed from the group.

SA Critical Critical This is an eos_ctp member alarm. Check the EOS member status to determine which paths have exceeded the delay and reroute them.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 94: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-88Force10 N

etworks

Release O

PS4.2.3

MND-V: Member not de-skewable - VT

eoseos_ctp

Differential Delay exceeded on EOS member and the member was removed from the group.

SA Critical Critical This is an eos_ctp member alarm. Check the EOS member status to determine which paths have exceeded the delay and reroute them.

Note: This alarm does not apply to Gigabit Ethernet cards.

MPU_BATTERY_A: Battery A alarm

ta200 SA Critical Critical

MPU_BATTERY_B: Battery B alarm

ta200 SA Critical Critical

MS-AIS: Alarm Indication Signal - Multiplex Section

sdh_ptp An upstream failure occurred at the multiplex section layer.

SA Critical Minor Check the equipment upstream.

Clear upstream alarms.

Verify your multiplex section payload connections.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 95: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-89

MS-BERSD: BER signal degrade - Multiplex Section

sdh_ptp • The BER on the incoming STM-N line has exceeded the signal degrade threshold.

• A connector in the STM-N optical link could be dirty.

• An STM-N module hardware problem could exist.

• Fiber could be bent or damaged.

– Critical Minor Verify the local receive optical levels, as well as the upstream transmit levels.

Verify good optical connections.

Clean optical cable connectors and module ports.

If an STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Check the remote (source) Transmit and fiber connection.

Check fiber for bends or damage.

If the problem persists, contact Force10 ’s Technical Assistance Center (TAC).

MS-BERSF: BER signal fail - Multiplex Section

sdh_ptp • The BER on the incoming STM-N line has exceeded the signal fail threshold.

• A connector in the STM-N optical link could be dirty.

• An STM-N module hardware problem could exist.

• Fiber could be bent or damaged.

– Critical Minor Verify the local receive optical levels, as well as the upstream transmit levels.

Verify good optical connections.

Clean optical cable connectors and module ports.

If an STM-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Check the remote (source) Transmit and fiber connection.

Check fiber for bends or damage.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 96: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-90Force10 N

etworks

Release O

PS4.2.3

MS-RDI: Remote Defect Indicator - Multiplex Section

sdh_ptp Valid STM-N framing is not detected or MS-AIS is received from the source.

– Warning Warning Check STM-N framing source.See MS-AIS.

MSSP_NOT_SYNC: MS-SP Ring synchronization failure

server One of the nodes in the MS-SP Ring is out of sync with the other nodes in the ring possibly due to invalid K bytes.

SA Critical Critical • Check for OC-N module failures.• Examine the incoming SONET

overhead with an optical test set to confirm inconsistent or invalid K bytes.

MSSP_SYNC_UNKNOWN: Unknown error

server MSSP ring synchronization status is unknown.

– Warning Warning Issue sync command to resynchronize the ring.

MULT_PRIMARY_SERVER server There are multiple primary servers discovered. Only one primary server is allowed.

SA Major Warning Restore the environment to one primary server.

NEIGHSC1 shelf Unused. – Minor Minor Unused.

NETSYNC: Network object synchronization failure

server Master network objects (e.g., alarm profiles) are out of synchronization with propagated node objects.

– Warning Warning Resynchronize using the TransNav GUI.

NEWLSA1 shelf Unused. – Minor Minor Unused.

NO_OUTPUT: Output Signal Activity Failure

ta200 SA Critical Critical

NO_PRIMARY_SERVER: No primary TransNav server

server The primary server was not found.

SA Major Warning Check connectivity.

If no primary server in the network, set up a primary server in the network environment.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 97: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-91

NODEEQMIS: Node equipment mismatch

server Server-Agent equipment mismatch.

SA Critical Critical Determine if the TransNav server or the node contains the correct module configuration.

If the TransNav server contains the correct module configuration, use the node-level CLI to lock, restart, and delete the module. The alarm should be deleted.

If the node contains the correct module configuration, delete the node.

During autodiscovery, the correct information will be forwarded to the TransNav server and the alarm should be deleted.

NODEIDMIS: Node ID mismatch

sonet_ptpsdh_ptp

The node ID selected is already in use.

– Minor Minor Check all node IDs. Verify that they are each unique.

NODESYNC: Node synchronization

server • Discovery of and synchronization with a new node.

• GCM protection switch.

– Warning Warning • Wait for node synchronization to complete.

• Check network server connections.

NO-REMOTE-LCAS: No remote LCAS

eos eopsdh_eosshelf

The remote peer does not have LCAS capability or the capability is undetermined.

– Warning Warning Enable LCAS on the remote nodes’ EOS or EOP.

Check remote peer configuration, capability, and connectivity.

NPM: No provisioned members eoseopsdh_eoslag

No members have been provisioned.

SA Critical Critical Add CTP members to the EOS or EOP port.

Add ports to the LAG.

OSPF-AIMM: OSPF Area ID Mismatch

te206 node The OSPF Area configuration does not match the configuration of other routers in the network.

Info Configure OSPF Area to be consistent in the network.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 98: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-92Force10 N

etworks

Release O

PS4.2.3

OSPF-DIMM: OSPF Router Dead Interval Mismatch

te206 node Info

OSPF-HIMM: OSPF Hello Interval Mismatch

te206 node Info

OPENDR: Door open shelf A door is open in the environment.

– Minor Minor Validate that the door should be open.

Close the door, as necessary.

OPR: Optical power received threshold violation

ethernet_ptpsdh_ptpsonet_ptpshelf

Received optical power does not meet guaranteed value.

– Warning Warning Check interface.

OPT: Optical power transmitted threshold violation

ethernet_ptpsdh_ptpsonet_ptpshelf

Current is outside guaranteed bounds.

For Ethernet only: brief generation of this alarm occurs after a 1:1 equipment PG protection switch because the transmit laser is off on the standby card prior to PG protection switch.

– Warning Warning Measure power level using optical power meter.

ORPNORM1: Optical receive power normalized threshold crossing alert

shelf Unused. – Warning Warning Unused.

OTPNORM1: Optical transmit power normalized threshold crossing alert

shelf Unused. – Warning Warning Unused.

OVERTEMP: Fan tray temperature has exceeded a maximum value

shelf Fan tray temperature has exceeded 56ºC.

– Minor Minor Check that the temperature of the room is not abnormally high.

Replace the fan tray air filter.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 99: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-93

OVERVOLTAGE_A1: Exceeded a maximum voltage value - Enhanced GCM_A

shelf GCM_A has triggered due to an over voltage condition.

The Enhanced GCM triggers the over-voltage alarm at -60.5 VDC. It clears this alarm at -58.5 VDC.

– Minor Minor Check power system, breaker, fuse, and related cabling for power input A.

OVERVOLTAGE_B1: Exceeded a maximum voltage value - Enhanced GCM_B

shelf GCM_B has triggered due to an over voltage condition.

The Enhanced GCM triggers the over-voltage alarm at -60.5 VDC. It clears this alarm at -58.5 VDC.

– Minor Minor Check power system, breaker, fuse, and related cabling for power input B.

PCASQLCH1: PCA channel squelched

sonet_ptpsdh_ptp

Extra traffic carried on protection channel(s) has been squelched due to a protection switch.

– Minor Minor Clear the protection switch.

Check equipment ring topology configuration.

PDI-n (P, n<2)1: Payload defect indicator

ds3_ptp(ds_ptp)e3_ptpsdh_hpsdh-lpsdh_ptpsonet_sts

Payload defect indication. SA Minor Minor Check cable connectors and module ports.

sonet_ptpsdh_ptp

Payload defect indication. – Minor Minor Clean the fiber connections.

PDI-n (1<n<5)1:Payload defect indicator

ds3_ptp(ds_ptp)e3_ptp

Payload defect indication. SA Major Minor For DS3/EC1 modules, check cable connectors and module ports.

sonet_ptpsdh_ptp

Payload defect indication. SA Major Minor For OC-N modules, clean the fiber connections.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 100: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-94Force10 N

etworks

Release O

PS4.2.3

PDI-n (n>4)1:Payload defect indicator

ds3_ptp(ds_ptp)e3_ptp

Payload defect indication. SA Critical Minor For DS3/EC1 modules, check cable connectors and module ports.

sonet_ptpsdh_ptp

Payload defect indication. SA Critical Minor For OC-N modules, clean the fiber connections.

PKTRETX1: An OSPF packet has been retransmitted

shelf Unused. – Minor Minor Unused.

PLC: Partial loss of capacity lag At least one port in the LAG is down.

SA Critical Critical At least one port in the LAG is down.

Check for proper cabling and that local and remote port configurations match.

PLCPLOF1: PLCP (Physical Layer Convergence Procedure) loss of frame

ds3_ptp(ds_ptp)e3_ptp

Unused. SA Critical Minor Unused.

PLCPRFI1: PLCP (Physical Layer Convergence Procedure) Remote Failure Indication

ds3_ptp(ds_ptp)e3_ptp

Unused. – Warning Info Unused.

PLCR: Partial loss of capacity - receive

eoseopsdh_eos

Capacity loss on path. SA Critical Critical Check the paths associated with the EOS and EOP members for alarms.

PLCT: Partial loss of capacity - transmit

eoseop sdh_eos

Capacity loss on path. SA Critical Critical Check the paths associated with the EOS or EOP members for alarms.

PLINESQL1: Persistent line squelching

sonet_ptpsdh_ptp

STS (high order) path on the reporting OC-N/STM-N line has been squelched to avoid a misconnection.

– Warning Warning Contact Force10 ’s Technical Assistance Center (TAC).

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 101: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-95

PLM:Payload label mismatch received

ds3_ptp(ds_ptp)e3_ptpsonet_ptpsonet_sts

• Invalid C2 byte (signal label byte) in the SONET path overhead.

• The payload does not match what the signal label is reporting.

SA Critical Minor Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

PLM-P: Path label mismatch ta200te50 te206 node

Payload label mismatch on the path.

– Warning Warning Verify that the payload is the same as the provisioned payload/service.

PLM-V: Payload label mismatch received

ds1_ptpds3_ptp(ds_ptp)e3_ptpshelfsonet_ptpsonet_vtsonet_stste206 node

• Invalid byte in the path overhead.

• The payload does not match what the signal label is reporting.

SA Critical Minor Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

te50 • Invalid byte in the path overhead.

• The payload does not match what the signal label is reporting.

– Warning Warning Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

PLM-VC: Payload label mismatch received - VC

e1_ptpsdh_ptp

• Invalid byte in the path overhead.

• The payload does not match what the signal label is reporting.

SA Critical Minor Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 102: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-96Force10 N

etworks

Release O

PS4.2.3

PMCFG: PM configuration error

ds3_ptp(ds_ptp)e1_ptpe3_ptpethernet_ptpsonet_ptpsdh_ptp

PM configuration is incorrect. – Warning Warning Check configuration.

PMDATALOST: Performance data lost

servershelf

PM data loss. – Info Info Informational; no action required.

POWER: Commercial power failure

shelf The commercial power source has failed.

– Minor Minor Check and follow your method of procedures.

PS: Automatic protection switch shelf An automatic protection switch has occurred.

– Info Info Check the equipment.

PUMPFAIL2: Pump failure shelf Pump has failed. – Minor Minor Check and follow your method of procedures.

PWFAIL-A: Power problem—power input A failed

shelfte206 node

GMT A fuse, cabling, circuit breaker, or power system unit has failed.

– Minor Minor Check power system, breaker, fuse, and related cabling for power input A.

PWFAIL-B: Power problem —power input B failed

shelf te206 node

GMT B fuse, cabling, circuit breaker, or power system unit has failed.

– Minor Minor Check power system, breaker, fuse, and related cabling for power input B.

PWR-48: 48 VDC power supply failure

shelfte206 node

Commercial fuse, cabling, circuit breaker, or power system unit has failed.

– Minor Minor Check and follow your method of procedures.

QEFAIL: Queue engine fail shelf Internal forwarding queue engine error.

SA Critical Critical Contact Force10 ’s Technical Assistance Center (TAC).

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 103: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-97

RAI eopeop_ctp

The far-end node has detected a framing problem on an incoming signal.

- Warning Warning Check the paths associated with the EOP members

RECTFAIL2: Rectifier failure shelf Rectifier has failed. – Minor Minor Check and follow your method of procedures.

RECTHIGH2: Rectifier high voltage

shelf Rectifier has high voltage. – Minor Minor Check and follow your method of procedures.

RECTLOW2: Rectifier low voltage

shelf Rectifier has low voltage. – Minor Minor Check and follow your method of procedures.

RMLF: Remote link failure lag A failure has occurred at the remote end of the link.

– Critical Critical Check the cable and configuration at the remote port.

REMOTE-LINKFAIL: Remote loss of client signal

ethernet_ptp Link Integrity enabled and indicating that the remote Ethernet port is down.

SA Critical Critical Check the cable and configuration at the remote port.

RESOURCE_MISMATCH: STSRM/VTRM Resource Mismatch

shelf An uncommon alarm. The resource mismatch may occur as a result of a non-active GCM controller condition. The management system configuration does not match that of the line card.

SA Critical Minor Contact Force10 ’s Technical Assistance Center (TAC).

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 104: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-98Force10 N

etworks

Release O

PS4.2.3

RFI-L: Remote failure indication – Line

ds3_ptp(ds_ptp)ta200te50

• The locally received EC-1 signal contains an RFI.

• The local EC-1 module is sending a bad signal to the remote node.

– Warning Warning Check module/port.

Check cable and connections.

Check for and resolve LOS, LOF, and AIS alarms in the far-end node.

sonet_ptpte206 node

• The locally received OC-N signal contains an RFI.

• The local OC-N module is sending a bad OC-N signal to the remote node.

• The far-end OC-N module has failed.

– Warning Warning Check module/port.

Check for and resolve LOS, LOF, and AIS-L alarms in the far-end node.

Verify the output of the local OC-N module for level degradation/dirty optical connectors.

Clean the optical connectors.

Check the fiber connection on adjacent equipment.

RFI-P: Remote failure indication – Path

ds3_ptp(ds_ptp)e3_ptp1

ta200te50

The signal demultiplexed from the EC-1 contains an RFI.

The far-end node has detected path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms such as LOP-P, AIS-P, PLM-P, TIM-P, and UNEQ-P from the far-end node.

sonet_ptp sonet_sts te206 node

The STS-1 signal demultiplexed from the OC-N contains an RFI-P.

The far-end node has detected path defects coming from the local site.

SA Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms such as LOP-P, AIS-P, and UNEQ-P from the far-end node.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 105: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-99

RFI-V: Remote failure indication

ds1_ptpds3_ptp(ds_ptp)sonet_ptpsonet_vtsonet_stsshelfta200te50te206 node

The VT signal demultiplexed from the DS1 contains an RFI-V.

The far-end node has detected VT path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms such as LOP-P, AIS-P, PLM-P, TIM-P, and UNEQ-P from the far-end node.

e3_ptp1

sdh_ptpThe low order signal demultiplexed from the STM contains an RFI-V.

The far-end node has detected low order path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms such as LOP-V, AU-AIS, LP-PLM, LP-TIM, and LP-UNEQ from the far-end node.

RFI-VC: Remote failure indication

e1_ptpsdh_ptp

• The low order signal demultiplexed from the STM contains an RFI-VC.

• The far-end node has detected low order path defects coming from the local site.

– Warning Warning Determine the defects found at the far-end node.

Verify your payload connections.

Clear path alarms such as LOP-V, AU-AIS, LP-PLM, LP-TIM, and LP-UNEQ from the far-end node.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 106: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-100Force10 N

etworks

Release O

PS4.2.3

RFICON: Remote failure indication – Connectivity defect

ds3_ptp(ds_ptp)sonet_ptpsonet_sts

Far end path has an UNEQ-P or TIM-P alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially UNEQ-P and TIM-P.

Refer to the recommended actions for UNEQ and TIM.

e3_ptpsdh_ptp

Far end path has an UNEQ-P or TIM-P alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially UNEQ-P and TIM-P.

Refer to the recommended actions for UNEQ-P and TIM-P.

RFICON-V: Remote failure indication – Connectivity defect

ds1_ptpds3_ptp(ds_ptp)shelfsonet_ptpsonet_vtsonet_sts

Far-end VT path has an UNEQ-V or TIM-P alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially UNEQ-V and TIM-V.

Refer to the recommended actions for UNEQ and TIM.

e3_ptpsdh_ptp

Far end VC path has an LP-UNEQ or LP-TIM alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially LP-UNEQ and LP-TIM.

Refer to the recommended actions for LP-UNEQ and LP-TIM.

RFICON-VC: Remote failure indication – Connectivity defect

e1_ptpsdh_ptp

Far-end VC path has an LP-UNEQ or LP-TIM alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially LP-UNEQ and LP-TIM.

Refer to the recommended actions for LP-UNEQ and LP-TIM.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 107: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-101

RFIPAY: Remote failure indication – Payload defect

ds3_ptp(ds_ptp)sonet_ptpsonet_sts

Far end path has a PLM-P alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially PLM-P.

Refer to the recommended actions for PLM.

e3_ptpsdh_ptp

Far end path has a HP-PLM alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially HP-PLM.

Refer to the recommended actions for HP-PLM.

RFIPAY-V: Remote failure indication – Payload defect

ds1_ptpds3_ptp(ds_ptp)shelfsonet_ptpsonet_vtsonet_sts

Far end path has a PLM-V alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially PLM-V.

Refer to the recommended actions for PLM.

e3_ptpsdh_ptp

Far end path has a LP-PLM alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially LP-PLM.

Refer to the recommended actions for LP-PLM.

RFIPAY-VC: Remote failure indication – Payload defect

e1_ptpsdh_ptp

Far end path has a LP-PLM alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially LP-PLM.

Refer to the recommended actions for LP-PLM.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 108: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-102Force10 N

etworks

Release O

PS4.2.3

RFISVR: Remote failure indication – Server defect

ds1_ptpds3_ptp(ds_ptp)sonet_ptpsonet_sts

Far end path has an AIS-P or LOP-P alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially AIS-P and LOP-P.

Refer to the recommended actions for AIS-P and LOP-P.

e3_ptpsdh_ptp

Far end path has an AIS-P or LOP-P alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially AIS-P and LOP-P.

Refer to the recommended actions for AIS-P and LOP-P.

RFISVR-V: Remote failure indication – Server defect

ds1_ptpds3_ptp(ds_ptp)shelfsonet_ptpsonet_vtsonet_sts

Far end path has an AIS-V or LOP-V alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially AIS-V and LOP-V.

Refer to the recommended actions for AIS-V and LOP-V.

e3_ptpsdh_ptp

Far end path has an TU-AIS or TU-LOP alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially TU-AIS and TU-LOP.

Refer to the recommended actions for TU-AIS and TU-LOP.

RFISVR-VC: Remote failure indication – Server defect

e1_ptpsdh_ptp

The far end path has a TU-AIS or TU-LOP alarm.

SA Warning Info Verify your payload connections.

Check for far end alarms, especially TU-AIS and TU-LOP.

Refer to the recommended actions for TU-AIS and TU-LOP.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 109: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-103

RFLF: Remote Line Failure te206 node The far end GbE interface is detecting a loss of signal.

Info Info Check the GbE fiber.

RMTLOOP: FEAC Loopback and FDL Loopback

te206 node The far end DS3 interface has initiated a remote loopback using the FEAC channel or the FDL channel.

Informational only. No action required.

RLSD: Receive Line Signal Detect on MPS IM

te50 Line signal not detected. SA Critical Critical Check connectivity and configuration at the remote end.

RS-TIM: Trace identifier mismatch

sdh_ptp The expected path trace string does not match the received path trace string.

SA Critical Minor Check configuration of path source or cross-connect.

Match the path trace string on both ends of the path.

RTS: Request to send on MPS IM

te50 Request to send not present. SA Critical Critical Check connectivity and configuration.

SENSORFAIL: Thermal sensor failure

shelf The thermal sensor on a line or control module has failed.

– Major Major Check that the temperature of the room or equipment is not abnormally high.

Contact Force10 ’s Technical Assistance Center (TAC) for assistance if the temperature is normal and this failure persists.

SERVER_LOGINFAIL: Server login to node failed

server Node login authentication failed.

– Critical Critical • Try again.• Contact your system administrator –

persistent login failures could indicate possible hacking.

SERVER_ROLE servershelf

Event identifies the server role as primary or secondary.

– Info Info Informational; no action required.

SETOPER: Set operation performed

servershelf

A set operation has been performed.

– Info Info Informational; no action required.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 110: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-104Force10 N

etworks

Release O

PS4.2.3

SFO1: Sync frequency offset ds3_ptp(ds_ptp)sonet_ptp

EC-1 or SONET facility timing. – Minor Minor Check timing signal quality.

e3_ptpsdh_ptp

SONET facility timing. – Minor Minor Check timing signal quality.

SFPFAIL: SFP Fault te206 node A fault has been detected with the SFP.

Critical Minor Replace the faulty SFP.

SFPMIS: SFP mismatch ethernet_ptpsdh_ptpsonet_ptpshelfte206 node

There is a mismatch on the SFP interface.

– Critical Minor Check interface.

SFPRMV: SFP removed ethernet_ptpsdh_ptpsonet_ptpshelf

The SFP has been removed. – Critical Minor Check interface.

SFP-UNKNOWN: ? te206 node An SFP has been detected that is not certified for use with the system.

SA Critical Minor Replace the unknown SFP with a Force10 certified SFP.

SHELFMIS: Shelf type mismatch

server The PreProvision shelf type does not match the actual shelf type.

– Warning Warning Delete the node. During autodiscovery, the correct node type should be discovered.

SMOKE2: Smoke detected shelf Smoke detected. – Minor Minor Check and follow your method of procedures.

SNTP-FAIL te206 node The TE-206 node cannot communicate with the SNTP server.

Check the availability of the SNTP server.

Verify the TE-206 SNTP configuration.

Verify network connectivity from the TE-206 to the SNTP server.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 111: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-105

SQLCHTBL1: Squelch table mismatch

sonet_ptpsdh_ptp

• Alarm is raised as a circuit is being added to or deleted from a BLSR.

• May also be caused by incomplete provisioning of the STS channels.

– Minor Minor If a circuit is being added, the alarm will clear after the circuit has been completely built into the ring by adding all the necessary cross-connections.

Be sure that the STS channels have been properly provisioned. Check equipment ring topology configuration.

SQM1: Sequence number change

ethernet_ptpshelfeopeop_ctp te206 node

Unused for Traverse.

The TE-206 member sequence number is in error.

SA Critical Minor Unused for ethernet_ptp and shelf.

Member alarm for virtual concatentation faults on EOP members.

SQM-P: Sequence ID mismatch- STS

eoseos_ctp

The member sequence number is in error.

SA Critical Critical This is an eos_ctp member alarm. If non-LCAS, check that the order of members in the remote EOS matches the local order.

SQM-V: Sequence ID mismatch- VT

eoseos_ctp

The member sequence number is in error.

SA Critical Critical This is an eos_ctp member alarm. If non-LCAS, check that the order of members in the remote EOS matches the local order.

Note: This alarm does not apply to Gigabit Ethernet cards.

SSF: Server Signal Fail shelf All LCAS VC bundle members have failed. Also see path alarms for each VC bundle member (facility). The VC bundle operational state is set to Disabled until at least one member returns.

SA Critical Minor • Inspect all VC bundle facilities.• Check remote sites for module

removal/failure alarms or disabled Ethernet transmitter.

• Check the cables and interfaces.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 112: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, L through S

Page 1-106Force10 N

etworks

Release O

PS4.2.3

SUM-V: VT Alarm Summary te206 node One or more alarms exists for VT paths within the STS-1.

Critical Minor Check the conditions of the VT paths within the STS-1.

SVC_STATUS1: Service status report

servershelf

Unused. – Info Info Unused.

SWCRPT: Software corruption servershelf

Software did not load or loaded with errors.

SA Critical Minor Contact Force10 ’s Technical Assistance Center (TAC).

SWERR: Software error all objects The software has detected an unexpected error.

– Info Info Contact Force10 ’s Technical Assistance Center (TAC).

SWITCH1: Pointer switch ethernet_ptp Unused. SA Critical Minor Unused.

SWITCH_TO_PROT: Traffic switch to Protection

shelf te206 node

Traffic has switched to the standby module, port, or channel for a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Info Info Informational; no action required.

SWITCH_TO_SECT1: Traffic switch on optimized 1+1 APS working section 1

shelf Traffic has switched on the optimized 1+1 APS bi-directional working section 1.

Note: Section 1 and 2 are equal working sections, each with a permanent traffic bridge.

– Info Info Informational; no action required.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 113: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, L through S

Release O

PS4.2.3Force10 N

etworks

Page 1-107

SWITCH_TO_SECT2: Traffic switch on optimized 1+1 APS working section 2

shelf Traffic has switched on the optimized 1+1 APS bi-directional working section 2.

Note: Section 1 and 2 are equal working sections, each with a permanent traffic bridge.

– Warning Warning • Verify that the switch was expected.• Check the switch-from section for

degraded performance or other relevant alarm conditions.

SWITCH_TO_WORK: Traffic switch to Working

shelf te206 node

Traffic has switched to the working module, port, or channel for a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Warning Warning • Verify that the switch was expected.• Check the switch-from section for

degraded performance or other relevant alarm conditions.

SWMIS: Software version mismatch

all objects te206 node

The reporting module is not running with the same software version as the active GCM.

– Minor Minor Reinstall correct software.

SW_UPG: Software upgrade shelf Software upgrade event is in process.

– Info Info Informational; no action required.

SW_UPG_PROG shelf Software upgrade is in progress. – Info Info Informational; no action required.

SYSREF: System reference lock failed

shelf te206 node

Lock on system reference is lost. – Critical Critical Check system reference.

SYSREF_EVENT: System lost reference lock

shelf System lost reference lock. – Info Info Check for SYSREF alarm.

SYNCFAIL2: Synchronization reference failure

sonet_ptpsdh_ptp

OC-N facility timing. SA Minor Minor Check timing signal quality.

1 Not supported in this release.2 Environmental alarm inputs are customized by each operator.

Table 1-10 Alarms, Events and Recommended Actions, L through S (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA(Protected)

Page 114: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, T through TZ

Page 1-108Force10 N

etworks

Release O

PS4.2.3

Alarms/Events, T through TZ

Table 1-11 Alarms, Events and Recommended Actions, T through TZ

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

TCA: Threshold crossing alert ds1_ptpds3_ptp(ds_ptp)e3_ptpethernet_ptpsonet_ptpsdh_ptp te206 node

A threshold crossing alert can be generated for each port PM parameter. The PM parameter is displayed in the Description column of the Events tab. For a list of PM parameters, see Section 2—Performance Monitoring, Chapter 1—“Managing Performance.”

For a list of corresponding TE-206 alarms, see Alarms/Events, TE-206, page -89

– Info Info Check PM for the integrity of the communications channel.

TEMP: Internal temperature threshold violation

ethernet_ptpsdh_ptpsonet_ptpshelf

Temperature is too great. – Warning Warning Card overtemp. Check fans and filter.

TEMPCRIT: Temperature critical

shelf A module’s temperature has exceeded 65ºC.

– Minor Minor Check the fan tray for proper functioning. Replace as necessary.

TEMPWARN: Temperature warning

shelf A module’s temperature has exceeded 59ºC.

– Minor Minor Check the fan speed change. The alarm should clear once the fan speed changes.

TIM: Trace identifier mismatch ds3_ptp(ds_ptp)e3_ptpsonet_ptpsdh_ptp

The expected path trace string (J1 byte in the path overhead) does not match the received path trace string.

SA Critical Minor Check configuration of path source or cross-connect.

Match the path trace string on both ends of the path.

Page 115: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, T through TZ

Release O

PS4.2.3Force10 N

etworks

Page 1-109

TIM-P: Trace identifier mismatch - Path

e3_ptpsonet_ptpsonet_sts te50 te206 node

The expected path trace string does not match the received path trace string.

SA Critical Minor Check configuration of path source or cross-connect.

Match the path trace string on both ends of the path.

TIM-S: Trace identifier mismatch - Section

e3_ptpsonet_ptpte50

The expected section trace (J0 byte) string does not match the received section trace string.

SA Critical Minor Check configuration of section source or cross-connect.

Match the section trace string at each end.

TIM-V: Trail trace mismatch - VT

ds1_ptpds3_ptp(ds_ptp)e3_ptpshelfsdh_ptpsonet_ptpsonet_vtsonet_stste50

The expected VT trail trace (J2 byte) string does not match the received VT trail trace string.

SA Critical Minor Check configuration of VT trail trace source or cross-connect.

Match the VT trail trace string at each end.

TIU-V: Trail trace unstable -VT ds1_ptpds3_ptp(ds_ptp)e3_ptpsdh_ptpsonet_ptpsonet_vtsonet_sts

The expected VT trail trace string match at received VT trail trace string is unstable.

SA Critical Minor Check configuration of VT trail trace source or cross-connect.

Match the VT trail trace string at each end.

TIMEDOUT: Session terminated

servershelf

The user session has been idle for two hours.

– Info Info Start a new user session.

Table 1-11 Alarms, Events and Recommended Actions, T through TZ (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 116: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, T through TZ

Page 1-110Force10 N

etworks

Release O

PS4.2.3

TIMEOUTWARN: Session terminate warning

servershelf

The user session has been idle for 1 hour and 55 minutes; the session will terminate in 5 minutes.

– Info Info Perform a user action to stop session termination.

TIU-V: Trail trace mismatch - VT

shelf VT trail trace mismatch. SA Critical Minor Check trace configuration at each end.

TLC: Total loss of capacity lag All ports in the LAG are down. SA Critical Critical Check for proper cabling and that local and remote port configurations match.

TLCR: Total loss of capacity - receive

eos eop [sdh_eos

Total capacity lost. SA Critical Critical Check the ingress transport link for alarms. Check the paths associated with the EOS or EOP members for alarms.

TLCT: Total loss of capacity - transmit

eos eop sdh_eos

Total capacity lost. SA Critical Critical Check the ingress transport link for alarms. Check the paths associated with the EOS or EOP members for alarms.

TOOMANYEVENTS: Too many events in the server

server Server event log too large. – Critical Critical Clear event log.

TOPOMIS: Topology mismatch sonet_ptpsdh_ptp

Topology is mismatched. – Minor Minor Check topologies.

TOXIC1: Toxic gas detected shelf Toxic gas detected. – Minor Minor Check and follow your method of procedures

TSS-ABS-DIFF: Timing internal clock failure

shelf NSA Major Major

TSS-EXT-LOCK: Timing external source lock failed on standby

shelf NSA Major Major

TSS-EXT-MAX: Timing external source PPM offset exceeds acceptable range

shelf NSA Major Major

Table 1-11 Alarms, Events and Recommended Actions, T through TZ (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 117: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, T through TZ

Release O

PS4.2.3Force10 N

etworks

Page 1-111

TSS-EXTA-OOB-A: Controller A EXT A - Out of Band

shelf Controller A EXT A reference is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-EXTA-OOB-B: Controller B EXT A - Out of Band

shelf Controller B EXT A reference is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-EXTB-OOB-A: Controller A EXT B - Out of Band

shelf Controller A EXT B reference is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-EXTB-OOB-B: Controller B EXT B - Out of Band.

shelf Controller B EXT B reference is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-FRC: Forced protection switching on timing

shelf te206 node

A forced protection switch command has been performed on the BITS or line timing source.

– Warning Warning If the reason for executing the forced switch no longer exists, clear the switch command.

TSS-FREERUN-GCMA: GCM is in freerun mode

shelf No timing references found. Defer to freerun mode.

– Warning Warning Check timing references.

TSS-FREERUN-GCMB: GCM is in freerun mode

shelf No timing references found. Defer to freerun mode.

– Warning Warning Check timing references.

TSS-HOLDOVER-GCMA: GCMA in holdover state awaiting a reference

shelf te206 node

There are no available external references so the GCMA is referencing the local oscillator.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-HOLDOVER-GCMB: GCMB in holdover state awaiting a reference

shelf te206 node

There are no available external references so the GCMB is referencing the local oscillator.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

Table 1-11 Alarms, Events and Recommended Actions, T through TZ (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 118: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, T through TZ

Page 1-112Force10 N

etworks

Release O

PS4.2.3

TSS-LINE1-OOB-GCMA: GCMA Line Ref 1 - Out of Band

shelf GCMA Line Reference 1 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE1-OOB-GCMB: GCMB Line Ref 1 - Out of Band

shelf GCMB Line Reference 1 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE2-OOB-GCMA: GCMA Line Ref 2 - Out of Band

shelf GCMA Line Reference 2 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE2-OOB-GCMB: GCMB Line Ref 2 - Out of Band

shelf GCMB Line Reference 2 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE3-OOB-GCMA: GCMA Line Ref 3 - Out of Band

shelf GCMA Line Reference 3 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE3-OOB-GCMB: GCMB Line Ref 3 - Out of Band

shelf GCMB Line Reference 3 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE4-OOB-GCMA: GCMA Line Ref 4 - Out of Band

shelf GCMA Line Reference 4 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LINE4-OOB-GCMB: GCMB Line Ref 4 - Out of Band

shelf GCMB Line Reference 4 is out of local oscillator qualification frequency range.

SA Critical Minor If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

TSS-LOCK: Lockout protection switching on timing

shelf A lockout protection switch command has been performed on the BITS or line timing source.

– Warning Warning If the reason for executing the lockout command no longer exists, clear the switch command.

Table 1-11 Alarms, Events and Recommended Actions, T through TZ (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 119: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, T through TZ

Release O

PS4.2.3Force10 N

etworks

Page 1-113

TSS-MAN: Manual protection switching on timing

shelfte206 node

A manual protection switch command has been performed on the BITS or line timing source.

– Warning Warning If the reason for executing the manual switch no longer exists, clear the switch command.

TSS-REF1-ALM: Primary reference for timing subsystem is alarmed

shelf An LOS, LOF, or AIS-L alarm exists on the BITS or line timing primary reference.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

TSS-REF2-ALM: Secondary reference for timing subsystem is alarmed

shelf An LOS, LOF, or AIS-L alarm exists on the BITS or line timing secondary reference.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

TSS-REF3-ALM: Third reference for timing subsystem is alarmed

shelf An LOS, LOF, or AIS-L alarm exists on the BITS or line timing third reference.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

TSS-REF4-ALM: Fourth reference for timing subsystem is alarmed

shelf An LOS, LOF, or AIS-L alarm exists on the BITS or line timing fourth reference.

– Warning Warning Clear the LOS, LOF, or AIS-L alarm. Refer to the recommended actions for those alarms in this table.

TSS-REFL-GCMA: All synchronization references are failed or unusable

shelf All BITS or line timing sources are alarmed.

– Major Major Restore primary and secondary timing references.

TSS-REFL-GCMB: All synchronization references are failed or unusable

shelf All BITS or line timing sources are alarmed.

– Major Major Restore primary and secondary timing references.

TSS-REFS: Reference switched - timing subsystem

shelf Reference has been switched. – Info Info Informational; no action required.

TSS-SSM: SSM (synchronization status message) update - timing subsystem)

shelf There has been a change in SSM for BITS or line timing sources.

– Info Info Informational; no action required.

Table 1-11 Alarms, Events and Recommended Actions, T through TZ (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 120: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, T through TZ

Page 1-114Force10 N

etworks

Release O

PS4.2.3

TSSALM: Timing reference alarm

shelf Timing reference alarm. – Info Info Check timing reference.

TSSGEN: Timing subsystem event

shelf Timing subsystem event. – Info Info Informational; no action required.

TSSREF: Timing system reference lock failed

shelf Lock on timing system reference is lost.

– Critical Critical Check timing system reference.

TSSREF_EVENT: Timing system lost reference lock

shelf Timing system lost reference lock.

– Info Info Check for TSSREF alarm.

TSSSETS: SETS status shelf Timing subsystem event. – Info Info Informational; no action required.

TU-AIS: Alarm indication signal – Tributary Unit)

sdh_hpsdh-lpsdh_ptp

An upstream failure occurred at the tributary unit path layer.

SA Critical Minor Check the equipment upstream.

Clear upstream alarms.

Verify your tributary unit payload connections.

TU-LOP: Loss of Pointer – Tributary Unit

sdh_hpsdh-lpsdh_ptp

Valid pointer bytes are missing from the tributary unit overhead.

SA Critical Minor Check the cabling and physical connections on the reporting card.

Verify cross-connects.

Check network timing synchronization.

If the alarm persists, replace the module.

TX-OFF-LI:Transmitter off due to link indication

ethernet_ptp The module is in standby mode. – Info Info Information only.

TX-ON-LI:Transmitter on due to link indication

ethernet_ptp The module is in active mode. – Info Info Information only.

1 Environmental alarm inputs are customized by each operator.

Table 1-11 Alarms, Events and Recommended Actions, T through TZ (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 121: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events U

through Z

Release O

PS4.2.3Force10 N

etworks

Page 1-115

Alarms/Events U through Z

Table 1-12 Alarms, Events and Recommended Actions, U through Z

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

UNDERVOLTAGE_A1: Below the minimum voltage value - Enhanced GCM_A

shelf GCM_A has triggered due to an under voltage condition.

The Enhanced GCM triggers the under-voltage alarm at -40.5 VDC. It clears this alarm at -42.5 VDC.

– Minor Minor Check power system, breaker, fuse, and related cabling for power input A.

UNDERVOLTAGE_B1: Below the minimum voltage value - Enhanced GCM_B

shelf GCM_B has triggered due to an under voltage condition.

The Enhanced GCM triggers the under-voltage alarm at -40.5 VDC. It clears this alarm at -42.5 VDC.

– Minor Minor Check power system, breaker, fuse, and related cabling for power input B.

UNEQ: Rx Path unequipped code received

ethernet_ptp No payload is received on an activated service.

SA Critical Minor Check your interface connection.

Connect your proper payload and service source.

UNEQ-P: Unequipped code signal label received

ds3_ptp(ds_ptp)e3_ptpsonet_ptpsonet_stste50 te206 node

No payload is received on an activated service.

SA Critical Minor Check your interface connection.

Connect your proper payload and service source.

UNEQ-P-TX: Unequipped code signal label transmitted

te206 node No payload is transmitted on an activated service.

SA Critical Minor Check your interface connection.

Connect your proper payload and service destination.

Page 122: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events U through Z

Page 1-116Force10 N

etworks

Release O

PS4.2.3

UNEQ-V: Unequipped code signal label received - VT path

ds1_ptpds3_ptp(ds_ptp)shelfsonet_ptpsonet_vtsonet_stste50 te206 node

No payload is received on an activated service.

SA Critical Minor Check your interface connection.

Connect your proper payload and service source.

e3_ptpsdh_ptp

See UNEQ-VC. SA Critical Minor See UNEQ-VC.

UNEQ-VC: Unequipped code signal label received - VC path

e1_ptpsdh_ptp

No payload is received on an activated service.

SA Critical Minor Check your interface connection.

Connect your proper payload and service source.

UP1: In service all objects Unused. – Minor Minor Unused.

VCC: Internal voltage threshold violation

ethernet_ptpsdh_ptpsonet_ptpshelf

Supply voltage doe not meet guarantee.

– Warning Warning Call Force10 ’s Technical Assistance Center.

VENTFAIL2: Ventilation system failure

shelf Ventilation system has failed. – Minor Minor Check and follow your method of procedures.

WARMREBOOT shelf Module warm reboot request in process. Until complete (within 60 seconds), module does not respond to provisioning requests or protection switch triggers.

– Minor Minor Verify that the module warm reboot request is expected.

WLMIS: Configured wavelength mismatch with hardware

sdh_ptpsonet_ptp TE-206 node

Incorrect provisioning. SA Major Minor Check interface and configuration.

Table 1-12 Alarms, Events and Recommended Actions, U through Z (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 123: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events U

through Z

Release O

PS4.2.3Force10 N

etworks

Page 1-117

X86_ABORT shelf Receiving X.86 encapsulation abort condition.

SA Critical Minor Check interface and configuration.

X86_CRC shelf Receiving X.86 encapsulation CRC errors.

SA Critical Minor Check interface and configuration.

XPT-FAIL-RX: Receiver connection failure

ethernet_ptp Link Integrity detected transport failure in the receive direction.

SA Critical Critical Check EOS members for path alarms.

XPT-FAIL-TX: Transmitter connection failure

ethernet_ptp Link Integrity detected transport failure in the transmit direction.

SA Critical Critical Check EOS members for path alarms.

XPTRX: Receive transport failure

lag Link Integrity detected transport failure in the receive direction.

SA Critical Critical Check EOS members for path alarms.

XPTTX: Transmit transport failure

lag Link Integrity detected transport failure in the transmit direction.

SA Critical Critical Check EOS members for path alarms.

1 Not supported in this release.2 Environmental alarm inputs are customized by each operator.

Table 1-12 Alarms, Events and Recommended Actions, U through Z (continued)

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 124: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TA200

Page 1-118Force10 N

etworks

Release O

PS4.2.3

Alarms/Events, TA200

Table 1-13 Alarms, Events and Recommended Actions, TA200

Alarm: Definition Alarm Profiles Probable Cause

Service Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

(Protected)

T2OOF: T2 Line - Out of frame ta200 T2 is out of frame. SA Critical Critical Check the configuration.

T2XBIT: T2 Remote (Far-End) Failure

ta200 On T2OOF alarm detection, the remote PM13 sends T2XBIT out the T3 interface.

– Warning Warning Check the remote end for out of frame errors and confirm the correct configuration.

TA200_CLOCK: Clock alarm ta200 The primary timing source is no longer present or has failed.

SA Critical Critical Check the configuration or timing source equipment for hard failure.

TA200_PM13E_G747FESmry: PM13e T3 747 Out of frame

ta200 PM13e T3 is out of frame. – Warning Warning Check the configuration.

TA200_PM13E_G747OOFSmry: PM13e T3 747 Out of frame: PM13e T3 747 FE (Remote Far-End) Failure

ta200 PM13e T3 is out of frame at the remote end.

SA Critical Critical Check the remote end configuration.

Page 125: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-119

Alarms/Events, TE-206

The following list contains alarms for the TE-206 nodes and the corresponding TransNav alarms. This information is needed to change the severity of alarms on the TE-206 node.

Modification of alarm severity and SA/NSA attributes for TE-206 alarms can only be done on TE-206 nodes.

Table 1-14 Alarms, Events and Recommended Actions, TE-206

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

AIS: Alarm Indication Signal

DS3 AISDS1 AISDS3 AIS-TX DS1 AIS-TX

The input and export signals on a DS1 or DS3 interface contains an AIS.

SA Minor Info Inspect and clear alarms from the upstream and downstream asynchronous equipment.

AIS-L: Alarm Indication Signal - Line

AIS-L The input and export signals on a DS1 or DS3 interface contains an AIS.

SA Minor Info Check the equipment (module/port) upstream and downstream.

Clear alarms.

AIS-P: Alarm Indication Signal - Path

AIS-PAIS-P-TX

The STS signal demultiplexed from the DS3 contains an AIS which can result from an upstream or downstream failure along the STS path.

SA Minor Info Check the equipment (module/port) upstream and downstream.

Clear alarms.

Verify your payload connections.

AIS-V: Alarm Indication Signal - VT

AIS-V An upstream failure occurred at the VC path layer.

SA Minor Info Check the equipment (module/port) upstream and downstream.

Clear alarms.

Verify your VT payload connections

APSB: APS Protection Switch Byte Failure

APSB On a 2F BLSR, the APS K1/K2 bytes are in an invalid state.

Minor Check for OC-N module failures

Examine the incoming SONET overhead with an optical test set to confirm inconsistent or invalid K bytes.

Page 126: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-120Force10 N

etworks

Release O

PS4.2.3

APSCM: Automatic protection switch (multiplex section protection -MSP) channel mismatch

APSCM On a 2F BLSR, the local node is not receiving the K1/K2 values it is expecting.

Minor

APSMM: Automatic protection switch (multiplex section protection - MSP) mode mismatch

APSMM There is a mismatch of the protection switching schemes at the two ends of the span.

Minor Minor Check protection modes at both ends. Verify that both ends are set for bidirectional or unidirectional.

AUTOSWSYNCH: Automatic Switch Synchronization

AUTOSWSYNCH A protection switch to a new timing source has occurred.

Info Check the timing sources for alarms.

CASALIEN: Alien Cassette

EQINV: Equipment invalid An invalid piece of equipment has been used.

Critical Plug in a valid piece of equipment.

CASFA: Cassette Fuse Failure

HWFAULT: Hardware fault

A hardware fault has occurred. SA Critical Minor Take appropriate action, as necessary.

CASFLT: Cassette Failure EQPT: Equipment malfunction / failure

A hardware failure has occurred on the reporting module.

SA Critical Minor Check and reseat equipment. If this fails to clear the alarm, replace the equipment if necessary.

CASINS: Cassette Inserted

EQINS A new cassette has been inserted into a TE-206 node.

Info

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 127: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-121

CASMM EQMIS Type of equipment plugged in does not match the provisioned type or the module/cassette is not allowed in the slot.

Major Determine if the TE-206 node contains the correct module configuration.

If the node contains the correct module configuration, lock, restart, and delete the module. During auto discovery, the correct configuration information will be forwarded to the TransNav server and the alarm should be cleared.

CASRMVD: Cassette Removed

EQPT A cassette has been removed from a TE-206 node.

Info

CMTFLT: Connection to TransNav GUI failed

CM TFLT Connection to TE-206 from TransNav GUI failed.

Info Check for and resolve any firmware mismatch.

Manually commit the software.

EOC: Embedded Operations Channel Failure

DCCFAIL • The DCC on the incoming OC-N has failed.

• The OC-N port is not connected or the fiber is cut along the path.

• The remote link is not active.

Minor • Check the OC-N interface. • Check for a fiber cut and OC-N LOS

alarms.• Verify the remote OC-N interface has

Control Data enabled and is active. Filter local alarms as necessary until remote link comes active.

ETHBLKTOFWD: Ethernet Transition from Block to Forward

BLOCK-TO-FWD Ethernet port RSTP state has changed from blocking to forwarding.

SA Major Informational only. No action required.

ETHRINGFAIL: Invalid Ethernet Ring Configuration

ETHRING-FAIL A root bridge has not been configured for the ETHRING.

Info Configure a root bridge for the ETHRING.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 128: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-122Force10 N

etworks

Release O

PS4.2.3

EXBER: Excessive Bit Error Rate

BERSF-L (OC48/OC12/OC3)BERSF-P (HO path)BERSF-V (VT1.5)

• The BER on the incoming OC-N line has exceeded the signal fail threshold.

• A connector in the OC-N optical link may be dirty.

• An OC-N module hardware problem may exist.

• Fiber could be bent or damaged.

• The VT signal demultiplexed and dropped from the OC-N has exceeded its signal fail threshold.

SA Critical Minor Verify the local receive optical levels, as well as the upstream transmit levels.

Verify good optical connections.

Clean optical cable connectors and module ports.

If an OC-N module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

Check the remote (source) Transmit and fiber connection.

Check fiber for bends or damage.

Examine the network for other path bit error rate problems and retrieve PM data to find a possible common source of the bit errors.

Perform loopback tests to isolate the problem.

Check cable connectors and module ports.

FDLLPBK: FDL Loopback

RMTLOOP Far end DS1 interface has initiated a remote loopback using the FDL channel.

Info

FEACAIS: DS3 FEAC AIS

DS3FEAC-AIS The DS3 FEAC channel is receiving AIS indication.

Info Check upstream equipment for source of AIS.

FEACEQFLTNSA: DS3 FEAC Equipment Failure (NSA)

DS3FEAC-EQPT(use SA/NSA)

The DS3 FEAC channel is receiving Equipment Failure indication.

Info Check upstream equipment for source of Equipment Failure.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 129: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-123

FEACEQFLTSA: DS3 FEAC Equipment Failure (SA)

DS3FEAC-EQPT (use SA/NSA)

The DS3 FEAC channel is receiving Equipment Failure indication.

SA Info Check upstream equipment for source of Equipment Failure.

FEACIDLE: DS3 FEAC Idle Signal

DS3FEAC-IDLE The DS3 FEAC channel is receiving Idle Signal indication.

Info Check upstream equipment for source of Idle.

FEACLOS: DS3 FEAC LOS

DS3FEAC-LOS The DS3 FEAC channel is receiving Loss of Signal indication.

Info Check upstream equipment for source of Loss of Signal.

FEACLPBK: FEAC Loopback

RMTLOOP Far end DS3 interface has initiated a remote loopback using the FEAC channel.

Info Informational only. No action requried.

FEACOOF: DS3 FEAC OOF

DS3FEAC-LOF The DS3 FEAC channel is receiving Loss of Frame indication.

Info If the Line format on the Traverse sets to SF or ESF, verify the line forma (SF, ESF) of the incoming signal from the upstream asynchronous device.

If the Line format on the Traverse sets to Unframed, call Force10 ’s Technical Assistance Center (TAC).

FEPRLF: Far End Protection Line Failure

FEP An APS switching channel signal failure has occurred on the protect module coming into the node.

– Minor Check the equipment on the other end of the fiber.

FRCDSWRING1: Forced Switch to Ring 1

FORCED A forced protection switch has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Info Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 130: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-124Force10 N

etworks

Release O

PS4.2.3

FRCDSWRING2: Forced Switch to Ring 2

FORCED A forced protection switch has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

– Info Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FRCDSWSYNC: Forced Sync Switch

TSS-FRC A forced protection switch command has been performed on the BITS or line timing source.

Info If the reason for executing the forced switch no longer exists, clear the switch command.

FRCDWKSWBK: Forced protection switch on protecting unit

FORCED_ON_PROT A forced protection switch has been performed on a protection group.

Info Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FRCDWKSWPR: Forced protection switch on working unit

FORCED_ON_WORK A forced protection switch has been performed on the working unit.

Info Verify that the reason for performing the forced switch no longer exists.

Clear the switch command.

FWMM: Firmware Mismatch

None. This is a te206 alarm only

The current running firmware revision does not match the current running software revision.

Major Perform firmware upgrade to resolve firmware mismatch.

HLDOVR: Holdover TSS-HOLDOVER There are no available external references so the GCMA (or GCMB) is referencing the local oscillator.

(SA) Major If this alarm persists for more than 5 minutes, contact Force10 ’s Technical Assistance Center (TAC).

HWFLT: Description is Fault specific

EQPT A hardware failure has occurred on the reporting cassette.

SA Critical Minor Check and reseat the equipment or cassette. If this fails to clear the alarm, replace the cassette if necessary.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 131: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-125

HWMM: Hardware Mismatch

EQMIS Type of equipment plugged in does not match the provisioned type or the module is not allowed in the slot.

Major If the node contains the correct module configuration, lock, restart, and delete the module. During auto discovery, the correct configuration information will be forwarded to the TransNav server and the alarm should be cleared.

LOA: Loss of Alignment LOA Differential Delay exceeded on active EOS member.

SA Critical Minor Check the EOS or EOP member status to determine which paths have exceeded the delay and reroute them.

LOC: Loss of Carrier LINKFAIL • Transmitter/receiver failure.• Fiber connection lost.• A module along the path has

been removed.

SA Critical Minor Check connectors, cables, and modules.

Check Ethernet port configuration, Integrity Status parameter for details. See the TransNav Management System GUI Guide, Section 5—Equipment, Chapter 4—“Ethernet Equipment,” Ethernet Equipment.

LOCKOUTOFPR: Lockout of Protect

LOCKOUT A lockout protection switch command has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

LOCKOUTRING2: Lockout of Ring 2

LOCKOUT A lockout protection switch command has been performed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info If protection required, investigate and remedy lockout provisioning. Otherwise, no action required.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 132: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-126Force10 N

etworks

Release O

PS4.2.3

LOF: Loss of Frame LOF (OC48/OC12/OC3)DS1LOFDS3LOF

Framing problem on the incoming OC-N signal.

SA Critical Minor Inspect all facilities related to the OC-N link.

Verify the local receive optical levels, as well as the upstream transmit optical levels.

Clean the optical connectors.

Check the upstream node for OC-N module failure/removal.

Verify good optical connections to the local and far-end OC-N modules.

LOL: Loss of Light LINKFAIL • Transmitter/receiver failure.• Fiber connection lost.• A module along the path has

been removed.

SA Critical Minor Check connectors, cables, and modules.

Check Ethernet port configuration, Integrity Status parameter for details. See the TransNav Management System GUI Guide, Section 5—Equipment, Chapter 4—“Ethernet Equipment,” Ethernet Equipment.

LOM: Loss of Multiframe LOM Loss of Multiframe on Transmit. SA Critical Minor Unused in Traverse.

LOP: Loss of Pointer Path LOP-P Valid H1/H2 pointer bytes are missing from the STS path overhead.

SA Critical Minor Check the cabling and physical connections on the reporting module.

Verify cross-connects.

Check network timing synchronization.

Verify that the expected bandwidth and received bandwidth are the same.

If the alarm persists, replace the module.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 133: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-127

LOP-V: Loss of Pointer VT Path

LOP-V Valid pointer bytes are missing from the VT overhead.

SA Critical Minor Check the cabling and physical connections on the reporting module.

Verify cross-connects.

Check network timing synchronization.

If the alarm persists, replace the module.

LOS: Loss of Signal LOS • OC-N loss of signal. • Fiber may not be correctly

connected to the module, or no signal exists on the line.

• Upstream equipment failure or fiber cut may cause this alarm.

SA Critical Minor Check the upstream node for OC-N module failure/removal.

Check the fiber connection.

Verify the receive optical levels.

Verify good optical connections to the local and far-end OC-N modules.

LOSYNC: Loss of Synchronization

LINKFAIL • Transmitter/receiver failure.• Fiber connection lost.• A module along the path has

been removed.

SA Critical Minor Check connectors, cables, and modules.

Check Ethernet port configuration, Integrity Status parameter for details. See the TransNav Management System GUI Guide, Section 5—Equipment, Chapter 4—“Ethernet Equipment,” Ethernet Equipment.

LPBK-FAC: Facility Loopback Active

LPBKFACILITY Facility is in active loopback state.

Info Validate this state.

Clear loopback, as required.

LPBK-TERM: Terminal Loopback Active

LPBKTERM A terminal loopback is active. Info Validate this state.

Clear loopback, as required.

MANSWRING1: Manual Switch to Ring 1

MANUAL A manual protection switch has been executed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info Informational; no action required.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 134: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-128Force10 N

etworks

Release O

PS4.2.3

MANSWRING2: Manual Switch to Ring 2

MANUAL A manual protection switch has been executed on a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info Informational; no action required.

MANSWSYNC: Manual protection switching on timing

TSS-MAN A manual protection switch command has been performed on the BITS or line timing source.

Info If the reason for executing the manual switch no longer exists, clear the switch command.

MANWKSWBK: Manual Switch to Working

MAN_ON_PROT A manual protection switch has been executed on the protecting port of a protection group.

Info Informational; no action required.

MANWKSWBK: Manual Switch to Working

MAN_ON_PROT A manual protection switch has been executed on the protecting port of a protection group.

Info Informational; no action required.

MANWKSWPR: Manual Switch to Protect

MAN_ON_WORK A manual protection switch has been executed on a working port of a protection group.

Info Info Informational; no action required.

MANWKSWPR: Manual Switch to Protect

MAN_ON_WORK A manual protection switch has been executed on a working port of a protection group.

Info Info Informational; no action required.

OSPFAIMM: OSPF Area ID Mismatch

OSPF-AIMM The OSPF Area configuration does not match the configuration of other routers in the network.

Info Configure the OSPF Area to be consistent in the network.

OSPFHIMM: OSPF Hello Interval Mismatch

OSPF-HIMM The OSPF Hello Interval does not match the configuration of other routers in the network.

Info Configure the OSPF Hello Interval to be consistent in the network.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 135: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-129

OSPFRDIMM: OSPF Router Dead Interval Mismatch

OSPF-DIMM The OSPF Router Dead configuration does not match the configuration of other routers in the network.

Info Configure OSPF Router Dead to be consistent in the network.

PLM-P: Payload Label Mismatch

PLM-P Payload label mismatch on the path.

SA Critical Minor Verify that the payload is the same as the provisioned payload/service.

PLM-V: VT Payload Label Mismatch VT Path

PLM-V • Invalid byte in the path overhead.

• The payload does not match what the signal label is reporting.

Minor Connect correct payload.

Verify that the payload is the same as the provisioned payload/service.

PWRA: Low -48V Power Side A

PWFAIL-A GMT A fuse, cabling, circuit breaker, or power system unit has failed.

Minor Check power system, breaker, fuse, and related cabling for power input A.

PWRB: Low -48V Power Side B

PWFAIL-B GMT B fuse, cabling, circuit breaker, or power system unit has failed.

Minor Check power system, breaker, fuse, and related cabling for power input B.

PWRHI: Excessive (in Absolute Value) - 48V Power

PWR-48 (in Traverse documentation )

Commercial fuse, cabling, circuit breaker, or power system unit has failed.

Major Check and follow your method of procedures.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 136: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-130Force10 N

etworks

Release O

PS4.2.3

RAI: Remote Alarm Indication

DS3RAIDS1RADS3RAI-TX DS1RAI-TX

• The far-end node has detected a defect signal on an incoming DS3. For TE-206 nodes, the defect signal is detected on incoming or outgoing DS3.

• The local node is sending a bad DS3 signal towards the DS-X. For TE-206 nodes, the defect signal is detected on incoming or outgoing DS3.

Info • Verify the connections between the DS-X and the DS3 module are secure.

• Verify that the DS3 signal entering the far end of the SONET network is error-free. For TE-206 nodes, verify the DS3 signals entering or exiting the far end of the SONET network are error-free.

RFI-L: Remote Failure Indication - Line

RFI-L • The locally received OC-N signal contains an RFI.

• The local OC-N module is sending a bad OC-N signal to the remote node.

• The far-end OC-N module has failed.

Info • Check module/port.• Check for and resolve LOS, LOF, and

AIS-L alarms in the far-end node. • Verify the output of the local OC-N

module for level degradation/dirty optical connectors.

• Clean the optical connectors. • Check the fiber connection on adjacent

equipment.

RFI-P: Remote Failure Indication - Path

RFI-P The STS-1 signal demultiplexed from the OC-N contains an RFI-P.

The far-end node has detected path defects coming from the local site.

Info • Determine the defects found at the far-end node.

• Verify your payload connections.• Clear path alarms such as LOP-P,

AIS-P, and UNEQ-P from the far-end node.

RFI-V: Remote Failure Indication - VT

RFI-V The VT signal demultiplexed from the DS1 contains an RFI-V.

The far-end node has detected VT path defects coming from the local site.

Info • Determine the defects found at the far-end node.

• Verify your payload connections.• Clear path alarms such as LOP-P,

AIS-P, PLM-P, TIM-P, and UNEQ-P from the far-end node.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 137: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-131

RFLF: Remote Line Failure

None. This is a te206 alarm only.

The far end GbE interface is detecting a Loss of Signal.

Info Info Check the GbE fiber.

RFOFF: Remote Fault Offline

Info

SD: Bit ErrorRate signal degrade – Line

BERSD-L (OC48/OC12/OC3)BERSD-P (HO Path)BERSD-V (VT1.5)

The BER on the incoming EC-1 line has exceeded the signal degrade threshold.

SA Critical Minor • Check cable connectors and module ports.

• If an EC-1 module is a possible source of the bit errors, perform a manual protection switch to the protection unit. If the BER alarm clears, replace the defective “working” unit.

• Check the remote (source) Transmit and cable connection.

SFPALIEN: Alien SFP SFP-UNKNOWN An SFP has been detected that is not certified for use with the system.

SA Critical Minor Replace the unknown SFP with a Force10 certified SFP.

SFPFLT: SFP Fault SFPFAIL A fault has been detected with the SFP.

SA Critical Minor Replace the faulty SFP.

SFPMM: SFP Mismatch SFPMIS There is a mismatch on the SFP interface.

SA Critical Minor Check interface.

SNTPFLT: SNTP Time Failure

SNTP-FAIL The TE-206 cannot communicate with the SNTP server.

Minor • Check the availability of the SNTP server.

• Verify the TE-206 SNTP configuration.• Verify network connectivity from the

TE-206 to the SNTP server.

SOFTMM: Software Version Mismatch

SWMIS The reporting module is not running with the same software version as the active GCM.

Major Reinstall correct software.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 138: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-132

SQM: Sequence number change

SQM Unused SA Critical Minor Unused for ethernet_ptp and shelf. Member alarm for virtual concatentation faults on EOP members.

SUM-V: VT Alarm Summary

SUM-V One or more alarms exist for VT paths within the STS-1.

SA Critical Minor Check teh conditions on the VT paths within the STS-1.

SWRING1: Auto Switch to Ring 1

SWITCH_TO_WORK Traffic has switched to the working module, port, or channel for a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info • Verify that the switch was expected.• Check the switch-from section for

degraded performance or other relevant alarm conditions.

SWRING2: Auto Switch to Ring 2

SWITCH_TO_PROTECT Traffic has switched to the standby module, port, or channel for a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info Informational; no action required.

SYNC: System reference lock failed

SYSREF Lock on system reference is lost. Minor Check system reference.

SYNCHSTATCHNG: Sychronization Status Message Change

SYNCHSTATCHNG The Synchronization Status messages has changes on the timing reference.

Info Informational; no action required.

TCA: Threshold Crossing Alert

TCA The associated Performance Monitoring parameter has crossed the configured threshold.

Info

TIM-P: Trace Identifier Mismatch - Path

TIM-P The expected path trace string does not match the received path trace string.

Minor • Check configuration of path source or cross-connect.

• Match the path trace string on both ends of the path.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 139: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Alarm

s/Events, TE-206

Page 1-133Force10 N

etworks

Release O

PS4.2.3

UNEQ-P: Unequipped code signal label received or transmitted

UNEQ-PUNEQ-P-TX

Unequipped code signal label received or transmitted

Minor

UNEQ-V: Unequipped code signal label received - VT path

UNEQ-V No payload is received on an activated service.

Minor • Check your interface connection.• Connect your proper payload and

service source.

WKSWBK: Auto Switch to Working

SWITCH_TO_WORK Traffic has switched to the working module, port, or channel for a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info • Verify that the switch was expected.• Check the switch-from section for

degraded performance or other relevant alarm conditions.

WKSWBK: Auto Switch to Working

APS-PROTECT A protection switch to the working facility that occurred because of an alarm clearing or Wait-To-Restore timer option.

Info Informational; no action required.

WKSWPR: Auto Switch to Protect

SWITCH_TO_PROT Traffic has switched to the standby module, port, or channel for a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group.

Info Informational; no action required.

WKSWPR: Auto Switch to Protect

APS-WORK A protection switch to the working facility that occurred because of an alarm on the working facility.

Info

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 140: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctionsA

larms/Events, TE-206

Release O

PS4.2.3Force10 N

etworks

Page 1-134

WLMM: Configured wavelength mismatch with hardware

WLMIS Incorrect provisioning. SA Critical Minor Check interface and configuration.

WTR: Transition to Wait to Restore mode (multiplex section protection - MSP)

APSWTR Traffic is in the process of switching back to working channels. This occurs when a 1:1 equipment, 1+1 facility, or BLSR/MS-SP Ring protection group has been configured as revertive.

Info If frequent protection switching occurs, check the revertive WTR period setting.

Table 1-14 Alarms, Events and Recommended Actions, TE-206 (continued)

TE-206 AlarmCorresponding

TransNavAlarm(s)

Probable CauseService

Affecting Default

Default SeverityRecommended Action

SA (Unprotected)

NSA (Protected)

Page 141: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Page 1-135Force10 N

etworks

Release O

PS4.2.3

Page 142: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Alarm

s, Events, and Recom

mended A

ctions

Release O

PS4.2.3Force10 N

etworks

Page 1-136

Page 143: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 1-137

SECTION 1FAULT MANAGEMENT

Chapter 3 Service Error Codes

Introduction This document contains TransNav service error code information to assist you in troubleshooting TransNav management system service request failure indications. See the figure below.

This chapter includes the following topics:• Service Activation Failure• Service Error Codes and Recommended Actions

Figure 1-29 TransNav GUI Service Request Error Window

Page 144: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 1: Fault ManagementService Activation Failure

Page 1-138 Force10 Networks Release OPS4.2.3

Service Activation Failure

If a service request activation fails, use the following Service Request—Show Last Error procedure to help trace and resolve the problem.

Table 1-15 Service Request—Show Last Error

Step Procedure

1 Select the service request entry.

Figure 1-30 Service Request Failure

2 From the Services menu, select Show Last Error.

Figure 1-31 Services Menu—Show Last Error Option

3 Observe the service error code information and refer to Table 1-16 Service Error Codes and Recommended Actions, page 1-139 for further troubleshooting details.

4 The Service Request—Show Last Error procedure is complete.

Service ActivationFailure

Indication

Service Error Code

InformationEntryRequest

Page 145: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter3

Service E

rror Codes

Service Error Codes and R

ecomm

ended Actions

Release O

PS4.2.3Force10 N

etworks

Page 1-139

Service Error Codes and Recommended Actions

Service error codes for the TransNav management stem are listed in the following table in ascending, numerical order. Each error code table entry contains the following information:• The service error code as visible in the service request error window.• Service error code string definition as visible in the service request error window.• Probable cause(s) for service request failure.• Recommended action(s) to take upon receiving the service error code indication.

Table 1-16 Service Error Codes and Recommended Actions

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

1 Internal error A system error occurred. If the problem persists, contact the Force10 Technical Assistance Center.

1007 RSVP (resource reservation protocol) - MIB SET operation failed

Residual resources from a previous service were not cleared due to a switchover. (e.g., a service deletion request in process when a switchover occurred.)

• Try to deactivate/reactivate the new service.• If deactivation/reactivation does not resolve the problem,

perform a GCM switchover.• As a last resort, restart the node.

1008 RSVP - MIB GET operation failed Residual resources from a previous service were not cleared due to a switchover. (e.g., a service deletion request in process when a switchover occurred.)

• Try to deactivate/reactive the new service.• If deactivation/reactivation does not resolve the problem,

perform a GCM switchover.• As a last resort, restart the node.

1009 RSVP - MIB TEST operation failed Residual resources from a previous service were not cleared due to a switchover. (e.g., a service deletion request in process when a switchover occurred.)

• Try to deactivate/reactive the new service.• If deactivation/reactivation does not resolve the problem,

perform a GCM switchover.• As a last resort, restart the node.

1016 RSVP - No path for reservation Remote node or link failure. Retry service request.

1025 RSVP - Service preempted Service of a higher priority has used the requested resources.

Check/set service priority. If possible, set high priority for all services to eliminate preemption.

Page 146: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Service Error Codes and R

ecomm

ended Actions

Page 1-140Force10 N

etworks

Release O

PS4.2.3

1034 RSVP - Resources not available Service resources completely used. Most typically, this applies to STS resources.

Use IP address and node name returned in the error message and trace the resource deficiency.

Select another resource and retry the service request.

1035 RSVP - System resources not available

Internal system resources completely used. The error is most commonly seen when using the Bulk Activation tool.

• Switchover to access potentially free resources, then retry the service request.

• If you were using the Bulk Activation tool, make note of the first service request error identified. Retry service activation, one-by-one.

1036 RSVP - System error, resources not available

Internal system resources completely used. The error is most commonly seen when using the Bulk Activation tool.

• Switchover to access potentially free resources, then retry the service request.

• If you were using the Bulk Activation tool, make note of the first service request error identified. Retry service activation, one-by-one.

1205 Unsupported interface in request Unsupported interface identified in the request. Check the interface specified in the original request. Make a new request with a valid interface.

1207 Invalid slot in request Unrecognized card was plugged into the slot. (e.g., a card was plugged into a previously configured yet unequipped slot.)

Check the slot configuration.

1208 Invalid interface in request Invalid interface selected in Ethernet, DCC Channel, or Service request. The physical port or card cannot be found. For example, an attempt was made to create a DCC Channel on an invalid port.

Check the interface specified in the original request. Make a new request with a valid interface.

1209 Invalid protection interface Unsupported interface identified in the request. For example, an Ethernet I/F in 1+1 protection group request.

Check the interface specified in the original request. Make a new request with a valid interface.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 147: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter3

Service E

rror Codes

Service Error Codes and R

ecomm

ended Actions

Release O

PS4.2.3Force10 N

etworks

Page 1-141

1210 Resources not available • Port is locked• STS is completely used

• Unlock the port• Select a different STS with sufficient bandwidth

1215 Error while processing a service request

Card not responding. Reseat the card. If the problem persists, contact the Force10 Technical Assistance Center

1217 Cannot find the service The service or cross-connect identifier has been lost. If the problem persists, contact the Force10 Technical Assistance Center.

1218 Interface already exists The interface is already in use. Make another interface selection and retry the service request.

1219 Slot already exists The slot is already in use. Make another slot selection and retry the service request.

1220 PG (protection group) already exists The protection group is already in use. Make another protection group selection and retry the service request.

1221 Interface exists in a protection group The interface is already in use in a protection group. Make another interface selection and retry the service request.

1222 Slot exists in a PG The slot is already in use in a protection group. Make another slot selection and retry the service request.

1227 PG already used by a service The protection group is already in use. Make another protection group selection and retry the service request.

1228 Interface already used by a service The interface is already in use in a service. Make another interface selection and retry the service request.

1229 Slot already used by a service The slot is already in use in a service. Make another slot selection and retry the service request.

1230 Error in processing UPSR (unidirectional path switched ring) request

Trying to use an unavailable UPSR protection group. Create the UPSR protection group and retry the service request.

1231 Invalid direction for service Incorrect direction type selected for the service. Make a valid direction selection and retry the service request.

1233 Invalid encoding type Incorrect encoding type selected for the service. Make a valid encoding type selection and retry the service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 148: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Service Error Codes and R

ecomm

ended Actions

Page 1-142Force10 N

etworks

Release O

PS4.2.3

1234 Invalid protection group Incorrect protection group selected for the service. Make a valid protection group selection and retry the service request.

1235 Invalid ring type Incorrect ring type selected for the service. Make a valid ring type selection and retry the service request.

1236 Switch command successful The switch function completed successfully. No action required.

1237 Switch command denial - equal or higher priority request outstanding

A failed attempt to request a lower priority protection switch while a higher priority protection switch was in progress.

Check the protection group priority.

1238 Invalid starting STS (synchronous transmission signal) specified

Incorrect STS selected. Make a valid STS selection and retry the service request.

1239 Invalid bandwidth specified Bandwidth request does not match the option. Check bandwidth. Make another selection and retry the service request.

1241 Interface in PG (protection group) of different type

Selected different interface types. Retry the service request with appropriate interface types.

1242 Invalid service request or invalid re-use of STS

• Attempted an invalid service request (e.g., mixed uni- and bi-direction request)

• Invalid slot, port, or STS identified in request

• Check service• Check the slot, port, and STS made in the request

1244 Error encountered on PG operation on line cards

Failure occurred while creating the protection group. If the problem persists, contact the Force10 Technical Assistance Center.

1246 Requested resource is Admin locked The resource is locked and must be unlocked. Unlock the resource.

1247 No UPSR PG created for the requested UPSR service

No UPSR PG was created so cannot be applied. Create UPSR PG and retry the service request.

1254 Invalid span or tributary card given in the transparent service

The span or tributary card cannot be identified. Check your selections.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 149: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter3

Service E

rror Codes

Service Error Codes and R

ecomm

ended Actions

Release O

PS4.2.3Force10 N

etworks

Page 1-143

1258 DCC tunnel interface is in a transparent ring

The selected port is in a transparent ring. Select another port and retry the service request.

1259 DCC tunnel STS is in use The STS specified is already in use. Select another STS and retry the service request.

1263 E2E service request; forward direction STS already in use

STS is unavailable to complete E2E service request. Check STS. Select another STS and retry the service request.

1264 E2E service request; forward direction STS already in use

STS is unavailable to complete E2E service request. STS already in use.

Check STS. Select another STS and retry the service request.

1265 E2E service request; reverse direction STS already in use

STS is unavailable to complete E2E service request. STS already in use.

Check STS. Select another STS and retry the service request.

1266 E2E service request; reverse direction STS already in use

STS is unavailable to complete E2E service request. STS already in use.

Check STS. Select another STS and retry the service request.

1267 Interface check failed Attempting to set up a service with incorrect constraint settings.

Make correct constraint selections and retry the service request.

1268 Interface type invalid Attempting to set up a service with an incorrect interface type.

Select another interface and retry the service request.

1269 Link encoding type invalid Incorrect encoding type selected. Select another encoding type and retry the service request.

1270 Link direction invalid Incorrect direction selected. Select another direction and retry the service request.

1271 Invalid interface During an end-to-end service, typically strict, a remote card was incorrectly specified or was inadvertently removed.

Check the slot/port of each card interface. If it is correct, then investigate the possibility of a remote card extraction.

1272 Pending IN label unavailable During an end-to-end service, the STS pending resource identifier is not found.

Check the slot/port. If the problem persists, contact the Force10 Technical Assistance Center.

1273 Pending OUT label unavailable During an end-to-end service, the STS pending resource identifier is not found.

Check the slot/port. If the problem persists, contact the Force10 Technical Assistance Center.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 150: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Service Error Codes and R

ecomm

ended Actions

Page 1-144Force10 N

etworks

Release O

PS4.2.3

1274 Used IN label unavailable During an end-to-end service, the STS used resource identifier is not found.

Check the slot/port. If the problem persists, contact the Force10 Technical Assistance Center.

1275 Used OUT label unavailable During an end-to-end service, the STS used resource identifier is not found.

Check the slot/port. If the problem persists, contact the Force10 Technical Assistance Center.

1277 Label word invalid Invalid directional resource request • Check uni- and bi-directional settings.• If the problem persists, contact the Force10 Technical

Assistance Center.

1278 Invalid label Invalid user request for STS # = 0 Make another STS # selection and retry the service request.

1280 Invalid pointer Cannot find system pointer If the problem persists, contact the Force10 Technical Assistance Center

1281 Next label unavailable Cannot find an available resource because all system resources are in use.

If the problem persists, contact the Force10 Technical Assistance Center.

1284 Invalid BLSR link check The STS number requested must be equivalent across the E2E BLSR path.

One of the STS labels along the path is already in use OR a card has been inadvertently pulled during the E2E service request selection process.

Check STS number availability across the entire BLSR path.

Make another STS number selection as necessary and retry the service.

1285 BLSR label unavailable The STS number in the E2E BLSR service request is in use.

Reactivate BLSR service request.

If previously attempting service request using Bulk Activation, retry on a one-by-one basis for better traceability.

1286 Invalid BLSR constraints. System error during the E2E BLSR service request. If the problem persists, contact the Force10 Technical Assistance Center.

1289 Switch exercise failed 1+1 linear bidirectional protection group exercise request failed.

Check remote node for (K1/K2 APS) byte failure.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 151: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter3

Service E

rror Codes

Service Error Codes and R

ecomm

ended Actions

Release O

PS4.2.3Force10 N

etworks

Page 1-145

1290 Path protection error Trying to use an unavailable 1+1 path protection group.

Create the 1+1 path protection group and retry the service request.

1291 Control channels don’t match for interfaces in the 1+1 PG

Control channel down Retry the service request.

1292 DCC bytes for interfaces in a 1+1 PG do not match

The DCC configuration termination bytes must match.

Retry the service request with matching DCC configuration termination bytes.

1293 Error modifying path parameter(s) Invalid parameter modification selection. Make appropriate parameter selections.

1423 CSPF - Protected tunnel must egress east port of the UPSR

Attempted activation of protected tunnel egressing the west port of a UPSR.

Use one of the following actions to remedy this error:• Reverse the source and destination endpoints of the protected

tunnel • Provision the tunnel to use the other path around the UPSR.

2820 GCM FM error - destination termination point resource allocation failed

Resource allocation failure during the Ethernet service request. There is not enough bandwidth available on the SONET endpoint to accommodate the new Ethernet service.

• Deactivate any unnecessary Ethernet services to free bandwidth at the SONET endpoint for the new service.

• Create a new SONET endpoint with the required bandwidth and use it in the new Ethernet service request.

3016 Destination termination point admin state is locked

The destination Ethernet port administrative state is set to locked.

Unlock the destination Ethernet port and retry the service request.

3017 Source termination point admin state is locked

The source Ethernet port administrative state is set to locked.

Unlock the source Ethernet port and retry the service request.

3021 LC FM (Line card flow manager) error - flow action failed

Too many VLANs have been configured on the Ethernet card. Ethernet cards support up to 243 VLANs.

• Deactivate any unnecessary Ethernet services to free up VLANs for the new service.

• Use a different Ethernet card on the same node and retry the service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 152: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Service Error Codes and R

ecomm

ended Actions

Page 1-146Force10 N

etworks

Release O

PS4.2.3

3204 Previous command issued by MP is still being processed

A second service request was issued before a previous request process had time to complete.

Retry the service request.

3212 Ethernet card requested in service is physically absent

The Ethernet card specified in the service request is not physically present.

Plug in an appropriate Ethernet card and retry the service request.

3220 Invalid Ethernet slot requested in service

Invalid slot identified in request. For example, slot 21 is requested in a 20 slot chassis.

Make another (valid) slot selection and retry the service request.

3221 Invalid Ethernet port requested in service

Invalid port identified in request. For example, port 25 is requested in a 24-port card.

Make another port selection and retry the service request.

3224 Ethernet port requested in service is used by active service with another tagging type

The Ethernet port identified in the service request is being used for another service type. Service types must be compatible.

Deactivate the conflicting service using the Ethernet port and retry the new service request.

3225 Optical facility requested in service is in use

The SONET endpoint is already in use by another service using a different Ethernet card. A SONET endpoint can only be used with one Ethernet card at a time.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3227 Optical facility requested in service is in use for a dedicated p2p (point to point) service

The SONET endpoint is already in use with a dedicated p2p service and is incompatible with the service in the activation request.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3228 Optical facility requested in service is in use for a transparent LAN service

The SONET endpoint is already in use with a transparent LAN service and is incompatible with the service in the activation request.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3229 VLAN ID requested in service is already being used in the Ethernet card

One or more VLAN IDs specified in the service request are already in use for another service on the Ethernet card.

Deactivate the conflicting service using the VLAN ID and retry the new service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 153: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter3

Service E

rror Codes

Service Error Codes and R

ecomm

ended Actions

Release O

PS4.2.3Force10 N

etworks

Page 1-147

3236 Ethernet card requested in service is not yet ready to accept new services

The Ethernet card in the service request has not completed initialization and is therefore not ready to accept service.

Once the Ethernet board completes initialization, retry the service request.

3240 Ethernet card type is not supported by EA in this release

The Ethernet card type in the service request is not supported in this release.

• To use the Ethernet card in question, perform a system software release upgrade. See Section 7—Software Upgrades, Chapter 1—“Release TR3.2.3 Traverse Software Upgrade,” page 7-1 for details.

• Choose another Ethernet card for the service request.

3242 Termination point specified in service is being used by non-IAS applications

The SONET endpoint is already in use with non-IAS services and is incompatible with the service in the IAS service request.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3243 Termination point specified in IAS service has an invalid participation type

The SONET endpoint is already in use with another IAS service with a different participation type.

All services using a SONET endpoint must have the same participation type (SUBSCRIBER or PROVIDER).

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3244 Ethernet port specified in IAS service has subscribers going to a different optical facility

The source Ethernet port identified in the service request is being used by another IAS service with a different destination termination point.

Use the same destination termination point as the previously activated IAS service and retry the service request.

3247 No free traffic contracts are available on the Ethernet card specified in service

Traffic contract resource allocation failure during service request. All traffic contracts are in use.

Each Ethernet card supports (typically) 124 traffic contracts.

Traffic contracts are required and most commonly used for Ethernet services with a guaranteed data rate. They are also needed for each SONET termination point using “best effort” services.

Deactivate some service using a traffic contract to free up resources and retry the new service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 154: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Service Error Codes and R

ecomm

ended Actions

Page 1-148Force10 N

etworks

Release O

PS4.2.3

3256 EA is not ready to receive MP requests

• Ethernet management command occurs while the GCM is still initializing and unable to handle the request.

• A large number of Ethernet requests occur in a very short period of time.

Retry the service request as this is a transient condition.

3271 Maximum number of TDM endpoints bound to Ethernet card

SONET endpoint resource allocation failure during service request. All SONET endpoints are already in use.

Each Ethernet card supports (typically) 24 SONET endpoints.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3272 Maximum number of TLS TDM endpoints bound to Ethernet card

The limit for Transparent LAN Service (TLS) SONET endpoints has been reached. There can only be a maximum of two TLS SONET endpoints on an Ethernet card.

Deactivate all services using one of the other TLS SONET endpoints and retry the new service request.

3273 Maximum number of TLS instances on Ethernet card

The limit for Transparent LAN Service (TLS) service instantiation has been reached. There can only be a maximum of four TLS service instances on an Ethernet card. Each TLS instance is identified by its VLAN ID.

Deactivate all of the active services using another TLS instance and retry the service request.

3274 VLAN ID is in use by non-TLS service on same Ethernet card

The VLAN ID specified in the service request is already in use by another non-TLS service on the Ethernet card.

• Deactivate the conflicting service using the VLAN ID and retry the new service request.

• Make another VLAN ID selection and retry the service request.

3275 VLAN ID is in use by TLS service on another Ethernet card

One or more VLAN IDs specified in the service request are already in use for another TLS service on a different Ethernet card in the same node.

A VLAN ID can only be used for TLS on one Ethernet card at a time in a node.

• Deactivate the conflicting service using the VLAN ID and retry the new service request.

• Make another VLAN ID selection and retry the service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 155: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter3

Service E

rror Codes

Service Error Codes and R

ecomm

ended Actions

Release O

PS4.2.3Force10 N

etworks

Page 1-149

3276 Optical facility requested in service is in use for a shared-p2p (point to point) service

The SONET endpoint is already in use with a shared p2p service and is incompatible with the service in the activation request.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3277 Optical facility requested in service is in use for an IAS service

The SONET endpoint is already in use with an internet access service (IAS) and is incompatible with the service in the activation request.

Deactivate the conflicting service using the SONET endpoint and retry the new service request.

3600 VT resource request is in use The VT resource requested is already in use. Check VT. Make another VT selection and retry the service request.

3601 STS resources between the cards are all used up

• VT Switch card is required but not present in the system.

• All the resources are already in use.

• Install a VT Switch card in the system.• Make a different resource selection with appropriate

bandwidth and retry the service request.

3609 Internal error; cannot create STS cross-connect

A system error occurred during the STS cross-connect process.

If the problem persists, contact the Force10 Technical Assistance Center.

3612 Incoming VT already in use The VT service endpoint requested is already in use. Check VT. Make another VT selection and retry the service request.

3613 Outgoing VT already in use The VT service endpoint requested is already in use. Check VT. Make another VT selection and retry the service request.

3620 Internal error; Error replicating generic cross-connect to standby

A system error occurred during the GCM replication process.

If the problem persists, contact the Force10 Technical Assistance Center.

3622 STS resource is already being used The STS resource requested is already in use. Make another STS selection (with appropriate bandwidth) and retry the service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 156: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection1: Fault M

anagement

Service Error Codes and R

ecomm

ended Actions

Page 1-150Force10 N

etworks

Release O

PS4.2.3

3817 All tunnels on Ethernet card already allocated

Ethernet card cannot support any new SONET endpoints at this time.

Each Ethernet card supports (typically) 24 SONET endpoints.

Deactivate one or more services using another SONET endpoint on this Ethernet card and retry the new service request.

3818 Minimum Best Effort bandwidth requirements unavailable

Resource allocation request failure. SONET termination point resources required for Best Effort class of service are unavailable so the service request cannot complete.

Premium class of service services are using the required bandwidth.

Deactivate one or more services using SONET termination points with the Premium class of service to free up resources, then retry the new service request.

3820 Ethernet card must be created before adding services

The Ethernet card in the service request does not exist. The card has not been provisioned.

Provision the Ethernet card and retry the service request.

3824 Backplane bandwidth from Ethernet card not available

Resource allocation request failure. SONET termination point resources required are unavailable so the service request cannot complete.

Deactivate one or more services using SONET termination points on the same Ethernet card to free up resources, then retry the new service request.

3828 VC Bundle misconfigured The VC Bundle (being used as a SONET termination point) is configured incorrectly. The SONET termination point is unusable.

Check the VC Bundle configuration, correct misconfiguration, and retry the service request.

Table 1-16 Service Error Codes and Recommended Actions (continued)

Service Error Code

Service Error Code String Definition Probable Cause Recommended Action

Page 157: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 2 PERFORMANCE MONITORINGSECTION 2SECTION 2

Contents

Chapter 1Managing Performance

Creating or Modifying a Monitoring Template . . . . . . . . . . . . . . . . . . . . . . . . . 2-2Assigning a PM Template to a Traverse Node . . . . . . . . . . . . . . . . . . . . . . . . 2-5Assigning a Port PM Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6Assigning an EOS Port PM Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6Assigning an EOP Port PM Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7Changing a Member PDH PM Template for an EOP PDH Member . . . . . . . . 2-7Assigning a Subport PM Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8Assigning a Service PM Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8Viewing PM Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9

PM Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9Viewing Port or Subport PM Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10Viewing Service Path PM Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12Viewing Signal Path Trace Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14Viewing Capacity Monitoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16Report Generation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17Generating a PM Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18Assigning a Template to a TE-206 Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19Scheduling TE-206 PM Collection Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20

Chapter 2SONET Performance Parameters

DS1 Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22DS3 Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25EC-1 Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28SONET Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31SONET STS Path Layer PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36SONET VT Path Layer PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-39SONET Capacity Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-41

Chapter 3SDH Performance Parameters

E1 Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-44E3 Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-47SDH High and Low Order Path PM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-49SDH Port PM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-53SDH VC-11 and VC-12 Path PM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-58SDH Capacity Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-61

Chapter 4Ethernet Performance Parameters

Page 158: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2 Performance Monitoring

Page ii Force10 Networks Release OPS4.2.3

Ethernet 10GbE Equipment PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-64EoPDH Equipment PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-66NGE Equipment PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-69Ethernet Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-71Ethernet Service Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-74EOS Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-76EOP Port PM Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-78

EOP Port PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-78EOP Port Member PM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-79

Small Form-Factor Pluggable Optical Port PM . . . . . . . . . . . . . . . . . . . . . . . . 2-80

Page 159: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 2-1

SECTION 2PERFORMANCE MONITORING

Chapter 1 Managing Performance

Introduction The TransNav management system provides performance monitoring (PM) functions to monitor electrical, optical, and Ethernet signals. It also provides capacity monitoring functions to gather switch capacity data for VT and TU cards. PM parameters are used to gather, store, and report on performance data. The results can be used to evaluate and analyze the effect and severity level of periodic conditions, and to facilitate early detection of problems. The capacity monitoring parameters allow operators to monitor resource usage using a ‘snapshot’ of the state of switching resources on VT/TU cards for future planning purposes.

See the following procedures to set up performance monitoring on Traverse nodes:• Creating or Modifying a Monitoring Template, page 2-2• Assigning a PM Template to a Traverse Node, page 2-5• Viewing PM Data, page 2-9

– PM Timing, page 2-9• Viewing Capacity Monitoring Data, page 2-16• Report Generation, page 2-17• Generating a PM Report, page 2-18

Cards (modules) that do not collect PM information may be reserved for administrative use; contact your system Administrator.

For further information on performance monitoring and capacity monitoring of Traverse nodes, and the management system, see the TransNav Management System GUI Guide, Section 8—Maintenance and Testing, Chapter 1—“Performance Monitoring”.

Use the following procedures to set up and view performance monitoring data on TE-206 nodes from TransNav: • Assigning a Template to a TE-206 Node, page 2-19• Scheduling TE-206 PM Collection Times, page 2-20

Note: These procedures document the methods used to view TE-206 performance monitoring data from the TransNav GUI. For additional information about available reports for the TE-206 nodes, see the TransNav Xpert Users Guide.

Page 160: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringCreating or Modifying a Monitoring Template

Page 2-2 Force10 Networks Release OPS4.2.3

Creating or Modifying a Monitoring Template

Creating or modifying performance monitoring or capacity monitoring templates gives the user configuration flexibility for threshold default settings and report generation parameter collection.

Note: Changes to a service PM template can only be made if the service is inactive and is not on an end-to-end service.

The following procedure describes how to create or modify a monitoring template.

Important: Default threshold values in the sonet_ptp_pm and sdh_ptp_pm template are based on performance monitoring for OC-3 and STM-1 rates, respectively. Force10 recommends customizing these templates for rates other than OC-3 and STM-1.

Table 2-1 Creating or Modifying a PM Template

Step Procedure

1 In Map View, select Admin, then Performance Templates. The Performance Templates dialog box displays.

Figure 2-1 Performance Templates Dialog Box

Page 161: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceCreating or Modifying a Monitoring Template

Release OPS4.2.3 Force10 Networks Page 2-3

2 From the Type drop-down list, select the template type. Each ptp template is used for port or subport; each path template is used for service performance monitoring; each capacity template is used for switch capacity monitoring; each eqp template is used for equipment performance monitoring. To display the types in alphabetical order, click the Type heading in the dialog box.• ds1_ptp_pm: DS1 port performance monitoring• ds3_ptp_pm: DS3 port performance monitoring• e1_ptp_pm: E1 port performance monitoring• e3_ptp_pm: E3 port performance monitoring• ec1_ptp_pm: EC1 port performance monitoring• eop_ptp_pm: Ethernet over PDH port performance monitoring• eos_ptp_pm: Ethernet over SONET/SDH port performance

monitoring• ethernet_10ge_eq_pm: Ethernet equipment performance monitoring

for 10GbE and GbE-10 cards• ethernet_eopdh_eq_pm: Ethernet over PDH equipment performance

monitoring for EoPDH cards• ethernet_eq_pm: Ethernet equipment performance monitoring fpr

NGE and NGE Plus cards• ethernet_ptp_pm: Ethernet port performance monitoring• ethernet_svcport_pm: Ethernet service port performance monitoring

per service flow• sdh_hp_path_pm: SDH high order path (VC4 or VC3) performance

monitoring• sdh_lp_path_pm: SDH VC3 low order path performance monitoring• sdh_ptp_pm: SDH port performance monitoring

• sdh_vc11_path_pm: VC11 low order path performance monitoring• sdh_vc12_path_pm: VC12 low order path performance monitoring• sdh_vc_capacity_pm: SDH VT/TU switch capacity monitoring• sonet_path_pm: SONET path performance monitoring

• sonet_ptp_pm: SONET port performance monitoring• sonet_vt_capacity_pm: SONET VT/TU switch capacity monitoring

• te206_pm: TE-206 node performance monitoring• vt_path_pm: SONET virtual tributary (VT) path performance

monitoring

3 Creating a template?• Yes. Go to the next step.• No. Go to Step 5.

Table 2-1 Creating or Modifying a PM Template (continued)

Step Procedure

Page 162: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringCreating or Modifying a Monitoring Template

Page 2-4 Force10 Networks Release OPS4.2.3

4 Click Add, then enter a Name for the template. Go to Step 6.

Note: Force10 recommends making a copy of the default template and naming it ‘original’. This avoids changing the default value on the Configuration screen for all cards and ports or on the Create/Edit EOP screens for EOP ports. For TE-206 nodes, this prevents PM collection from being enabled on all TE-206 nodes.

5 Double-click the template row to open the Configuration Template dialog box.

6 Set the thresholds for each performance monitoring parameter you want the system to generate threshold crossing alerts (TCA) using one of the following methods: • Manually set threshold defaults. (If the threshold value is crossed prior

to setting the level for the current 15-minute or 24-hour period, the system could erroneously generate Ethernet PM TCA alerts.)

Note: For eop_ptp_pm and ethernet_eopdh_eq_pm templates, select the Non-resetting PM check box to prevent the value in the 24-hour period from resetting to “0” every 24 hours. • Click Default Thresholds to set all standard default settings if there

are no non-default threshold requirements.• Click Disable Thresholds and zero out all settings. The system will

not generate TCAs.

7 For the capacity monitoring parameters, manually set the Capacity Available % parameter threshold to have the system generate threshold crossing alerts (TCA) if the amount of VT/TU switching capacity available is exceeded. A TCA will be generated once per interval.

8 Select the check box in the corresponding Collect column to enable Report data collection (as desired). For all service port PM parameters, the default is Disabled. For TE-206 nodes, if the Collect check box is selected, all PM data for the nodes is collected.

Note: For capacity monitoring, only VT/TU switching information is captured for reports. STS paths are not included when determining available capacity.

Note: The number of parameters you select affects the file size. If the output files are stored on the server, the server performance could be affected. For information on changing the output directory, see the TransNav Provisioning Guide, Chapter 5—“Generating and Viewing Reports,” Generating Reports.

Table 2-1 Creating or Modifying a PM Template (continued)

Step Procedure

Page 163: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceAssigning a PM Template to a Traverse Node

Release OPS4.2.3 Force10 Networks Page 2-5

Assigning a PM Template to a Traverse Node

Choose one of the following topics by object type (e.g., port) to assign a PM template for a Traverse node:• Assigning a Port PM Template, page 2-6• Assigning an EOS Port PM Template, page 2-6• Assigning an EOP Port PM Template, page 2-7• Assigning a Subport PM Template, page 2-8• Assigning a Service PM Template, page 2-8

9 Click OK.

The example shown below is a DS1 port performance monitoring template with standard default values and Collect (for the Report function) set.

Figure 2-2 DS1 PM Configuration Template Dialog Box

10 A confirmation dialog box displays. Click Yes to synchronize the template to make it available to other nodes. Click No if you do not want to synchronize the new template.

Table 2-1 Creating or Modifying a PM Template (continued)

Step Procedure

Page 164: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringAssigning a Port PM Template

Page 2-6 Force10 Networks Release OPS4.2.3

Assigning a Port PM Template

The following procedure describes how to assign a port PM template to a card port.

Assigning an EOS Port PM Template

The following procedure describes how to assign an EOS port PM template to an EOS port.

Table 2-2 Assigning a Port PM Template

Step Procedure

1 In Shelf View, click a card port.

2 Click the Config tab. The Port Configuration screen appears.

3 From the PM Template parameter list, select a port PM (ptp) template. If you have not created or modified a template, only the default value appears.

4 Click Apply.

5 The Assigning a Port PM Template procedure is complete.

Table 2-3 Assigning an EOS Port PM Template

Step Procedure

1 In Shelf View, click the Ethernet tab.

2 Select the EOS subtab and click an EOS port from the EOS port list, then click Edit.

3 Click Advanced. The EOS Advanced Parameters dialog box displays.

4 From the PM Template parameter list, select an eos_ptp_pm template. If you have not created or modified a template, only the default value appears.

5 Click Apply.

6 The Assigning an EOS Port PM Template procedure is complete.

Page 165: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceChanging a Member PDH PM Template for an EOP PDH Member

Release OPS4.2.3 Force10 Networks Page 2-7

Assigning an EOP Port PM Template

The following procedure describes how to assign an EOP port PM template to an EOP port.

Changing a Member PDH PM Template for an EOP PDH Member

Member PDH PM templates are usually assigned to PDH members at the time the EOP port is created. The following procedure describes how to change a PM template for an existing EOP PDH member.

For information on assigning a Member PDH PM Template to a new EOP port, see the TransNav Provisioning Guide, Section 7—Configuring Ethernet, Chapter 6—“Ethernet Over PDH (EOP)”.

Table 2-4 Assigning an EOP Port PM Template

Step Procedure

1 In Shelf View, click the Ethernet tab.

2 Select the EOP subtab and click an EOP port from the EOP port list, then click Edit.

3 Click Advanced. The EOP Advanced Parameters dialog box displays.

4 From the PM Template parameter list, select an eop_ptp_pm template. If you have not created or modified a template, only the default value appears.

5 Click OK. A Synchronize Template message displays “Would you like to synchronize the new Template?” Click Yes to synchronize the template or No.

6 The Assigning an EOS Port PM Template procedure is complete.

Table 2-5 Changing a Member PDH PM Template for EOP PDH Members

Step Procedure

1 In Shelf View, click the Ethernet tab.

2 Select the EOP subtab and click an EOP port from the EOP port list, then click Edit.

3 From the Member PDH PM Template parameter list, select a template (ds1_ptp_pm, ds3_ptp_pm, e1_ptp_pm, or e3_ptp_pm). The available template types match the bandwidth value in the PDH Member Type parameter (DS1, DS3, E1, or E3). If you have not created or modified a template, only the default value appears. Go to Step 5.

4 Click Apply.

5 The Changing a Member PDH PM Template for EOP PDH Members procedure is complete.

Page 166: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringAssigning a Subport PM Template

Page 2-8 Force10 Networks Release OPS4.2.3

Assigning a Subport PM Template

The following procedure describes how to assign a port PM template to a DS3 Transmux subport.

Assigning a Service PM Template

The following procedure describes how to assign a path PM template to a service. The service PM template is selected during service creation or editing.

Note: Changes to the PM template can only be made if the service is inactive and is not on an end-to-end service.

Table 2-6 Assigning a Subport PM Template

Step Procedure

1 In Shelf View, select a DS3 Transmux card port.

2 Click the Config tab.

3 From the Subport row, PM Template column list, select a port (ptp) PM template matching the embedded signal subport type (e.g., ds1_ptp).

4 Click Apply.

5 The Assigning a Subport PM Template procedure is complete.

Table 2-7 Assigning a Service PM Template

Step Procedure

1 From any view, click the Service tab.

2 Creating or editing a service?• Creating: Click Add to access the Create Service tab.• Editing: Double-click a service row to access the Edit Service tab.

3 Click Advanced to access the Advanced Parameters dialog box.

Page 167: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceViewing PM Data

Release OPS4.2.3 Force10 Networks Page 2-9

Viewing PM Data

Choose one of the following topics by object type (e.g., port) to view PM data for Traverse nodes. • Viewing Port or Subport PM Data, page 2-10• Viewing Service Path PM Data, page 2-12

To schedule PM data for TE-206 nodes, see the following section:• Scheduling TE-206 PM Collection Times, page 2-20

4 The Advanced Parameters dialog box appears.

From the Source PM Template and Destination PM Template or Service Port PM list, select a PM template.

Figure 2-3 Service PM Template Parameters

5 Click Done and continue creating or editing the service.

6 The Assigning a Service PM Template procedure is complete.

Table 2-7 Assigning a Service PM Template (continued)

Step Procedure

3

4

PM Timing. Performance monitor on-screen Samples (bin) column timestamps use the Traverse node time. The on-screen PM Refresh Time uses the TransNav GUI time. The Traverse node time and TransNav GUI time can be different if they are in different time zones.

Page 168: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringViewing Port or Subport PM Data

Page 2-10 Force10 Networks Release OPS4.2.3

Viewing Port or Subport PM Data

The following procedure describes how to view port or subport PM data.

Table 2-8 Viewing Port or Subport PM Data

Step Procedure

1 In Shelf View, click the Performance tab and select a port or a subport.

Figure 2-4 Object Selection for PM

2 On the Interval list (see the graphic in the next step), you can select 15-minute or 24-hour intervals. You can view up to thirty-two 15-minute or two 24-hour Samples current and previous.

Page 169: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceViewing Port or Subport PM Data

Release OPS4.2.3 Force10 Networks Page 2-11

3 Click Refresh to re-display updated PM values.

Figure 2-5 Port Performance Tab

4 If you click Reset, the counters reset to zero.

Note: If the Non-resetting PM check box was selected for any Ethernet template, the Refresh Time parameter will not be updated.

5 Click Print to print the current screen.

6 Click Save to save the PM data to a file.

7 The Viewing Port or Subport PM Data procedure is complete.

Table 2-8 Viewing Port or Subport PM Data (continued)

Step Procedure

Page 170: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringViewing Service Path PM Data

Page 2-12 Force10 Networks Release OPS4.2.3

Viewing Service Path PM Data

The following procedure describes how to view service path PM data.

Table 2-9 Viewing Service PM Data

Step Procedure

1 In Shelf View, click the Service tab.

2 Select a service. Right-click and select Show Tx/Rx Path to display the Path Display for Service screen.

Figure 2-6 Path Display for Services Screen

3 Click the PM (Performance) tab to display the PM screen.

4 From the Path Display for Service screen, for either a Tx or Rx table row, select an Active or Standby Hop. Your selection appears in the Hop Id field on the PM tab.

5 Click Refresh on the PM tab to display the performance monitoring data.

Page 171: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceViewing Service Path PM Data

Release OPS4.2.3 Force10 Networks Page 2-13

6 On the Interval list you can select 15-minute or 24-hour intervals. You can view up to thirty-two 15-minute or two 24-hour Samples current and previous.

Figure 2-7 Service Performance (PM) Tab

7 Click Refresh to re-display updated PM values.

8 If you click Reset, the counters reset to zero.

9 Click Print to print the current screen.

10 Click Save to save the PM data to a file.

11 The Viewing Service PM Data procedure is complete.

Table 2-9 Viewing Service PM Data (continued)

Step Procedure

Page 172: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringViewing Signal Path Trace Data

Page 2-14 Force10 Networks Release OPS4.2.3

Viewing Signal Path Trace Data

The following procedure describes how to view transmission and received signal path trace information.

Table 2-10 Viewing Signal Path Trace Data

Step Procedure

1 In Shelf View, click the Service tab.

2 Select a service. Right-click and select Show Tx/Rx Path to display the Path Display for Service screen.

Figure 2-8 Path Display for Service Screen

3 Click the CTP tab to display the CTP screen.

4 From the Path Display for Service screen, for either a Tx or Rx table row, select an Active Hop. Your selection appears in the EndPoint field on the CTP tab.

Page 173: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceViewing Signal Path Trace Data

Release OPS4.2.3 Force10 Networks Page 2-15

5 In the Alarm Profile field, one of the following profile values displays:• useParent: The alarm profile of the containing object (Parent) based

on the following superset and subset definitions:– Port: Contains line and path alarms and is the superset.– High order path: Contains high and low order path alarms and is a

subset of port profiles.– Low order path: Contains only low order path alarms and is a finer

subset of high order path profiles.– STS path. Contains STS and VT path alarms and is a subset of

port profiles.– VT path: Contains only VT path alarms and is a finer subset of

STS path profiles.• default: The default alarm profile matching the CTP object type.• <user-defined>: Depending on the CTP object type, this value

indicates a user-defined alarm profile of one of the following path alarm profile types:– sdh_hp– sdh_lp– sonet_sts– sonet_vt

6 Click Received/Transmitted Path Overhead. The Received/ Transmitted Path Overhead dialog box displays. (The name of the button and the resulting dialog box corresponds to whether you selected a Tx or Rx active hop.)

Figure 2-9 Path Overhead Dialog Box

7 Click Refresh to display updated PM values.

8 Click Done to return to the previous screen.

9 The Viewing Signal Path Trace Data procedure is complete.

Table 2-10 Viewing Signal Path Trace Data (continued)

Step Procedure

Page 174: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringViewing Capacity Monitoring Data

Page 2-16 Force10 Networks Release OPS4.2.3

Viewing Capacity Monitoring Data

The following procedure describes how to view VT or TU capacity monitoring data. The capacity monitoring data shows the numbers of paths used or available at the instant the information is captured. Unlike the performance monitoring data, the capacity monitoring data is not accumulated for each period. If the VT card where the capacity is being monitored is in a 1:n protection group, only the capacity of the working card will be collected.

Table 2-11 Viewing VT/TU Capacity Monitoring Data

Step Procedure

1 In Shelf View, click the Performance tab and select a VT or VT-TU module.

2 On the Interval list (see the graphic in the next step), you can select 15-minute or 24-hour intervals. You can view up to thirty-two 15-minute or two 24-hour Samples current and previous.

3 Click Refresh to re-display updated capacity monitoring values.

Figure 2-10 Viewing VT/TU Capacity Monitoring Data

4 If you click Reset, an error message displays. The counters do not reset to zero.

5 Click Print to print the current screen.

6 Click Save to save the capacity monitoring data to a file.

7 The Viewing VT/TU Capacity Monitoring Data procedure is complete.

Page 175: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceReport Generation

Release OPS4.2.3 Force10 Networks Page 2-17

Report Generation

Through the TransNav management system, you have the ability to create different reports. You can customize the reports for your own uses, as well as specify generation dates and generation periods.

Performance monitoring data for TE-206 nodes is collected by TransNav and stored in the EMS directory on the server. To view the output data collected by the report, go to the \report\output directory. (This is the only way to access large TE-206 reports.) The report displays in the following format:

<Report name > _mm.dd.yyyy.hh.mm

The file must be opened with a basic document editor such as NotePad or WordPad.

Create the following reports for all nodes in a domain or for a specific node:• Performance monitoring• Historical alarm• Node inventory• Historical event• Resource availability• Domain service• Service availability

The following figure shows a sample event report.

Figure 2-11 Event Report Sample

Page 176: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringGenerating a PM Report

Page 2-18 Force10 Networks Release OPS4.2.3

Generating a PM Report

The following procedure describes how to create a PM report.

For information on scheduling reports, refer to the TransNav Management System GUI Guide, Section 2— Administrative Tasks, Chapter 5—“Generating and Viewing Reports,” Using the Report Scheduler.

Important: Performance monitoring data collection for the Report function occurs when the corresponding PM template Collect check boxes are set. See Creating or Modifying a Monitoring Template.

Table 2-12 PM Report Generation

Step Procedure

1 From the Admin menu, select Reports. The Reports screen displays.

Figure 2-12 Reports Screen

2 Select a PM report from the Report Schedulers list.

3 Click Generate Now. Entries appear in the Report List section.

4 Select a Report List entry.

5 Click View Report.

6 The PM Report Generation procedure is complete.

Page 177: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Managing PerformanceAssigning a Template to a TE-206 Node

Release OPS4.2.3 Force10 Networks Page 2-19

Assigning a Template to a TE-206 Node

The following procedure describes how to assign a PM template to a TE-206 node.

Table 2-13 Assigning a Template to a TE-206 Node

Step Procedure

1 In Shelf View, double-click a TE-206 node to establish connection. The selected shelf GUI displays.

Figure 2-13 Select TE-206 Node Template

2 Click the Config tab.

3 From the PM Template Name, select the name of the PM template. Click Apply.

4 The Assigning a Template to a TE-206 Node procedure is complete.

Page 178: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringScheduling TE-206 PM Collection Times

Page 2-20 Force10 Networks Release OPS4.2.3

Scheduling TE-206 PM Collection Times

The following procedure describes setting up PM collection times for TE-206 nodes from TransNav:

To generate a PM report for a TE-206 node from TransNav, follow the instructions in Generating a PM Report.

Table 2-14 Scheduling TE-206 PM Collection Times

1 From Map View, establish connection to the TE-206 node that you want to set up PM data collection times. The WebCraft GUI displays with a graphical view of the node.

2 On the WebCraft GUI, click the Administration tab.

3 Under Performance Monitoring, select Daily Collection Start Time.

4 The start time is represented by 24 integers (00-23) to indicate a 24-hour clock. 00 refers to 12:00a.m. and so on. The default is 17:00.

Figure 2-14 Set the Daily Collection Time

Select the time to start the 24 hour collection and click OK to set the new start time.

5 The Scheduling TE-206 PM Collection Times procedure is complete.

Page 179: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 2-21

SECTION 2PERFORMANCE MONITORING

Chapter 2 SONET Performance Parameters

Introduction This chapter provides performance parameter information for:• DS1 Port PM, page 2-22• DS3 Port PM, page 2-25• EC-1 Port PM, page 2-28 • SONET Port PM, page 2-31• SONET STS Path Layer PM, page 2-36• SONET VT Path Layer PM, page 2-39• SONET Capacity Monitoring, page 2-41

Cards (modules) that do not collect PM information may be reserved for administrative use; contact your system Administrator.

For further information on performance monitoring and the management system, see the TransNav Management System GUI Guide.

Page 180: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringDS1 Port PM

Page 2-22 Force10 Networks Release OPS4.2.3

DS1 Port PM The Traverse system provides near- and far-end DS1 port PM parameters (ds1_ptp_pm).

Table 2-15 DS1 Port PM Parameters—Near End

Parameter Definition 15-min Threshold

Daily Threshold

Line—Near End

CV (Code Violations)

Count of both bipolar violations (BPV) and excessive zeros (EXZ) occurring over the accumulation period. An EXZ increments the CV Line count by one regardless of the length of the zero string.

1–16383

Default: 13340

1–1048575

Default: 133400

ES(Errored Seconds)

Count of seconds containing one or more BPVs, one or more EXZs, or one or more LOS defects. BPVs that are part of the zero substitution code are excluded.

1–900

Default: 65

1–65535

Default: 648

SES (Severely Errored Seconds)

Count of 1-second intervals during which BPVs plus EXZs exceed 1544, or one or more LOS defects occur. BPVs that are part of the zero substitution code are excluded.

1–63

Default: 10

1–4095

Default: 100

LOSS(Loss of Signal Seconds

Count of one or more 1-second intervals containing LOS defects.

1–63

Default: 10

1–4095

Default: 100

Path—Near End

CV(Code Violations)

Count of frame synchronization bit errors in the SF format or a count of CRC-6 errors in the ESF format.

1–16383

Default: 13296

1–1048575

Default: 132960

ES(Errored Seconds)

Count of 1-second intervals containing any of the following:• CRC-6 errors (ESF)• CS events (ESF, SF)• SEF defects (ESF, SF)• LOS defects (ESF, SF)• FE errors (SF)

1–900

Default: 65

1–65535

Default: 648

SES(Severely Errored Seconds)

Count of 1-second intervals containing:• 320 or more CRC-6 errors (ESF)• 8 or more FE events (SF)• one or more SEF or LOS defects (ESF, SF)

1–63

Default: 10

1–4095

Default: 100

Page 181: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersDS1 Port PM

Release OPS4.2.3 Force10 Networks Page 2-23

AISS(Alarm Indication Signal Seconds)

Count of 1-second intervals containing one or more AIS defects

1–63

Default: 10

1–4095

Default: 100

SAS(Severely Errored Frames/Alarm Indication Signal Seconds)

Count of 1-second intervals containing one or more of either SEF defects or LOS/AIS defects.

1–63

Default: 2

1–4095

Default: 17

CSS(Controlled Slip Seconds

Counts of 1-second intervals containing one or more controlled slips.

1–63

Default: 2

1–4095

Default: 17

UAS(Unavailable Seconds)

Count of 1-second intervals for which the DS1 path is unavailable.

1–63

Default: 10

1–4095

Default: 100

FC(Failure Counts)

Count of the number of near-end failure events on the path. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 4

1–4094

Default: 40

Table 2-16 DS1 Port PM Parameters—Far End

Parameter Definition 15-min Threshold

Daily Threshold

Line—Far End

ES (Errored Seconds)

Count of seconds containing one or more BPVs, one or more EXZs, or one or more LOS defects. BPVs that are part of the zero substitution code are excluded.

1–900

Default: 65

1–65535

Default: 648

Table 2-15 DS1 Port PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Page 182: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringDS1 Port PM

Page 2-24 Force10 Networks Release OPS4.2.3

Path—Far End

CV (Code Violations)

Count of frame synchronization bit errors (FE) in the SF format or a count of CRC-6 errors in the ESF format.

1–16383

Default: 13296

1–1048575

Default: 132960

ES (Errored Seconds–Path)

Count of 1-second intervals containing any of the following:• CRC-6 errors (ESF)• CS events (ESF, SF)• SEF defects (ESF, SF)• LOS defects (ESF, SF)• FE errors (SF)

1–900

Default: 65

1–65535

Default: 648

SES (Severely Errored Seconds–Path)

Count of 1-second intervals containing:• 320 or more CRC-6 errors (ESF)• 8 or more FE events (SF)• 1 or more SEF or LOS defects (ESF, SF)

1–63

Default: 10

1–4095

Default: 100

SEFS (Severely Errored Framing Seconds–Path)

Count of 1-second intervals containing one or more SEF defects.

1–63

Default: 2

1–4095

Default: 17

CSS (Controlled Slip Seconds–Path)

Counts of 1-second intervals containing one or more controlled slips.

1–63

Default: 2

1–4095

Default: 17

UAS(Unavailable Seconds–Path)

Count of 1-second intervals for which the DS1 path is unavailable.

1–63

Default: 10

1–4095

Default: 100

FC (Failure Count–Path)

Count of far-end path failure (RAI) events. 1–63

Default: 10

1–4095

Default: 100

Table 2-16 DS1 Port PM Parameters—Far End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Page 183: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersDS3 Port PM

Release OPS4.2.3 Force10 Networks Page 2-25

DS3 Port PM The Traverse system provides near- and far-end DS3 (clear channel or transmux) port PM parameters.

Table 2-17 DS3 Port PM Parameters—Near End

Parameter Definition 15-min Threshold

Daily Threshold

Line—Near End

CV (Code Violations)

Count of both bipolar violations (BPV) and excessive zeros (EXZ) occurring over the accumulation period. An EXZ increments the CV Line count by one regardless of the length of the zero string. BPVs that are part of the zero substitution code are excluded.

1–16383

Default: 387

1–1048575

Default: 3865

ES (Errored Seconds)

Count of seconds containing one or more BPVs, one or more EXZs, or one or more LOS defects. BPVs that are part of the zero substitution code are excluded.

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of seconds during which BPVs plus EXZs exceed 44, or one or more LOS defects occur. BPVs that are part of the zero substitution code are excluded.

1–63

Default: 4

1–4095

Default: 40

Path PBit—Near End

CV (Code Violations)

Count of P-bit parity check CVs. The receipt of non-identical P-bits corresponding to the same DS3 M-Frame also constitutes a parity check CV.

1–16383

Default: 382

1–1048575

Default: 3820

ES (Errored Seconds

Count of seconds containing one or more P-bit parity errors, one or more SEF defects, or one or more LOS defects.

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of seconds containing more than 44 P-bit parity violations, one or more SEF defects, or one or more LOS defects.

1–63

Default: 4

1–4095

Default: 40

UAS (Unavailable Seconds)

Count of 1-second intervals during which the DS3 path is unavailable.

1–63

Default: 10

1–4095

Default: 10

Page 184: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringDS3 Port PM

Page 2-26 Force10 Networks Release OPS4.2.3

FC (Failure Counts)

Count of the number of near-end path failure events. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–63

Default: 4

1–4095

Default: 40

Path CBit—Near End

CV(Code Violations)

Both CP-bit parity CVs (CVCP-P) and CVP-P counts are defined and may be supported since they can convey different information. The first is the count of CP-bit parity errors occurring in the accumulation period. The CVP-P parameter count is the same as described above.

1–16383

Default: 382

1–1048575

Default: 3820

ESC (Errored Seconds)

Two versions of the ES parameter may be accumulated and stored. The ESCP-P parameter is a count of seconds containing one or more CP-bit parity errors, one or more SEF defects, or one or more LOS defects. The ESP-P parameter count is the same as described above.

1–900

Default: 25

1–65535

Default: 250

SESC (Severely Errored Seconds)

Two versions of the SES parameter may be accumulated and stored. The SESCP-P parameter is a count of seconds containing more than 44 CP-bit parity errors, one or more SEF defects, or one or more LOS defects. The SESP-P parameter is the same as described above.

1–63

Default: 4

1–4095

Default: 40

UASC (Unavailable Seconds–C-bit parity application)

Count of 1-second intervals during which the DS3 path is unavailable.

1–63

Default: 10

1–4095

Default: 10

Table 2-17 DS3 Port PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Page 185: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersDS3 Port PM

Release OPS4.2.3 Force10 Networks Page 2-27

Table 2-18 DS3 Port PM Parameters—Far End

Parameter Definition 15-min Threshold

Daily Threshold

Path PBit—Far End

FCFE (Failure Counts)

Count of the number of far-end path failure events. A failure event begins when the RFI-P failure is declared, and ends when the RFI-P failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–63

Default: 4

1–4095

Default: 40

Path CBit—Far End

CVFE (Code Violations)

Counted when the three FEBE bits in an M-frame are not all set to 1.

1–16383

Default: 382

1–1048575

Default: 3820

ESFE (Errored Seconds)

Count of 1-second intervals containing one or more M-frames with the three FEBE bits not all set to one, or one or more far-end SEF/LOS defects.

1–900

Default: 25

1–65535

Default: 250

SESFE (Severely Errored Seconds)

Count of 1-second intervals containing one or more than 44 M-frames with the three FEBE bits not all set to one, or one or more far-end SEF/LOS defects.

1–63

Default: 4

1–4095

Default: 40

UASFE (Unavailable Seconds

Count of 1-second intervals during which the DS3 path is unavailable.

1–63

Default: 10

1–4095

Default: 10

Page 186: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEC-1 Port PM

Page 2-28 Force10 Networks Release OPS4.2.3

EC-1 Port PM The Traverse system provides near- and far-end EC-1 port PM parameters.

Table 2-19 EC1 Port PM Parameters—Near-End

Parameter Definition 15-min Threshold

Daily Threshold

SECTION

CV (Code Violations)

Count of BIP-8 errors that are detected at the section layer of the incoming signal.

Count of BIP errors detected at the section layer (i.e., using the B1 bytes in the incoming SONET signal). Up to 8 section BIP errors can be detected per STS-N frame, with each error incrementing the CV-S register.

1–16383

Default: 382

1–1048575

Default: 3820

ES (Errored Seconds)

Count of 1-second intervals during which (at any point during the second) at least one section layer BIP error was detected or an SEF or LOS defect was present

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of the seconds during which 154 or more section layer BIP errors were detected or an SEF or LOS defect was present.

1–900

Default: 4

1–65535

Default: 40

SEFS (Severely Errored Framing Seconds)

Count of 1-second intervals during which (at any point during the second) an SEF defect was present. An SEF defect is detected when an incoming signal has a minimum of four consecutive errored framing patterns.

1–900

Default: 2

1–65535

Default: 8

LINE

CV (Coding Violations)

Count of BIP errors detected at the line layer (i.e., using the B2 bytes in the incoming SONET signal). Up to 8xN BIP errors can be detected per STS-N frame, with each error incrementing the CV-L current second register.

1–16383

Default: 387

1–1048575

Default: 3865

ES (Errored Seconds)

Count of the seconds during which (at any point during the second) at least one Line layer BIP error was detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present.

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of the seconds during which 52 or more Line layer BIP errors were detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present.

1–63

Default: 4

1–4095

Default: 40

Page 187: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersEC-1 Port PM

Release OPS4.2.3 Force10 Networks Page 2-29

UAS (Unavailable Seconds)

Count of the seconds during which the Line was considered unavailable. A Line becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-Ls, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-Ls.

1–63

Default: 4

1–4095

Default: 40

FC (Failure Counts)

Count of the number of near-end Line failure events. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–63

Default: 4

1–4095

Default: 40

Table 2-19 EC1 Port PM Parameters—Near-End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Table 2-20 EC1 Port PM Parameters—Far-End

Parameter Definition 15-min Threshold Daily Threshold

LINE

CVFE (Coding Violations–Far-End)

Count of the number of BIP errors detected by the far-end LTE and reported back to the near-end LTE using the REI-L indication in the Line overhead. For SONET signals at rates below OC-48, up to 8xN BIP errors per STS-N frame can be indicated using the REI-L. For OC-48 signals, up to 255 BIP errors per STS-N frame can be indicated. The CV-LFE current second register increments for each BIP error indicated by the incoming REI-L.

1–16383

Default: 387

1–1048575

Default: 3865

ESFE (Errored Seconds–Far-End)

Count of the seconds during which (at any point during the second) at least one Line BIP error was reported by the far-end LTE (using the REI-L indication) or an RDI-L defect was present.

1–900

Default: 25

1–65535

Default: 250

SESFE (Severely Errored Seconds–Far-End)

Count of the seconds during which K or more Line BIP errors were reported by the far-end LTE or an RDI-L defect was present. The number of reported far-end BIP errors causing a second to be considered an SES-LFE.

1–63

Default: 4

1–4095

Default: 40

Page 188: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEC-1 Port PM

Page 2-30 Force10 Networks Release OPS4.2.3

UASFE (Unavailable Seconds–Far-End)

Count of the seconds during which the Line is considered unavailable at the far end. A Line is considered unavailable at the far end at the onset of 10 consecutive seconds that qualify as SES-LFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES-LFEs.

1–63

Default: 4

1–4095

Default: 40

FCFE (Failure Counts–Far-End)

Count of the number of far-end Line failure events. A failure event begins when the RFI-L failure is declared, and ends when the RFI-L failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–63

Default: 4

1–4095

Default: 40

Table 2-20 EC1 Port PM Parameters—Far-End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Table 2-21 SFP (and XFP) Optical Port PM Parameters

Parameter Definition

Measured Temperature A measure of the internal transceiver temperature yielding a value within the total range of -128 to +128 celsius.

Measured Supply Voltage A measure of the internal transceiver supply voltage yielding a value within the total range of 0 to +6.55 volts.

Measured TX Bias Current A measure of the TX bias current yielding a value within the total range of 0 to 131 mA.

Measured TX Output Power A measure of the TX output power based on the measurement of laser monitor photodiode current and yielding a value within the total range of 0 to 6.5535 mW.

Measured TX Input Power A measure of the TX input power yielding a value within the total range of 0 to 6.5535 mW (~ -40 to +8.2 dBm). Absolute accuracy is dependent upon the exact optical wavelength.

Page 189: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersSONET Port PM

Release OPS4.2.3 Force10 Networks Page 2-31

SONET Port PM

The Traverse system provides the following near- and far-end SONET port performance monitoring parameters.

Important: Default threshold values in the sonet_ptp_pm template are based on performance monitoring for OC-3 rates. Force10 recommends customizing this template for rates other than OC-3.

Table 2-22 SONET Port PM—Near End

Parameter Definition 15-min Threshold Daily Threshold

Section—Near End

CV (Coding Violation)

Count of BIP (Bit Interleaved Parity) errors detected at the Section layer (i.e., using the B1 byte in the incoming SONET signal). Up to 8 section BIP errors can be detected per STS-N frame, with each error incrementing the CV-S register.

1–16383

Default: 382

1–1048575

Default: 3820

ES (Errored Seconds)

Count of 1-second intervals during which (at any point during the second) at least one Section layer BIP error was detected or an SEF or LOS defect was present.

1–900

Default: 25

1–65535

Default: 250

SES(Severely Errored Seconds)

Count of the seconds during which K or more Section layer BIP errors were detected or an SEF or LOS defect was present. K has the following values: • 154 for OC3• 615 for OC12• 2459 for OC48• 8854 for OC192

1–900

Default: 4

1–65535

Default: 40

SEFS(Severely Errored Framing Seconds)

Count of 1-second intervals during which (at any point during the second) an SEF defect was present. An SEF defect is detected when an incoming signal has a minimum of four consecutive errored framing patterns.

1–900

Default: 2

1–65535

Default: 8

CBiFEC (OC192 interfaces only) (Corrected bits by Forward Error Correction)

Count of number of corrected bites in the forward direction. Indicates the quality of the line using the number of FEC corrections.

1–16383

Default: 382

1–1048575

Default: 3820

Page 190: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSONET Port PM

Page 2-32 Force10 Networks Release OPS4.2.3

CByFEC

(OC-192 interfaces only) (Corrected bytes by Forward Error Correction)

Count of number of corrected bytes in the forward direction. Indicates the quality of the line using the number of FEC corrections.

1–16383

Default: 382

1–1048575

Default: 3820

Line—Near End

CV (Coding Violation)

Count of BIP errors detected at the Line layer (i.e., using the B2 bytes in the incoming SONET signal). Up to 8xN BIP errors can be detected per STS-N frame, with each error incrementing the CV-L current second register.

1–16383

Default: 1146

1–1048575

Default: 11460

ES (Errored Seconds)

Count of the seconds during which (at any point during the second) at least one Line layer BIP error was detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present.

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of the seconds during which K or more Line layer BIP errors were detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present. K has the following values: • 154 for OC3• 615 for OC12• 2459 for OC48• 8854 for OC192

1–900

Default: 4

1–65535

Default: 40

Table 2-22 SONET Port PM—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 191: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersSONET Port PM

Release OPS4.2.3 Force10 Networks Page 2-33

UAS (Unavailable Seconds)

Count of the seconds during which the Line was considered unavailable. A Line becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-Ls, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-Ls.

1–900

Default: 4

1–65535

Default: 40

FC (Failure Counts)

Count of the number of near-end Line failure events. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 4

1–4094

Default: 40

Table 2-22 SONET Port PM—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Table 2-23 SONET Port PM Parameters—Far End

Parameter Definition 15-min Threshold

Daily Threshold

Line—Far End

CVFE (Coding Violations)

Count of the number of BIP errors detected by the far-end LTE and reported back to the near-end LTE using the REI-L indication in the Line overhead. For SONET signals at rates below OC-48, up to 8xN BIP errors per STS-N frame can be indicated using the REI-L. For OC-48 signals, up to 255 BIP errors per STS-N frame can be indicated. The CV-LFE current second register increments for each BIP error indicated by the incoming REI-L.

1–16383

Default: 1146

1–1048575

Default: 11460

ESFE (Errored Seconds–Far End)

Count of the seconds during which (at any point during the second) at least one Line BIP error was reported by the far-end LTE (using the REI-L indication) or an RDI-L defect was present.

1–900

Default: 25

1–65535

Default: 250

Page 192: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSONET Port PM

Page 2-34 Force10 Networks Release OPS4.2.3

SESFE (Severely Errored Seconds– Far End)

Count of the seconds during which K or more Line BIP errors were reported by the far-end LTE or an RDI-L defect was present. The number of reported far-end BIP errors causing a second to be considered an SES-LFE. K has the following values: • 154 for OC3• 615 for OC12• 2459 for OC48• 8854 for OC-192

1–900

Default: 4

1–65535

Default: 40

UASFE (Unavailable Seconds)

Count of the seconds during which the Line is considered unavailable at the far end. A Line is considered unavailable at the far end at the onset of 10 consecutive seconds that qualify as SES-LFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES-LFEs.

1–900

Default: 4

1–65535

Default: 40

FCFE (Failure Counts)

Count of the number of far-end Line failure events. A failure event begins when the RFI-L failure is declared, and ends when the RFI-L failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 4

1–4094

Default: 40

PSCW (Protection Switch Counts Working)

Count of the number of times that an OC-N line service (i.e., BLSR, 1+1 ASP) switches from the working to the protecting line. This count also includes the number of times the service (revertive) switches back from the protecting to the working line.

1–63

Default: 2

1–255

Default: 10

PSDW (Protection Switch Duration Working)

Count of the seconds that the working line was being used to carry an OC-N line service (i.e., BLSR, 1+1 ASP).

1–900

Default: 4

1–65535

Default: 40

Table 2-23 SONET Port PM Parameters—Far End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Page 193: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersSONET Port PM

Release OPS4.2.3 Force10 Networks Page 2-35

PSCP(Protection Switch Counts Protecting)

Count of the number of times that an OC-N line service (i.e., BLSR, 1+1 ASP) switches from the protecting to any working line. This count also includes the number of times service (revertive) switches back from the protecting to the working line.

1–63

Default: 2

1–255

Default: 10

PSDP(Protection Switching Duration Protecting)

Count of the seconds that the protecting line was being used to carry OC-N line service (i.e., BLSR, 1+1 ASP).

1–900

Default: 4

1–65535

Default: 40

Table 2-23 SONET Port PM Parameters—Far End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Page 194: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSONET STS Path Layer PM

Page 2-36 Force10 Networks Release OPS4.2.3

SONET STS Path Layer PM

The Traverse system provides the following performance monitoring parameters for SONET STS path layer services (sonet_path_pm).

Table 2-24 SONET STS Path PM Parameters—Near End

Parameter Definition 15-min Threshold Daily Threshold

CV (Coding Violations)

Count of BIP errors detected at the STS Path layer (i.e., using the B3 byte in the incoming STS path overhead). Up to 8 BIP errors can be detected per frame, with each error incrementing the CV-P current second register.

1–16383

Default: 1146

1–1048575

Default: 11460

ES(Errored Seconds)

Count of the seconds during which (at any point during the second) at least one path BIP error was detected, or an LOS (or a lower-layer, traffic-related, near-end defect), an LOP-P or, if the STS PTE monitoring the path supports ERDI-P for that path, an UNEQ-P or TIM-P (Trace Identifier Mismatch) defect was present.

1–900

Default: 25

1–65535

Default: 250

SES(Severely Errored Seconds)

Count of the seconds during which 2400 or more path BIP errors were detected, or an LOS (or a lower-layer, traffic-related, near-end defect), an LOP-P or, if the STS PTE monitoring the path supports ERDI-P for that path, an UNEQ-P or TIM-P defect was present. The number of BIP errors causes a second to be considered an SES-P.

1–900

Default: 4

1–65535

Default: 40

UAS (Unavailable Seconds)

Count of the seconds during which the path was considered unavailable. A path becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-Ps and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-Ps.

1–900

Default: 4

1–65535

Default: 40

RTD (Round Trip Delay)

Query the current round trip delay in milliseconds. The thresholds are not cumulative.

1–1000

Default: 0

1–1000

Default: 0

RTDA(Round Trip Delay, Average)

Query the average round trip delay in milliseconds. The thresholds are not cumulative.

1–1000

Default: 0

1–1000

Default: 0

Page 195: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersSONET STS Path Layer PM

Release OPS4.2.3 Force10 Networks Page 2-37

RTDM(Round Trip Delay, Maximum)

Query the maximum round trip delay in milliseconds. The thresholds are not cumulative.

1–1000

Default: 0

1–1000

Default: 0

RTDS(Round Trip Delayed Seconds)

Count of the number of seconds when measured delay exceeds the expected delay. The system will raise a TCA when the measured delay exceeds the PM threshold.

1-900

Default: 25

1-65535

Default: 250

RTDTO(Round Trip Delay, Time Out)

Count of the number of seconds when delay measurement is not available due to time out (i.e., the monitoring of CTP times out and resets upon not receiving the tag within one second). The timeout seconds only accumulate when a valid F3 byte is received.

1-900

Default: 25

1-65535

Default: 250

Table 2-24 SONET STS Path PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Table 2-25 SONET STS Path PM Parameters—Far End

Parameter Definition 15-min Threshold Daily Threshold

CVFE(Coding Violations)

Count of the number of BIP errors detected by the far-end STS PTE and reported back to the near-end STS PTE using the REI-P indication in the STS Path overhead. Up to 8 BIP errors per frame can be indicated. The CV-PFE current second register increments for each BIP error indicated by the incoming REI-P.

1–16383

Default: 1146

1–1048575

Default: 11460

ESFE (Errored Seconds)

Count of the seconds during which (at any point during the second) at least one STS Path BIP error was reported by the far-end STS PTE (using the REI-P indication), a one-bit RDI-P was present, or (if ERDI-P is supported) an ERDI-P Server or Connectivity defect was present.

1–900

Default: 25

1–65535

Default: 250

Page 196: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSONET STS Path Layer PM

Page 2-38 Force10 Networks Release OPS4.2.3

SESFE (Severely Errored Seconds)

Count of the seconds during which 2400 or more STS Path BIP errors were reported by the far-end STS PTE, a one-bit RDI-P was present, or (if ERDI-P is supported) an ERDI-P Server or connectivity defect was present. The number of reported far-end BIP errors causing a second to be considered an SES-PFE.

1–900

Default: 4

1–65535

Default: 40

UASFE (Unavailable Seconds)

Count of the seconds during which the STS Path is considered unavailable at the far end. A path is considered unavailable at the far end at the onset of 10 consecutive seconds that qualify as SES-PFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES-PFEs.

1–900

Default: 4

1–65535

Default: 40

Table 2-25 SONET STS Path PM Parameters—Far End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 197: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersSONET VT Path Layer PM

Release OPS4.2.3 Force10 Networks Page 2-39

SONET VT Path Layer PM

The Traverse system provides the following performance monitoring parameters for SONET VT path layer services (vt_path_pm).

Table 2-26 SONET VT Path PM Parameters—Near End

Parameter Definition 15-min Threshold

Daily Threshold

CV (Coding Violations)

Count of BIP errors detected at the VT Path layer (i.e., using bits 1 and 2 of the V5 byte in the incoming VT Path overhead). Up to 2 BIP errors can be detected per VT superframe, with each error incrementing the CV–V current second register.

1–16383

Default: 156

1–1048575

Default: 14976

ES (Errored Seconds)

Count of the seconds during which (at any point during the second) at least one VT Path BIP error was detected, or an LOS defect (or a lower-layer, traffic-related, near-end defect), an LOP–V defect or, if the VT PTE monitoring the path supports ERDI–V for that path, an UNEQ–V defect was present.

1–900

Default: 65

1–65535

Default: 648

SES(Severely Errored Seconds)

Count of the seconds during which 600 or more VT Path BIP errors were detected, or an LOS defect (or a lower-layer, traffic-related, near-end defect), an LOP–V defect or, if the VT PTE monitoring the path supports ERDI–V for that path, an UNEQ–V defect was present.

1–900

Default: 10

1–65535

Default: 100

UAS (Unavailable Seconds)

Count of the seconds during which the VT Path was considered unavailable. A VT Path becomes unavailable at the onset of 10 consecutive seconds that qualify as SES–Vs, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES–Vs.

1–900

Default: 10

1–65535

Default: 100

Page 198: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSONET VT Path Layer PM

Page 2-40 Force10 Networks Release OPS4.2.3

Table 2-27 SONET VT Path PM Parameters—Far End

Parameter Definition 15-min Threshold

Daily Threshold

CVFE (Coding Violations)

Count of the number of BIP errors detected by the far-end VT PTE and reported back to the near-end VT PTE using the REI–V indication in the VT Path overhead. Note that only 1 BIP error can be indicated per VT superframe using the REI–V bit (out of the two BIP errors that can be detected). The CV–VFE current second register increments for each BIP error indicated by the incoming REI–V.

1–16383

Default: 156

1–1048575

Default: 14796

ESFE (Errored Seconds)

Count of the seconds during which (at any point during the second) at least one VT Path BIP error was reported by the far-end VT PTE (using the REI–V indication), a one-bit RDI–V defect was present, or (if ERDI–V is supported) an ERDI–V Server or Connectivity defect was present.

1–900

Default: 65

1–65535

Default: 648

SESFE (Severely Errored Seconds)

Count of the seconds during which 600 or more VT Path BIP errors were reported by the far-end VT PTE, a one-bit RDI–V defect was present, or (if ERDI–V is supported) an ERDI–V Server or Connectivity defect was present. The number of reported far-end BIP errors causing a second to be considered an SES–VFE.

1–900

Default: 10

1–65535

Default: 100

UASFE (Unavailable Seconds)

Count of the seconds during which the VT Path is considered unavailable at the far end. A VT Path is considered unavailable at the far end at the onset of 10 consecutive seconds that qualify as SES–VFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES–VFEs.

1–900

Default: 10

1–65535

Default: 100

Page 199: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 SONET Performance ParametersSONET Capacity Monitoring

Release OPS4.2.3 Force10 Networks Page 2-41

SONET Capacity Monitoring

The Traverse system provides the following SONET capacity monitoring parameters.

Important: Capacity monitoring values in the sonet_vt_capacity_pm template indicate the available capacity of STS and VT1.5 paths on the VT/TU module (card). The information is a snapshot of the instant the information is captured.

Table 2-28 SONET Capacity Monitoring

Parameter Definition 15-min Threshold Daily Threshold

STS Used The number of STS paths that are currently used on the VT/TU card.

0–96 0–96

STS Available The number of additional STS paths that could be created on the VT/TU card.

0–96 0–96

VT Used The number of VT1.5 paths that are currently used on the VT/TU card.

0–2688 0–2688

VT Available The number of additional VT1.5 paths that could be created on the VT/TU card.

0–2688 0–2688

Capacity Available

The percentage of VT/TU switching capacity available on the VT/TU card. This number grows and declines as VT/TU services are activated and deactivated respectively. The capacity is calculated using the lowest path granularity (VT1.5). The STS paths are not included when determining available capacity. The Traverse system generates a TCA when this threshold is crossed.

0–100

Default: 0

0–100

Default: 0

Page 200: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSONET Capacity Monitoring

Page 2-42 Force10 Networks Release OPS4.2.3

Page 201: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 2-43

SECTION 2PERFORMANCE MONITORING

Chapter 3 SDH Performance Parameters

Introduction This chapter provides performance parameter information for:• E1 Port PM, page 2-44• E3 Port PM, page 2-47• SDH High and Low Order Path PM, page 2-49• SDH Port PM, page 2-53• SDH VC-11 and VC-12 Path PM, page 2-58• SDH Capacity Monitoring, page 2-61

Cards (modules) that do not collect PM information may be reserved for administrative use; contact your system Administrator.

For further information on performance monitoring and the management system, see the TransNav Management System GUI Guide.

Page 202: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringE1 Port PM

Page 2-44 Force10 Networks Release OPS4.2.3

E1 Port PM The Traverse system provides the following near- and far-end E1 port performance monitoring parameters (e1_ptp_pm)_.

Table 2-29 E1 Port PM Parameters—Near End

Parameter Definition 15-min Threshold

Daily Threshold

Line–Near End

FC (Failure Counts)

Count of the number of near-end failure events on the line. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 4

1–4094

Default: 40

CV (Code Violations)

Count of both BPVs (Bipolar Violations) and EXZs (Excessive Zeros) occurring over the accumulation period. An EXZ increments the CV Line count by one regardless of the length of the zero string.

1–16383

Default: 13340

1–1048575

Default: 133400

ES (Errored Seconds)

Count of seconds containing one or more BPVs, one or more EXZs, or one or more LOS defects. BPVs that are part of the zero substitution code are excluded.

1–900

Default: 65

1–65535

Default: 648

SES (Severely Errored Seconds)

Count of 1-second intervals during which BPVs plus EXZs exceed 2048, or one or more LOS defects occur. BPVs that are part of the zero substitution code are excluded.

1–63

Default: 10

1–4095

Default: 100

LOSS (Loss of Signal Seconds

Count of one or more 1-second intervals containing LOS defects.

1–63

Default: 10

1–4095

Default: 100

FAS (Frame Alignment Signal)

Count of one or more 1-second intervals containing FAS defects.

1–63Default: 2

1–4095Default: 17

Line—Far End

ES (Errored Seconds)

Count of seconds containing one or more BPVs, one or more EXZs, or one or more LOS defects. BPVs that are part of the zero substitution code are excluded.

1–900

Default: 65

1–65535

Default: 648

Path—Near End

EB (Errored Blocks)

Count of the number of blocks containing one or more bit errors.

1–8 x 106

Default: 1329

1–8 x 108

Default: 13,296

Page 203: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersE1 Port PM

Release OPS4.2.3 Force10 Networks Page 2-45

ES (Errored Seconds)

Count of 1-second intervals containing any of the following:• CRC-6 errors (ESF)• CS events (ESF, SF)• SEF defects (ESF, SF)• LOS defects (ESF, SF)• FE errors (SF)

1–900

Default: 65

1–65535

Default: 648

SES (Severely Errored Seconds)

Count of 1-second intervals containing:• 320 or more CRC-6 errors (ESF)• 8 or more FE events (SF)• one or more SEF or LOS defects (ESF, SF)

1–63

Default: 10

1–4095

Default: 100

AISS (Alarm Indication Signal Seconds)

Count of 1-second intervals containing one or more AIS defects

1–63

Default: 10

1–4095

Default: 100

UAS (Unavailable Seconds)

Count of 1-second intervals for which the DS1 path is unavailable.

1–63

Default: 10

1–4095

Default: 100

BBE (Background Block Error)

An errored block not occurring as part of an SES. 1–8 x 106

Default: 1329

1–8 x 108

Default: 13,296

ESR (Errored Seconds Ratio)

The ratio of ES to total seconds in available time during a fixed measurement interval.

1–65535

Default: 4

1–65535

Default: 10

SESR (Severely Errored Seconds Ratio)

The ratio of SES to total seconds in available time during a fixed measurement interval.

1–65535

Default: 4

1–65535

Default: 10

BBER (Background Block Error Ratio)

The ratio of Background Block Errors (BBE) to total blocks in available time during a fixed measurement interval. The count of total blocks excludes all blocks during SESs.

1–65535

Default: 4

1–65535

Default: 10

Table 2-29 E1 Port PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold

Daily Threshold

Page 204: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringE1 Port PM

Page 2-46 Force10 Networks Release OPS4.2.3

Table 2-30 E1 Port PM Parameters—Far End

Parameter Definition 15-min Threshold

Daily Threshold

Path—Far End

ES (Errored Seconds)

Count of 1-second intervals containing any of the following:• CRC-6 errors (ESF)• CS events (ESF, SF)• SEF defects (ESF, SF)• LOS defects (ESF, SF)• FE errors (SF)

1–900

Default: 65

1–65535

Default: 648

SES (Severely Errored Seconds)

Count of 1-second intervals containing:• 320 or more CRC-6 errors (ESF)• 8 or more FE events (SF)• one or more SEF or LOS defects (ESF,

SF)

1–63

Default: 10

1–4095

Default: 100

UAS (Unavailable Seconds)

Count of 1-second intervals for which the DS1 path is unavailable.

1–63

Default: 10

1–4095

Default: 100

EB (Errored Blocks)

Count of the number of blocks containing one or more bit errors.

1–8 x 106

Default: 1329

1–8 x 108

Default: 13,296

FC (Failure Count)

Count of far-end path failure (RAI) events. 1–63

Default: 10

1–4095Default: 100

BBE (Background Block Error)

An errored block not occurring as part of an SES.

1–8 x 106

Default: 1329

1–8 x 108

Default: 13,296

Page 205: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersE3 Port PM

Release OPS4.2.3 Force10 Networks Page 2-47

E3 Port PM The Traverse system provides the following near- and far-end E3 port performance monitoring parameters (e3_ptp_pm).

Table 2-31 E3 Port PM Parameters–Near End

Parameter Definition 15-min Threshold Daily Threshold

Line—Near End

CV (Code Violations)

Count of both BPVs (Bipolar Violations) and EXZs (Excessive Zeros) occurring over the accumulation period. An EXZ shall increment the CV Line count by one regardless of the length of the zero string. BPVs that are part of the zero substitution code are excluded.

Default: 387 Default: 3865

ES (Errored Seconds)

Count of seconds containing one or more BPVs, one or more EXZs, or one or more LOS defects. BPVs that are part of the zero substitution code are excluded.

Default: 25 Default: 250

SES (Severely Errored Seconds)

Count of seconds during which BPVs plus EXZs exceed 44, or one or more LOS defects occur. BPVs that are part of the zero substitution code are excluded.

Default: 4 Default: 40

LOSS (Loss of Signal Seconds

Count of one or more 1-second intervals containing LOS defects.

1–63

Default: 10

1–4095

Default: 100

Path - Near End

EB (Errored Blocks)

Count of the number of blocks containing one or more bit errors.

1–8 x 106

Default: 1329

1–8 x 108

Default: 13,296

ES (Errored Seconds)

Count of seconds containing one or more P-bit parity errors, one or more SEF defects, or one or more LOS defects.

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of seconds containing more than 44 P-bit parity violations, one or more SEF defects, or one or more LOS defects.

1–63

Default: 4

1–4095

Default: 40

Page 206: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringE3 Port PM

Page 2-48 Force10 Networks Release OPS4.2.3

UAS (Unavailable Seconds)

Count of 1-second intervals during which the DS3 path is unavailable.

1–63

Default: 10

1–4095

Default: 10

FC (Failure Counts)

Count of the number of near-end path failure events. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–63

Default: 10

1–4095

Default: 40

Table 2-31 E3 Port PM Parameters–Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Table 2-32 E3 Port PM Parameters—Far End

Parameter Definition 15-min Threshold Daily Threshold

Path—Far End

EB (Errored Blocks)

Count of the number of blocks containing one or more bit errors.

1–8 x 106

Default: 1329

1–8 x 108

Default: 13,296

ES (Errored Seconds)

Count of seconds containing one or more P-bit parity errors, one or more SEF defects, or one or more LOS defects.

1–900

Default: 25

1–65535

Default: 250

SES (Severely Errored Seconds)

Count of seconds containing more than 44 P-bit parity violations, one or more SEF defects, or one or more LOS defects.

1–63

Default: 4

1–4095

Default: 40

UAS (Unavailable Seconds

Count of 1-second intervals during which the DS3 path is unavailable.

1–63

Default: 10

1–4095

Default: 10

FC (Failure Counts)

Count of the number of far-end path failure events. A failure event begins when the RFI-P failure is declared, and ends when the RFI-P failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

Default: 4 Default: 40

Page 207: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH High and Low Order Path PM

Release OPS4.2.3 Force10 Networks Page 2-49

SDH High and Low Order Path PM

The Traverse system provides the following SDH high order (VC-4 or VC-3) and low order (VC-3) path performance monitoring parameters (sdh_hp_path_pm and sdh_lp_path_pm).

The following table lists the block size and the threshold for errored blocks for each path layer.

The following table lists the supported performance monitoring parameters for SDH paths.

Table 2-33 Number of Errored Blocks that Constitute an SES

VC type Bits/Block Blocks/Second Threshold of EBs for SES

VC-3 6120 8000 2400

VC-4 18,792 8000 2400

VC-4-4c 75,168 8000 2400

VC-4-16c 300,672 8000 2400

Table 2-34 SDH High Order VC Path andLow Order VC3 PM Parameters—Near End

Parameter Definition 15-min Threshold Daily Threshold

EB

(Errored Block)

A block is a set of consecutive bits associated with the path. An errored block contains one or more bits with an error.

See Table 2-33 Number of Errored Blocks that Constitute an SES, page 2-49 to determine how many bits are in one block for each container type (VC-N).

1–7,200,000

Default: 20,000

1–691,200,000

Default: 200,000

ES

(Errored Seconds)

Count of 1-second period with at least one errored block or one defect.

1–900

Default: 25

1–86,400

Default: 250

Page 208: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH High and Low Order Path PM

Page 2-50 Force10 Networks Release OPS4.2.3

SES

(Severely Errored Seconds)

Count of a 1-second period which contains 30% or more errored blocks or at least one defect. See Table 2-33 Number of Errored Blocks that Constitute an SES, page 2-49 to determine how many errored blocks constitute an SES on the path.

When a near-end SES occurs as a result of a near-end defect, the far-end performance is not evaluated during that second.

However, if a near-end SES occurs as a result of 30% or more EBs, performance monitoring at the far end continues.

1–900

Default: 4

1–86,400

Default: 40

UAS

(Unavailable Seconds)

Count of the seconds during which the path was considered unavailable. A path becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-Ps, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-Ps.

1–900

Default: 4

1–86,400

Default: 40

BBE

(Background Block Error)

Count of errored blocks not occurring as part of Severely Errored Seconds.

1–7,200,000

Default: 20,000

1–691,200,000

Default: 200,000

FC

(Failure Counts)

Count of the number of near-end failure events on the line. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–900

Default: 2

1–225

Default: 10

RTD

(Round Trip Delay)

Query the current round trip delay in milliseconds. The thresholds are not cumulative.

1–1000

Default: 0

1–1000

Default: 0

RTDA

(Round Trip Delay, Average)

Query the average round trip delay in milliseconds. The thresholds are not cumulative.

1–1000

Default: 0

1–1000

Default: 0

Table 2-34 SDH High Order VC Path andLow Order VC3 PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 209: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH High and Low Order Path PM

Release OPS4.2.3 Force10 Networks Page 2-51

RTDM

(Round Trip Delay, Maximum)

Query the maximum round trip delay in milliseconds. The thresholds are not cumulative.

1–1000

Default: 0

1–1000

Default: 0

RTDS

(Round Trip Delayed Seconds)

Count of the number of seconds when measured delay exceeds the expected delay. The system will raise a TCA when the measured delay exceeds the PM threshold.

1-900

Default: 25

1-65535

Default: 250

RTDTO

(Round Trip Delay, Time Out)

Count of the number of seconds when delay measurement is not available due to time out (i.e., the monitoring of CTP times out and resets upon not receiving the tag within one second). The timeout seconds only accumulate when a valid F3 byte is received.

1-900

Default: 25

1-65535

Default: 250

PPJCP Det

(Positive Pointer Justifications Detected)

Count of the positive pointer justifications detected on the path.

1–1,048,575

Default: 60

1–16,777,215

Default: 6000

NPJCP Det

(Negative Pointer Justifications Detected)

Count of the negative pointer justifications detected on the path.

1–1,048,575

Default: 60

1–16,777,215

Default: 6000

PPJCP Gen (Positive Pointer Justifications Generated)

Count of the positive pointer justifications generated on the path to reconcile the frequency of the path with the local timing reference.

1–1,048,575

Default: 60

1–16,777,215

Default: 6000

NPJCP (Negative Pointer Justifications Generated)

Count of the negative pointer justifications generated on the path to reconcile the frequency of the path with the local timing reference.

1–1,048,575

Default: 60

1–16,777,215

Default: 6000

Table 2-34 SDH High Order VC Path andLow Order VC3 PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 210: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH High and Low Order Path PM

Page 2-52 Force10 Networks Release OPS4.2.3

Table 2-35 SDH High Order VC Path andLow Order VC3 PM Parameters—Far End

Parameter Definition 15-min Threshold Daily Threshold

EBFE

(Errored Blocks)

Count of the number of BIP errors detected by the far-end node and reported back to the near-end node using the overhead bytes. Up to 8 BIP errors per frame can be indicated.

1–7200000

Default: 20,000

1–691200000

Default: 30,000

ESFE

(Errored Seconds)

Count of the seconds during which (at any point during the second) at least one defect is detected at the far end.

1–900

Default: 20

1–65535

Default: 200

SESFE

(Severely Errored Seconds)

Count of seconds which contains 30% or more errored blocks or at least one defect at the far end.

1–900

Default: 3

1–65535

Default: 10

UASFE

(Unavailable Seconds)

Count of the seconds during which the path is considered unavailable at the far end. A path is considered unavailable at the far end at the onset of 10 consecutive seconds that qualify as SES-PFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES-PFEs.

1–900

Default: 3

1–65535

Default: 10

BBEFE

(Background Block Error)

Count of errored blocks at the far end not occurring as part of Severely Errored Seconds.

1–7200000

Default: 36,000

1–691200000

Default: 48,000

FCFE

(Failure Counts)

Count of the number of far-end failure events on the line. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–900

Default: 2

1–225

Default: 10

Page 211: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH Port PM

Release OPS4.2.3 Force10 Networks Page 2-53

SDH Port PM The Traverse system provides the following near- and far-end SDH port performance monitoring parameters.

Important: Default threshold values in the sdh_ptp_pm template are based on performance monitoring for STM-1 rates. Force10 recommends customizing this template for rates other than STM-1.

Table 2-36 SDH Port PM—Near End

Parameter Definition 15-min Threshold Daily Threshold

Regenerator Section—Near End

EB (Errored Block)

Count of BIP (Bit Interleaved Parity) errors detected at the regenerator section layer (i.e., using the B1 byte in the incoming SDH signal). Up to 8 section BIP errors can be detected per STM-N frame, with each error incrementing the EB-RS register.

1–7200000

Default: 10,000

1–691200000

Default: 100,000

Recommended defaults for rates other than STM-1:

STM-0: 9,600STM-4: 115,200STM-16: 460,800STM-64:1,843,200

STM-0: 96,000STM-4: 288,000STM-16: 1,152,000STM-64: 18,432,000

ES(Errored Seconds)

Count of 1-second intervals during which (at any point during the second) at least one regenerator section layer BIP error was detected or at least one defect was present.

1–900

Default: 25

1–65535

Default: 250

SES(Severely Errored Seconds)

Count of the seconds during which K or more regenerator section layer BIP errors were detected or at least one defect was present. K has the following values: • 154 for STM1• 615 for STM4• 2459 for STM16• 8854 for STM64

1–900

Default: 4

1–86,400

Default: 40

BBE (Background Block Error)

Count of error block not occurring as part of Severely Errored Seconds.

1–7200000

Default: 10,000

1–691200000

Default: 100,000

Recommended defaults for rates other than STM-1:

STM-0: 9,600STM-4: 115,200STM-16: 460,800STM-64:1,843,200

STM-0: 96,000STM-4: 288,000STM-16: 1,152,000STM-64: 18,432,000

Page 212: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH Port PM

Page 2-54 Force10 Networks Release OPS4.2.3

Multiplex Section—Near End

EB(Errored Blocks)

Count of BIP errors detected at the multiplex section layer. Up to 8 section BIP errors can be detected per STM frame, with each error incrementing the EB-MS register.

1–1.10592 x 1010

Defaults: 28,800

1–1.03168 x 1012

Default: 288,000

ES Errored Seconds)

Count of the seconds during which (at any point during the second) at least one multiplex section layer BIP error was detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present.

1–900

Default: 25

1–86,400

Default: 250

SES

(Severely Errored Seconds)

Count of the seconds during which K or more multiplex section layer BIP errors were detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present. K has the following values: • 154 for STM1• 615 for STM4• 2459 for STM16• 8854 for STM64

1–900

Default: 4

1–86,400

Default: 40

UAS (Unavailable Seconds)

Count of the seconds during which the multiplex section was considered unavailable. A multiplex section becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-MSs, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-MSs.

1–900

Default: 4

1–65535

Default: 40

Table 2-36 SDH Port PM—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 213: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH Port PM

Release OPS4.2.3 Force10 Networks Page 2-55

BBE (Error Blocks)

Count of BIP errors detected at the multiplex section layer (i.e., using the B1 byte in the incoming SDH signal). Up to 8 section BIP errors can be detected per STM-N frame, with each error incrementing the EB-MS register.

1–1.10592 x 1010

Defaults: 28,800

1–1.03168 x 1012

Default: 288,000

FC (Failure Counts)

Count of the number of near-end multiplex section failure events. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 4

1–4094

Default: 40

Table 2-36 SDH Port PM—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Table 2-37 SDH Port PM—Far End

Parameter Definition 15-min Threshold Daily Threshold

Multiplex Section—Far End

EBFE (Errored Blocks

Count of BIP errors detected at the multiplex section layer. Up to 8 section BIP errors can be detected per STM frame, with each error incrementing the EB-MS register.

1–1.10592 x 1010

Defaults: 28,800

1–1.03168 x 1012

Default: 288,000

Recommended defaults for rates other than STM-1:

STM-0: 9,600STM-4: 115,200STM-16: 460,800STM-64:1,843,200

STM-0: 96,000STM-4: 288,000STM-16: 1,152,000STM-64: 18,432,000

ESFE (Errored Seconds

Count of the seconds during which (at any point during the second) at least one multiplex section layer BIP error was detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present.

1–900

Default: 25

1–86,400

Default: 250

Page 214: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH Port PM

Page 2-56 Force10 Networks Release OPS4.2.3

SESFE (Severely Errored Seconds)

Count of the seconds during which K or more Line layer BIP errors were detected or an LOS defect (or a lower-layer, traffic-related, near-end defect) was present. K has the following values: • 154 for STM1• 615 for STM4• 2459 for STM16• 8854 for STM64

1–900

Default: 4

1–86,400

Default: 40

UASFE (Unavailable Seconds)

Count of the seconds during which the multiplex section was considered unavailable. A multiplex section becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-MSs, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-MSs.

1–900

Default: 4

1–65535

Default: 40

BBEFE (Error Blocks)

Count of BIP errors detected at the multiplex section layer (i.e., using the B2 byte in the incoming SDH signal). Up to 8 section BIP errors can be detected per STM-N frame, with each error incrementing the EB-MS register.

1–1.10592 x 1010

Defaults: 28,800

1–1.03168 x 1012

Default: 288,000

Recommended defaults for rates other than STM-1:

STM-0: 9,600STM-4: 115,200STM-16: 460,800STM-64:1,843,200

STM-0: 96,000STM-4: 288,000STM-16: 1,152,000STM-64: 18,432,000

FCFE (Failure Counts)

Count of the number of far end multiplex section failure events. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 4

1–4094

Default: 40

Table 2-37 SDH Port PM—Far End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 215: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH Port PM

Release OPS4.2.3 Force10 Networks Page 2-57

PSCWS (Protection Switch Count Working)

Count of the number of times that an STM multiplex section service (i.e., MS-SP Ring, 1+1 MSP) switches from the working to the protecting facility. This count also includes the number of times the service (revertive) switches back from the protecting to the working facility.

1–63

Default: 2

1–255

Default: 10

PSDW-MS (Protection Switch Duration Working)

Count of the seconds that the working facility was being used to carry an STM multiplex section service (i.e., MS-SP Ring, 1+1 MSP).

1–900

Default: 300

1–86,400

Default: 600

PSCP-MS (Protection Switch Count Protecting)

Count of the number of times that an STM multiplex section service (i.e., MS-SP Ring, 1+1 MSP) switches from the protecting to any working facility. This count also includes the number of times the service (revertive) switches back from the protecting to the working facility.

1–63

Default: 2

1–255

Default: 10

PSDP-MS (Protection Switch Duration Protecting)

Count of the seconds that the protecting facility was being used to carry an STM multiplex section service (i.e., MS-SP Ring, 1+1 MSP).

1–900

Default: 300

1–86,400

Default: 600

Table 2-37 SDH Port PM—Far End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 216: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH VC-11 and VC-12 Path PM

Page 2-58 Force10 Networks Release OPS4.2.3

SDH VC-11 and VC-12 Path PM

The Traverse system provides the following SDH VC-11 and VC-12 path performance monitoring parameters (sdh_vc11_path_pm and sdh_vc12_path_pm).

The following table lists the block size and the threshold for errored blocks for each low order path layer.

The following table lists the supported performance monitoring parameters for SDH paths.

Table 2-38 Number of Errored Blocks that Constitute an SES

VC Type Bits/Block Blocks/Second Threshold of EBs for SES

VC-11 832 2000 600

VC-12 1120 2000 600

Table 2-39 SDH VC-11 and VC-12 Path PM Parameters—Near End

Parameter Definition 15-min Threshold Daily Threshold

EB (Errored Blocks)

A block is a set of consecutive bits associated with the path. An errored block contains one or more bits with an error.

See Table 2-38 Number of Errored Blocks that Constitute an SES, page 2-58 to determine how many bits are in one block for each container type (VC-N).

1–1.8 x 106

Default: 5,000

1–1.8x108

Default: 50,000

ES(Errored Seconds)

Count of 1-second period with at least one errored block or one defect.

1–900

Default: 25

1–65,535

Default: 250

SES (Severely Errored Seconds)

Count of a 1-second period which contains 30% or more errored blocks or at least one defect. See Table 2-38 Number of Errored Blocks that Constitute an SES, page 2-58 to determine how many errored blocks constitute an SES on the path.

When a near-end SES occurs as a result of a near-end defect, the far-end performance is not evaluated during that second.

However, if a near-end SES occurs as a result of 30% or more EBs, performance monitoring at the far end continues.

1–900

Default: 4

1–65,535

Default: 40

Page 217: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH VC-11 and VC-12 Path PM

Release OPS4.2.3 Force10 Networks Page 2-59

UAS (Unavailable Seconds)

Count of the seconds during which the path was considered unavailable. A path becomes unavailable at the onset of 10 consecutive seconds that qualify as SES-Ps, and continues to be unavailable until the onset of 10 consecutive seconds that do not qualify as SES-Ps.

1–900

Default: 4

1–65,535

Default: 40

FC (Failure Counts)

Count of the number of near-end failure events on the line. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 2

1–4,095

Default: 10

BBE (Background Block Error)

Count of errored blocks not occurring as part of Severely Errored Seconds.

1–1.8 x 106

Default: 5,000

1–1.8x108

Default: 50,000

PPJCP Det

(Positive Pointer Justifications Detected)

Count of the positive pointer justifications detected on the path.

1–32,767

Default: 30

1–2,097,151

Default: 300

NPJCP Det (Negative Pointer Justifications Detected)

Count of the negative pointer justifications detected on the path.

1–32,767

Default: 30

1–2,097,151

Default: 300

PPJCP Gen (Positive Pointer Justifications Generated)

Count of the positive pointer justifications generated on the path to reconcile the frequency of the path with the local timing reference.

1–32,767

Default: 30

1–2,097,151

Default: 300

NPJCP Gen (Negative Pointer Justifications Generated)

Count of the negative pointer justifications generated on the path to reconcile the frequency of the path with the local timing reference.

1–32,767

Default: 30

1–2,097,151

Default: 300

Table 2-39 SDH VC-11 and VC-12 Path PM Parameters—Near End (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 218: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH VC-11 and VC-12 Path PM

Page 2-60 Force10 Networks Release OPS4.2.3

Table 2-40 SDH VC-11 and VC-12 Path PM Parameters—Far End

Parameter Definition 15-min Threshold Daily Threshold

EBFE

(Errored Blocks)

Count of the number of BIP errors detected by the far-end node and reported back to the near-end node using the overhead bytes. Up to 8 BIP errors per frame can be indicated.

1–1.8 x 106

Default: 5,000

1–1.8x108

Default: 50,000

ESFE

(Errored Seconds)

Count of the seconds during which (at any point during the second) at least one defect is detected at the far end.

1–900

Default: 25

1–65,535

Default: 250

SESFE (Severely Errored Seconds)

Count of seconds which contains 30% or more errored blocks or at least one defect at the far end.

1–900

Default: 4

1–65,535

Default: 40

UASFE (Unavailable Seconds)

Count of the seconds during which the path is considered unavailable at the far end. A path is considered unavailable at the far end at the onset of 10 consecutive seconds that qualify as SES-PFEs, and continues to be considered unavailable until the onset of 10 consecutive seconds that do not qualify as SES-PFEs.

1–900

Default: 4

1–65,535

Default: 40

BBEFE

(Background Block Error)

Count of errored blocks at the far end not occurring as part of Severely Errored Seconds.

1–1.8 x 106

Default: 5,000

1–1.8x108

Default: 50,000

FCFE (Failure Counts)

Count of the number of far-end failure events on the line. A failure event begins when the LOS failure (or a lower-layer, traffic-related, near-end failure) is declared, and ends when the failure is cleared. A failure event that begins in one period and ends in another period is counted only in the period in which it begins.

1–72

Default: 2

1–4,095

Default: 10

Page 219: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 3 SDH Performance ParametersSDH Capacity Monitoring

Release OPS4.2.3 Force10 Networks Page 2-61

SDH Capacity Monitoring

The Traverse system provides the following SDH capacity monitoring parameters.

Important: Capacity monitoring values in the sdh_vt_capacity_pm template indicate the available capacity on the VT/TU module (card). The information is a snapshot of the instant the information is captured. By default, values for all thresholds are collected.

Table 2-41 SDH Capacity Monitoring

Parameter Definition 15-min Threshold Daily Threshold

VC-4 Used The number of VC-4 paths currently used on the VT/TU card.

0–32 0–32

VC-4 Available The number of additional VC-4 paths that could be created on the VT/TU card.

0–32 0–32

VC-3 Used The number of VC-3 paths currently used on the VT/TU card.

0–96 0–96

VC-3 Available The number of additional VC-3 paths that could be created on the VT/TU card.

0–96 0–96

TU-3 Used The number of TU-3 containers currently used on the VT/TU card. This reflects only the TR-3 containers within VC-4 grooming endpoints currently existing on the VT/TU card.

0–96 0–96

TU-3 Available The number of additional TU-3 containers that could be created on the VT/TU card. This reflects the sum of:• the TU-3 containers available within

empty or partially filled VC-4 grooming endpoints currently existing on the VT/TU card and

• the TU-3 containers that would be available if all available VC-4 paths were to be used only for TU-3 services.

0–96 0–96

VC-12 Used The number of VC-12 paths currently used on the VT/TU card.

0–2016 0-2016

Page 220: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSDH Capacity Monitoring

Page 2-62 Force10 Networks Release OPS4.2.3

VC-12 Available The number of additional VC-12 paths that could be created on the VT/TU card. This reflects the sum of:• the VC-12 paths available within

empty or partially filled VC-4 / VC-3 grooming endpoints currently existing on the VT/TU card and

• the VC-12 paths that would be available if all available VC-4 or VC-3 paths were to be used only for VC-12 services.

0–2016 0-2016

VC-11 Used The number of VC-11 paths currently used on the VT/TU card.

0–2688 0–2688

VC-11 Available The number of additional VC-11 paths that could be created on the VT/TU card. This reflects the sum of:• the VC-11 paths available within

empty or partially filled VC-4 / VC-3 grooming endpoints currently existing on the VT/TU card and

• the VC-11 paths that would be available if all available VC-4 or VC-3 paths were to be used only for VC-11 services.

0–2688 0–2688

Capacity Available

The percentage of VT/TU switching capacity available on the VT/TU card. This number grows and declines as VT/TU services are activated and deactivated. The capacity is calculated using the lowest path granularity (VC-11). No other paths are included when determining available capacity. The Traverse system generates a TCA when this threshold is crossed.

0–100

Default: 0

0–100

Default: 0

Table 2-41 SDH Capacity Monitoring (continued)

Parameter Definition 15-min Threshold Daily Threshold

Page 221: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 2-63

SECTION 2PERFORMANCE MONITORING

Chapter 4 Ethernet Performance Parameters

Introduction This chapter provides performance monitoring parameter information for:• Ethernet 10GbE Equipment PM, page 2-64• EoPDH Equipment PM, page 2-66• NGE Equipment PM, page 2-69• Ethernet Port PM, page 2-71• Ethernet Service Port PM, page 2-74• EOS Port PM, page 2-76• EOP Port PM Parameters, page 2-78• Small Form-Factor Pluggable Optical Port PM, page 2-80

Cards (modules) that do not collect PM information may be reserved for administrative use; contact your system Administrator.

To generate performance monitoring data, the Collect check box of each parameter for which you wish to view data must be selected on the corresponding PM template. For more information, see Chapter 1—“Managing Performance,” Creating or Modifying a Monitoring Template, page 2-2.

For further information on performance monitoring and the management system, see the TransNav Management System GUI Guide.

Page 222: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEthernet 10GbE Equipment PM

Page 2-64 Force10 Networks Release OPS4.2.3

Ethernet 10GbE Equipment PM

The system provides the following performance monitoring and counters for 10GbE or GbE-10 equipment events that occur during normal operation. For example, discarded frames or excessive traffic on a service.

Table 2-42 Ethernet 10GbE Equipment PM Parameters

Parameter(Exclusive Parameter Note)

Definition Counter type

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

Not applicable

G3CpDiscards Frames discarded inside the analysis block. Includes frames discarded because they could not be assigned to any activated service, as well as possible internal errors.

Frame

G3Spi4RxOverrun SPI-4 RX overruns. This counter could increment under heavy load of 64-byte frames. Each event may correspond to one or more discarded frames.

Event

G3SwcBufRAMOverrun Frames discarded because no buffer was available to hold it (all available buffers are in use by queued frames). Can occur if RED thresholds are set excessively high for very congested egress ports.

Frame

G3SwcPckHdrOverrun Frames discarded due to lack of packet header resources. This counter could increment if the offered load exceeds the card’s limit of 25 million frames per second.

Frame

G3SwcFCBOverrun Frames discarded due to lack of frame control blocks resources. This counter could increment under heavy load.

Frame

G3SwcDPResetAbort Frames that were either discarded or corrupted during a data path reset. This counter could increment when an equipment switchover (either manual or automatic) takes place. Corrupted frames may have been transmitted.

Frame

W3TxFifoIngFCDisc Frames discarded due to FIFO overflow. This counter could increment under heavy load of 64-byte frames.

Frame

W3TxAborts Frames discarded because of GFP errors (payload FCS error, excessive size) that did not appear until well into the frame processing. Payload FCS errors are also counted as “GFP FCS DISCARDS” in EOS port PM for the affected port.

Frame

Page 223: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEthernet 10GbE Equipment PM

Release OPS4.2.3 Force10 Networks Page 2-65

G3PortTxOverrun Ethernet or CPU port TX overruns which occurred in the TX FIFO of the port module. This counter could increment as the result of service deactivation in the presence of port transmission.

Event

G3SwcIngressShort Frames discarded when entering the switch core because they are short. Can occur as a result of bit errors or short packets received on the EOS.

Frame

G3SwcIngressPViol Protocol violations which occurred when entering the switch core. This counter could increment as a result of bit errors on the EOS.

Event

G3SwcFreeUnderrun Frames discarded because buffer memory could not be allocated fast enough internally. This can occur if a burst (>300) of very short frames (<=18 bytes) is injected into the switch core back to back.

Frame

G3Spi4RxAbort Frames discarded because the packets were received with an Abort from the framer. This counter could increment as a result of bit errors on the EOS.

Frame

G3SwcIngressLong Frames discarded when entering the switch core because they are long. This counter could increment as a result of bit errors on the Ethernet port or EOS.

Frame

Table 2-42 Ethernet 10GbE Equipment PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition Counter type

Page 224: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEoPDH Equipment PM

Page 2-66 Force10 Networks Release OPS4.2.3

EoPDH Equipment PM

The system provides the following performance monitoring and counters for EoPDH equipment events that occur during normal operation. For example, discarded frames or excessive traffic on a service.

Table 2-43 EoPDH Equipment PM Parameters

Parameter(Exclusive Parameter Note)

Definition Counter type

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

Not applicable

LAN SPI3 RX FIFO OVERRUNS

Count of overrun events on FIFO for SPI-3 bus in LAN to Gardenia direction.

EoPDH increments this counter when it discards an ingress frame from an Ethernet port due to inability of the internal switch to handle aggregate traffic arriving from Ethernet, EOS, and EOP ports. The most likely cause of the congestion is an excess of aggregate traffic arriving EoPDH from the Ethernet ports.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

LAN SPI3 TX CRC ERRORS Count of SPI-3 CRC error events in the Gardenia to LAN direction.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

LAN SPI3 TX PROTOCOL ERRORS

Count of protocol error events in the Gardenia to LAN direction. Protocol events include SPI-3 CRC errors, protocol violations or parity errors.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

LAN TX OVERSIZE COUNT Frames discarded before transmission on the physical port because they exceeded the size limit of EoPDH’s PHY. These frames are well over the EoPDH card’s maximum Jumbo Frame Size.

Frame

GARDENIA FLT DISCARDS Count of seconds during which Gardenia discarded frames due to overflow of internal multicast queue.

This is a normal condition that can arise when there is more multicast traffic than the system can handle.

Errored seconds

GARDENIA BUFFER ABORTS

Count of seconds during which Gardenia discarded frames due to inability to access RLDRAM buffer memory.

This could occur if ingress traffic contains a high volume of 81-byte frames.

Errored seconds

Page 225: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEoPDH Equipment PM

Release OPS4.2.3 Force10 Networks Page 2-67

GARDENIA SPI3 RX PROTOCOL ERRORS

Count of seconds during which Gardenia detected a SPI-3 RX interface protocol error in either the LAN to Gardenia or WAN to Gardenia direction.

Errored seconds

WAN RX FIFO OVERRUNS Count of overrun events on FIFO for SPI-3 bus in WAN to Gardenia direction.

EoPDH increments this counter when it discards an ingress frame from an EOS (WAN-side) or EOP port due to inability of the internal switch to handle aggregate traffic arriving from Ethernet, EOS, or EOP ports. The most likely cause of the congestion is an excess of aggregate traffic arriving at the EoPDH card from the Ethernet ports.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

WAN ENCAPSULATION UNDERRUN

Underrun events on SPI-3 bus in Gardenia to WAN direction.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

WAN TX ABORTS Frames discarded due to unspecified errors in Gardenia to WAN direction.

Frame

WAN RX UPDATE DISCARDS Count of frames discarded in WAN to Gardenia direction because they could not be forwarded.

EoPDH increments this counter when it discards an ingress frame from an EOS or EOP port, because a) the VLAN ID could not be matched to an activated service, or b) the MAC address table forwards this frame’s destination address to a nonexistent port.

Frame

WAN TX SPI3 ERRORS Number of frames received on the external SPI-3 interface with protocol violation or parity error. Single word frames with error are not counted.

Event

WAN ENCAP INPUT ABORTS Number of packets aborted on the input to the Encapsulation block.

Frame

WAN ENCAP PROTOCOL VIOLATIONS

Number of internal protocol violations on the input to the Encapsulation block.

Event

WAN ENCAP TOO MUCH DATA

Number of frames received by the Encapsulation block where more data was received than was expected based on the length.

Frame

Table 2-43 EoPDH Equipment PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition Counter type

Page 226: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEoPDH Equipment PM

Page 2-68 Force10 Networks Release OPS4.2.3

WAN ENCAP TOO FEW DATA

Number of frames received by the Encapsulation block where less data was received than was expected based on the length

Frame

WAN ENCAP TOO SHORT Number of packets received by the Encapsulation block where the data length is too small to be encapsulated to GFP, LAPS, or PPP and therefore discarded.

Frame

Table 2-43 EoPDH Equipment PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition Counter type

Page 227: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersNGE Equipment PM

Release OPS4.2.3 Force10 Networks Page 2-69

NGE Equipment PM

The system provides the following performance monitoring and counters for NGE equipment (NGE and NGE Plus) events that occur during normal operation. For example, discarded frames or excessive traffic on a service.

Table 2-44 NGE Equipment PM Parameters

Parameter(Exclusive Parameter Note)

Definition Counter type

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

Not applicable

LAN SPI3 RX FIFO OVERRUNS

Count of overrun events on FIFO for SPI-3 bus in LAN to Gardenia direction.

NGE increments this counter when it discards an ingress frame from an Ethernet port due to inability of the internal switch to handle aggregate traffic arriving from Ethernet and EOS ports. The most likely cause of the congestion is an excess of aggregate traffic arriving at NGE cards from the Ethernet ports.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

LAN SPI3 TX CRC ERRORS Count of SPI-3 CRC error events in the Gardenia to LAN direction.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

LAN SPI3 TX PROTOCOL ERRORS

Count of protocol error events in the Gardenia to LAN direction. Protocol events include SPI-3 CRC errors, protocol violations or parity errors.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

LAN TX OVERSIZE COUNT Frames discarded before transmission on the physical port because they exceeded the size limit of NGE’s PHY. These frames are well over the NGE card’s maximum Jumbo Frame Size.

Frame

GARDENIA FLT DISCARDS Count of seconds during which Gardenia discarded frames due to overflow of internal multicast queue.

This is a normal condition that can arise when there is more multicast traffic than the system can handle.

Errored seconds

Page 228: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringNGE Equipment PM

Page 2-70 Force10 Networks Release OPS4.2.3

GARDENIA BUFFER ABORTS

Count of seconds during which Gardenia discarded frames due to inability to access RLDRAM buffer memory.

This could occur if ingress traffic contains a high volume of 81-byte frames.

Errored seconds

GARDENIA SPI3 RX PROTOCOL ERRORS

Count of seconds during which Gardenia detected a SPI-3 RX interface protocol error in either the LAN to Gardenia or WAN to Gardenia direction.

Errored seconds

WAN RX FIFO OVERRUNS Count of overrun events on FIFO for SPI-3 bus in WAN to Gardenia direction.

NGE increments this counter when it discards an ingress frame from an EOS (WAN-side) port due to inability of the internal switch to handle aggregate traffic arriving from Ethernet and EOS ports. The most likely cause of the congestion is an excess of aggregate traffic arriving at the NGE card from the Ethernet ports.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

WAN ENCAPSULATION UNDERRUN

Underrun events on SPI-3 bus in Gardenia to WAN direction.

There could be several events for a single discarded frame, or one event for several discarded frames.

Event

WAN TX ABORTS Frames discarded due to unspecified errors in Gardenia to WAN direction.

Frame

Table 2-44 NGE Equipment PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition Counter type

Page 229: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEthernet Port PM

Release OPS4.2.3 Force10 Networks Page 2-71

Ethernet Port PM

The system provides the following performance monitoring parameters and counters for Fast Ethernet (10/100BaseTX), Gigabit Ethernet (GbE), and 10GbE ports and the GbE ports on the GbE-10 card.

The Traverse 10GbE ports can process 10 times as many bytes or frames in any 15-minute or 24-hour period as can GbE ports.

Important: The table below contains common, as well as exclusive, PM (where noted) for: Traverse NGE (both NGE and NGE Plus) 10GbE, GbE-10, EoPDH, and TE-100 Ethernet.

Note: Ethernet Port PM and Ethernet Service PM byte counts may differ for the following reasons:• Ethernet Service PM byte counts do not include the 8-byte GFP header.• VLAN tags may be added or stripped as packets traverse the Ethernet card. This

results in different packet sizes when counted at the service interface than when counted at the Ethernet port interface.

In Shelf View, click an Ethernet port, then click the Performance tab to view these parameters in the order given.

Table 2-45 Ethernet Port PM Parameters

Parameter(Exclusive Parameter Note)

Definition

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

TX UNICAST1 The number of unicast frames transmitted with no errors.

TX MULTICAST1 The number of multicast frames that are not broadcast, transmitted with no errors.

TX BROADCAST The number of broadcast frames transmitted with no errors.

TX FRAMES1 The number of frames transmitted (unicast, multicast, and broadcast) with no errors.

RX UNICAST1 The number of unicast frames received, with length between 64 bytes and the maximum size, with no errors.

RX MULTICAST1 The number of multicast frames received, with length between 64 bytes and the maximum size, with no errors.

RX BROADCAST The number of broadcast frames received, with length between 64 bytes and the maximum size, with no errors.

RX FRAMES1 The number of frames received (unicast, multicast, and broadcast) with no errors.

Page 230: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEthernet Port PM

Page 2-72 Force10 Networks Release OPS4.2.3

RX > MAX FRAME SIZE The number of received frames that exceed the maximum valid packet length for the port.

RX < 64 The number of frames received, less than 64 bytes in length, received with no errors.

RX PKT 64(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received 64-byte frames, including bad frames.

RX PKT 65-127(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received frames, 65 to 127 bytes in length, including bad frames.

RX PKT 128-255(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received frames, 128 to 255 bytes in length, including bad frames.

RX PKT 256-511(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received frames, 256 to 511 bytes in length, including bad frames.

RX PKT 512-1023(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received frames, 512 to 1023 bytes in length, including bad frames.

RX PKT 1024-1518(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received frames, 1024 to 1518 bytes in length, including bad frames.

RX PKT > 1518(Not applicable to Traverse NGE, EoPDH, 10GbE, or GBE-10)

The number of received frames, greater than or equal to 1519 bytes in length, including bad frames.

RX DISCARDS2,3,4 The number of inbound frames discarded by this port due to errors, and thus, unable to forward to a higher-layer protocol.

TX DISCARDS(Traverse NGE, 10GbE, GbE-10, and EoPDH only)

The number of outbound frames discarded by this port due to aborted frames and underruns.

RX DELAY DISCARDS(TE-100 Ethernet only)

Number of frames discarded by this interface due to excessive transit delay through the bridge.

RX MTU DISCARDS(Not applicable to TE-100 Ethernet)

Number of frames discarded by this interface due to an excessive size.

RX FCS ERR5 Number of frames received which are an integral number of octets and do not pass the FCS check.

Table 2-45 Ethernet Port PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition

Page 231: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEthernet Port PM

Release OPS4.2.3 Force10 Networks Page 2-73

RX MAC CTL DISCARDS (Traverse 10GbE or GbE-10 only)

The number of received “MAC control” frames that were discarded due to invalid addresses.

RX PAUSE The number of received pause control frames.

TX PAUSE The number of transmitted pause control frames.

TX BYTES6 The number of bytes transmitted in good frames.

RX BYTES2 The number of bytes received in good frames.

TX SINGLE COLL(10/100BaseTX only)

The number of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision. Also counted as a successful transmission. Half-duplex operation only.

TX MULTIPLE COLL(10/100BaseTX only)

The number of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision. Also counted as a successful transmission. Half-duplex operation only.

TX DEFERRED FRAMES(10/100BaseTX only)

The number of frames for which the first transmission attempt on a particular interface is delayed because the medium is busy. Does not include frames involved in collisions. Half-duplex operation only.

TX LATE COLL(10/100BaseTX only)

The number of times that a collision is detected on a particular interface later than one slotTime into the transmission of a packet. Half-duplex operation only.

TX EXCESSIVE COLL(10/100BaseTX only)

The number of frames for which transmission on a particular interface fails due to excessive collisions. Half-duplex operation only.

1 Traverse NGE, 10GbE, GbE-10, or EoPDH do not include PAUSE frames.

2 Traverse NGE, 10GbE, GbE-10, or EoPDH include packets that are < 64 or > MTU with CRC errors.

3 Traverse NGE, 10GbE, GbE-10, or EoPDH cards due to coding error or rate limiting.

4 TE-100 Ethernet includes packets < 64 wCRC errors, packets dropped due to lack of resources or rate limiting.

5 TE-100 Ethernet includes align errors as well.

6 Traverse NGE, 10GbE, GbE-10, or EoPDH include PAUSE frames.

Table 2-45 Ethernet Port PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition

Page 232: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEthernet Service Port PM

Page 2-74 Force10 Networks Release OPS4.2.3

Ethernet Service Port PM

The system provides the following performance monitoring parameters and counters for the ports on the following Traverse cards: NGE (both NGE and NGE Plus), 10GbE, GbE-10, or EoPDH.

In a Traverse node Shelf View, click an Ethernet port, then click the Performance tab to view these parameters in the order given.

Table 2-46 Ethernet Service Port PM Parameters

Parameter(Exclusive Parameter Note)

Definition

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

TX BYTES (NGE, NGE Plus, and EoPDH only)

The number of bytes contained in packets queued for transmitted to this port for this service, including internal overhead per packet.

TX PACKETS The number of packets queued for transmission to this port for this service.

TX RED DISCARDS The number of packets that were not queued for transmission to this port for this service because they were discarded due to Random Early Discard (RED).

On an NGE card, when RSTP puts an EOS in a blocking state, the RX path is disabled and no packets are forwarded to the blocked EOS.

When a port on a 10GbE or GBE-10 card is in an RSTP blocking state, the transmissions are blocked and recorded as TX RED discards.

RX BYTES2 The number of bytes received on this port for this service, including internal overhead per packet.

RX PACKETS The number of packets received on this port for this service.

Page 233: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEthernet Service Port PM

Release OPS4.2.3 Force10 Networks Page 2-75

RX LOCAL DISCARDS (NGE, NGE Plus, and EoPDH only)

The number of packets received on this port for this service, but discarded because the destination address has been learned on the ingress port.

The counter increments when a packet having a DMAC that matches a MAC address in the MAC table and the port on which the packet was received is on the same port in the MAC table entry. Since L2 switching cannot return packets to the originating port, the packets are dropped.

RX HARDWARE PACKET DISCARDS

On NGE and EoPDH cards, indicates the number of packets dropped due to Spanning Tree port blocking. The number of packets were received on this port for this service, but were discarded due to an unclassifiable hardware error. This state can also occur if RSTP has put respective EOS in a blocking state. Broadcast or unicast unknown SMAC address packets received from other nodes in the network are discarded as RX hardware packet discards.

On 10GbE and GbE-10 ports, indicates the number of local discards, Spanning Tree discards, and packets discarded due to an unclassifiable hardware error.

Table 2-46 Ethernet Service Port PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition

Page 234: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEOS Port PM

Page 2-76 Force10 Networks Release OPS4.2.3

EOS Port PM The system provides the following performance monitoring parameters and counters for EOS ports.

Important: The EOS Port PM Parameters table contains common, as well as exclusive, PM (where noted) for Traverse NGE (both NGE and NGE Plus), 10GbE, GbE-10, EoPDH, and TE-100 Ethernet cards.

Note: The EOS Port and EOP Port PM byte counts include the 8-byte GFP header, allowing users to view the precise loads being handled by the EOS or EOP port.

EOS Port PM and EOS Service PM byte counts may differ for the following reasons:• If multiple services are using the same EOS port, the EOS Port PM is the

cumulative total across all such services.• EOS Service PM byte counts do not include the 8-byte GFP header.• VLAN tags may be added or stripped as packets traverse the Ethernet card. This

results in different packet sizes when counted at the service interface than when counted at the EOS port interface.

To view performance data for a card, from Shelf View, click the Ethernet tab, click the EOS subtab, click an EOS port from the EOS port list, then click the Performance tab.

Table 2-47 EOS Port PM Parameters

Parameter(Exclusive Parameter Note)

Definition

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

TX UNICAST(TE-100 Ethernet only)

The number of unicast frames transmitted with no errors.

TX MULTICAST(TE-100 Ethernet only)

The number of multicast frames that are not broadcast, transmitted with no errors.

TX BROADCAST(TE-100 Ethernet only)

The number of broadcast frames transmitted with no errors.

TX FRAMES1 The number of frames transmitted (unicast, multicast, and broadcast) with no errors.

TX BYTES2,3 The number of bytes transmitted in good frames.

TX DISCARDS(Traverse NGE and EoPDH only)

The number of outbound frames received by this port which were discarded.

RX UNICAST(TE-100 Ethernet only)

The number of unicast frames received, with length between 64 bytes and the maximum size, with no errors.

RX MULTICAST(TE-100 Ethernet only)

The number of multicast frames received, with length between 64 bytes and the maximum size, with no errors.

Page 235: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEOS Port PM

Release OPS4.2.3 Force10 Networks Page 2-77

RX BROADCAST(TE-100 Ethernet only)

The number of broadcast frames received, with length between 64 bytes and the maximum size, with no errors.

RX FRAMES1 The number of frames received (unicast, multicast, and broadcast) with no errors.

RX BYTES23 The number of bytes received in good frames.

RX DISCARDS(Traverse NGE and EoPDH only)

The number of inbound frames discarded by this port due to errors, and thus, unable to forward to a higher-layer protocol.

RX FCS ERR (Traverse 10GbE or GbE-10 only)

The number of received frames that were discarded due to incorrect Ethernet CRC.

GFP FCS DISCARDS4

(Traverse NGE and EoPDH only)The number of GFP frames discarded due to frame checksum (FCS) errors.

GFP CHEC DISCARDS The number of GFP frames discarded due to uncorrectable core header (cHEC) checksum errors.

GFP PHEC DISCARDS(Traverse NGE and EoPDH only)

The number of GFP frames discarded due to due to uncorrectable “payload header” (extension or type header) checksum (eHEC, tHEC) errors.

GFP FCS OR PHEC DISCARDS(TE-100 Ethernet only)

The number of GFP frames discarded due to frame checksum (FCS) errors, plus GFP frames discarded due to uncorrectable “payload header” (extension or type header) checksum (eHEC, tHEC) errors.

RX MTU DISCARDS(TE-100 Ethernet only)

The number of frames discarded by this interface due to an excessive size.

GFP HEC CORRECTIONS GFP frames received with single-bit HEC errors (cHEC, eHEC or tHEC) that have been corrected.

1 Traverse NGE and TE-100 Ethernet exclude CMF frames.

2 Traverse NGE and EoPDH has a complete GFP Frame, excluding CMF frames.

3 TE-100 Ethernet has Ethernet Frame only.

4 Traverse NGE and EoPDH payload FCS, includes CMF frames.

Table 2-47 EOS Port PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition

Page 236: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringEOP Port PM Parameters

Page 2-78 Force10 Networks Release OPS4.2.3

EOP Port PM Parameters

Two Performance Monitoring templates exist for use with the EOP ports on EoPDH cards. One template controls collection of PM counters that apply to the EOP port as a whole. The other template collects PM counters for PDH events on the individual members of the EOP port. Both are provisioned on the EOP port but are used for different reasons.

EOP Port PM

The EOP port PM template (eop_pm) includes Ethernet Frame and octet counters, as well as GFP error counters. These counters apply to the non-PDH portion of the EOP port.

In Shelf View, click the Ethernet tab, click the EOP subtab, click an EOP port from the EOP port list, then click the Performance tab.

Table 2-48 EOP Port PM Parameters

Parameter(Exclusive Parameter Note)

Definition

Non-resetting PM When selected, the 24-hour count for the selected template will not automatically reset every 24 hours. When disabled (not selected), the counter resets to 0 every 24 hours and can be manually reset through operator command. The default is Disabled.

TX UNICAST The number of unicast frames transmitted with no errors.

TX MULTICAST The number of multicast frames that are not broadcast, transmitted with no errors.

TX BROADCAST The number of broadcast frames transmitted with no errors.

TX FRAMES The number of frames transmitted (unicast, multicast, and broadcast) with no errors.

TX BYTES The number of bytes transmitted in good frames.

TX DISCARDS The number of outbound frames received by this port which were discarded.

RX UNICAST The number of unicast frames received, with length between 64 bytes and the maximum size, with no errors.

RX MULTICAST The number of multicast frames received, with length between 64 bytes and the maximum size, with no errors.

RX BROADCAST The number of broadcast frames received, with length between 64 bytes and the maximum size, with no errors.

RX FRAMES The number of frames received (unicast, multicast, and broadcast) with no errors.

RX BYTES The number of bytes received in good frames.

Page 237: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Ethernet Performance ParametersEOP Port PM Parameters

Release OPS4.2.3 Force10 Networks Page 2-79

EOP Port Member PM

Each member of an EOP port is a virtual PDH port and has its own PM information. This information includes PM counters a physical PDH port such as near-end and far-end CV, ES, and SES values.

The EOP port member PM template is provisioned for one EOP port, but collects information for all the same counters on the EOP port members. For a SONET system, the port members are either DS1 or DS3. For SDH systems, the port members are either E1 or E3. For example, a DS1 EOP port with 8 members will have a single ds1_ptp_pm template. The template controls the data for all 8 sets of PM counters on that port. Each set of data can be viewed separately.

In Shelf View, click the Ethernet tab, click the EOP subtab, select an EOP port from the EOP port list, then click the Performance tab, select the Port Member from the port pulldown and then click Refresh. The values display for the port member selected (for SONET, either DS1 or DS3; for SDH, either E1 or E3). For definitions of the Ethernet port parameters, refer to Ethernet Port PM, page 2-71.

RX DISCARDS The number of inbound frames discarded by this port due to errors, and thus, unable to forward to a higher-layer protocol.

RX FCS ERRORS The number of received frames that were discarded due to incorrect Ethernet CRC.

GFP FCS DISCARDS The number of GFP frames discarded due to frame checksum (FCS) errors.

GFP CHEC DISCARDS The number of GFP frames discarded due to uncorrectable core header (cHEC) checksum errors.

GFP PHEC DISCARDS The number of GFP frames discarded due to due to uncorrectable “payload header” (extension or type header) checksum (eHEC, tHEC) errors.

GFP FCS OR PHEC DISCARDS The number of GFP frames discarded due to frame checksum (FCS) errors, plus GFP frames discarded due to uncorrectable “payload header” (extension or type header) checksum (eHEC, tHEC) errors.

RX MTU DISCARDS The number of frames discarded by this interface due to an excessive size.

GFP HEC CORRECTIONS GFP frames received with single-bit HEC errors (cHEC, eHEC or tHEC) that have been corrected.

Table 2-48 EOP Port PM Parameters (continued)

Parameter(Exclusive Parameter Note)

Definition

Page 238: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 2: Performance MonitoringSmall Form-Factor Pluggable Optical Port PM

Page 2-80 Force10 Networks Release OPS4.2.3

Small Form-Factor Pluggable Optical Port PM

The Traverse system provides the following performance (diagnostic) monitoring parameters for the small form-factor pluggable (SFP) and 10 Gigabit small form-factor pluggable (XFP) optical ports.

To view SFP or XFP information, select an optical card and click the Config tab. To verify the card has an SFP or XFP, check the description of the HW Description field. To view the SFP or XFP information, refer to the TransNav Management System GUI Guide, Section 5—Equipment, Chapter 2—“SONET Equipment,” SFP Port Parameters.

Table 2-49 SFP (and XFP) Optical Port PM Parameters

Parameter Definition

Measured Temperature A measure of the internal transceiver temperature yielding a value within the total range of -128 to +128 celsius.

Measured Supply Voltage A measure of the internal transceiver supply voltage yielding a value within the total range of 0 to +6.55 volts.

Measured TX Bias Current A measure of the TX bias current yielding a value within the total range of 0 to 131 mA.

Measured TX Output Power A measure of the TX output power based on the measurement of laser monitor photodiode current and yielding a value within the total range of 0 to 6.5535 mW.

Measured TX Input Power A measure of the TX input power yielding a value within the total range of 0 to 6.5535 mW (~ -40 to +8.2 dBm). Absolute accuracy is dependent upon the exact optical wavelength.

Page 239: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 3 EQUIPMENT LED STATUSSECTION 3SECTION 3

Contents

Chapter 1LEDs and Module Status

PDAP LEDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2Front Inlet Fan Tray Module LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Power and Standby LED Indicators—All Modules . . . . . . . . . . . . . . . . . . . . . 3-6General Control Module (GCM) LED Indicators . . . . . . . . . . . . . . . . . . . . . . . 3-7Electrical Module Port LED Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8Optical Module Port LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9Ethernet Module Port LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9Ethernet Termination Connector LED Indicators. . . . . . . . . . . . . . . . . . . . . . . 3-10Visual Status During and After Start-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11

Flashing red. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11Solid green . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11

Page 240: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3 Equipment LED Status

Page ii Force10 Networks Release OPS4.2.3

Page 241: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 3-1

SECTION 3EQUIPMENT LED STATUS

Chapter 1 LEDs and Module Status

Introduction Light emitting diodes (LEDs) exist on several pieces of Force10 product family equipment to provide visual status.

This chapter provides information on each of the LEDs and what they indicate:• PDAP LEDs, page 3-2• Front Inlet Fan Tray Module LEDs, page 3-3• Power and Standby LED Indicators—All Modules, page 3-6• General Control Module (GCM) LED Indicators, page 3-7• Electrical Module Port LED Indicators, page 3-8• Optical Module Port LED Indicators, page 3-9• Ethernet Module Port LED Indicators, page 3-9• Ethernet Termination Connector LED Indicators, page 3-10• Visual Status During and After Start-up, page 3-11

Page 242: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3: Equipment LED StatusPDAP LEDs

Page 3-2 Force10 Networks Release OPS4.2.3

PDAP LEDs The following drawings illustrate the locations of the Power Distribution and Alarm Panel (PDAP-2S, or PDAP-4S). LEDs are shown in the following drawings. Refer to Table 3-1 PDAP LEDs for information on how to interpret the PDAP LED indicators.

Figure 3-1 PDAP-2S LEDs

Figure 3-2 PDAP-4S LEDs

The LEDs in the following table apply to LEDs on the PDAP-2S and PDAP-4S.

Table 3-1 PDAP LEDs

LED RED GREEN AMBER OFF

Critical Summary

Alarm

At least one critical alarm in

the rack.

N/A N/A No critical alarms for the entire rack.

GMT Fuse BlockPower

At least one fuse failure in GMT

Fuse Block “A” or “B.”

All fuses are good in GMT Fuse

Block “A” or “B.”

N/A No power.

InputPower

N/A Power from Battery “A” or

“B” input.

N/A No power.

Major Summary

Alarm

At least one major alarm in the rack.

N/A N/A No major alarms for the entire rack.

Page 243: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 LEDs and Module StatusFront Inlet Fan Tray Module LEDs

Release OPS4.2.3 Force10 Networks Page 3-3

Front Inlet Fan Tray Module LEDs

The following drawing shows the location of the front inlet fan tray module LEDs. Refer to Table 3-2 Front Inlet Fan Card LEDs for information on how to interpret LED indicators.

Figure 3-3 Front Inlet Fan Card with LEDs

Minor Summary

Alarm

N/A N/A At least one minor alarm exists in the

rack.

No minor alarms for the entire rack.

TPA Fuse Power

(PDAP-4S only)

The TPA fuse has failed.

N/A N/A TPA fuse is good.

Table 3-1 PDAP LEDs (continued)

LED RED GREEN AMBER OFF

Power (green)

Fan Failure (red)

Power (green)

Fan Failure (red)

Page 244: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3: Equipment LED StatusFront Inlet Fan Tray Module LEDs

Page 3-4 Force10 Networks Release OPS4.2.3

The locations of common and specific card LEDs is shown in the following graphic.

Table 3-2 Front Inlet Fan Card LEDs

LED RED GREEN OFF

Power N/A Power on No power

Fan Failure

• At least one fan card, fan tray EEPROM or thermistor has failed. Check and replace the fan tray and/or card.

• Lost communication with GCM. Reseat the fan tray.

• Over temperature condition on the GCM. Check that the room temperature is not abnormally high or replace the front inlet fan tray air filter.

N/A

• All fans are working.• Communication with

GCM is good.• All temperature

indications are good.

Page 245: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 LEDs and Module StatusFront Inlet Fan Tray Module LEDs

Release OPS4.2.3 Force10 Networks Page 3-5

Figure 3-4 Physical Card LEDs

DS3/E3 OC-N/STM-N Ethernet

DS1, DS3/E3,E1, OC-N/STM-N

and ETH PortIndicators

ETHERNET LINKOSS and Craft

Alarms:CRITICAL/MAJOR

MINOR

Timing:LOCKED/

UNLOCKEDFREE RUN/HOLDOVER

RS-232 Interface(DB-9)

EGCM

ACO ON

10/100BaseTEthernet Interface

(RJ-45)

DS1 VTSwitch

ACO

PWR(Power)

ACTV/STNBY

(Active/Standby)Optical

Port

E1OPS 00015

Page 246: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3: Equipment LED StatusPower and Standby LED Indicators—All Modules

Page 3-6 Force10 Networks Release OPS4.2.3

Power and Standby LED Indicators—All Modules

The LEDs in the following tables apply to all cards.

Table 3-3 Power and Active/Standby—All Cards

LEDRED Amber GREEN OFF

Flashing Solid Flashing Solid Flashing Solid

Power

Initialization and diagnosis is underway but not complete.

Hardware failure

detected; replace the

card.

N/A N/A N/A

Initialization is complete and

the card is operational.

No power.

Active/ Standby N/A N/A

The card is unlocked and in Standby mode.1 Synchronization with the Active card is not complete.

The card is unlocked. The card type does not match the provisioned card type or the card is placed in an invalid slot.2

The card is unlocked and in Standby mode. Synchronization with the Active card is complete.

The Active card is unlocked and operational.

The card is locked or initialization is not complete.

1 Does not apply to GbE or OC-N cards.

2 For the Traverse platform, refer to Appendix A—“Card Placement Planning and Guidelines,” page 12-1 for valid card placement guidelines.

Page 247: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 LEDs and Module StatusGeneral Control Module (GCM) LED Indicators

Release OPS4.2.3 Force10 Networks Page 3-7

General Control Module (GCM) LED Indicators

The LEDs in the following tables apply to GCM cards only. If you have placed GCMs with integrated (OC-12/STM-4 or OC-48/STM-16) optics, also refer to Table 3-9 Optical Card/Port Status.

Table 3-4 GCM Alarms

LEDRED AMBER

OFFSolid Solid

Critical/ Major

One or more critical or major alarms are active. Indicates a service-affecting event(s) and requires immediate action.

N/A

No critical or major alarms

Minor N/A

One or more minor alarms are active. Indicates a non-service-affecting event(s). Take action to prevent a more serious problem.

No minor alarms

Alarm Cutoff (ACO)

N/AThe audible alarm is cut off (silenced).

The audible alarm is not cut off (not silenced).

Table 3-5 Timing Subsystem

LEDRED GREEN AMBER

OFFSolid Flashing Solid Flashing Solid

Locked/ Unlocked

Selected timing input reference is lost.

Lost-phase mode. LED flashes at 500ms on/off rate.

Locked to a timing input reference1 N/A N/A

Initialization is not complete or the GCM is in free-run mode.

Free-run/ Hold-over N/A

Tracking a timing reference signal, but not completely out of free-run mode. LED flashes at 500ms on/off rate.

Free-run mode2 Transitioning out of hold-over mode, but not Locked. LED flashes at 500ms on/off rate.

Hold-over mode.3

Initialization is not complete or the GCM is locked to a timing input reference1.

1 Timing input references are: T1, Composite Clock, or OC-N line timing reference.

2 A valid timing input reference is not available and the GCM is unable to acquire an estimate for hold-over, or the GCM is configured for free-run mode.

3 The external timing reference is degraded or lost and no other input references are available for system synchronization. The GCM was locked to its selected timing input reference and established a valid frequency estimate before going into hold-over mode.

Page 248: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3: Equipment LED StatusElectrical Module Port LED Indicators

Page 3-8 Force10 Networks Release OPS4.2.3

:

Electrical Module Port LED Indicators

The LEDs in the following table apply to electrical (DS1, DS3, E1, E3, and VT/TU Switch) cards only.

Table 3-6 Ethernet Link (OSS and Craft 10/100BaseT)

LEDRED GREEN OFF

Flashing Solid Flashing Solid

Ethernet Port

Running diagnostics or in loopback mode.

Port is unlocked, but there is no link integrity/signal.

Transmitting or receiving frames.

Operational, the link is active.

Port is locked.

Table 3-7 Electrical Card/Port Status

RED GREEN OFF

LED Flashing Solid Flashing Solid

Ports

Running diagnostics or in loopback mode.

Unlocked and a port failure is detected (LOS, LOF/OOF, AIS, RFI)

N/A

Unlocked and receiving a valid signal.

Card initialization is not complete, the card is in Standby mode, or the port is locked.

Page 249: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 LEDs and Module StatusEthernet Module Port LED Indicators

Release OPS4.2.3 Force10 Networks Page 3-9

Optical Module Port LED Indicators

The LEDs in the following table apply to optical cards (OC-N/STM-N) and to the opti-cal ports (OC-12/STM-4 or OC-48/STM-16) on the GCM with integrated optics cards.

Ethernet Module Port LED Indicators

The LEDs in the following table apply to the optical 10GbE, GbE-10, GbE and FE (100Base FX and 10/100BaseTX) combination cards.

Table 3-8 Optical Card/Port Status

RED GREEN OFF

LED Flashing Solid Flashing Solid

Ports

Running diagnostics or in loopback mode

Unlocked and a port failure is detected (LOS, LOF/OOF, AIS, RFI)

Unlocked and receiving a valid signal; in Standby mode for a 1+1 facility protection group

Unlocked and receiving a valid signal

Card initialization is not complete or the port is locked

Table 3-9 GbE and Fast Ethernet Port

LEDRED GREEN OFF

Flashing Solid Flashing Solid

Ethernet Port

Running diagnostics or in loopback mode

Unlocked no link integrity/signal detected

Unlocked and transmitting or receiving frames

Unlocked and operational. The Ethernet link is active.

Card initialization is not complete or the port is locked

Page 250: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3: Equipment LED StatusEthernet Termination Connector LED Indicators

Page 3-10 Force10 Networks Release OPS4.2.3

Ethernet Termination Connector LED Indicators

The LEDs in the following table apply to the optical 10GbE, GbE-10, GbE and FE (100Base FX and 10/100BaseTX) combination cards.

Table 3-10 GbE and Fast Ethernet Port

LEDRED GREEN OFF

Flashing Solid Flashing Solid

Ethernet Port

Running diagnostics or in loopback mode

Unlocked no link integrity/signal detected

Unlocked and transmitting or receiving frames

Unlocked and operational. The Ethernet link is active.

Card initialization is not complete or the port is locked

Page 251: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 LEDs and Module StatusVisual Status During and After Start-up

Release OPS4.2.3 Force10 Networks Page 3-11

Visual Status During and After Start-up

The GCM power LED indicates the status of start-up and initialization. The GCM power LED will go through the following sequence:

Flashing red

Power On Self Test (POST) is started 1.

Solid green

Initialization complete and successful.

1 The POST takes approximately one minute to run and it invokes the LED activity for initialization.

Important: The solid green Active/Standby LED indicates the active GCM card. Use the CLI to commission and configure the active GCM.

Table 3-11 Power and Active/Standby—GCM Cards

LEDRED Amber GREEN OFF

Flashing Solid Flashing Solid Flashing Solid

Power

Initializing; POST is started.

Hardware failure detected; replace the card.

N/A N/A Node is in commissioning

mode

Passed initialization and is operational

No power

Active/ Standby

N/A N/A Standby mode;

synchroniza-tion with the Active card

is not complete.

Card type does not match the provisioned card type or the card is placed in an invalid slot.1

Standby mode; synchroniza-tion with the active card is complete.

Active and operational

Initializing; POST is started.

1 Please refer to Appendix A—“Card Placement Planning and Guidelines,” page 12-1 for valid card placement guidelines.

Page 252: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 3: Equipment LED StatusVisual Status During and After Start-up

Page 3-12 Force10 Networks Release OPS4.2.3

Page 253: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 4 DIAGNOSTICSSECTION 4

Contents

Chapter 1Diagnostics Overview

Symptoms and Recommended Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2

Chapter 2Traverse Transmit and Receive Signal Levels

Traverse Optical Interface Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4

Chapter 3TraverseEdge 100 Transmit and Receive Signal Levels

TE-100 Optical Interface Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8

Chapter 4Loopback Tests

DS1 and DS3 Loopback Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12DS1 and DS3 Facility Payload Loopback . . . . . . . . . . . . . . . . . . . . . . . . 4-12DS1 and DS3 Terminal Loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12

E1 and E3 Loopback Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13E1 and E3 Facility Payload Loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13E1 and E3 Terminal Loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13

Ethernet Loopback Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14NGE and EoPDH Ethernet Facility Loopback . . . . . . . . . . . . . . . . . . . . . 4-14Ethernet Terminal Loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14

Facility Loopback on EOP Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15SONET/SDH Loopback Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16

SONET/SDH Facility Loopback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16SONET/SDH Terminal Loopback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16

Performing Loopback Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17Equipment States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19

Chapter 5Other Diagnostics

Power On Self Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21Alarm Cut-Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21LED Lamp Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21

Page 254: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4 Diagnostics

Page ii Force10 Networks Release OPS4.2.3

Page 255: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 4-1

SECTION 4DIAGNOSTICS

Chapter 1 Diagnostics Overview

Introduction The diagnostics section provides various diagnostic tips and tools to assist you isolate, and find resolution to, abnormal conditions observed while monitoring the Traverse system.

This chapter includes the following topics:• Symptoms and Recommended Actions, page 4-2• Chapter 2—“Traverse Transmit and Receive Signal Levels,” page 4-3• Chapter 3—“TraverseEdge 100 Transmit and Receive Signal Levels,” page 4-7• Chapter 4—“Loopback Tests,” page 4-11• Chapter 5—“Other Diagnostics,” page 4-21

Page 256: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection4: D

iagnosticsSym

ptoms and R

ecomm

ended Actions

Page 4-2Force10 N

etworks

Release O

PS4.2.3

Symptoms and Recommended Actions

During normal operation of the Traverse system various symptoms (non-alarm/event conditions) may arise that require attention by network operations.

Table 4-1 Symptoms and Recommended Actions below describes observable symptoms, their probable causes, and any recommended actions to take to resolve the problem.

Symptoms are listed in the following table in ascending, alphabetical order. Each symptom entry contains the following information:• Suspected system area• Symptom description• Suspected domain (network) or node (module or port) scope• Probable cause• Recommended action based on symptom observation

Table 4-1 Symptoms and Recommended Actions

System Area Symptom Description Scope Probable Cause Recommended Action

Environmental Alarms

Environmental Alarm input or output is incorrect.

Node • Incorrect alarm cable connections

• Environmental Alarm Module (EAM) failure

• Incorrect alarm cable connections. See the Traverse Installation and Commissioning Guide, Section 1—Fault Management, Chapter 2—“Alarms, Events, and Recommended Actions,” page 1-33

• Replace EAM. See Section 6—Routine Maintenance, Chapter 1—“Routine Maintenance,” Environmental Alarm Module Replacement (Traverse only), page 6-20

Page 257: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 4-3

SECTION 4DIAGNOSTICS

Chapter 2 Traverse Transmit and Receive Signal Levels

Introduction This chapter provides optical parameter specifications to assist you in handling a Loss of Signal (LOS) condition on a Traverse optical module.

Page 258: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection4: D

iagnosticsTraverse O

ptical Interface Specifications

Page 4-4Force10 N

etworks

Release O

PS4.2.3

Traverse Optical Interface Specifications

The table below provides a summary of all optical interface specifications.

OPTIC WARNING! The optical receiver of the OC-N/STM-N Long Reach cards can be damaged permanently if overloaded. Do not connect the optical transmitter directly to the optical receiver, unless with proper attenuation. A minimum of 10dB attenuation is required for long reach optics.

Table 4-2 Traverse Optical Interface Specification Summary Table

Optical Interface Card Optic Type

Typical Nominal TX Wavelength

TX Wavelength

Range

RX Wavelength

Range

Transmitter Output Power1

Receiver Signal1,2

Guaranteed Link

Budget1

Distance Objective 3, 4

(nm) (nm) (nm) (dBm) (dBm) (dB) (mi) (km)

Fast Ethernet(10/100)

100BaseFX (GbE/Fast Ethernet combo)

1310 1261 to 1360 1260 to 1600 -16 to -14 -29 to -14 13 20.2 32.5

GbE 1000Base-X (SFP)Pluggable SFP

GbE SX 850 830 to 860 770 to 860 -10.5 to -4 -16 to -3 5.5 0.34 0.55

GbE LX 1310 1270 to 1360 1270 to 1355 -10 to -3 -18 to -3 8 6.21 10

GbE ZX 1550 1530 to 1580 1260 to 1620 -1 to -5 -22 to -3 21 49.71 80

GbE CWDM 1470 to 1610(8 channels at 20 nm intervals)

1260 to 1620 -1 to 4 -18 to -0 17 24.85 40

10GbE(XFP)Pluggable SFP

10GbE LR 1310 1260 to 1355 1260 to 1600 -7.2 to 0.5 -11.6 to 0.5 4.4 6.21 10

10GbE ER 1550 1530 to 1565 1270 to 1600 -2 to 2 -13 to -1 11 24.85 40

10GbE ZR 1550 1530 to 1565 1270 to 1600 -1 to 4 -23 to -7 22 49.71 80

OC-3/STM-1 OC-3 IR1/STM-1 SH1 / S-1.1 1310 1261 to 1360 1260 to 1600 -16 to -8 -28 to -7 12 9.32 15

OC-3 LR2/STM-1 LH2 / L-1.2 1550 1480 to 1580 1260 to 1600 -6 to 0 -32 to -10 26 49.71 80

OC-12/STM-4 OC-12 IR1/STM-4 SH15 / S-4.1 1310 1274 to 1356 1260 to 1600 -16 to -8 -27 to -7 11 9.32 15

OC-12 LR2/STM-4 LH25 / L-4.2 1550 1480 to 1580 1260 to 1600 -4 to 2 -26 to -8 22 49.71 80

Page 259: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter2

Traverse Transmit and R

eceive Signal Levels

Traverse Optical Interface Specifications

Release O

PS4.2.3Force10 N

etworks

Page 4-5

OC-48/STM-16 OC-48 SR1/STM-16 SH15 / I-16 1310 1266 to 1360 1260 to 1600 -11 to -3 -17 to -3 6 1.24 2

OC-48 IR1/STM-16 SH15 / S.16.1

1310 1260 to 1360 1260 to 1600 -6 to 0 -17 to 0 11 9.32 15

OC-48 LR1/STM-16 LH15 / L-16.1

1310 1280 to 1335 1260 to 1600 -3 to 3 -26 to -8 23 24.85 40

OC-48 LR2/STM-16 LH25 / L-16.2

1550 1500 to 1580 1260 to 1600 -3 to 3 -25 to -8 22 49.71 80

OC-48 LR2/STM-16 LH CWDM 1470 to 1610(8 channels at 20 nm intervals)

1260 to 1620 -1 to 5 -25 to -8 24 49.71 80

OC-48 ELR/STM-16 LH ITU DWDM

1529.55 to 1562.23 (42 channels)

1260 to 1600 -1 to 4 -26 to -8 25 62.14 100

OC-48 VR2/STM-16 VLH 1550 1530 to 1560 1260 to 1600 4 to 10 -25 to -8 29 62.14 100

OC-48 VR/STM-16 VLH DWDM

1529.55 to 1562.23 (42 channels)

1260 to 1600 4 to 10 -25 to -8 29 62.14 100

OC-192/STM-646 OC-192 SR1/STM-64 SH1 1310 1290 to 1330 1290 to 1600 -5 to -1 -13 to -1 8 7.46 12

OC-192 IR2/STM-64 SH2 1550 1530 to 1565 1290 to 1600 -2 to 2 -15 to -1 13 24.85 40

OC-192 LR2/STM-64 LH2 1550 1530 to 1565 1290 to 1600 2 to 7 -20 to -4 22 49.71 80

OC-192 LR/STM-64 LH ITU DWDM

1529.55 to 1562.23(42 channels)

1290 to 1600 2 to 7 -20 to -4 22 49.71 80

OC-192 ELR/STM-64 LH ITU DWDM

1529.55 to 1562.23 (42 channels)

1290 to 1600 2 to 7 -23 to -4 25 55.92 90

Table 4-2 Traverse Optical Interface Specification Summary Table (continued)

Optical Interface Card Optic Type

Typical Nominal TX Wavelength

TX Wavelength

Range

RX Wavelength

Range

Transmitter Output Power1

Receiver Signal1,2

Guaranteed Link

Budget1

Distance Objective 3, 4

(nm) (nm) (nm) (dBm) (dBm) (dB) (mi) (km)

Page 260: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection4: D

iagnosticsTraverse O

ptical Interface Specifications

Page 4-6Force10 N

etworks

Release O

PS4.2.3

1 These values account for the connector loss from connection to the optical interface and the worst case optical path penalty.

2 Pseudo Random Bit Sequence, Bit Error Rate is 223 -1 PRBS, BER=10-12

3 Per IEEE 802.3-2005 for Ethernet and assumes a fiber loss of 0.4 dB/km for 1330 m, pr 0.25 dB/km for 1550 nm (including splices, connectors, etc.). Per GR-253-CORE, Issue 3, for SONET/SDH and assumes a fiber loss of 0.55 dB/km for 1310 nm or 0.275 dB/km for 1550 nm (including splices, connectors, etc.).

4 Force10 recommends customers to take actual fiber readings as these values are based on standards qualification.

5 GCM with integrated optics are also available. See the Traverse Product Overview Guide, Section 3—Card (Module) Descriptions, Chapter 1—“General Control Module (GCM) Cards,” page 3-1 for more information.

6 The OC-192/STM-64 LR2 and LR/LH DWDM card link budget (22 dB) is with forward error correction (FEC) off. Add an additional 3 dB with FEC on.

Page 261: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 4-7

SECTION 4DIAGNOSTICS

Chapter 3 TraverseEdge 100 Transmit and Receive Signal Levels

Introduction This chapter provides optical parameter specifications to assist you in handling a Loss of Signal (LOS) condition on a TraverseEdge 100 optical port.

Page 262: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection4: D

iagnosticsTE-100 O

ptical Interface Specifications

Page 4-8Force10 N

etworks

Release O

PS4.2.3

TE-100 Optical Interface Specifications

The table below summarizes all optical interface specifications. This table represents data for Force10 -approved SFPs. Additional SFPs may now be available; contact your Force10 sales representative.

Table Notes:• All TE-100 optical ports use SFP optical cards.• The RX power (min) and Attenuation (max) values assume the worst case optical path penalty (dispersion).• Not all vendors specify RX wavelength range. It is likely that the card will operate over a larger range than specified.

WARNING! The optical receiver of the OC-N long-reach optics can be damaged permanently if overloaded. Do not connect the optical transmitter directly to the optical receiver without proper attenuation. A minimum of 10 dB attenuation is required for long reach optics.

Important: Only use SFPs approved by Force10 or equipment damage may occur, thus voiding any TE-100 warranty.

Table 4-3 SONET, STM, and GbE Optics for the TE-100

Application Approx Distance

(km)

Tx Power Range(dBm)

Rx Power Range(dBm)

Dispersion Penalty

(db)

Attenuation Range

Extinction Ratio (dB)

Tx Wavelength

Range(nm)

RxWavelength

Range(nm)

Dispersion Tolerance (ps/nm)

Temperature Range (degC)SONET STM

OC-3 IR-1 STM-1 S-1.1 15 -15 to -8 -29 to -7 0 0 to 14 8.2 1261 to 1360 1260 to 1600 0 -40 to 85

OC-3 LR-2 STM-1 L-1.2 80 -5 to 0 -33 to -10 1 10 to 28 10 1480 to 1580 1260 to 1600 0 -40 to 85

OC-12 IR-1 STM-4 S-4.1 15 -15 to -8 -28 to -7 0 0 to 13 8.2 1274 to 1356 1260 to 1600 0 -40 to 85

OC-12 LR-2

STM-4 L-4.2 80 -3 to 2 -27 to -8 1 10 to 24 10 1480 to 1580 1260 to 1600 0 -40 to 85

OC-48 SR-1 STM-16 I-16 2 -10 to -3 -18 to -3 0 0 to 8 8.2 1266 to 1360 1260 to 1600 0 -40 to 85

OC-48 IR-1 STM-16 S.16.1 15 -5 to 0 -18 to 0 0 0 to 13 8.2 1260 to 1360 1260 to 1600 0 -40 to 85

OC-48 LR-1 STM-16 L-16.1 40 -2 to 3 -27 to -8 1 11 to 25 8.2 1280 to 1335 1260 to 1600 0 -40 to 85

OC-48 LR-2 STM-16 L-16.2 80 0 to 5 -26 to -8 2 13 to 26 8.2 1470 to 1610 1260 to 1600 1760 -5 to 70

OC-48 LR-2 STM-16 L-16.2 80 -2 to 3 -26 to -8 2 11 to 24 8.2 1500 to 1580 1260 to 1600 1600 -40 to 85

OC-48 ELR STM-16 100 0 to 4 -27 to -8 2 12 to 27 8.2 1529.55 to 1562.23

1260 to 1600 1750 0 to 70

1000Base SX 1000Base SX 0.555 -9.5 to -4 -17 to -3 0 0 to 7.5 9 830 to 860 770 to 860 0 -40 to 85

1000Base LX 1000Base LX 10 -9 to -3 -19 to -3 0 0 to 10 9 1270 to 1360 1270 to 1355 0 -40 to 85

1000Base ZX 1000Base ZX 80 0 to 5 -23 to -3 1 8 to 23 9 1530 to 1580 1260 to 1620 1600 -40 to 85

Page 263: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection4: D

iagnosticsTE-100 O

ptical Interface Specifications

Page 4-9Force10 N

etworks

Release O

PS4.2.3

Page 264: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsTE-100 Optical Interface Specifications

Page 4-10 Force10 Networks Release OPS4.2.3

Page 265: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 4-11

SECTION 4DIAGNOSTICS

Chapter 4 Loopback Tests

Introduction The TransNav Management System provides diagnostic loopback testing for troubleshooting ports and spans. The system supports the following loopback tests:• Facility—To troubleshoot the line interface unit of a card, the backplane, or the

cabling• Terminal—To troubleshoot a circuit path and loop back to the card

Important: Facility and terminal loopbacks cannot be performed on most ports, part of a BLSR/MS-SP Ring, or on a 1+1 APS/MSP protection group. Facility loopbacks can be performed on EOP ports.

This chapter contains the following card-specific loopback tests:• DS1 and DS3 Loopback Tests, page 4-12• E1 and E3 Loopback Tests, page 4-13• Ethernet Loopback Tests, page 4-14• SONET/SDH Loopback Tests, page 4-16

See Performing Loopback Tests, page 4-17 for a step-by-step procedure on how to perform loopback tests.

See Equipment States, page 4-19 for a discussion of the Traverse operational and administrative states.

WARNING! Loopback tests interrupt traffic flow; do not perform them on nodes providing service.

Page 266: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsDS1 and DS3 Loopback Tests

Page 4-12 Force10 Networks Release OPS4.2.3

DS1 and DS3 Loopback Tests

DS1 and DS3 Facility Payload Loopback

Each node or EOP port supports a facility payload loopback for each incoming received DS-x signal. The facility must first be taken out of service before starting the loopback test.

The facility payload loopback connects the incoming received DS-x signal immediately to the associated return transmitter as shown in Figure 4-1. During this loopback, AIS is inserted and sent to the far end.

Figure 4-1 DS-x Facility Payload Loopback

DS1 and DS3 Terminal Loopback

The node supports terminal loopback for each DS-x signal. The facility must first be taken out of service before starting the loopback test.

For DS1 and DS3 terminal loopback, the signal is looped back toward the SONET/SDH system just before being transmitted toward the DS-x line as shown in Figure 4-2. This loopback is used to verify the receiver associated with the interface and the integrity of the transmitted DS-x signal.

Figure 4-2 DS-x Terminal Loopback

OPS 00027

DS-x card Trunk card

LIU LIUAIS

DS-x facility underloopback test

TestSet

Servicebetween ports

DS-x card Trunk card

LIU LIU

DS-x facility underloopback test

TestSet

Service set upbetween ports

OPS 00028

Page 267: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Loopback TestsE1 and E3 Loopback Tests

Release OPS4.2.3 Force10 Networks Page 4-13

E1 and E3 Loopback Tests

E1 and E3 Facility Payload Loopback

The node supports a facility payload loopback for each incoming received E-x signal. The facility must first be taken out of service prior to initiating the loopback test.

The facility payload loopback connects the incoming received E-x signal immediately to the associated return transmitter, as shown in Figure 4-1. During this loopback, AIS is inserted and sent to the far end.

Figure 4-3 E-x Facility Payload Loopback

E1 and E3 Terminal Loopback

The node supports terminal loopback for each E-x signal. The facility must first be taken out of service before starting the loopback test.

For E1 and E3 terminal loopback, the signal is looped back toward the SONET/SDH system just before being transmitted toward the E-x line, as shown in Figure 4-2. This loopback is used to verify the receiver associated with the interface and the integrity of the transmitted E-x signal.

Figure 4-4 E-x Terminal Loopback

OPS 00029

E-x module Trunk module

LIU LIUAIS

E-x facility underloopback test

TestSet

Servicebetween ports

E-x module Trunk module

LIU LIU

E-x facility underloopback test

TestSet

Service set upbetween ports

OPS 00030

Page 268: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsEthernet Loopback Tests

Page 4-14 Force10 Networks Release OPS4.2.3

Ethernet Loopback Tests

NGE and EoPDH Ethernet Facility Loopback

The node supports a facility payload loopback for next-generation Ethernet interfaces. All packets that the Ethernet card receives from a CPE port are transmitted back on the same CPE port. Service providers can use this to check the local cabling from CPE device to the node.

Facility loopback does not affect traffic flow on any other Ethernet port. If an Ethernet port is in an activated Ethernet service, the system prohibits facility loopback. If facility loopback is active, the system prohibits the activation of any Ethernet service.

The facility payload loopback connects the incoming received signal immediately to the associated return transmitter, as shown in Figure 4-5. The facility loopback is in effect across card reboot.

Figure 4-5 Ethernet Facility Payload Loopback

Ethernet Terminal Loopback

The node supports terminal loopback for next-generation Ethernet interfaces. Ethernet terminal loopback uses the forwarding relationship established by an Ethernet service to loop back packets to their sources, instead of transmitting them out the looped-back facility. This function requires the facility be in use by one or more activated Ethernet services that use point-to-point forwarding. (i.e., Line services).

Important: When facility loopback is on for the next-generation Ethernet port, and when no other Ethernet ports on this card are sending or receiving frames, the system transmits back to the loopback port all frames that it receives from that port with the likely exception of PAUSE frames and errored frames.

Ethernet frames

OPS 00031

Ethernet card

Ethernetfacility inFacility

Loopback

Traverse Node

Page 269: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Loopback TestsFacility Loopback on EOP Ports

Release OPS4.2.3 Force10 Networks Page 4-15

For Ethernet terminal loopback, the signal is looped back toward the SONET/SDH system just before being transmitted toward the Ethernet interface.

Figure 4-6 Ethernet Terminal Loopback

Facility Loopback on EOP Ports

Facility loopback on an EOPDH card occurs when a manual facility loopback is applied to the EOP port member. The PDH signal, shown in red in the following diagram, sends a copy of a received PDH signal to the transmit PDH signal while continuing to forward the received PDH signal to the EOP port’s VCAT or GFP function.

Figure 4-7 EOP Port Member Facility Loopback

The system allows up to 16 concurrent facility loopback settings on any EOP port member. A loopback facility alarm (LPBKFACILITY) is raised on the EOP port member while the local loopback is in effect.

Ethernetfacility inTerminalLoopback GFP-encapsulated

Ethernet overSONET / SDH

OPS 00032

Ethernet cardNode

EOS port

L ActivatedLineservice(s)O (i)

SL

Trunk Card

EoPDH card OC-N/STM-Ntransport card

LIUTest Set

PDHmember

OPS 00094

GFP,VCAT

EthernetSwitch

PDH payloadgenerated and

consumed here

Page 270: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsSONET/SDH Loopback Tests

Page 4-16 Force10 Networks Release OPS4.2.3

SONET/SDH Loopback Tests

SONET/SDH Facility Loopback

The node supports a facility payload loopback for each OC-N/STM-N facility (including the OC-12/STM-4 and OC-48/STM-16 facility on the Traverse GCM). The facility must first be taken out of service before starting the loopback test.

The facility payload loopback connects the incoming received SONET/SDH signal immediately to the associated return transmitter following the optical-to-electrical conversion (before scrambling), as shown in Figure 4-8. During this loopback, AIS is inserted and sent to the far end.

Figure 4-8 SONET/SDH Facility Payload Loopback

SONET/SDH Terminal Loopback

The node supports terminal loopback for each OC-N/STM-N facility (including the OC-12/STM-4 and OC-48/STM-16 facility on the Traverse GCM). The facility must first be taken out of service before starting the loopback test.

For SONET/SDH terminal loopback, the signal is looped back toward the SONET/SDH system by connecting the outgoing signal immediately before the electrical-to-optical conversion (after scrambling), as shown in Figure 4-9. Terminal loopback is used to verify the integrity of the electronics associated with the framer or the transmitted signal.

Figure 4-9 SONET/SDH Terminal Loopback

OC-N module OC-N module

LIU LIUAIS

SONET facilityunder loopback test

STS-NSTS-N

TestSet

Servicebetween ports

OPS 00033

OC-N/STM-Nmodule

OC-N/STM-Nmodule

LIU LIU

SONET/SDH facilityunder loopback test

TestSet

Service set upbetween ports

OPS 00034

Page 271: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Loopback TestsPerforming Loopback Tests

Release OPS4.2.3 Force10 Networks Page 4-17

Performing Loopback Tests

Before performing loopback testing, the port’s administrative state must first be changed to Unlocked.

Use the vendor’s procedures for setting up your test equipment, then follow the procedure below to perform loopback tests on a port.

The loopback state or port lock/unlock state is be restored after a node database restore operation is performed. Instead, the system uses the current state of the port to override what was stored in the node database.

Important: Loopback tests interrupt data flow; do not perform them on a port providing service.

Table 4-4 Performing Loopback Tests

Step Procedure

1 In the GUI, display the Shelf View of the node on which you will perform loopback tests. If you are currently in Map View, double-click the node to switch to the Shelf View.

2 Select a port on the appropriate card.

3 Click the Config tab.

4 To unlock a port that is currently locked, click the Locked icon in the lower left corner to display the Unlocked icon, then click Apply.

5 Is this an OC-N/STM-N port?• Yes. Disable the Config tab Control Data parameter.• No. Go to the next step.

6 Click Apply.

7 Click the Diagnostic tab.

8 From the Loopback drop-down list, select one of the following types of loopback tests to run:

– Facility: Troubleshoot the line interface unit (LIU) of a card, the backplane, and the cable.

– Terminal: Troubleshoot a circuit path and loop back from the card.

Figure 4-10 Setting Up a Loopback Test

Page 272: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsPerforming Loopback Tests

Page 4-18 Force10 Networks Release OPS4.2.3

9 For DS3/EC-1 ports only, select the Test Signal Type: (Planned for future release.)

– Clear (default)– PRBS (Pseudo random bit sequence): 223-1 PRBS – Fixed-24Bit: Repeating 24-bit pattern

(101110111011101110111011)

10 Click Apply to run the loopback test. If the loopback test fails, there is a problem with the signal path. Take corrective action.

11 After receiving feedback on the test equipment about the success or failure of the loopback test, clear the loopback test.

Select Clear on the Loopback status drop-down list, then click Apply.

12 The Performing Loopback Tests procedure is complete.

Table 4-4 Performing Loopback Tests (continued)

Step Procedure

Page 273: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 4 Loopback TestsEquipment States

Release OPS4.2.3 Force10 Networks Page 4-19

Equipment States

Icons in the bottom left-hand corner of the Config tab indicate the state of the card or port.

Figure 4-11 Equipment States

Equipped State: Displays one of the following values:• Equipped: Indicates the equipped state of the card or port. When Equipped, the

equipment is present in the system.• Non-Equipped: When selected, indicates the card or port is Non-Equipped; the

equipment is not present in the system.

Operational State: Displays one of the following values:• Enabled: The administrative state of the card or port is Unlocked.• Disabled: The administrative state of the card or port is Locked.

Administrative State: Click the icon until one of the following values displays:• Lock (default for ports): Do not allow the card or port to operate. Changes the

operational state to Disabled. Initiates protection switching, if applicable.• Unlock (default for cards): Allow the card or port to operate.

Operational state

Equipped state

Administrative state

Page 274: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsEquipment States

Page 4-20 Force10 Networks Release OPS4.2.3

Page 275: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 4-21

SECTION 4DIAGNOSTICS

Chapter 5 Other Diagnostics

Introduction This chapter provides other general diagnostics:• Power On Self Test, page 4-21• Alarm Cut-Off, page 4-21• LED Lamp Test, page 4-21

Power On Self Test

The Traverse and TE-100 system runs the Power On Self Test (POST) diagnostic test sequence on the Traverse general control module (GCM) and TE-100 system module at system startup, respectively. The POST determines whether all system components are working properly and takes approximately one minute to run, during which time the power LED displays solid RED.• The POST runs on both the working and protection modules• Any and all POST failures cause a fail-over• The POST invokes LED activity for test progress, and pass and fail notification

For a complete description of the LEDs in the system, see Chapter 1—“LEDs and Module Status.”

Alarm Cut-Off The Alarm Cut-Off (ACO) button on the front of the Traverse GCM and TE-100 System module causes the audible sound for major and critical alarms to silence or re-activate. Press the ACO button on the active module to silence the audible alarm and have the ACO LED change color and remain AMBER. If a subsequent major or critical alarm is raised, then the audible sound and matching LED turn on. Upon resolution of the condition or the operator presses (toggles) the button again, the LED turns off and the ACO button relay is reset for normal operation.

LED Lamp Test The ACO button also serves as a diagnostic LED lamp test button. Press and hold the ACO button for greater than 10 seconds to activate or cancel the test. Upon activation, all:• Traverse shelf module LEDs light sequentially from left to right, through all their

individual valid colors, and eventually display GREEN. Upon cancellation, all LEDs return to normal behavior.

• TE-100 shelf module LEDs light in unison through all their individual valid colors (GREEN, RED, and AMBER). Upon cancellation, all LEDs return to normal behavior.

Page 276: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 4: DiagnosticsLED Lamp Test

Page 4-22 Force10 Networks Release OPS4.2.3

Page 277: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 5 TEST ACCESSSECTION 5

Contents

Chapter 1Traverse Test Access

Local Test Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2Remote Test Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3Mode Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4Access Identifier (AID). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5Monitor Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6Split Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-7Feature Set Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9Test Access Mode Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9Monitor Test Access Example (MONE). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9Per Side Split Test Access Example (SPLTE) . . . . . . . . . . . . . . . . . . . . . . . . 5-13Series Split Test Access Example (SPLTA) . . . . . . . . . . . . . . . . . . . . . . . . . . 5-17

Chapter 2Traverse Test Access Guidelines for the Spirent BRTU Interface

Traverse Platform and Spirent BRTU Interoperability . . . . . . . . . . . . . . . . . . . 5-22Guidelines to Set Up the Traverse Test Access Spirent BRTU Interface . . . . 5-23

Page 278: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5 Test Access

Page ii Force10 Networks Release OPS4.2.3

Page 279: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 5-1

SECTION 5TEST ACCESS

Chapter 1 Traverse Test Access

Introduction (SONET network only) Traverse Test Access on digital cross-connect (DCS3/1) systems and Add-drop Multiplexer (ADM) systems provides for non-intrusive monitoring and intrusive split testing of DS3/STS-1 and DS1/VT1.5 digital signals.

Traverse test access is compliant with the following Telcordia standards: GR-834-CORE, Network Maintenance: Access and Testing, GR-1402-CORE, Network Maintenance: Access Testing - DS3 HCDS TSC/RTU and DTAU Functional Requirement, and GR-818 Network Maintenance: Access and Testing - Generic Test Architecture.

Interoperability with the Spirent® Communication’s network tester, Broadband Remote Test Unit (BRTU) with REACT® remote test Operations Support System (OSS), provides the Traverse platform with integrated test access functionality, enabling carriers to test and monitor any DS1/VT1.5 or DS3/STS-1 service provisioned on the Traverse switch fabric. See Chapter 2—“Traverse Test Access Guidelines for the Spirent BRTU Interface”.

For parameter descriptions, see the TransNav Management System GUI Guide, Section 8—Maintenance and Testing, Chapter 5—“Test Access”.

This chapter includes the following test access information.• Local Test Access, page 5-2• Remote Test Access, page 5-3• Mode Configurations, page 5-4• Access Identifier (AID), page 5-5• Feature Set Options, page 5-8• Configuration Management, page 5-9• Test Access Mode Examples, page 5-9

Page 280: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessLocal Test Access

Page 5-2 Force10 Networks Release OPS4.2.3

Local Test Access

The figure below shows the digital signal for monitoring or testing drops at a logical, pre-configured test access point (TAP). You pre-configure the TAP for use in establishing a test access cross-connect (TAC) to a unidirectional service, a bidirectional service, or an unmapped termination point (TP). The TAP is given a unique identifier and is configured as either a single facility access digroup (FAD) or a dual FAD (DFAD) using one or two service endpoint access identifiers (AIDs), respectively. A DFAD is just two FADs together in one TAP. DFADs are only used in test access mode configurations that require two FADs. Refer to Mode Configurations, page 5-4 for a description of all the test access mode configurations. For service endpoint information, refer to Access Identifier (AID), page 5-5.

The physical connection for a TAP is a standard cable connection between a DS3 or DS1 port and the remote test unit (RTU), typically via a patch panel. You establish TACs through the node-level control link or TransNav management system interface. With the test access cross-connects in service, you can monitor or perform tests using the test system controller (TSC) user interface to the RTU.

The Traverse system automatically disconnects all in-service TACs and restores all the original services upon reboot or communication loss with the RTU.

Figure 5-1 Local Traverse DCS3/1 Test Access

OPS 00039

TestSystem

Controller(TSC)

Test Access Point (TAP)(e.g., DS1 port)

ManagementSystem

(GUI, CLI, or TL1)

DCS3/1

RemoteTestUnit

(RTU)

Patch Panel

Node-level Control Link(CLI or TL1)Termination Point (TP)

of the Circuit Under Test

TransNav

Page 281: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessRemote Test Access

Release OPS4.2.3 Force10 Networks Page 5-3

Remote Test Access

The figure below shows the Remote test access that provides for the configuration of and access to TAPs at a remote location or network element. The remote TAP definition is a logical VT1.5 termination on an OC-N port. The DS1s for test access may be physically located at a remote site and/or in an access network element.

The figure below shows the remote test access network configuration. At the top of the figure is the Traverse DCS3/1. A static STS-1 or VT1.5 path is created across the service provider network from the remote multiplexer to the Traverse DCS3/1. A remote test unit (RTU) is connected with physical TAPs to a remote access multiplexer. When references are made to the logical VT1.5 level TAPs on the Traverse DCS3/1, the resulting test access configurations are effectively cross-connected to DS1 ports on the remote multiplexer for testing.

Figure 5-2 Remote Traverse DCS3/1 Test Access

OPS 00040

SONETNetwork

Remote Test Unit(RTU)

Remote AccessMultiplexer

Physical TAPs (e.g., DS1)

Logical TAPs(e.g., VT1.5 on OC-N port)

DCS3/1

STS-1or VTPath

Page 282: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessMode Configurations

Page 5-4 Force10 Networks Release OPS4.2.3

Mode Configurations

There are multiple monitor and split test access mode configurations available for use with bidirectional, unidirectional, and unmapped DS3/STS-1 and DS1/VT1.5 services.

The Traverse system supports the following test access mode configurations:• Monitor Configurations, page 5-6• Split Configurations, page 5-7

Each test access mode supports a set of service types. The following table lists the test access mode versus service compatibility matrix where A = Allowed, NA = Not Allowed.

Table 5-1 Test Access Mode vs. Service Compatibility Matrix

ModeService

Bidirectional Unidirectional Unmapped

MONE A A A

MONEF A NA NA

MONF A NA NA

SPLTA A A NA

SPLTB A NA NA

SPLTE A A A

SPLTEF A NA NA

SPLTF A NA NA

Page 283: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessAccess Identifier (AID)

Release OPS4.2.3 Force10 Networks Page 5-5

Access Identifier (AID)

The access identifier (AID) is a simple or compound string to uniquely identify a Traverse service (ingress or egress) endpoint.

Although the endpoint is the same, the actual AID format differs between the TransNav management system or node-level access interfaces (GUI and TL1) quite simply because there are underlying interface structural differences.• TransNav GUI AID Format—For example, the AID format for a DS1 port facility

is the following compound string group s(1-M)(DS1), p(1-28)(DS1). The s stands for slot. The M is 4 for the Traverse 600, 12 for the Traverse 1600, or 16 for the Traverse 2000, offering all possible module (card) slot choices. The p stands for port. The port number choices are from 1 to 28. DS1 identifies the module and port type, respectively. See Figure 5-3 TransNav GUI AID Format Example below.For service endpoint mapping definitions, refer to the TransNav Provisioning Guide, Section 9—Appendices, Appendix B—“Service Endpoints”

Figure 5-3 TransNav GUI AID Format Example

• TL1 AID Format—For example, the AID format for a DS1 port facility is FAC-(1-M)-(1-28). (FAC stands for facility.) The M is 4 offering 1 to 4 possible module (card) slot choices on the Traverse 600, 12 offering 1 to 12 possible module slot choices on the Traverse 1600, or 16 offering 1 to 16 possible module slot choices for the Traverse 2000. The port number choices are from 1 to 28.For a list of TL1-specific Traverse system AID formats, refer to the TransNav Management System TL1 Guide, Appendix C—AIDs.

Page 284: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessMonitor Configurations

Page 5-6 Force10 Networks Release OPS4.2.3

Monitor Configurations

Each monitor configuration is non-intrusive. The original service remains intact so there is no disruption to customer traffic while monitoring the data flow.

Test access provides three monitor mode configurations:• MONE - Monitor unidirectional data flow from ingress to egress termination point• MONF - Monitor unidirectional data flow from egress to ingress termination point1

• MONEF - Monitor bidirectional data flow from both the ingress and egress termination points

Figure 5-4 Monitor Configurations

1 If MONF is configured with a DFAD instead of the standard FAD, it uses the second FAD.

FAD

E F

MONF Test Access

FAD

E F

MONE Test Access

FAD

E F

MONEF Test Access

FADOPS 00042

Page 285: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessSplit Configurations

Release OPS4.2.3 Force10 Networks Page 5-7

Split Configurations

Each split configuration is intrusive. These configurations disable the original service so there is disruption to customer traffic. There are two kinds of split configurations: series and per side.

Test access provides five split mode configurations:• SPLTE - Per side split on the ingress termination point to test the ingress service• SPLTF - Per side split on the egress termination point to test the egress service2

• SPLTEF - Per side split on both the ingress and egress termination points to simultaneously test services

• SPLTA - Series split on the ingress termination point to test data flow from the ingress toward the egress termination point

• SPLTB - Series split on the egress termination point to test data flow from the egress toward the ingress termination point3

Figure 5-5 Split Configurations

2 If SPLTF is configured with a DFAD instead of the common FAD, it uses the second FAD.

3 If SPLTB is configured with a DFAD instead of the standard FAD, it uses the second FAD.

A

B

SPLTB Test Access

FAD

A

B

SPLTA Test Access

FAD

E

F

SPLTF Test Access

FAD

E

F

SPLTE Test Access

FAD

FAD

E

F

SPLTEF Test Access

FAD OPS 00043

Page 286: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessFeature Set Options

Page 5-8 Force10 Networks Release OPS4.2.3

Feature Set Options

The Traverse system provides the following full feature set module and user access interface options to support DCS3/1 test access applications. Choose those options that fit your network and test configuration requirements:• Modules:

– DS1—The DS1 module terminates up to 28 DS1s and provides mapping of DS1 to VT1.5 to enable grooming of VT1.5 at the VT Switch module.

– E1—The E1 module terminates up to 21 E1s and provides mapping of E1 to VC to enable grooming of VC at the VCX component STM module.

– DS3/E3/EC-1—The DS3/E3/EC-1 module is a single-slot 12 or 24-port transport module that provides twelve or twenty-four DS3 Clear Channel and twelve Transmux transport interfaces. The DS3/E3/EC-1 module supports SONET STS-1 or SDH TU-3/TUG-3/AU-3 mapping of DS3/E3/EC-1 client signals.

– DS3/EC-1 Transmux—The DS3/EC-1 Transmux module is a single-slot 12-port module that provides DS3 transmultiplexing (transmux) functions for channelized DS3 access to the Traverse platform. In addition to transmux functionality, any port can be independently configured for DS3 clear channel or EC-1 through the user interface.

– OC-N/STM-N—The OC-N/STM-N modules integrate the capabilities of a high-performance SONET/SDH Add-Drop Multiplexer (ADM) and a non-blocking cross-connect in a single module. The OC-N/STM-N module ports can be used as a trunk interface or for the aggregation and grooming of SONET/SDH services.

– Virtual Tributary/Tributary Unit (VT/TU) Switch—The VT/TU 5G Switch module integrates wideband switching and grooming functions into the Traverse platform. This module has a termination capacity of 5 Gbps for up to 32 STS-3c/AU-4 equivalents or 96 STS-1/AU-3 equivalents.

– Virtual Tributary Cross-connect (VTX)—The OC-48/STM-16 and GCM modules with an integrated virtual tributary/container (VT/VC) cross-connect component (VTX/VCX) known simply as VTX. The VTX component has a termination capacity of 2.5 Gbps for up to 16 STS-3c/AU-4 equivalents or 48 STS-1/AU-3 equivalents.

• User Access Interfaces:– Node-level Control Link—Direct test access configuration management via

standards-compliant node-level TL1 (Transaction Language 1) or CLI (Command Line Interface) control link interface from the TSC or RTU to the Traverse general control module. The physical connection of the control link is between the Traverse DCS3/1 system general control module (GCM) and the remote test system utilizing the Ethernet interface. The CLI interface also supports the RS-232 interface.

– TransNav Management System—Direct test access configuration management via the TransNav graphical user interface (GUI), CLI, or TL1 interface. Refer to the TransNav Management System Product Overview Guide.

Page 287: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessMonitor Test Access Example (MONE)

Release OPS4.2.3 Force10 Networks Page 5-9

Configuration Management

You can manage the test access feature through the GUI, CLI, or TL1 interface. Each interface is unique and offers the ability to create, change mode, view, disconnect, and report on test access configurations.• GUI—The procedures in this chapter use this interface. For further information,

refer to the TransNav Management System GUI Guide.• CLI—CLI scripts may be written to automate test access. These scripts run in the

TSC or the RTU itself. For further information, refer to the TransNav Management System CLI Guide.

• TL1—TL1 scripts may be written to automate test access. These scripts run in the TSC or the RTU itself. This interface is interoperable with the Spirent® network tester, BRTU with REACT® remote test OSS. For further information, refer to the TransNav Management System TL1 Guide.

Test Access Mode Examples

The test access mode examples identified below use the TransNav management system as the user interface for configuration management.

See one of the following test access mode examples:• Monitor Test Access Example (MONE), page 5-9• Series Split Test Access Example (SPLTA), page 5-17• Per Side Split Test Access Example (SPLTE), page 5-13

Monitor Test Access Example (MONE)

The MONE (Monitor-E) monitor test access configuration is non-intrusive. There is no disruption to customer traffic.

The figure below shows a MONE monitor test access configuration. At the top of the figure, a service is provisioned and activated between the source (S1) and destination (D1). The original service operational state is enabled and the service state is active. These states remain intact through the MONE test access mode configuration and use.

Figure 5-6 Monitor Test Access Configuration—MONE

Service to be Tested

Monitor Test Access(Non-Intrusive)

TAP (e.g., DS1)

DCS D1S1

TAP1

DCS D1S1

OPS 00011

Page 288: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessMonitor Test Access Example (MONE)

Page 5-10 Force10 Networks Release OPS4.2.3

Use the following procedure to create the MONE monitor test access configuration. This configuration allows the test equipment at test access port (TAP1) to monitor the data flow in the direction from the source (S1) to destination (D1).

Table 5-2 Monitor Test Access Configuration—MONE

Step Procedure

1 Physically connect the cable for the TAP from the remote test unit (RTU) into the patch panel connected to the Traverse DSC3/1.

2 Using the TransNav GUI, from the Test Access tab, TAP sub-tab, create a logical TAP (single FAD) of the same type as the service source termination point (S1).

Figure 5-7 Example VT TAP (Single FAD)

Page 289: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessMonitor Test Access Example (MONE)

Release OPS4.2.3 Force10 Networks Page 5-11

3 From the Test Access tab, TAC sub-tab, create a Monitor-E (MONE) TAC from the source (S1) to a logical TAP.

Note: Use the Switch Mode button to switch from one mode configuration to another. For valid mode changes, see Table 5-1 Test Access Mode vs. Service Compatibility Matrix.

Figure 5-8 MONE TAC Example

Table 5-2 Monitor Test Access Configuration—MONE (continued)

Step Procedure

TAP1MONE Mode Service ID Connected State

Switch Mode command

Page 290: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessMonitor Test Access Example (MONE)

Page 5-12 Force10 Networks Release OPS4.2.3

4 The original service remains intact (enabled) as seen when you select the Service tab.

Figure 5-9 Service with MONE TAC Example

5 With the TAC enabled to the RTU, you can now monitor the ingress (S1) to egress (D1) data flow at the source service under test.

6 To disconnect the TAC from the original (and still active) service, simply remove the TAC.

7 The Monitor Test Access Configuration—MONE procedure is complete.

Table 5-2 Monitor Test Access Configuration—MONE (continued)

Step Procedure

Service ID Enabled Operational State

Page 291: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessPer Side Split Test Access Example (SPLTE)

Release OPS4.2.3 Force10 Networks Page 5-13

Per Side Split Test Access Example (SPLTE)

The SPLTE per side split test access configuration is intrusive.

The figure below shows a SPLTE per side split test access configuration. At the top of the figure, a service is provisioned and activated between the source (S1) and destination (D1). The original service operational state is enabled and the service state is active. The service under the test operational state is disabled.

Figure 5-10 Per Side Split Test Access Configuration—SPLTE

Service to be Tested

Per Side Split Test Access(Intrusive)

TAP (e.g., DS1)

DCS D1S1

TAP1

DCS D1S1

OPS 00047

Page 292: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessPer Side Split Test Access Example (SPLTE)

Page 5-14 Force10 Networks Release OPS4.2.3

Use the following procedure to create the per side split test access configuration.

Table 5-3 Per Side Split Test Access Configuration—SPLTE

Step Procedure

1 Physically connect the cables for TAP from the remote test unit (RTU) into the patch panel connected to the Traverse DSC3/1.

2 Using the TransNav GUI, from the Test Access, TAP tab, create a logical test access point (TAP) (single FAD) of the same type as the source termination point (S1).

Figure 5-11 Example VT TAP (Single FAD)

Page 293: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessPer Side Split Test Access Example (SPLTE)

Release OPS4.2.3 Force10 Networks Page 5-15

3 From the Test Access tab, TAC sub-tab, create a per side split (SPLTE) test access cross-connect (TAC) from the source (S1) to a logical TAP.

Note: Use the Switch Mode button to switch from one mode configuration to another. For valid mode changes, see Table 5-1 Test Access Mode vs. Service Compatibility Matrix.

Figure 5-12 SPLTE TAC Example

Table 5-3 Per Side Split Test Access Configuration—SPLTE (continued)

Step Procedure

TAP2SPLTE Mode Service ID Connected State

Switch Mode command

Page 294: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessPer Side Split Test Access Example (SPLTE)

Page 5-16 Force10 Networks Release OPS4.2.3

4 The system disables the original service as seen when you select the Service tab.

Figure 5-13 Service with SPLTE TAC Example

5 With the TAC enabled to the RTU, you can now run various tests on the source service under test.

Note: An alarm indication signal (AIS) is automatically transmitted in the direction of D1 to show service disruption due to the test configuration.

6 To remove the TAC from the original (and still active) service, simply remove the TAC.

Note: The system restores the original service state.

7 The Per Side Split Test Access Configuration—SPLTE procedure is complete.

Table 5-3 Per Side Split Test Access Configuration—SPLTE (continued)

Step Procedure

Service ID Enabled Operational State

Page 295: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessSeries Split Test Access Example (SPLTA)

Release OPS4.2.3 Force10 Networks Page 5-17

Series Split Test Access Example (SPLTA)

The SPLTA series split test access configuration is intrusive.

The figure below shows a SPLTA series split test access configuration. At the top of the figure, a service is provisioned and activated between the source (S1) and destination (D1). The original service operational state is enabled and the service state is active. The service under the test operational state is disabled.

Figure 5-14 Series Split Test Access Configuration—SPLTA

Service to be Tested

Series Split Test Access(Intrusive)

TAP (e.g., DS1)

DCS D1S1

TAP1

DCS D1S1

OPS 00051

Page 296: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessSeries Split Test Access Example (SPLTA)

Page 5-18 Force10 Networks Release OPS4.2.3

Use the following procedure to create the series split test access configuration.

Table 5-4 Series Split Test Access Configuration—SPLTA

Step Procedure

1 Physically connect the cables for TAP (test access point) from the remote test unit (RTU) into the patch panel connected to the Traverse DSC3/1.

2 Using the TransNav GUI, from the Test Access tab, TAP sub-tab, create a logical TAP (single FAD) of the same type as the source termination point (S1).

Figure 5-15 Example DS1 TAP (Single FAD)

Page 297: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Traverse Test AccessSeries Split Test Access Example (SPLTA)

Release OPS4.2.3 Force10 Networks Page 5-19

3 From the Test Access tab, TAP sub-tab, create a series split (SPLTA) test access cross-connect (TAC) from the source (S1) to a logical TAP.

Note: Use the Switch Mode button to switch from one mode configuration to another. For valid mode changes, see Table 5-1 Test Access Mode vs. Service Compatibility Matrix.

Figure 5-16 SPLTA TAC Example

Table 5-4 Series Split Test Access Configuration—SPLTA (continued)

Step Procedure

TAP3SPLTE Mode Service ID Connected State

Switch Mode command

Page 298: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessSeries Split Test Access Example (SPLTA)

Page 5-20 Force10 Networks Release OPS4.2.3

4 The system disables the original service as seen when you select the Service tab.

Figure 5-17 Service with SPLTA TAC Example

5 With the TAC enabled to the RTU, you can now run various tests on the source service under test.

6 To remove the TAC from the original (and still active) service, simply remove the TAC.

Note: The system restores the original service state.

7 The Series Split Test Access Configuration—SPLTA procedure is complete.

Table 5-4 Series Split Test Access Configuration—SPLTA (continued)

Step Procedure

Service ID Enabled Operational State

Page 299: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 5-21

SECTION 5TEST ACCESS

Chapter 2 Traverse Test Access Guidelines for the Spirent BRTU Interface

Introduction This section includes the following topics.• Traverse Platform and Spirent BRTU Interoperability, page 5-22• Guidelines to Set Up the Traverse Test Access Spirent BRTU Interface,

page 5-23

For general Traverse test access information, refer to Section 5—Test Access, Chapter 1—“Traverse Test Access”.

Page 300: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessTraverse Platform and Spirent BRTU Interoperability

Page 5-22 Force10 Networks Release OPS4.2.3

Traverse Platform and Spirent BRTU Interoperability

The Traverse platform interoperates with the Spirent® Communication’s Broadband Remote Test Unit (BRTU) network tester to provide integrated test access functionality. The Traverse system, TransNav management system graphical user interface (GUI), and Spirent BRTU with REACT® remote test Operations Support System (OSS) enables carriers to test and monitor any DS1/VT1.5 or DS3/STS-1 service provisioned on the Traverse switch fabric.

Figure 5-18 Force10 TransNav GUI and Spirent BRTU REACT OSS Example

Spirent REACT OSSForce10 TransNav GUI

Page 301: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Traverse Test Access Guidelines for the Spirent BRTU InterfaceGuidelines to Set Up the Traverse Test Access Spirent BRTU Interface

Release OPS4.2.3 Force10 Networks Page 5-23

Guidelines to Set Up the Traverse Test Access Spirent BRTU Interface

Use the following guidelines to set up Traverse test access interoperability with the Spirent BRTU. Read through all of these guidelines before you begin the system setup.• The Username and Password TransNav management system parameters must be

in all caps format. For parameter descriptions, refer to the TransNav Management System GUI Guide, Section 2—Management Server Procedures, Chapter 3—“Server Administration Procedures”.

• Configure the TransNav user as both a Domain User and a Node User.• The Traverse system and Spirent BRTU must be on the same subnet when

communicating via the backplane data communications network (DCN) Ethernet IP connection.

• Configure the Spirent BRTU with the Traverse backplane DCN Ethernet IP address (BP DCN IP) and use port 9988 (system) or 9989 (user) to communicate from the Spirent BRTU to the Traverse digital cross-connect system (DCS).

• Configure the Traverse DCS equipment type as “O” for other in the current version of the Spirent BRTU REACT OSS.

• All tests are driven from the test system controller (TSC) user interface to the Spirent Communication’s remote test unit (RTU) REACT OSS. For a configuration example, see Section 5—Test Access, Chapter 1—“Traverse Test Access,” Local Test Access, page 5-2.

• If the Spirent BRTU is to also act as the TSC, then configure it to TSC mode.• The TL1 target identifier (TID) is the Traverse network element node identifier,

know as the Node Name in the TransNav GUI or node-id in the command line interface (CLI). For a TID format description, refer to the TransNav Management System TL1 Guide.

• Each access identifier (AID) is equal to a Traverse service (ingress or egress) endpoint. For a list of all possible Traverse system AID formats in TL1, refer to the TransNav Management System TL1 Guide, Appendix C—AIDs. For service endpoint mapping definitions, refer to the TransNav Provisioning Guide, Section 9—Appendices, Appendix B—“Service Endpoints.” Note that the AID formats may differ between the Traverse GUI, TL1, or CLI and that of the Spirent BRTU. For a list of Spirent BRTU AID formats, refer to your Spirent test access documentation.

• Configure the test access point (TAP) and test access cross-connect (TAC) via the TransNav management system or over the node-level TL1 control link. For a configuration example, see Section 5—Test Access, Chapter 1—“Traverse Test Access,” Monitor Test Access Example (MONE), page 5-9. For parameter descriptions, refer to the TransNav Management System GUI Guide, Section 5—Test Access, Chapter 1—“Traverse Test Access” or the TransNav Management System TL1 Guide, Section 3.7—Test Access Commands.

• The Spirent BRTU uses the term DS3 test access digroup (TAD) which is a Traverse system DS1 subport within a DS3 Transmux port.

Page 302: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 5: Test AccessGuidelines to Set Up the Traverse Test Access Spirent BRTU Interface

Page 5-24 Force10 Networks Release OPS4.2.3

Page 303: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 6 ROUTINE MAINTENANCESECTION 6SECTION 6

Contents

Chapter 1Routine Maintenance

Fan Air Filter Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1Fan Assemblies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1

Front Inlet Fan Tray Module (Traverse 1600 and Traverse 2000) . . . . . 6-1Fan Module with Integral Fan Tray (Traverse 600) . . . . . . . . . . . . . . . . . 6-1Fan Assembly (TE-100). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1

Air Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2Air Filter Replacement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2Air Filter Replacement (Traverse 1600 and Traverse 2000) . . . . . . . . . . . . . . 6-2Fan Tray Air Filter Replacement (Traverse 600). . . . . . . . . . . . . . . . . . . . . . . 6-4Air Filter Replacement (TE-100) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5PDAP Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6PDAP-15A GMT Fuse Replacement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6PDAP-2S Circuit Breaker Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7PDAP-2S GMT Fuse Replacement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8PDAP-2S LED Module Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10PDAP-4S TPA Fuse Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-13PDAP-4S GMT Fuse Replacement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15PDAP-4S LED Module Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-16Environmental Alarm Module Replacement (Traverse only). . . . . . . . . . . . . . 6-17Non-Field Replaceable Fuses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18

Chapter 2Node Database Backup and Restore

Backing Up Traverse Node Databases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19Guidelines for Traverse Node Database Backups . . . . . . . . . . . . . . . . . . . . . 6-20Traverse Node Database Restore Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . 6-20

Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Backup and Restore CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21

exec node database backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Syntax Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21exec node database restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21Syntax Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22

Troubleshooting Traverse Node Backup and Restore . . . . . . . . . . . . . . . . . . 6-22TE-206 Node Database Backup Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22

Page 304: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6 Routine Maintenance

Page ii Force10 Networks Release OPS4.2.3

TE-206 Node Backups from the TransNav GUI . . . . . . . . . . . . . . . . . . . . . . . 6-23

Page 305: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 6-1

SECTION 6ROUTINE MAINTENANCE

Chapter 1 Routine Maintenance

Introduction This chapter provides routine maintenance tasks for node-specific system equipment:• Fan Air Filter Maintenance, page 6-1• PDAP Maintenance, page 6-9• Environmental Alarm Module Replacement (Traverse only), page 6-20

Fan Air Filter Maintenance

The fan maintenance topics are as follows:• Fan Assemblies, page 6-1• Air Filters, page 6-2• Air Filter Replacement, page 6-2

Fan Assemblies

Front Inlet Fan Tray Module (Traverse 1600 and Traverse 2000)

The Traverse 1600 and Traverse 2000 fan assembly (fan tray with integrated air ramp and fan module) cools the control modules and service modules in the shelf. The Traverse 1600 fan assembly has five fans. The Traverse 2000 fan assembly has six fans. The fans draw in cooling air from the front and push the air upward through the perforated shelf. The integrated air ramp on the shelf above directs the heated air through to the rear of the shelf. The fan module can force up to 200 cubic feet per minute of cooling air.

Fan Module with Integral Fan Tray (Traverse 600)

The Traverse 600 fan assembly (fan module with integral fan tray) cools the control modules and service modules in the shelf. The Traverse 600 fan assembly has six fans. The fans draw in cooling air and push the air through the perforated shelf. The fan module can force up to 200 cubic feet per minute of cooling air.

Fan Assembly (TE-100)

The TE-100 shelf has a pre-installed, field-replaceable fan assembly. The fan assembly consists of three fans and a replaceable, cleanable air filter.

Page 306: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceAir Filters

Page 6-2 Force10 Networks Release OPS4.2.3

Air Filters The air filters on the Traverse and TE-100 systems play a very important role in the cooling function of the modules.

There are environmental factors that could decrease the amount of time required between air filter replacements. Check these environmental factors regularly. Any unusual environmental circumstance at the site that causes an increase in temperature and/or particulate matter in the air might affect performance (for example, new equipment installation).

Air Filter Replacement

The fan air filter replacement topics are as follows:• Air Filter Replacement (Traverse 1600 and Traverse 2000), page 6-2• Fan Tray Air Filter Replacement (Traverse 600), page 6-6• Air Filter Replacement (TE-100), page 6-8

Air Filter Replacement (Traverse 1600 and Traverse 2000)

When the front inlet fan tray air filter (for either Traverse 1600 or Traverse 2000) has been in place for at least six months, or other environmental factors have contributed to requiring an air filter replacement, use the following procedure to replace the air filter.

Required Equipment: New front inlet fan tray air filter.

Important: Fan tray air filters should be checked at six-month intervals and replaced as necessary.

Important: Regularly monitor the speeds of the cooling fans in order to accurately determine air filter replacement intervals. An increase in overall fan speed may indicate a clogged filter.

Page 307: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenanceAir Filter Replacement (Traverse 1600 and Traverse 2000)

Release OPS4.2.3 Force10 Networks Page 6-3

Table 6-1 Install a Fan Tray Air Filter with Springs (Legacy)

Step Procedure

1 If you are replacing an old air filter, carefully remove the old air filter from the fan tray holder to avoid contaminating the equipment.

2 Insert the new air filter. Rotate the air filter pull-tabs out.

Figure 6-1 Air Filter with Springs

3 Hold the air filter with the metal window-pane side down and the springs to the back.

4 Insert the air filter in the gap between the fan tray card and the top of the fan tray holder. Slide the air filter along the fan tray holder guides until the springs on the back edge are fully compressed.

5 With the springs fully compressed, lift the front edge of the air filter up and over the retaining flanges and release it.

6 Rotate the pull-tabs so they are parallel to the front edge of the air filter.

OPS 00058

Springs

Pull Tabs

Page 308: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceInstall a Fan Tray Air Filter with Handle (Legacy)

Page 6-4 Force10 Networks Release OPS4.2.3

Install a Fan Tray Air Filter with Handle (Legacy)

The following procedure provides steps on how to install the fan tray filter with a handle on the front edge.

7 Lift the fan tray holder front cover into its closed position. Tighten the captive fasteners to secure it.

Figure 6-2 Fan Tray Holder Front Cover

Note: The front cover closes very easily when the fan tray card and air filter are in position. If the cover does not close easily, check the fan tray card to make sure it is recessed from the front of the fan tray holder.

8 The Install a Fan Tray Air Filter with Springs (Legacy) procedure is complete.

Table 6-1 Install a Fan Tray Air Filter with Springs (Legacy) (continued)

Step Procedure

OPS 00059

Captive Fasteners

Table 6-2 Install a Fan Tray Air Filter with Handle (Legacy)

Step Procedure

1 If you are replacing an old air filter, carefully remove the old air filter from the fan tray holder to avoid contaminationg the equipment.

2 Hold the air filter with the metal window-pane side down with the handle facing to the front.

Figure 6-3 Air Filter with Handle

OPS 00060

Handle

Page 309: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenanceInstall a Fan Tray Air Filter with Handle (Legacy)

Release OPS4.2.3 Force10 Networks Page 6-5

3 Insert the air filter in the gap between the fan tray card and the top of the fan tray holder.

4 Slide the air filter along the fan tray holder guides. Lift up on the filter handle as you are pushing the filter towards the back of the fan tray holder. There is an audible “click” when the air filter is in position. The handle drops down over the front of the fan tray card.

5 Lift the fan tray holder front cover into its closed position. Tighten the captive fasteners to secure it.

Figure 6-4 Fan Tray Holder Front Cover

Note: The front cover closes very easily when the fan tray card and air filter are correctly in position. If the cover does not close easily, check the fan tray card to make sure it is recessed from the front of the fan tray holder.

6 The Install a Fan Tray Air Filter with Handle (Legacy) procedure is complete.

Table 6-2 Install a Fan Tray Air Filter with Handle (Legacy) (continued)

Step Procedure

OPS 00059

Captive Fasteners

Page 310: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceFan Tray Air Filter Replacement (Traverse 600)

Page 6-6 Force10 Networks Release OPS4.2.3

Fan Tray Air Filter Replacement (Traverse 600)

When the Traverse 600 fan air filter has been in place for at least six months, or other environmental factors have contributed to requiring an air filter replacement, use the following procedure to replace the air filter.

Required Equipment: New air filter

Table 6-3 Insert a Traverse 600 Fan Assembly

Step Procedure

1 Loosen the two captive screws on the right-front cover of the Traverse 600 fan assembly to release it.

Figure 6-5 Fan Assembly Front Cover - Traverse 600

2 Open the right-front fan assembly cover.

OPS 00089

Captive Fasteners

Page 311: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenanceFan Tray Air Filter Replacement (Traverse 600)

Release OPS4.2.3 Force10 Networks Page 6-7

3 Hold the fan assembly vertically with the fan card facing left and lift it level with the fan cage. Slide the fan assembly into the fan cage along the guides and push it straight in until it connects to the back of the shelf.

Important: Do not force the fan tray card into position. If it does not plug in easily, slide it back out. Check for any obstructions or a damaged connector that might prevent it from sliding into position and verify it is lined up in the correct guides.

Figure 6-6 Traverse 600 Fan Assembly Installation

4 The Fan Tray Air Filter Replacement (Traverse 600)Insert a Traverse 600 Fan Assembly procedure is complete.

Table 6-3 Insert a Traverse 600 Fan Assembly (continued)

Step Procedure

OPS 00090

Traverse 600 Shelf

Fan Assembly

Page 312: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceAir Filter Replacement (TE-100)

Page 6-8 Force10 Networks Release OPS4.2.3

Air Filter Replacement (TE-100)

When the TE-100 fan air filter has been in place for at least six months, or other environmental factors have contributed to requiring an air filter replacement, use the following procedure to replace the air filter.

Required Equipment: New air filter

The fan assembly is in a vertical slot on the left front of the shelf. It draws ambient air through the perforation on the left wall and forces the air over the system and interface modules in the horizontal slots.

The fan assembly must be removed before the air filter can be replaced because the metal air filter attaches to the side of the fan assembly.

The following procedure provides step-by-step instructions on how to replace the TE-100 air filter.

Table 6-4 Replace the Fan Air Filter (TE-100)

Step Procedure

1 Loosen the captive fastener that holds the fan assembly in place.

2 Slide the fan assembly out of the fan cage.

Figure 6-7 Fan Cage and Assembly

3 Carefully remove the old air filter from the fan assembly to avoid contaminating the equipment.

Figure 6-8 Removing the Air Filter

4 Make sure the new air filter is clean and free of dust particles.

Captive Fastener

Fan Cage

Pull up on the air filter

Page 313: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenancePDAP-15A GMT Fuse Replacement

Release OPS4.2.3 Force10 Networks Page 6-9

PDAP Maintenance

The Power Distribution and Alarm Panel (PDAP) maintenance topics are as follows:• PDAP-15A GMT Fuse Replacement, page 6-9• PDAP-2S Circuit Breaker Replacement, page 6-10• PDAP-2S GMT Fuse Replacement, page 6-11• PDAP-2S LED Module Replacement, page 6-13• PDAP-4S TPA Fuse Replacement, page 6-16• PDAP-4S GMT Fuse Replacement, page 6-18• PDAP-4S LED Module Replacement, page 6-19

PDAP-15A GMT Fuse Replacement

The PDAP-15A provides GMT fuses (from 0.25 amps to 15 amps per fuse) for up to ten pieces of auxiliary equipment. The PDAP’s field replaceable fuses are accessible without having to remove the front panel.

Use the following procedure to replace a failed GMT fuse.

5 Slide the air filter into place, lining up the small tabs with the small holes on the fan assembly.

Figure 6-9 Attaching the Air Filter

6 Slide the fan assembly back into the fan cage.

Important: Do not force the fan assembly into position. If it does not plug in easily, slide it back out and check for any obstructions that might prevent it from sliding into position.

7 Tighten the captive fastener to secure the fan assembly in place.

8 The Replace the Fan Air Filter (TE-100) procedure is complete.

Table 6-4 Replace the Fan Air Filter (TE-100) (continued)

Step Procedure

Tabs Lined up with Holes

WARNING! Use extreme caution when working with battery and battery return supply cables. Remove all metal jewelry when working with power circuits.

Page 314: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenancePDAP-2S Circuit Breaker Replacement

Page 6-10 Force10 Networks Release OPS4.2.3

PDAP-2S Circuit Breaker Replacement

The Power Distribution and Alarm Panel (PDAP-2S) contains field replaceable 40 ampere (amp) circuit breakers.1 Each pair of A and B circuit breakers (e.g., A1, B1) provides redundant circuit protection per shelf. Power will not be lost to the shelf if a circuit breaker fails.

Use the following procedure to replace a failed circuit breaker.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the Power Distribution and Alarm Panel (PDAP-15A). Plug the ESD wrist strap into an ESD jack or other confirmed source of earth ground.

Table 6-5 Replacing PDAP-15A GMT Fuses

Step Procedure

1 Remove the GMT fuse by pulling it straight out.1

Figure 6-10 PDAP-15A Front View

1 The GMT fuses protrude from the PDAP-15A front panel to allow access for fuse removal and insertion without having to remove the front panel.

2 Replace the failed GMT fuse with a new one of equal current rating.

3 The Replacing PDAP-2S GMT Fuses procedure is complete.

GMT Fuses

Alarm LEDs

1 Optional PDAP-2S circuit breakers are available up to a 50 amp maximum.

WARNING! Use extreme caution when working with battery and battery return supply cables. Remove all metal jewelry when working with power circuits.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the Power Distribution and Alarm Panel (PDAP-2S). Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Page 315: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenancePDAP-2S GMT Fuse Replacement

Release OPS4.2.3 Force10 Networks Page 6-11

PDAP-2S GMT Fuse Replacement

The PDAP-2S contains two fuse blocks (A and B) of ten field replaceable GMT fuses. Each block has a 100 amp maximum load. Each pair of A and B GMT fuses (e.g., A1, B1) provides redundant power (from 0.25 to 10 amps per fuse) to one of up to ten pieces of auxiliary equipment.

Use the following procedure to replace a failed GMT fuse.

Table 6-6 Replacing PDAP-2S Circuit Breakers

Step Procedure

1 If the toggle switch on the failed circuit breaker is in the On position, switch it off.PDAP-2S Circuit Breakers

2 Remove the circuit breaker by pulling it straight out.

3 Replace the failed circuit breaker with a new one of equal current rating.

4 Switch the new circuit breaker on.

5 The Replacing PDAP-2S Circuit Breakers procedure is complete.

WARNING! Use extreme caution when working with battery and battery return supply cables. Remove all metal jewelry when working with power circuits.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the Power Distribution and Alarm Panel (PDAP-2S). Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Page 316: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenancePDAP-2S GMT Fuse Replacement

Page 6-12 Force10 Networks Release OPS4.2.3

Table 6-7 Replacing PDAP-2S GMT Fuses

Step Procedure

1 Remove the GMT fuse by pulling it straight out.1

Figure 6-11 PDAP-2S GMT Fuses

2 Replace the failed GMT fuse with a new one of equal current rating.

3 The Replacing PDAP-2S GMT Fuses procedure is complete.

1 The GMT fuses protrude from the PDAP-2S front panel to allow access for fuse removal and insertion without having to remove the front panel.

Page 317: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenancePDAP-2S LED Module Replacement

Release OPS4.2.3 Force10 Networks Page 6-13

PDAP-2S LED Module Replacement

The Power Distribution and Alarm Panel (PDAP-2S) system alarm LEDs (Critical, Major, Minor), power input A and B LEDs, and GMT A and B fuse block failure LEDs are on one field replaceable module.

Use the following procedure to replace the PDAP-2S LED module.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the PDAP-2S. Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Table 6-8 Replacing PDAP-2S LED Module

Step Procedure

1 Loosen the two captive fasteners on the PDAP-2S front cover to release it.

Figure 6-12 PDAP-2S Assembly - Remove Front Cover

2 Remove the front cover.

Captive Fasteners

Page 318: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenancePDAP-2S LED Module Replacement

Page 6-14 Force10 Networks Release OPS4.2.3

3 Locate the nonfunctional module with a white pull tab at the center of the PDAP-2S.

Figure 6-13 PDAP-2S Assembly - LED Module

4 Remove the module by pulling it straight out using the white pull tab.

5 Insert the new PDAP-2S LED module using the left and right guides for proper alignment.

Important: The module should insert easily into the PDAP-2S. Do not force it into position. If the module does not insert easily, slide it back out and verify you are placing it in the correct position and inserting it into the correct left and right guides.

Figure 6-14 PDAP-2S LED Module Guides

6 Replace the front cover.

Table 6-8 Replacing PDAP-2S LED Module (continued)

Step Procedure

Page 319: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenancePDAP-2S LED Module Replacement

Release OPS4.2.3 Force10 Networks Page 6-15

7 Tighten the two captive fasteners on the PDAP-2S front cover to secure it.

8 The Replacing PDAP-2S LED Module procedure is complete.

Table 6-8 Replacing PDAP-2S LED Module (continued)

Step Procedure

Page 320: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenancePDAP-4S TPA Fuse Replacement

Page 6-16 Force10 Networks Release OPS4.2.3

PDAP-4S TPA Fuse Replacement

The Power Distribution and Alarm Panel (PDAP-4S) contains field replaceable 40 amp TPA fuses.2 Each pair of A and B TPA fuses (e.g., A1, B1) provides redundant protection per shelf. Power will not be lost to the shelf if a TPA fuse fails.

Use the following procedure to replace a failed TPA fuse.

2 Optional PDAP-4S TPA fuses are available up to a 50 amp maximum.

WARNING! Use extreme caution when working with battery and battery return supply cables. Remove all metal jewelry when working with power circuits.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the Power Distribution and Alarm Panel (PDAP-4S). Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Page 321: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenancePDAP-4S TPA Fuse Replacement

Release OPS4.2.3 Force10 Networks Page 6-17

Table 6-9 Replacing PDAP-4S TPA Fuses

Step Procedure

1 If a TPA fuse LED is RED, replace the fuse embedded in the TPA holder.

Figure 6-15 PDAP-4S TPA Fuses

2 Remove the TPA fuse holder by pulling it straight out.1

Figure 6-16 PDAP-4S TPA Fuse and Holder

3 Replace the failed TPA fuse with a new one of equal current rating (Force10 recommends using 40 amp fuses).

4 Insert the TPA fuse holder by pushing it straight in.

5 The Replacing PDAP-4S TPA Fuses procedure is complete.

1 The TPA fuses protrude from the PDAP-4S front panel to allow access for fuse removal and insertion without having to remove the front panel.

Page 322: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenancePDAP-4S GMT Fuse Replacement

Page 6-18 Force10 Networks Release OPS4.2.3

PDAP-4S GMT Fuse Replacement

The PDAP-4S contains two fuse blocks (A and B) of five field replaceable GMT fuses. Each block has a 65 amp maximum load. Each pair of A and B GMT fuses (e.g., A1, B1) provides redundant power (from 0.25 to 15 amps per fuse) to one of up to five pieces of auxiliary equipment.

Use the following procedure to replace a failed GMT fuse.

WARNING! Use extreme caution when working with battery and battery return supply cables. Remove all metal jewelry when working with power circuits.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the Power Distribution and Alarm Panel (PDAP-4S). Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Table 6-10 Replacing PDAP-4S GMT Fuses

Step Procedure

1 Remove the GMT fuse by pulling it straight out.1

Figure 6-17 PDAP-4S GMT Fuses

1 The GMT fuses protrude from the PDAP-4S front panel to allow access for fuse removal and insertion without having to remove the front panel.

2 Replace the failed GMT fuse with a new one of equal current rating.

3 The Replacing PDAP-4S GMT Fuses procedure is complete.

Page 323: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenancePDAP-4S LED Module Replacement

Release OPS4.2.3 Force10 Networks Page 6-19

PDAP-4S LED Module Replacement

The Power Distribution and Alarm Panel (PDAP-4S) system alarm LEDs (Critical, Major, Minor), power input A and B LEDs, and TPA/GMT fuse block failure LED (for both A and B) are on one field replaceable module.

Use the following procedure to replace the PDAP-4S LED module.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working on the PDAP-4S. Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Table 6-11 Replacing PDAP-4S LED Module

Step Procedure

1 Loosen the two PDAP-4S LED faceplate captive fasteners to release it.

Figure 6-18 PDAP-4S Assembly - LED Faceplate

2 Remove the faceplate with attached module by pulling it straight out.

3 Insert the new PDAP-4S LED module using the left and right guides for proper alignment.

Important: The module should insert easily into the PDAP-4S. Do not force it into position. If the module does not insert easily, slide it back out and verify you are placing it in the correct position and inserting it into the correct left and right guides.

4 Tighten the two captive fasteners on the faceplate to secure it.

5 The Replacing PDAP-4S LED Module procedure is complete.

Page 324: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceEnvironmental Alarm Module Replacement (Traverse only)

Page 6-20 Force10 Networks Release OPS4.2.3

Environmental Alarm Module Replacement (Traverse only)

The Environmental Alarm Module (EAM) located on the Traverse main back plane supports the environmental telemetry inputs and outputs. The EAM is an optional, field replaceable module required to support environmental alarm input/output functionality. Environmental signals are accessed through wire-wrap posts located on the main backplane, allowing the EAM to be replaced without disconnecting alarm wiring.

Use the following procedure to replace the EAM on the Traverse backplane.

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when working with the EAM and the main backplane. Plug the ESD wrist strap into the ESD jack provided on the air ramp or other confirmed source of earth ground.

Table 6-12 Replacing EAM

Step Procedure

1 Locate and remove the nonfunctional module by simultaneously holding the module along the long edges toward the top of the module and pressing the plastic standoff tab to pull out the module.

Important: The module should remove fairly easily from the main backplane connector once the plastic standoff tab is depressed. Do not force it out of position. If the module does not remove easily, check the pressure on the plastic standoff tab to be sure it is fully depressed. You may need to pivot the plastic standoff (by hand) to align the tab into a more convenient, accessible position.

Figure 6-19 EAM Location - Traverse 1600 Main Backplane

2 Prepare to insert the new EAM by holding the module upright along the long edges with the pins facing toward the main backplane.

Page 325: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Routine MaintenanceNon-Field Replaceable Fuses

Release OPS4.2.3 Force10 Networks Page 6-21

Non-Field Replaceable Fuses

The following components in the Traverse system contain non-field replaceable fuses:• Control module• Service interface module• Fan tray

If a Traverse module requires (non-field replaceable) fuse replacement, call the Force10 Technical Assistance Center. If the fan tray requires fuse replacement, it will need to be replaced with a new fan tray unit.

3 Insert the module into the main backplane EAM connector using the plastic standoff and proper alignment guides. The plastic standoff tab clicks into place when the module is properly seated.

Important: The module should insert easily into the main backplane connector. Do not force it into position. If the module does not insert easily, pull it back out and verify you are placing it in the correct position and inserting it along the plastic standoff and proper alignment guides.

Figure 6-20 EAM Alignment

4 The Replacing EAM procedure is complete.

Table 6-12 Replacing EAM (continued)

Step Procedure

Long edge

Pins facing Proper Alignment Guide

Plastic Standoff Guide

Main Backplane

Page 326: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceNon-Field Replaceable Fuses

Page 6-22 Force10 Networks Release OPS4.2.3

Page 327: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 6-23

SECTION 6ROUTINE MAINTENANCE

Chapter 2 Node Database Backup and Restore

Introduction This chapter provides information on backing up and restoring the node databases for Traverse nodes and TE-206 nodes that are managed by the TransNav GUI. For Traverse nodes, the backups and restoration can be done using either the TransNav GUI or CLI commands. For TE-206 nodes, backups and restorations can be done using the TransNav GUI. For information on backing up TE-206 node databases from the node, see the TraverseEdge 206 Users Guide.

For backing up Traverse node databases, the following sections are included in this chapter:• Backing Up Traverse Node Databases• Guidelines for Traverse Node Database Backups• Traverse Node Database Restore Guidelines• Backup and Restore CLI Commands• Troubleshooting Traverse Node Backup and Restore

For backing up TE-206 node databases, the following sections are included in this chapter:• TE-206 Node Database Backup Overview• TE-206 Node Backups from the TransNav GUI

Backing Up Traverse Node Databases

Traverse node databases can be backed up in one of two methods: to an FTP server or to the GCM card. Node-level CLI commands are used for the backup and restore procedures for Traverse nodes.

Force10 recommends backing up the node database to a remote FTP server due to size constraints, especially if optical cards currently exist on the shelf.

During the backup, provisioning is allowed. Be aware, however, that provisioned services may not be captured during the backup and may be lost when the database is restored. Backups may occur with live traffic on the node.

The backup procedure produces two files: a .dat file and a .meta file. The Traverse uses these files to restore the database.

Page 328: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceGuidelines for Traverse Node Database Backups

Page 6-24 Force10 Networks Release OPS4.2.3

Guidelines for Traverse Node Database Backups

If the Traverse node has minimal services, the backup will take one or two minutes. However, if numerous services exist on the node, the backup may take several minutes.• Have the FTP server information ready before beginning the backup procedure.

The FTP (host) server IP address, the username and password are required to logon to the FTP server.

• If FTP server information is provided, a path must be provided in the path parameter to tell the Traverse where to backup the database. The default is the path of the FTP server directory accessed when logging into the FTP server. The backup tool does not create directories specified in the path parameter.

• If FTP server information is not provided: – The system uses a default of 127.0.0.1 (localhost). This default is for the active

GCM module.– If an FTP host IP address is not provided, the username, password, and path

parameters are not required. The default for the path parameter is nodeDB.*.• The filename is optional. If a file name is not entered, the system uses the default

nodeDB.xxx. • If services are provisioned during the backup, some services may not be captured

during the backup and will, therefore, be lost when the database is restored.

Force10 recommends backing up the node database during a maintenance period, especially if optical cards exist on the shelf.

Traverse Node Database Restore Guidelines

For Traverse nodes, the restoration process takes longer than the backup procedure; both shelf controllers (GCMs) must be rebooted to allow the new database changes to become effective. A message appears and must be confirmed before the restoration can proceed any further.

The current Traverse node database will be replaced with the backed up information. If more than one backup version exists on the FTP server, make sure the data from the correct file is restored.

Note: Node databases can only be restored to the same node from which they were backed up.Command descriptions use the following conventions:

Table 6-13 CLI Command Conventions

Command Description

| Vertical bars ( | ) separate alternative, mutually exclusive elements. You must enter one of the options as part of the command.

[ ] Square brackets ([ ]) indicate optional elements.

{ } Braces ({ }) indicate a required choice of a command element.

Page 329: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Node Database Backup and RestoreBackup and Restore CLI Commands

Release OPS4.2.3 Force10 Networks Page 6-25

Backup and Restore CLI Commands

Use the following CLI commands to backup and restore the Traverse node database.

exec node database backup. Use the exec node database backup command to back up the Traverse node database.

Syntax

exec node database backup [host ip address user-name UserName password password [path blank][filename nodeDB.xxx]]

Syntax Description

ip address - IP address of the FTP server where the database will be backed up

user-name - username to use when accessing the FTP server

password - password to use when accessing the FTP server

path - enter the path on the FTP site where the database will be backed up

filename - enter the file name to call the database file

l

exec node database restore. Use the exec node database restore command to restore the Traverse node database.

Boldface Boldface indicates literal commands and keywords that are entered exactly as shown.

Note: You can abbreviate literal commands. See the Section 1—Overview and Quick Reference, Chapter 1—“CLI Overview,” Using Shortcuts, page 1-12.

Italics Italics indicate arguments for which you supply values.

Boldface Underlined

Boldface Underlined or underlined in parentheses (value) is a default value if you do not provide your own. Default values are set when an object (such as a service or interface) is created using the create command.

Table 6-13 CLI Command Conventions

Command Description

Page 330: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceTroubleshooting Traverse Node Backup and Restore

Page 6-26 Force10 Networks Release OPS4.2.3

Syntax

exec node database restore [host ip address user-name UserName password password [path blank][filename nodeDB.xxx]]

Syntax Description

ip address - IP address of the FTP server where the database is backed up

user-name - username to use when accessing the FTP server

password - password to use when accessing the FTP server

path - enter the path on the FTP site from where the database will be restored

filename - enter the file name of the database file

Troubleshoot-ing Traverse Node Backup and Restore

If problems occur when restoring a Traverse node backup, it may be due to one of the following reasons:

Backups will fail if:• An incorrect FTP server IP address is entered. Verify the FTP server IP address is

correct.• The directories are not provided or are incorrect in the path parameter of the CLI

command. Verify the name of the directory is provided and is correct.• A filename already exists with the same name as the backup file. Change the name

of the file being backed up.

Restorations will fail if:• The node database backup file is corrupt.• The Node IP address in the node database backup file is different than the system’s

commissioned values.• The Node ID in the node database backup file is different than the system’s

commissioned values.

Note: Do not restore a database file backed up from a different node.

Newly provisioned services do not appear if: • The service was provisioned while the backup was in progress; the data may not

have been captured. Re-provision the service.

TE-206 Node Database Backup Overview

From the TransNav server, backups of TE-206 node databases can be performed from the Admin menu by selecting the Node Backup Scheduler option. Backups can be scheduled either for a regular automatic backup without operator intervention, or manually with explicit operator action. Regularly scheduled backups are unprotected by default. Only the last three unprotected backups are retained. The rest are

Page 331: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Node Database Backup and RestoreTE-206 Node Backups from the TransNav GUI

Release OPS4.2.3 Force10 Networks Page 6-27

automatically deleted when the next scheduled backup occurs. Manually created backup database files are protected by default and must be removed manually.

At minimum, TransNav stores three backup copies of the TE-206 node database in the \\ems_(release)\nodedb directory on the management system server. Each stored copy identifies the node ID, date, and time that the backup file was created.

Important: Manually deleting the files in the \\ems_(release)\nodedb directory prevents the TE-206 node database from being accessible from TransNav.

To ensure the latest TE-206 node configuration is exported, manually backup the TE-206 database prior to exporting the EMS.

Backed up TE-206 node databases are restored upon a manual request. When the TransNav database is exported or imported, TE-206 node databases are included.

Note: For specific steps to back up the TE-206 node databases from TransNav, see TE-206 Node Backups from the TransNav GUI, page 6-27.

TE-206 Node Backups from the TransNav GUI

Perform TE-206 node database backups from the TransNav GUI using the Admin menu, Node Backup Scheduler option. The Node Backup Scheduler can be set to backup the databases of a group of nodes or to backup the database of all TE-206 nodes in the network.

If multiple servers exist in the network, the database backup scheduler runs only on the primary server.

Note: For Release TN4.2.1, this menu option is available only to back up TE-206 node databases. Traverse node databases must be backed up using CLI commands as described in Backup and Restore CLI Commands.

Page 332: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceTE-206 Node Backups from the TransNav GUI

Page 6-28 Force10 Networks Release OPS4.2.3

Figure 6-21 Initial Node Backup Scheduler Dialog Box

To create manual backup or to schedule an automatic backup, select Action, Create. The Create Backup Scheduler dialog box displays.

Figure 6-22 Create Backup Scheduler Dialog Box

Name: Enter a name to identify the backup being created.

Page 333: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Node Database Backup and RestoreTE-206 Node Backups from the TransNav GUI

Release OPS4.2.3 Force10 Networks Page 6-29

Backup Period: Indicate the length of time before the next backup. Valid values are: 1 hour, 3 hours, 6 hours, 12 hours, 1day, 2 days, 3 days, 4 days, 5 days, 6 days, 1 week (default), 2 weeks, 3 weeks, 4 weeks.

Next Backup Time: Select the time for the backup to occur. For automatically scheduled backups, the default backup time will correspond to the current time PLUS the selected backup period.

Description: Enter a description of the backup.

Enabled: Select this checkbox to activate the backup schedule.

Node Membership Configuration: Select the TE-206 node(s) to be included in the group of nodes to have database information backed up for the period being created. Use the Add and Remove buttons to move the name of the selected TE-206 node(s) from the Candidate Nodes pane to the Member Nodes pane.

Click OK to create the backup schedule. A confirmation message displays.

To change any options in the backup schedule, select Action, Edit. To delete the backup schedule, select Action, Delete. To run the scheduled backup manually, select Action, Run Schedule.

After the backup schedule has been set, the schedule information displays on the Node Backup Schedule dialog box in the Schedule Specifications screen. Right-click on any column to display a shortcut menu allowing you to create, edit, delete or run the selected backup schedule.

To view the node names of TE-206 nodes included in the selected backup schedule, click the Node Count column. The node names included in the specified schedule display in the Schedule Specification Members screen in the lower half of the dialog box. The system-assigned schedule member ID, node name, last successful backup date, last backup attempted date, and last backup attempt status for each node display.

Page 334: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceTE-206 Node Backups from the TransNav GUI

Page 6-30 Force10 Networks Release OPS4.2.3

Figure 6-23 Node Backup Scheduler Dialog Box, Scheduled Backup

Once created, TE-206 node backups can be managed from the TransNav map view. From the map view, select the TE-206 node, right-click and select Manage Node Backups from the shortcut menu. The Manage Node Backups dialog box displays.

Figure 6-24 Manage Node Backups Dialog Box

ID: Indicates the system-generated identifier of the scheduled backup.

Database Version: Indicates the unique identifier of the backup file from the nodedb directory.

Software Version: Indicates the software version of the backup file.

Protected: A checkbox. If selected, indicates if the backup is protected from deletion by the automatic database backup schedule. Manually-initiated backups are always marked as protected. To change the value in the checkbox, right-click the cell and select Protect or Unprotect.

Page 335: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Node Database Backup and RestoreTE-206 Node Backups from the TransNav GUI

Release OPS4.2.3 Force10 Networks Page 6-31

Backup Time: Identifies the date and time the backup was performed.

Backup Size: Indicates the size of the backup file.

Description: Indicates if the backup was scheduled or manually generated.

Each stored copy identifies the node ID, date, and time that the backup file was created.

Page 336: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 6: Routine MaintenanceTE-206 Node Backups from the TransNav GUI

Page 6-32 Force10 Networks Release OPS4.2.3

Page 337: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 7 SOFTWARE UPGRADESSECTION 7

Contents

Chapter 1Release TR3.2.2 Traverse Software Upgrade

Release TR3.2.2 Upgrade Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1Node Software Upgrade Flowchart (Top Level) . . . . . . . . . . . . . . . . . . . . . . . 7-2Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Required Equipment and Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3

General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3Traverse Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3

TransNav Management System GUI Commands and Conventions . . . . . . . . 7-4Compatibility and Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4General Software Compatibility Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4Traverse System SW Upgrade Compatibility Notes . . . . . . . . . . . . . . . . . . . . 7-5

General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5Software Upgrade for TR3.2.x Maintenance Releases . . . . . . . . . . . . . . 7-5Software Upgrade from Release TR2.1.x or TR3.0.x to TR3.2.x . . . . . . 7-6

Guidelines for Software Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6Node Software Upgrade Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7Download Node Software to the TransNav Server . . . . . . . . . . . . . . . . . . . . . 7-8Download Node Software to the TransNav Server . . . . . . . . . . . . . . . . . . . . . 7-8Module Software Download Set-up. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10Card Software Version Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15Software Activation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15BLSR/MS-SP Ring on GCM with Optics Software Activation . . . . . . . . . . . . . 7-18Control Module Software Upgrade Activation . . . . . . . . . . . . . . . . . . . . . . . . . 7-22Software Upgrade Activate (all other protected modules). . . . . . . . . . . . . . . . 7-27Software Upgrade Activate (all unprotected modules) . . . . . . . . . . . . . . . . . . 7-30Spare Control Module Software Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-32Spare Module Software Activation (All Other Types) . . . . . . . . . . . . . . . . . . . 7-33Verify Protection Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-34Perform a Forced Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-35Perform a Manual Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-36Clear Protection Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-38Software Revert Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-40

Revert Node Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-40Revert TransNav Management System Software . . . . . . . . . . . . . . . . . . 7-41

Post-Remote Node— Upgrade the Spare Control Module Software . . . . . . . 7-41

Page 338: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7 Software Upgrades

Page ii Force10 Networks Release OPS4.2.3

User- selectable FPGA Upgrade Capability . . . . . . . . . . . . . . . . . . . . . . . . . . 7-43Overview to Upgrade TE-206 Nodes from TransNav . . . . . . . . . . . . . . . . . . . 7-44Requirements for Upgrading TE-206 Node Software . . . . . . . . . . . . . . . . . . . 7-46Downloading TE-206 Node Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-46Upgrading TE-206 Node Software from TransNav . . . . . . . . . . . . . . . . . . . . . 7-48

Chapter 2Release TE3.2.x TE-100 System Software Upgrade

Release TE3.2.x Upgrade Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-51Before You Begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52Required Equipment and Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52

Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52TE-100 Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-52

TransNav Management System GUI Commands and Conventions . . . . . . . . 7-53Compatibility and Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-53General Software Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-53TE-100 Platform SW Upgrade Compatibility Notes . . . . . . . . . . . . . . . . . . . . . 7-54Guidelines for Software Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-54Node Software Upgrade Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-54Download Node Software to the TransNav Server . . . . . . . . . . . . . . . . . . . . . 7-55Download Node Software to the TransNav Server . . . . . . . . . . . . . . . . . . . . . 7-55Module Software Download Set-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-57Card Software Version Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-62Software Activation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-62Activate Software - Control Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-64Spare Control Module Software Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-68Software Revert Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-69

Revert Node Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-69Revert TransNav Management System Software . . . . . . . . . . . . . . . . . . 7-70

Page 339: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 7-1

SECTION 7SOFTWARE UPGRADES

Chapter 1 Release TR3.2.3 Traverse Software Upgrade

Introduction This chapter provides the following information including steps on how to initiate and complete software upgrades to Traverse nodes in your network using the TransNav GUI.

Complete the TR3.2.3 software upgrade of all cards in a Traverse node using the release TN4.2.3 TransNav management system graphical user interface (GUI).• Release TR3.2.3 Upgrade Overview, page 7-1• Node Software Upgrade Flowchart (Top Level), page 7-3• Before You Begin, page 7-4• Required Equipment and Tools, page 7-4• TransNav Management System GUI Commands and Conventions, page 7-5• Compatibility and Guidelines, page 7-5• Traverse Node Software Upgrade Process, page 7-8• Software Revert Procedure, page 7-42• Post-Remote Node— Upgrade the Spare Control Card Software, page 7-43• User- selectable FPGA Upgrade Capability, page 7-45

To upgrade software to TE-206 nodes using the TransNav GUI, see the following information:• Overview to Upgrade TE-206 Nodes from TransNav, page 7-46• Requirements for Upgrading TE-206 Node Software, page 7-48• Downloading TE-206 Node Software, page 7-48• Upgrading TE-206 Node Software from TransNav, page 7-50

Release TR3.2.3 Upgrade Overview

Release TR3.2.3 provides a unified release for the Traverse and TransNav products supporting SONET networks and services.

This software release supports:• Traverse in-service software upgrade to TR3.2.3 from the following previous

releases: TR3.0.0.7, TR3.2.1 and TR3.2.2 • Point releases (as necessary) for the TR3.2.3 Traverse nodes. • Upgrades of TE-206 nodes from the TransNav system. • Remote upgrade capability.

Page 340: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesRelease TR3.2.3 Upgrade Overview

Page 7-2 Force10 Networks Release OPS4.2.3

• User-selectable Field Programmable Gate Array (FPGA) upgrade capability.• Simultaneous TransNav Management System (TN4.2.3) software management of

the following associated releases:– Traverse Releases TR3.0.0.7, TR3.2.1, TR3.2.2, and TR3.2.3– TE-100 nodes on Release TE3.0.x, TE3.2.2, or TE3.2.3– TE-206 nodes on Release R04.06.x

Note: If your systems are on an earlier release, contact your Sales representative.

Page 341: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeNode Software Upgrade Flowchart (Top Level)

Release OPS4.2.3 Force10 Networks Page 7-3

Node Software Upgrade Flowchart (Top Level)

The diagram below shows a top-level flow for the node software upgrade process.

Figure 7-1 Node Software Upgrade Process Flowchart

OPS 00071

Node Software UpgradeTop-Level Flowchart

Begin

Read release nodes, upgrade

compatibility notes, guidelines, and all upgrade

procedures

Operations Manager creates a

comprehensive upgrade plan

Point release upgrade?

Go to Page 2

YES

NO

Is this a major release

upgrade?

YES

NO

Is your software on an earlier

release not listed for upgrade?

YES

Contact your Sales

representative

End

Operations Manager

Upgrade Team

Follow the Node

Upgrade Process

Read and understand the release notes, upgrade

compatibility notes , guidelines, upgrade

procedures, and your company's comprehensive

upgrade plan

IMPORTANT! For details, refer to the specific software upgrade procedures in the manual or contact the Technical Assistance Center .

Page 342: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesBefore You Begin

Page 7-4 Force10 Networks Release OPS4.2.3

Before You Begin

Review these requirements before you begin.

Required Equipment and Tools

The following equipment and tools are required for a Traverse system software upgrade to a node or multiple nodes in a domain:• TransNav management system server connected to a gateway Traverse node• Access to the Force10 corporate website at www.force10networks.com

Note: Use this procedure to install the management server software from the Force10 Networks corporate website. A Customer Portal Account is required. If you do not have a Customer Portal Account, you can request one from the Force10 website at www.force10networks.com by selecting Services & Support, then Account Request.

The following hardware equipment and tools are required to place cards in a Traverse shelf.

General

• Electrostatic Discharge (ESD) wrist strap• Eye protection• 1-slot wide blank faceplates for any empty slots to ensure EMI protection and

proper cooling. Blank faceplates must be ordered separately.

Traverse Shelf

• MPX cleaning materials to clean fiber optic cable and card MPX connectors:– Isopropyl alcohol of at least 91% purity– Lint-free wipes– Lint-free cleaning swabs with urethane foam heads– Pressurized optical duster (canned air)

Table 7-1 Traverse Node Software Upgrade Requirements

Requirement Reference

Compose and have ready for the Upgrade Team a comprehensive network upgrade plan.

Your company’s Operations Manager is responsible for this task.

Read through and understand the Release Notes, upgrade compatibility notes, guidelines, upgrade procedures, and your company’s comprehensive upgrade plan.

• See Release Notes TR3.2.3 and TN4.2.3.• Read through this entire chapter• If you have TE-206 nodes in your network, read the

TraverseEdge 206 Users Guide, Chapter 18, Maintenance.• Contact your company’s Operations Manager.

The software upgrade feature for this release supports Traverse TR3.0.0.7, TR3.2.1 or TR3.2.2 to TR3.2.3 and TransNav TN4.1.3, TN4.2.1 or TN4.2.2 to TN4.2.3 upgrades.

If you are upgrading from an earlier Traverse or TransNav software release, contact the Force10 Technical Assistance Center.

Have the required equipment and tools ready.

Required Equipment and Tools, page 7-4

Page 343: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeGeneral Software Compatibility Notes

Release OPS4.2.3 Force10 Networks Page 7-5

• 1 or 2 control cards, as well as any spares• System interface module (SIM) cards

Note: The number and combination of SIMs is based on your network requirements and physical cabling at the Traverse main and fiber optic backplanes.

TransNav Management System GUI Commands and Conventions

This document provides node software upgrade procedures using the TransNav GUI. Refer to the TransNav Management System Product Overview Guide to become familiar with the TransNav system.

The following conventions are used in the procedure tables.

Compatibility and Guidelines

Read the compatibility topics that are relevant to your specific upgrade.• General Software Compatibility Notes, page 7-5• Traverse System SW Upgrade Compatibility Notes, page 7-6• Guidelines for Software Upgrade, page 7-7

General Software Compatibility Notes

Control Cards. Each control card is partitioned and capable of holding two versions of software. The new software is downloaded onto the card’s backup partition during a software upgrade. You activate the new software after the software has been successfully downloaded. Software upgrade activation reboots each card and activates the back-up partition with the newly downloaded software. Provisioning data stored on the node control card is migrated to the backup partition before reboot.

Management Software. The TransNav software simultaneously manages various node releases to accommodate longer-term upgrade paths. For a detailed product compatibility matrix, see the Product Compatibility Matrix table in the Release Notes corresponding to your upgrade release.

Replacement cards. Software version numbers are broken down as follows (SW Version: 1.2.3.4):• Position 1 shows the major software release number.• Position 2 shows the minor software release number.• Position 3 shows the release build number.• Position 4 shows the software batch to build number.

An INCOMPATSW:Incompatible software alarm is generated when:• A replacement card with a (major.x.x.x) software version lower than the

compatibility ID of the Active control card—the lowest software version the Active control card can work with—is placed in the node.

• The Active control card (major.x.x.x) software version is lower than the compatibility ID of the replacement card.

Table 7-2 TransNav GUI Command Descriptions

Command Description

Boldface Boldface indicates dialog boxes, fields, menus, and list names.

Italics Italics indicate information that you supply.

Page 344: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesTraverse System SW Upgrade Compatibility Notes

Page 7-6 Force10 Networks Release OPS4.2.3

• The Active control card with a (major.x.x.x) software version higher than the TransNav management system can support.In these cases, use the procedures in this section to upgrade or rollback the software version on the replacement card.

A SWMIS: Software version mismatch alarm is generated when a replacement card with either an earlier or later (major.minor.build.x) version of software than the software running on the control card is placed in the node. In this case, use the procedures in this section to upgrade or rollback the software version on the replacement card.

Traverse System SW Upgrade Compatibility Notes

Review this information to understand the important compatibility items for Traverse and TransNav software releases.

General

• Release TN4.2.3 TransNav management system software:– simultaneously manages Release TR3.2.1, TR3.2.2 and TR3.2.3 Traverse

nodes.– manages the in-service software upgrade from Release TR3.0.0.7, TR3.2.1or

TR3.2.2 to TR3.2.3, as well as, any TR3.2.x maintenance releases.– manages a network of mixed nodes running Release TR3.2.1, TR3.2.2, and

TR3.2.3 for functions including:• Service management (provisioning, activation, deactivation, deletion, etc.)• Alarms and performance monitoring (on-demand and periodic)• Node and card addition and deletion• Loopback• External commands on protection groups

– manages a network of mixed nodes running TraverseEdge 100 (TE-100) Release TE3.0.x, TE3.2.2, or TE3.2.3.

– manages a network of mixed nodes running TraverseEdge 206 (TE-206) Release R04.06.0x

• The remote upgrade capability manages the arrival of older version cards and allows for remote download and activation of such cards to the TR3.2.3 release.

• Line-derived timing cards (e.g., OC-3/STM-1) support only one timing reference. When a service provider replaces an old card with a new card, they should plan for and make the line-derived timing reference provisioning changes accordingly (i.e., move the timing references to different cards). Upon in-service replacement, the Traverse system raises and alarm and uses the timing reference of the lowest-numbered port on the card that was previously provisioned with multiple timing references, and ignores the timing provisioning for the higher-numbered ports.

• The Traverse system allows in-service replacement and upgrade of a UTMX-24 card with a UTMX-48 card, but not vice versa.

Software Upgrade for TR3.2.3 Release

• Hitless software upgrade and warm restart are available, unless otherwise noted in the specific maintenance software Release Notes.

Page 345: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeGuidelines for Software Upgrade

Release OPS4.2.3 Force10 Networks Page 7-7

• In-service, hitless software upgrade support is available.

Software Upgrade from Traverse Release TR3.0.0.7 and TR3.2.x to TR3.2.3

• Support for in-service Traverse node software upgrades from Release TR3.0.0.7, TR3.2.1, or TR3.2.2 to TR3.2.3 for all network topologies: UPSR, BLSR, linear 1+1 chain, mesh, or combinations of these topologies.

Guidelines for Software Upgrade

Review the following guidelines for software upgrades:• Conduct upgrades in a specific maintenance window when you expect no

user-initiated service state changes.• For larger network upgrades, the entire upgrade process may span several nights.• Start the upgrade from the services egress node of the network (if possible).• Do not perform any new service creation, deletion, activation or deactivation (e.g.,

for Ethernet or End-to-End services) until you complete the upgrade on the TransNav server and all network nodes.

• Verify that all communication links between nodes are operational and have no loss of signal (LOS) or data communications channel (DCC) alarms.

• Do not change any fiber/link or other network (node, slot, port) objects during the upgrade.

• Due to the use of FTP libraries, bulk software downloads may fail so schedule software downloads to the control cards (i.e., Traverse GCM) at least 5 minutes apart.

• Perform an upgrade on spare cards, unless you are using the remote upgrade capability and plan to upgrade spares at a later time (see Post-Remote Node— Upgrade the Spare Control Card Software, page 7-43 for details).– In either case, always upgrade (download and activate) both the standby and

active GCM cards before upgrading any spare GCM cards.• Software upgrade is to be errorless. Release Notes for TR3.2.3 define any potential

exceptions. This document resides on the Force10 website at www.force10networks.com on the Customer Support website. A Customer Portal Account is required. If you do not have a Customer Portal Account, you can request one from the Force10 website at www.force10networks.com by selecting Services & Support, then Account Request.

Page 346: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesTraverse Node Software Upgrade Process

Page 7-8 Force10 Networks Release OPS4.2.3

Traverse Node Software Upgrade Process

Traverse and TransNav support in-service software upgrades from Release TR3.0.0.7, TR3.2.1, or TR3.2.2 to TR3.2.3. Depending on your requirements and current software load, you can choose either a hitless (warm restart) or a service-affecting (cold reboot) upgrade.

Note: If you have one or more nodes in your system with a node name that begins with a number, call the Force10 Technical Assistance Center before upgrading

Note: If you have TE-206 nodes that are managed by TransNav, see the TraverseEdge 206 Users Guide, Chapter 18, Maintenance, for upgrade instructions.

Complete the software upgrade procedures in the following order:

You must first download the software for the upgrade from the Force10 Networks corporate website onto a TransNav server before proceeding with the upgrade procedures. Choose one of the following download procedures, depending on the TransNav EMS platform (i.e., PC or Solaris) for your network.

Download the TransNav Management System or Traverse node software from the Force10 Networks corporate website (www.force10networks.com). From Services &

Table 7-3 Traverse Node Software Upgrade Process

Step Procedure Reference

1 Have you read through, and do you understand, all the Before You Begin items?

Before You Begin, page 7-4

2 Do you have the required equipment and tools ready?

Required Equipment and Tools, page 7-4

3 Upgrade the Traverse software (includes first exporting the current database off the TransNav server).

Note: Do not uninstall the previous version. Mark the directory as “-old” and remove the Icon from the desktop.

Note: NETSYNC alarms occur when you start the GUI, after the server software upgrade, and before upgrading the node software. The master network objects (e.g., alarm profiles) are out of synchronization with propagated node objects.

TransNav Management System Server Guide, Section 2—Management Server Procedures, Chapter 3—“Server Administration Procedures,” Upgrade Server Software, page 2-48

4 Download the new Traverse node software to the TransNav server.

Download Node Software to the TransNav Server, page 7-9

5 Download the software to the cards. Module Software Download Set-up, page 7-11

6 Activate the new software. Software Activation Process, page 7-17

7 The Traverse Node Software Upgrade Process is complete.

Page 347: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeDownload Traverse Node Software to the TransNav Server

Release OPS4.2.3 Force10 Networks Page 7-9

Support, select Customer Login. Enter your Force10 User ID and Password, then click Login.

Download Traverse Node Software to the TransNav Server

Use these steps to download the Traverse node software to the TransNav server.

Table 7-4 Download Traverse Node Software to the TransNav Server

Step Procedure

1 Navigate to the directory where the Traverse node software files were previously downloaded from the Force10 Networks website.

Figure 7-2 Example—PC System Explorer Window File Listing

2 Right-click the flash.n.n.n.n.zip file (where n.n.n.n is the latest software release number). For Windows PC systems, select the WinZip > Extract to command. For Solaris systems, use the gunzip command.

Page 348: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesDownload Traverse Node Software to the TransNav Server

Page 7-10 Force10 Networks Release OPS4.2.3

3 From the Extract dialog box, select a user-defined folder path directory (e.g., /upgrade/files), then click Extract to download the flash files into the /<user-defined>/flash directory.

Important: Verify the Use folder names check box is selected to keep the ./flash relative path structure in the zip file intact upon download.

Figure 7-3 Extract Dialog Box

4 The Download Traverse Node Software to the TransNav Server procedure is complete. Continue to Step 5 of the Traverse Node Software Upgrade Process, page 7-8.

Table 7-4 Download Traverse Node Software to the TransNav Server

Step Procedure

Page 349: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeCard Software Download Set-up

Release OPS4.2.3 Force10 Networks Page 7-11

Card Software Download Set-up

Software upgrades are done at the node level. The following procedure provides steps on how to begin a software upgrade by setting software download times for each card using the SW Upgrade dialog box.

Important: Due to repartitioning of the FLASH chip, GCM upgrades to Release TR3.2.3 will take approximately 8 to 0 minutes per GCM to upgrade instead of the 2 to 3 minutes necessary on to upgrade on earlier releases. Additionally, the Power LED on the GCM cards will blink red/green while the Active Standby light remains dark. Additionally, the Major/Critical and Minor LEDs may blink or may remain dark. THIS IS EXPECTED BEHAVIOR FOR UPGRADES TO THIS RELEASE.

Table 7-5 Card Software Download Set-up

Step Procedure

1 Verify the card software versions. Refer to Card Software Version Verification, page 7-17.

2 In Shelf View, select SW Upgrade from the Admin menu to display the SW Upgrade dialog box.

Figure 7-4 SW Upgrade Dialog Box

3 Server IP Address: Enter the TransNav server IP address where the new node software version was downloaded.

(For example: aaa.bbb.ccc.ddd)

4 Base Path: Enter the directory path on the TransNav server to the node software files.

(For example: /files/node/flash)

Page 350: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesCard Software Download Set-up

Page 7-12 Force10 Networks Release OPS4.2.3

5 Username: Enter the user name with File Transfer Protocol (FTP) permission access to the TransNav server where the new node software version resides.

(For example: ftpusername)

6 Password: Enter the user password with FTP permission access to the TransNav server where the new node software version resides.

(For example: ftppassword)

7 Click Update and verify that there were no errors in the FTP session.

Note: This action should fill in the data for each card in the Relative Path columns.

Important: The Relative Path and Upgrade Type values must be set by the system before the download starts. Default is INIT.

Table 7-5 Card Software Download Set-up (continued)

Step Procedure

Page 351: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeCard Software Download Set-up

Release OPS4.2.3 Force10 Networks Page 7-13

8 Set each Download Time based on these requirements for each card. Approximate software download times are as follows:• Control card download time is approximately 10 to 20 minutes• Download time for all other cards is approximately 2 to 5 minutes

Note: Force10 recommends you set sequential download times based on the card requirements.

Note: Due to the use of FTP libraries, bulk software downloads may fail so schedule software downloads at least 5 minutes apart.

Note: It takes a fully loaded Traverse-specific node approximately one hour to download the new software onto all cards. The time required to download software is dependent on the IP bandwidth available to the Traverse node. Download times can increase by a factor of 2 or more if there are multiple nodes using the same DCC channel for downloading software files. The software download process is completely non-service-affecting for protected cards and services. It does not require you to stand by during the download.

Note: Force10 recommends you download the control cards individually, three line cards at a time and one node at a time.

Figure 7-5 Download Time Settings

Table 7-5 Card Software Download Set-up (continued)

Step Procedure

Page 352: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesCard Software Download Set-up

Page 7-14 Force10 Networks Release OPS4.2.3

9 From the Download Time drop-down box, select Set time to manually adjust the time. Select part of the time string (e.g., month, day, hour). Use the up and down arrows or manually re-enter the time to reset the value.

Figure 7-6 SW Upgrade Download Times

10 Verify the Relative Path is set for each card.

Relative Path: A literal sub-directory path (in relation to the Base Path directory) where the software resides for each card. It is based on the type of card in the slot and is case sensitive. For example: ds3

11 Verify the Upgrade Type is set to the default for each card.

Upgrade Type: The upgrade type for each card can be set to one of the following values:

• INIT (default): Completely erases the backup partition before copying the complete set of software upgrade files.

• MERGE: This setting is available for special cases only when working with the Technical Assistance Center.

12 Repeat Steps 7 through 11 for each card in the node.

Table 7-5 Card Software Download Set-up (continued)

Step Procedure

Page 353: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeCard Software Download Set-up

Release OPS4.2.3 Force10 Networks Page 7-15

13 You can Clear Download Time for any card by right-clicking the card in the SW Upgrade dialog box and clicking the Update button. If necessary, you can Abort Download to any card by right-clicking the card in the SW Upgrade dialog box.

Note: Force10 recommends that you do not leave the card in the upgrade abort state. Clear the download time and click the Update button to clear the abort state.

.

Figure 7-7 SW Upgrade—Clear Download Time

14 Verify the download date and times are correct.

15 The software upgrade begins based on the dates and times entered in the Download Time field. You do not have to stand by during the software download; it does not affect protected service or system performance.

You can view the status of the software upgrade in the Download Status field of the SW Upgrade dialog box. The following status displays:• NONE: The software download has not begun.• INPROGRESS: The software download has begun, but is not

complete.• OK: The software download has successfully completed.• ABORTED: The software download has stopped.• FAILED: The software download has failed. Retry the software

download. Contact Force10’s Technical Assistance Center if the software download fails a second time.

Table 7-5 Card Software Download Set-up (continued)

Step Procedure

Page 354: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesCard Software Download Set-up

Page 7-16 Force10 Networks Release OPS4.2.3

16 Continue only when the Download Status is OK and the newly downloaded software version displays in Standby SW Version field for all cards (select each card row and check the Standby SW Version field). This indicates the software download has successfully completed.

17 The Card Software Download Set-up procedure is complete.

Depending on the procedure where you started, return to either:• Step 6 of the Node Software Upgrade Flowchart (Top Level),

page 7-3• Step 3 of the Spare Card Software Activation (All Other Types),

page 7-35

Return to Step 6 of the Traverse Node Software Upgrade Process, page 7-8.

Table 7-5 Card Software Download Set-up (continued)

Step Procedure

Page 355: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeSoftware Activation Process

Release OPS4.2.3 Force10 Networks Page 7-17

Card Software Version Verification

You can determine the software version number of a card using the TransNav GUI. The software version and serial number display in the Config tab in Shelf View. Follow these steps to verify the software version.

Software Activation Process

The new software is not active until the software is activated and system reboots each card. The reboot loads and executes the new software and, in the case of the control card, upgrades the database.

Table 7-6 Card Software Version Number Verification

Step Procedure

1 In Shelf View, click a card to select it.

2 Click the Config tab to view current software version information.

Figure 7-8 Card Configuration Dialog Box

3 The software version displays in the Current SW Version field in the Card Configuration dialog box. Software version numbers are broken down as follows (Current SW Version: 1.2.3.4):• 1st position indicates the major software release number• 2nd position indicates the minor software release number• 3rd position indicates the release build number• 4th position indicates the software patch to build number

4 The Card Software Version Number Verification procedure is complete.

Important: Read all important notes below before beginning the activation process.

Important: Software activation should start at the node farthest from the server that is connected to the head-end node, then work inward.

Page 356: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSoftware Activation Process

Page 7-18 Force10 Networks Release OPS4.2.3

Important: The software upgrade activate process is considered service-affecting unless all services are protected. Therefore, Force10 recommends that activation be scheduled/completed one card at a time. This requires you to observe the reboot process and set the activate time for each card after the previous card reboot is complete. Check the Alarms dialog box to verify that the equipment alarm, caused by the reboot, has cleared before setting the activate time for the next card.

Important: Any unprotected traffic residing on an Enhanced GCM (EGCM) with Optics card will experience an outage until the EGCM is restored from activation.

Important: During software activation, the card automatically reboot. Do not execute any external commands on the cards during software activation.

Important: If you are upgrading a BLSR/MS-SP Ring network without GCMs with Optics, make sure to perform a lockout on the span before activating the line card. Once the line cards for the span on both nodes have been activated, release the force switch. Perform this step on each span in the BLSR/MS-SP Ring network.

Important: If you are performing software activation on an Ethernet card that is using RSTP, selecting the “warm reboot” option may result in service interruption of network-wide Ethernet applications that include Bridge services on that card. Force10 recommends that you deactivate Bridge services on an Ethernet card that is using RSTP before scheduling a software upgrade with a warm reboot of that card.

Table 7-7 Software Activation Process

Step Procedure Reference

1 Did you complete the upgrade of TransNav EMS server and client software and download the node software to the TransNav server?

TransNav Management System Server Guide, Section 2—Management Server Procedures, Chapter 3—“Server Administration Procedures,” Upgrade Server Software, page 2-48

2 Did you download the node software to the TransNav server?

Traverse Node Software Upgrade Process, page 7-8

3 Is the card software download complete?

Card Software Download Set-up, page 7-11

4 Do you have your network nodes in a BLSR/MS-SP Ring network with Traverse Enhanced GCMs with Optics?

• Activate software for all cards set up in a BLSR/MS-SP Ring protection group. See BLSR/MS-SP Ring on GCM with Optics Software Activation, page 7-20

• Continue to Step 6 of this process to software upgrade activate all other protected cards.

Page 357: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeSoftware Activation Process

Release OPS4.2.3 Force10 Networks Page 7-19

5 Activate software for:• Standby GCM• Active GCM• Spare (standby) GCM(s), unless

you are using the remote upgrade feature and want to upgrade your spare cards at a later time (see page 7-43)

Control Card Software Upgrade Activation, page 7-24

6 Activate software for all cards set up in a protection group.

Software Upgrade Activate (All Other Protected Cards), page 7-29

7 Activate software for all unprotected cards.

Software Upgrade Activate (All Unprotected Cards), page 7-32

8 Activate software for all other types of spare cards, unless you are using the remote upgrade capability and want to upgrade your spare cards at a later time.

Spare Card Software Activation (All Other Types), page 7-35

9 The Software Activation Process is complete.

Table 7-7 Software Activation Process (continued)

Step Procedure Reference

Page 358: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesBLSR/MS-SP Ring on GCM with Optics Software Activation

Page 7-20 Force10 Networks Release OPS4.2.3

BLSR/MS-SP Ring on GCM with Optics Software Activation

The new software is not active until the software is activated and system reboots each card. The reboot loads and executes the new software, and in the case of the control card, upgrades the database.

The activation is scheduled for each card based on the date and time entered in the Activate Time field of the SW Activation dialog box. Follow these step-by-step instructions to set up software upgrade activation for GCMs with Optics in a BLSR/MS-SP Ring.

Important: The following procedure applies to Traverse nodes only.

Important: Do not start the Activate Software—BLSR/MS-SP Ring GCM with Optic Cards procedure until the downloaded software version displays indicating that the software download has successfully completed. The software version displays in the SW Activation dialog box, Standby SW Ver field for all cards.

Table 7-8 Activate Software—BLSR/MS-SP Ring GCM with Optic Cards

Step Procedure

1 Verify the network is alarm free or validate and record any alarms present prior to activation.

2 In Shelf View, select a GCM with Optics card and click the Config tab.

3 Verify Active/Standby GCM with Optics Protection Status using the Card Configuration dialog box.

Figure 7-9 Card Configuration GCM Protection Status

4 Execute a BLSR/MS-SP Ring Forced Switch on the standby GCM with Optics card following the procedure in Perform a Forced Switch, page 7-37.

Check the BLSR/MS-SP Ring state and verify that Force is issued on the near- and far-end.

Page 359: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeBLSR/MS-SP Ring on GCM with Optics Software Activation

Release OPS4.2.3 Force10 Networks Page 7-21

5 Click the standby GCM with Optics Activate Time field in the SW Upgrade dialog box; the current date and time displays. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Figure 7-10 SW Activation—Activate Time

6 Select the activation type—Act Type (default=NSA). Service Affecting (SA) is required for standby GCM with Optics card activation.

Valid values are:• NSA (non-service-affecting): Default. Will not activate an active node

GCM. • SA (service-affecting): Will activate and reboot the control card

regardless of its active or standby status. • SPARE (non-service-affecting): Will activate and reboot the spare

(standby) control card. Only use this option in the instance where the standby and active control cards have already been upgraded and activated.

7 Select to warm reboot (Warm Rbt) this card. To learn more about those cards that allow a warm reboot upgrade, see the table Cold Reboot Matrix for Cards on Upgrade from Previous Releases to Release TRx.x.x, in the Release Notes.

8 Select to ignore the FPGA upgrade available on this card. See User- selectable FPGA Upgrade Capability, page 7-45 for details about this parameter.

Note: Although the user-selectable FPGA upgrade capability is available to avoid FPGA updates that are deemed to be non-critical to your network, Force10 recommends that (by default) you accept all FPGA upgrades so as not to create an upgrade deviation in your network.

9 Click Update.

Table 7-8 Activate Software—BLSR/MS-SP Ring GCM with Optic Cards

Step Procedure

Page 360: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesBLSR/MS-SP Ring on GCM with Optics Software Activation

Page 7-22 Force10 Networks Release OPS4.2.3

10 View the status of the software activation in the Act Status field of the SW Upgrade dialog box. The following status displays:• NONE: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.• FAILED: Software activation has failed. Retry software activation.

Contact Force10 TAC if software activation fails a second time.

Important: The activation status will show INPROGRESS, then NONE until the card has completed the upgrade; then it will show OK. This is normal behavior.

11 Verify that the new software version activation is complete and it displays in the SW Activation dialog box, Current SW Ver column.

Figure 7-11 Act Status and Current SW Ver Fields

12 With the standby GCM with Optics selected in Shelf View, select the Alarms tab and check the Alarms dialog box. Verify that the EQFAIL: equipment failure alarm caused by the reboot has cleared.

13 A SWMIS: Software version mismatch alarm is generated since the standby GCM with Optics software version is now mismatched with the active GCM with Optics. This is normal behavior.

14 Clear the near-end Forced Switch using the procedure in Clear Protection Switch, page 7-40.

Verify that the BLSR/MS-SP Ring has returned to normal operation. If not, initialize the BLSR/MS-SP Ring.

15 Execute a BLSR/MS-SP Ring Forced Switch on the active GCM with Optics card following the procedure in Perform a Forced Switch, page 7-37.

Check the BLSR/MS-SP Ring state and verify that Force is issued on the near- and far-end.

Table 7-8 Activate Software—BLSR/MS-SP Ring GCM with Optic Cards

Step Procedure

Page 361: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeBLSR/MS-SP Ring on GCM with Optics Software Activation

Release OPS4.2.3 Force10 Networks Page 7-23

16 Click the active GCM with Optics card Activate Time field in the SW Activation dialog box; the current date and time displays. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Note: You can clear the Activation Time for any card by right-clicking the card in the SW Activation dialog box and selecting Clear Activation Time from the shortcut menu.

17 Select the activation type—Act Type (default=NSA). Service Affecting (SA) is required for standby GCM with Optics card activation.

Valid values are:• NSA (non-service-affecting): Default. Will not reboot (activate) an

active node GCM. • SA (service-affecting): Will activate and reboot the node GCM

regardless of its active or standby status. • SPARE (non-service-affecting): Will activate and reboot the spare

(standby) control card. Only use this option in the instance where the standby and active control cards have already been upgraded and activated.

18 Select to warm reboot (Warm Rbt) this card. To learn more about those cards that allow a warm reboot upgrade, see the table, Cold Reboot Matrix for Cards on Upgrade from Previous Releases to Release TRx.x.x, in the Release Notes.

19 Select to ignore the FPGA upgrade available on this card. See User- selectable FPGA Upgrade Capability, page 7-45 for details about this parameter.

Note: Although the user-selectable FPGA upgrade capability is available to avoid FPGA updates that are deemed to be non-critical to your network, Force10 recommends that (by default) you accept all FPGA upgrades so as not to create an upgrade deviation in your network.

20 Click Update.

21 Verify that the new software version activation is complete and it is displayed in the SW Activation dialog box, Current SW Ver field.

Note: Activating the active GCM causes the new software to upgrade and a switchover to the protection card.

22 With the now standby (previously active) GCM with Optics card selected in Shelf View, select the Alarms tab and check the Alarms dialog box. Verify the EQFAIL: equipment failure alarm caused by the reboot has cleared.

Table 7-8 Activate Software—BLSR/MS-SP Ring GCM with Optic Cards

Step Procedure

Page 362: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesControl Card Software Upgrade Activation

Page 7-24 Force10 Networks Release OPS4.2.3

Control Card Software Upgrade Activation

The new software is not active until the system reboots each card. The reboot activates the backup partition with the newly downloaded software on the control card at each node.

The activation is scheduled for each card based on the date and time entered in the Activate Time field of the SW Activation dialog box. Follow these step-by-step instructions to set up software upgrade activation for node GCMs.

23 The SWMIS: Software version mismatch alarm generated on the previously standby GCM with Optics clears as both GCM with Optics software versions now match. However, this alarm is now generated for all other cards in the system as their software versions are now mismatched with the active GCM with Optics. This is normal behavior.

24 Clear the near-end Forced Switch using the procedure in Clear Protection Switch, page 7-40.

Verify that the BLSR/MS-SP Ring has returned to normal operation.

25 If you have spare GCM with Optic cards to software upgrade at this time (i.e., you are not using the remote upgrade capability), remove the standby GCM with Optics card from the shelf and install the spare GCM with Optics. Complete the Spare Control Card Software Activation, page 7-34 procedure.

26 The Activate Software—BLSR/MS-SP Ring GCM with Optic Cards procedure is complete. Return back to Step 4 of the Software Activation Process, page 7-18.

Table 7-8 Activate Software—BLSR/MS-SP Ring GCM with Optic Cards

Step Procedure

Important: Do not start the Activate Software—Control Card procedure until the downloaded software version displays. This indicates the software download has completed successfully. The software version displays in the SW Activation dialog box, Standby SW Ver field for all cards.

Table 7-9 Activate Software—Control Card

Step Procedure

1 Verify the network is alarm free or validate and record any alarms present prior to activation.

2 In Shelf View, select a control card and click the Config tab.

Page 363: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeControl Card Software Upgrade Activation

Release OPS4.2.3 Force10 Networks Page 7-25

3 Verify the Protection Status of the Active/Standby control card using the Card Configuration dialog box.

Figure 7-12 Card Configuration Protection Status

4 Click the standby control card Activate Time field in the SW Activation dialog box; the current date and time displays. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Figure 7-13 SW Activation—Activate Time

5 Select the activation type Act Type (default=NSA). Change to SA for standby control card activation.

Valid values are:• NSA (non-service-affecting): Default. Will not activate an active

control card. • SA (service-affecting): Will activate and reboot the control card

regardless of its active or standby status. • SPARE (non-service-affecting): Will activate and reboot the spare

(standby) control card. Use this option only when the standby and active control cards have already been upgraded and activated.

6 If the card does not require a cold restart, then select to warm restart (Warm Rbt) this card.

Table 7-9 Activate Software—Control Card (continued)

Step Procedure

Page 364: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesControl Card Software Upgrade Activation

Page 7-26 Force10 Networks Release OPS4.2.3

7 Select to ignore the FPGA upgrade available on this card. See User- selectable FPGA Upgrade Capability, page 7-45 for details about this parameter.

Note: Although the user-selectable FPGA upgrade capability is available to avoid FPGA updates that are deemed to be non-critical to your network, Force10 recommends that (by default) you accept all FPGA upgrades so as not to create an upgrade deviation in your network.

8 Click Update.

9 View the status of the software activation in the Act Status field of the SW Activation dialog box. The following status displays:• NONE: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.• FAILED: Software activation has failed. Retry the software activation.

Contact Force10 TAC if the software activation fails a second time.

Important: The activation status will show INPROGRESS and then NONE until the card has completed the upgrade; then it will show OK. This is normal behavior.

10 Verify that the new software version activation is complete and it displays in the SW Activation dialog box, Current SW Ver field.

Important: If there are any unexpected discrepancies here, STOP and contact Force10 TAC.

.

Figure 7-14 Act Status and Current SW Ver Fields

11 With the standby control card selected in Shelf View, select the Alarms tab and check the Alarms dialog box. Verify that the EQFAIL: equipment failure alarm caused by the reboot has cleared.

12 A SWMIS: Software version mismatch alarm is generated since the standby control card software version is now mismatched with the active control card. This is normal behavior.

Table 7-9 Activate Software—Control Card (continued)

Step Procedure

Page 365: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeControl Card Software Upgrade Activation

Release OPS4.2.3 Force10 Networks Page 7-27

13 If the control cards contain integrated VTX/VCX cards in a protection group (e.g., GCM with VTX/VCX), you must perform a Manual switch on the active card (card with the old software) to change its state to standby. Refer to the procedure, Perform a Manual Switch, on page 7-38 for details.

Note: The manual protection switch on certain cards is necessary due to FPGA changes.

14 After the manual switch is complete, repeat Steps 3 through 12, for the now standby card (card with the old software) of the protection group.

15 Release (clear) the protection switch after activation is complete on the standby card to return it to its original active status. Refer to the Clear Protection Switch procedure on page 7-40 for details.

16 Click the active control card Activate Time field in the SW Activation dialog box to display the current date and time. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Note: Clear the Activation Time for any card by right-clicking the card in the SW Activation dialog box and selecting Clear Activation Time from the shortcut menu.

17 Act Type (default=NSA). Select SA (service-affecting) activation type for the active control card.

Valid values are:• NSA (non-service-affecting): Default. Will not activate an active

control card. • SA (service-affecting): Will activate and reboot the control card

regardless of its active or standby status. • SPARE (non-service-affecting): Will activate and reboot the spare

(standby) control card. Use this option only when the standby and active control cards have already been upgraded and activated.

18 Select to warm reboot (Warm Rbt) this card.

19 Select to ignore the FPGA upgrade available on this card. See User- selectable FPGA Upgrade Capability, page 7-45 for details about this parameter.

Note: Although the user-selectable FPGA upgrade capability is available to avoid FPGA updates that are deemed to be non-critical to your network, Force10 recommends that (by default) you accept all FPGA upgrades so as not to create an upgrade deviation in your network.

20 Click Update.

Table 7-9 Activate Software—Control Card (continued)

Step Procedure

Page 366: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesControl Card Software Upgrade Activation

Page 7-28 Force10 Networks Release OPS4.2.3

21 View the status of the software activation in the Act Status field of the SW Activation dialog box. The following status types display:• NONE: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.• FAILED: Software activation has failed. Retry the software activation.

Contact the Force10 TAC if the software activation fails a second time.

Important: The activation status will show INPROGRESS, then NONE until the card has completed the upgrade; then it will show OK. This is normal behavior.

22 Verify that the new software version activation is complete and it is displayed in the SW Activation dialog box, Current SW Ver field.

Note: Activating the active control card causes the new software to upgrade and a switchover to the protection card.

23 With the now standby (previously active) control card selected in Shelf View, select the Alarms tab. Check the Alarms dialog box to verify the EQFAIL: equipment failure alarm caused by the reboot has cleared.

24 The SWMIS: Software version mismatch alarm generated on the previously standby control card clears as both control card software versions now match. However, this alarm is now generated for all other cards in the system as their software versions are now mismatched with the active control card. This is normal behavior.

25 If you have spare control cards to software upgrade at this time (i.e., you are not using the Remote Upgrade feature), remove the standby control card from the shelf and install the spare (standby) control card. Complete the Spare Control Card Software Activation, page 7-34 procedure.

26 The Activate Software—Control Card procedure is complete. Continue to Step 6 of the Software Activation Process, page 7-19.

Table 7-9 Activate Software—Control Card (continued)

Step Procedure

Page 367: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeSoftware Upgrade Activate (All Other Protected Cards)

Release OPS4.2.3 Force10 Networks Page 7-29

Software Upgrade Activate (All Other Protected Cards)

Follow these step-by-step instructions to set up software upgrade activation for all other protected cards.

Important: Upgrade the entire protection group first before continuing to the next protection group.

Table 7-10 Activate Software —All Other Protected Cards

Step Procedure

1 Proceed with software upgrade activation for other protected cards after the software activation has successfully completed on both the control cards (Act Status=OK) and any service-affecting alarms on the node are cleared.

Software upgrade activation on other protected cards must be performed in the following order for all cards set up in a protection group:• Set the Activate Time so the standby card activates first.• If a cold reboot activation was used, after the activation (activate

software and reboot) has successfully completed, perform a manual switch on the active card to change its state to standby.

• Set the Activate Time for the active card.• Release the protection switch.

2 Verify and record the standby/active status for cards/ports set up in a protection group. Refer to the Verify Protection Status procedure on page 7-36 for more details.

3 Click the standby card Activate Time field to display the current date and time. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Figure 7-15 SW Activation—Activate Time

Page 368: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSoftware Upgrade Activate (All Other Protected Cards)

Page 7-30 Force10 Networks Release OPS4.2.3

4 Set the activation type Act Type to SA for the card.

Valid types are:

NSA (non-service-affecting): Default. Will not activate a card if it has any active services.

SA (service-affecting): Activates the software and reboots the card regardless of any services.

5 If the card does not require a cold restart, then select to warm restart (Warm Rbt) this card.

6 Select to ignore the FPGA upgrade available on this card. See User- selectable FPGA Upgrade Capability, page 7-45 for details about this parameter.

Note: Although the user-selectable FPGA upgrade capability is available to avoid FPGA updates that are deemed to be non-critical to your network, Force10 recommends that (by default) you accept all FPGA upgrades so as not to create an upgrade deviation in your network.

7 Click Update.

8 View the status of the software activation in the Act Status field of the SW Activation dialog box. The following statuses display:• NONE: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.• FAILED: Software activation has failed. Retry the software activation.

Contact Force10 TAC if the software activation fails a second time.

9 Verify that the new software version is displayed in SW Activation dialog box, Current SW Ver field.

Figure 7-16 Act Status and Current SW Ver Fields

Table 7-10 Activate Software —All Other Protected Cards (continued)

Step Procedure

8 9

Page 369: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeSoftware Upgrade Activate (All Other Protected Cards)

Release OPS4.2.3 Force10 Networks Page 7-31

10 With the standby card selected in Shelf View, check the Alarms dialog box to verify the following alarms have cleared:• EQFAIL (equipment failure): caused by the reboot.• SWMIS (software mismatch): caused by a software version mismatch

with the active control card.

11 If the cards contain integrated VTX/VCX cards in a protection group, perform a Manual Switch on the active card (card with the old software) to change its state to standby. Refer to the Perform a Manual Switch procedure on page 7-38 for details.

Note: The manual protection switch on certain cards is necessary due to FPGA changes.

12 After the manual switch is complete, repeat Steps 3 through 10 for the now standby card (card with the old software) of the protection group.

13 Release (clear) the protection switch after activation is complete on the standby card to return it to its original active status. Refer to the Clear Protection Switch procedure on page 7-40 for details.

14 Repeat Steps 2 through 13 for the next protection group.

15 The Activate Software —All Other Protected Cards procedure is complete. Continue to Step 7 of the Software Activation Process, page 7-17.

Table 7-10 Activate Software —All Other Protected Cards (continued)

Step Procedure

Page 370: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSoftware Upgrade Activate (All Unprotected Cards)

Page 7-32 Force10 Networks Release OPS4.2.3

Software Upgrade Activate (All Unprotected Cards)

Use the following step-by-step instructions to set up software upgrade activation for all unprotected cards:

Table 7-11 Activate Software —All Unprotected Cards

Step Procedure

1 Proceed with software upgrade activation on all unprotected cards after the software activation has successfully completed (Act Status=OK) on both the control cards and then on all other protected cards before clearing any service-affecting alarms on the node.

2 Click the unprotected card Activate Time field to display the current date and time. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Figure 7-17 SW Activation—Activate Time

3 Select the activation type Act Type and set to SA for the card.

Valid values are:• NSA (non-service-affecting): Default. Will not activate an active

control card. • SA (service-affecting): Will activate and reboot the control card

regardless of its active or standby status.

4 If the card does not require a cold restart, select to warm restart (Warm Rbt) this card.

5 Select to ignore the FPGA upgrade available on this card. See User- selectable FPGA Upgrade Capability, page 7-45 for details about this parameter.

Note: Although the user-selectable FPGA upgrade capability is available to avoid FPGA updates that are deemed to be non-critical to your network, Force10 recommends that (by default) you accept all FPGA upgrades so as not to create an upgrade deviation in your network.

6 Click Update.

7 View the status of the software activation in the Act Status field of the SW Activation dialog box. The following status types display:• NONE: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.

FAILED: Software activation has failed. Retry the software activation. Contact Force10 TAC if software activation fails a second time.

Page 371: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeSoftware Upgrade Activate (All Unprotected Cards)

Release OPS4.2.3 Force10 Networks Page 7-33

8 Verify the new software version displays in SW Activation dialog box, Current SW Ver field.

Figure 7-18 Act Status and Current SW Ver Fields

9 With the unprotected card selected in Shelf View, check the Alarms dialog box to verify the following alarms have cleared:• EQFAIL (equipment failure): Caused by the reboot.• SWMIS (software mismatch): Caused by a software version mismatch

with the active control card.

10 Repeat Steps 2 through 9 for all unprotected cards.

11 Verify the network is alarm free, or validate and record any alarms present prior to the upgrade.

12 Verify the restoration of all the services.

13 The Activate Software —All Unprotected Cards procedure is complete.

Depending on the procedure from which you came, continue to either:• Step 8 of the Software Activation Process, page 7-19• Step 4 of the Spare Card Software Activation (All Other Types),

page 7-35

Table 7-11 Activate Software —All Unprotected Cards (continued)

Step Procedure

Page 372: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSpare Control Card Software Activation

Page 7-34 Force10 Networks Release OPS4.2.3

Spare Control Card Software Activation

The new software is not active until the system activates the software and reboots the spare (standby) control card. The reboot loads and executes the new software.

The activation is scheduled for each card at the node based on the date and time entered in the Activate Time field of the SW Activation dialog box. Follow these step-by-step instructions to set up software upgrade activation for spare control cards.

Important: This procedure assumes you have completed upgrading (downloading and activating the new software for) the standby and active control cards.

Important: A spare control card can only be upgraded in a shelf that has the same type of control card. For example, if the standby Traverse GCM is a GCM with OC-48 card, you can only upgrade GCM with OC-48 cards in this procedure. If the standby TE-100 system card is an OC-48 card, you can only upgrade with another OC-48 system card.

Table 7-12 Activate Software—Spare Control Cards

Step Procedure

1 Remove the upgraded standby control card by restarting the card through the TransNav management system, then removing the card from the shelf.

2 Insert the spare (standby) control card.

3 Once the spare control card is online and the EQRMV/EQCOMM alarms are clear, download the new software version to the card using the Card Software Download Set-up, page 7-11 procedure.

4 Once the new software downloads to the spare control card, activate the software using the steps described for the standby control card in the Control Card Software Upgrade Activation, page 7-24 procedure.

5 Repeat Steps 1 through 4 for each spare control card.

6 Once the upgrade and activation is complete for all the spare control cards you can either:• Leave the last spare in place to act as the new standby card.• Replace the original standby control card back into the standby slot

and continue the procedure.

7 The Activate Software—Spare Control Cards procedure is complete.

Depending on the procedure from which you came, continue to either:• Step 24 of the procedure BLSR/MS-SP Ring on GCM with Optics

Software Activation, page 7-22• Step 26 of the procedure Control Card Software Upgrade

Activation, page 7-28

Page 373: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeSpare Card Software Activation (All Other Types)

Release OPS4.2.3 Force10 Networks Page 7-35

Spare Card Software Activation (All Other Types)

The new software is not active until the system activates the software and reboots the spare cards that are not control cards. The reboot loads and executes the new software.

The activation is scheduled for each card based on the date and time entered in the Activate Time field of the SW Activation dialog box. Use the following step-by-step instructions to set up the software upgrade activation for the spare cards.

Table 7-13 Activate Software—Spare Cards (All Other Types)

Step Procedure

1 Insert the spare card in an unused slot in the shelf that has an empty slot to both the left and the right of the spare card.

2 Once the spare card is online and the EQRMV/EQCOMM alarms are clear, download the new software version to the card using the Card Software Download Set-up, page 7-11 procedure.

3 Once the new software downloads to the spare card, activate the software using the steps described in the Software Upgrade Activate (All Other Protected Cards), page 7-29 procedure.

4 Repeat Steps 1 through 3 for each spare card.

5 The Activate Software—Spare Cards (All Other Types) procedure is complete. Continue to Step 9 of the Software Activation Process, page 7-19.

Page 374: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesVerify Protection Status

Page 7-36 Force10 Networks Release OPS4.2.3

Verify Protection Status

Follow these step-by-step instructions to verify the protection status (Standby or Active) of a card/port in a protection group:

Table 7-14 Verify Protection Status

Step Procedure

1 From Map View, double-click on a node to display the Shelf View.

2 Click the Protection tab to display the Protection Groups dialog box.

Figure 7-19 Protection Groups Dialog Box

3 Select the protection group.

4 Click Edit to display the Protection Group Configuration dialog box.

5 The status displays in the Protection field - either Active or Standby.

Figure 7-20 Equipment Protection Group Configuration Dialog Box

6 The Verify Protection Status procedure is complete.

Continue to Step 3 of the procedure Software Upgrade Activate (All Other Protected Cards), page 7-29.

2

5

Page 375: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradePerform a Forced Switch

Release OPS4.2.3 Force10 Networks Page 7-37

Perform a Forced Switch

Use the following step-by-step instructions to perform a user-initiated forced protection switch.

Table 7-15 Perform a Forced Switch

Step Procedure

1 In Shelf View, click the Protection tab to display the Protection Groups dialog box.

Figure 7-21 Protection Groups Dialog Box

2 Select the protection group.

3 Click Edit to display the Protection Group Configuration dialog box.

4 Right-click the card or port with an Active Protection status in the Protection Group Configuration dialog box to display a shortcut menu. Select Forced from the shortcut menu.

Figure 7-22 Protection Group—Forced Switch

5 The Confirm Force Switch dialog box displays. Click Yes to confirm.

Figure 7-23 Confirm Force Switch Dialog Box

6 Check the Alarms dialog box to verify the EQFAIL: equipment failure alarm caused by the forced protection switch has cleared.

Page 376: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesPerform a Manual Switch

Page 7-38 Force10 Networks Release OPS4.2.3

Perform a Manual Switch

For cards in a protection group requiring a cold restart activation due to FPGA changes, a manual protection switch is necessary. Follow these step-by-step instructions to perform a manual protection switch to switch the active card (with the old software) from the active to the standby state.

Note: This procedure is required for cold restart activation only.

7 The active card or port is switched to standby.

8 The Perform a Forced Switch procedure is complete.

If you were in the procedure BLSR/MS-SP Ring on GCM with Optics Software Activation to activate the:• standby card, then return to Step 4.• active card, then return to Step 15.

Table 7-15 Perform a Forced Switch (continued)

Step Procedure

Table 7-16 Perform a Manual Switch

Step Procedure

1 In Shelf View, click the Protection tab to display the Protection Groups dialog box.

Figure 7-24 Protection Groups Dialog Box

2 Select the protection group.

3 Click Edit to display the Protection Group Configuration dialog box.

Page 377: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradePerform a Manual Switch

Release OPS4.2.3 Force10 Networks Page 7-39

4 Right-click the card or port with an Active Protection status in the Protection Group Configuration dialog box to display a shortcut menu. Select Manual from the shortcut menu.

Figure 7-25 Protection Group—Manual Switch

5 The Confirm Manual Switch dialog box displays. Click Yes to confirm.

Figure 7-26 Confirm Manual Switch Dialog Box

6 Check the Alarms dialog box to verify the EQFAIL: equipment failure alarm caused by the forced protection switch has cleared.

7 The active card or port is switched to standby.

8 The Perform a Manual Switch procedure is complete.

If you were in the procedure:• Control Card Software Upgrade Activation, then return to Step 14.• Software Upgrade Activate (All Other Protected Cards), then

return to Step 12.

Table 7-16 Perform a Manual Switch (continued)

Step Procedure

Page 378: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesClear Protection Switch

Page 7-40 Force10 Networks Release OPS4.2.3

Clear Protection Switch

Use the following step-by-step instructions to clear (release) a user-initiated protection switch.

Table 7-17 Clear Protection Switch

Step Procedure

1 From Map View, double-click on a node to display the Shelf View.

2 In Shelf View, click the Protection tab to display the Protection Groups dialog box.

Figure 7-27 Protection Groups Dialog Box

3 Select the protection group.

4 Click Edit to display the Protection Group Creation dialog box.

5 Right-click the Standby card/port in the Protection Group Creation dialog box to display a shortcut menu. Select Clear from the shortcut menu.

Figure 7-28 Protection Group—Clear Protection Switch

Page 379: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeClear Protection Switch

Release OPS4.2.3 Force10 Networks Page 7-41

6 The Confirm Release dialog box displays. Click Yes to confirm the force switch release.

Figure 7-29 Confirm Release Dialog Box

7 Check the Alarms dialog box to verify the EQFAIL: equipment failure alarm caused by the protection switch release has cleared.

8 The standby card or port is switched back to its original active status.

9 The Clear Protection Switch procedure is complete.

If you were in the procedure:• BLSR/MS-SP Ring on GCM with Optics Software Activation to

activate the:– standby card, then return to Step 14.– active card, then return to Step 24.

• Software Upgrade Activate (All Other Protected Cards), then return to Step 14.

Table 7-17 Clear Protection Switch (continued)

Step Procedure

Page 380: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSoftware Revert Procedure

Page 7-42 Force10 Networks Release OPS4.2.3

Software Revert Procedure

Use the following procedures to revert to a previous software version used on the node and TransNav management system.• Revert Node Software, page 7-42• Revert TransNav Management System Software, page 7-43

Revert Node Software

Important: This procedure is service affecting.

Important: If you expect to revert an entire node, Force10 recommends you call the Technical Assistance Center for assistance.

Table 7-18 Revert Node Software

Step Procedure

1 Connect to the node using the Node CLI.

2 Perform the software revert command on every card that has been upgraded to the desired software load. Execute this command in the following card order:• Line cards, one at a time• Standby control card (e.g., GCM)• Active control card

CLI command sequence:For cards 1 to n (in the order described above):beginexec upgrade switch-to-stdby-load slot <slot#>Are you sure you want to execute this command?YES.endexec node restartAre you sure you want to execute this command?YES.

3 Verify the node software level has been revised to the desired version and that the system is running the desired software load.

4 The Revert Node Software procedure is complete.

Page 381: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradePost-Remote Node— Upgrade the Spare Control Card Software

Release OPS4.2.3 Force10 Networks Page 7-43

Revert TransNav Management System Software

Post-Remote Node— Upgrade the Spare Control Card Software

If you initially used the remote upgrade capability to upgrade the software version on your network nodes, the software on your spare cards likely needs to still be upgraded. The following procedure gives step-by-step instructions to perform this function.

The new software is not active until the system reboots the spare (standby) control card (i.e., Traverse GCM or TE-100 system card). The reboot activates the backup partition with the newly downloaded software on the spare control card.

The activation is set based on the date and time entered in the Activate Time field of the SW Activation dialog box. Use these step-by-step instructions to set up software upgrade activation for spare control cards in the case where the other cards on the node have already been upgraded.

Table 7-19 Revert TransNav Management System Software

Step Procedure

1 Stop the upgraded TransNav server.

2 Start the previous version of software on the TransNav server.

3 Open the previous software version of the Client GUI. Verify the nodes and services are correct (i.e., nodesync/com are cleared).

4 The Revert TransNav Management System Software procedure is complete.

Important: This procedure assumes you have completed upgrading (downloading and activating the new software for) the standby and active control cards.

Important: A spare control card can only be upgraded in a shelf that has the same type of control card. For example, if the standby Traverse GCM is a GCM with OC-48 card, you can only upgrade GCM with OC-48 cards in this procedure. If the standby TE-100 system card is an OC-48 card, you can only upgrade with another OC-48 system card.

Table 7-20 Post-Remote Node —Upgrade the Spare Control Card

Step Procedure

1 Remove the previously upgraded standby control card by first restarting the card through the TransNav management system using a cold reboot, then removing the card from the shelf.

Page 382: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesPost-Remote Node— Upgrade the Spare Control Card Software

Page 7-44 Force10 Networks Release OPS4.2.3

2 Insert the spare (standby) control card.

Important: Once the spare control card is online, the following alarms generate: EQRMV and EQCOMM. From this point, you have up to 30 minutes to complete the download and activation process. The versions and other data will be invalid until the upgrade is complete.

3 Download the desired software version to the spare control card using the procedure in the procedure Card Software Download Set-up, page 7-11.

4 When the desired software is loaded onto the spare control card, activate the software using the steps described for the standby control card in the procedure described in procedure Control Card Software Upgrade Activation, page 7-24. You must change the value in the ActType field to SPARE.

Note: After the upgrade, the EQRMV and EQCOMM alarms clear.

5 Repeat Steps 1 through 4 for each spare control card.

6 Once the upgrade and activation is complete for all the spare control cards you can either:• Leave the last spare in place to act as the new standby card.• Place the original standby control card back into the standby slot and

continue the procedure.

7 The Post-Remote Node —Upgrade the Spare Control Card procedure is complete.

Table 7-20 Post-Remote Node —Upgrade the Spare Control Card (continued)

Step Procedure

Page 383: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeUser- selectable FPGA Upgrade Capability

Release OPS4.2.3 Force10 Networks Page 7-45

User- selectable FPGA Upgrade Capability

In some cases, upgrading from one Traverse release to another requires a new FPGA image for a card or set of cards. Accepting this new FPGA image can resolve an issue that is unique to a certain deployment. The user-selectable FPGA upgrade capability (force warm reboot) gives you the choice to ignore the FPGA card software change because it is non-critical in nature to your deployment. This capability allows the upgrade to proceed in a hitless fashion without loading the new FPGA image.

From the SW Activation dialog box, if you select to ignore the new FPGA image and the existing FPGA image remains compatible with the new FPGA image, the system performs a force warm upgrade for the card.

Figure 7-30 User-selectable FPGA Upgrade Parameter

Important: If a decision has been made to use Ignore FPGA, Force10 recommends upgrading to the new FPGA image as soon as possible during a network maintenance window.

Page 384: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesOverview to Upgrade TE-206 Nodes from TransNav

Page 7-46 Force10 Networks Release OPS4.2.3

Overview to Upgrade TE-206 Nodes from TransNav

The TransNav GUI can be used to manage systems that include TE-206 nodes using functions including performing software downloads, upgrades, commits and fallbacks remotely to TE-206 nodes.

The following directories have been added to the Force10EMS directory on the management server to facilitate managing TE-206 nodes: nodedb, nodesoftware, and tl1log.

From the TransNav GUI, the following basic functions can be performed on the TE-206 nodes:

Software Upgrade: The complete process of downloading software to the NE and switching the running software on the NE from a previous version to a newer version. Software Upgrade (using the EMS) can only be performed on one NE at a time. If the software has already been downloaded onto the NE, the software upgrade process automatically skips the download step. The NE undergoes a soft reset during the software upgrade process which is non-traffic affecting, however, communication to the node is lost during the upgrade process. After the upgrade process the new software will be in the Not Commit State. In this state, the software will automatically Fallback to the previous load as a result of an NE reset. To prevent this from happening, you should transition the NE to either the Commit or Commit with Fallback state.

Software Download: The process of transferring the software from the EMS to the NE. It is a subset of the Software Upgrade process. Software Download is available as a separate function for two reasons; Use the Software Download function if you prefer to download the new software to the NE at one point in time, and then upgrade the NE to the software at a future point in time (possibly during the maintenance window that night); Use the Software Download function to download the software on multiple NEs simultaneously.

Note: To fully upgrade an NE, use the Software Upgrade feature. If you want to bulk software download first and then upgrade at a later time, first use Software Download and then Software Upgrade.

NE Software Commit: After an NE has been upgraded to new software, the NE is in the Not Commit state. In this state the software will automatically Fallback to the previous load as a result of an NE reset. To prevent this from happening, move the NE to either the Commit or Commit with Fallback state. Committing software locks the new software load into the NE. The states are described below:• Not Commit: Default state after a software upgrade. In the Not Commit state, an

NE reset causes the node to Fallback to the previous software version. • Commit - Software has been Committed on the NE. There is no Fallback option

after the NE has entered the Commit state. • Commit with Fallback: (CommitFallBk) Commit the software on the NE, but

allows you the option of falling back for a specified period of between 1 and 120 hours. After the fallback timer expires, the node automatically transitions to the Commit state.

Fallback: Software fallback is the process of reverting the software back to the old version from the new version. This is usually done because a problem has been discovered on the new software load. Fallback can only be performed on a node that is in the Not Commit state or the Commit with fallback state.

Page 385: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeOverview to Upgrade TE-206 Nodes from TransNav

Release OPS4.2.3 Force10 Networks Page 7-47

Resolve Firmware Mismatch: If the NE contains new software that is expecting new firmware, the NE generates a firmware mismatch alarm. The EMS resolves the firmware mismatch alarm by loading the new firmware into the node. The new firmware may be part of the software load that is downloaded, but it is not upgraded during software upgrade. To resolve the firmware mismatch, the EMS must hard reset the NE which causes at least one traffic switch during the hard reset process.

Resolve Software Mismatch: If the NE contains software on one or more CCTs that does not match the rest of the node, the NE generates a software mismatch alarm. The EMS resolves this software mismatch alarms by loading the correct software on all the mismatched CCTs and performs a software upgrade (after user confirmation) on the system components that contain the incorrect version of software. This process is non-service affecting.

Figure 7-31 NE Software Dialog Box, View Software

TID - The TID of the NE

Vendor - The maker of the NE.

Model - The model number of the NE.

Current Version - The currently running version of the NE software

Secondary Version - The software loaded in the NEs secondary bank of RAM. If software has been downloaded but not yet upgraded, it appears in the Secondary Version field. During a software upgrade, the software loaded in the secondary bank becomes the currently running version of software; the current version becomes the secondary version.

Latest Version Available - This field is related to the software loads on the TransNav Server. It displays the latest version of software available in the TransNav software download directory for the given NE type.

Status - The current status of the software on the NE (Commit, Not Committed, Commit with Fallback, Commit with FWMM, or Disconnected).

Page 386: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesRequirements for Upgrading TE-206 Node Software

Page 7-48 Force10 Networks Release OPS4.2.3

Requirements for Upgrading TE-206 Node Software

Review the following guidelines prior to upgrading TE-206 node software from the TransNav GUI:• TE-206 nodes must be running release R04.06.00 software to be discovered by

TransNav release TN4.2.3 or higher. (TE-206 nodes running Release R04.050.00 or lower must be upgraded from an external application, such as TN-Xpert or TN-Sight/TL1).

• Upgrades of TE-206 node software from the TransNav GUI must be performed manually; they cannot be scheduled.

• Upgrade software version must be in the nodesoftware directory in the EMS directory on the server prior to upgrading TE-206 node software.

Downloads can be performed across multiple TE-206 nodes simultaneously.

Downloading TE-206 Node Software

Use the following procedure to download node-level software from the TransNav management system for discovered TE-206 nodes for upgrade at a later time. Prior to downloading the TE-206 software, be sure the requirements for upgrading the software have been met. For more information, see the section, Requirements for Upgrading TE-206 Node Software. To fully upgrade the software on a node, see the section Upgrading TE-206 Node Software from TransNav.

Table 7-21 Downloading TE-206 Node Software

1 In the TransNav GUI, from Map View select the TE-206 node to update.

2 Select Admin, SW Upgrade. The NE Software dialog box displays.

Figure 7-32 NE Software Dialog Box

3 The current running version and state of the software for the nodes and equipment is listed. Highlight the node to where the software will be downloaded. To download to multiple nodes simultaneously, click the first node, hold the Shift key and click the last node to upgrade.

Note: Force10recommends upgrading a maximum of five nodes at a time.

Page 387: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeDownloading TE-206 Node Software

Release OPS4.2.3 Force10 Networks Page 7-49

4 While the nodes are highlighted (continue to hold down the Shift key), right-click and select Download from the shortcut menu. The Select Software Version dialog box displays.

Figure 7-33 Select Software Version Dialog Box

Select the software version to be used from the Software Versions parameter.

5 Click OK to begin downloading the selected software version. The NE Software Download dialog box displays.

6 Click Start at the bottom of the dialog box to begin the download. The status displays in the Status pane:

Figure 7-34 NE Software Download Dialog Box, Status

7 When the download completes, click Close.

8 The Downloading TE-206 Node Software procedure is complete.

Table 7-21 Downloading TE-206 Node Software

Page 388: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesUpgrading TE-206 Node Software from TransNav

Page 7-50 Force10 Networks Release OPS4.2.3

Upgrading TE-206 Node Software from TransNav

The complete process of downloading software to the node and switching the running software on the node from a previous version to a newer version is performed by an upgrade. This process can only be performed on one node at a time. If the software has already been downloaded onto the node, the download step is ignored. During the upgrade, the node undergoes a soft reset. The soft reset is non-traffic affecting, however communication to the node is lost during the upgrade process.

Before beginning the upgrade, be sure the requirements for upgrading the software have been met. For more information, see Requirements for Upgrading TE-206 Node Software.

Upgrading TE-206 nodes from TransNav consists of first upgrading the software and, if necessary, the firmware and bootloader.

Table 7-22 Upgrading TE-206 Node Software from TransNav

1 In the TransNav GUI, from Map View select the specific TE-206 node to upgrade.

2 Select Admin, SW Upgrade. The NE Software dialog box displays.

Figure 7-35 NE Software Dialog Box

3 Highlight the TE-206 node to be upgraded.

Figure 7-36 Select TE-206 Node to Upgrade

Page 389: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Release TR3.2.3 Traverse Software UpgradeUpgrading TE-206 Node Software from TransNav

Release OPS4.2.3 Force10 Networks Page 7-51

4 From the NE Software dialog box, select Actions, Upgrade from the menu or right-click for a pull-down menu. The NE Software Upgrade dialog box displays.

Click Start at the bottom of the dialog box to begin the upgrade. The upgrade status displays in the Status pane.

A node database backup is performed and the software downloaded to the node if it was not previously downloaded. Some items are disabled based on the status of the software on the node.

5 When the software upgrade completes, click Close.

6 If necessary, upgrade the firmware and bootloader.

7 The Upgrading TE-206 Node Software from TransNav procedure is complete.

Table 7-22 Upgrading TE-206 Node Software from TransNav

Page 390: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesUpgrading TE-206 Node Software from TransNav

Page 7-52 Force10 Networks Release OPS4.2.3

Page 391: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 7-53

SECTION 7SOFTWARE UPGRADES

Chapter 2 Release TE3.2.x TE-100 System Software Upgrade

Introduction Complete the Release TE3.2.x software upgrade of all TraverseEdge 100 (TE-100) modules using the TransNav management system graphical user interface (GUI).

This chapter provides the following information including step-by-step procedures on how to initiate and complete software upgrades using the TransNav GUI.• Release TE3.2.x Upgrade Overview, page 7-53• Before You Begin, page 7-54• Required Equipment and Tools, page 7-54• TransNav Management System GUI Commands and Conventions, page 7-55• Compatibility and Guidelines, page 7-55• Node Software Upgrade Process, page 7-57• Software Revert Procedure, page 7-73

Release TE3.2.x Upgrade Overview

Release TE3.2.3 provides a unified release for the TE-100 product supporting SONET or SDH networks and services. This software release supports:• TE-100 software upgrade from Release TE3.0.x to Release TE3.2.3—not an

in-service upgrade• In-service software upgrade TE3.2.x point releases (as necessary) for TE-100

nodes• TE-100 warm reboot and hitless upgrade features are unavailable• Simultaneous TransNav management system node software management to

accommodate longer-term upgrade paths:– Release TR3.0.0.7, TR3.2.1 and TR3.2.2 Traverse nodes– Release TE3.2.x TE-100 nodes– Release R04.06.01 TE-206 nodes

Page 392: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesBefore You Begin

Page 7-54 Force10 Networks Release OPS4.2.3

Before You Begin

Review this information before you begin.

Required Equipment and Tools

This section lists required equipment and tools for both hardware and software upgrades.

Software

The following items are required to upgrade TE-100 system software to a node or multiple nodes in a domain:• TransNav management system server connected to a TE-100 node or gateway

Traverse node• The Infocenter website (www.force10networks.com)

Note: If you do not have access to the Infocenter website, contact your local sales representative.

Hardware

Use the following hardware equipment and tools to place modules in a TE-100 shelf.

General

• Electrostatic Discharge (ESD) wrist strap.• 1-slot wide blank faceplates are required in any empty slots to ensure EMI

protection and proper cooling. Blank faceplates must be ordered separately.

TE-100 Shelf

• 1 or 2 System modules (and any spares)

Table 7-23 Node Software Upgrade Requirements

Requirement Reference

Compose and have ready for the Upgrade Team a comprehensive network upgrade plan.

Your company’s Operations Manager is responsible for this task.

Read through and understand the Release Notes, upgrade compatibility notes, guidelines, upgrade procedures, and your company’s comprehensive upgrade plan.

• Refer to Release Notes TE3.2.3 • Read through this entire chapter• Contact your company’s Operations Manager

The software upgrade feature for this release supports TransNav 3.1.x to TN3.2.3 upgrades.

If you are upgrading from an earlier TransNav software release, contact the Force10Technical Assistance Center (TAC).

Have the required equipment and tools ready.

Required Equipment and Tools

Page 393: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeGeneral Software Compatibility

Release OPS4.2.3 Force10 Networks Page 7-55

TransNav Management System GUI Commands and Conventions

This document provides node software upgrade procedures using the TransNav GUI. Refer to the TransNav Management System Product Overview Guide to become familiar with the TransNav system.

The following conventions are used in the procedure tables.

Compatibility and Guidelines

Read the compatibility topics that are relevant to your specific upgrade.• General Software Compatibility, page 7-55• TE-100 Platform SW Upgrade Compatibility Notes, page 7-56• Guidelines for Software Upgrade, page 7-56

General Software Compatibility

Control Cards. Each control card is partitioned and capable of holding two versions of software. The new software is downloaded onto the card’s backup partition during a software upgrade. You activate the new software after the software has been successfully downloaded. Software upgrade activation reboots each card and activates the back-up partition with the newly downloaded software. Provisioning data stored on the node control card is migrated to the backup partition before reboot.

Management Software. The TransNav software simultaneously manages various node releases to accommodate longer-term upgrade paths. For a detailed product compatibility matrix, see the Product Compatibility Matrix table in the Release Notes corresponding to your upgrade release.

Replacement cards. Software version numbers are broken down as follows (SW Version: 1.2.3.4):• Position 1 shows the major software release number.• Position 2 shows the minor software release number.• Position 3 shows the release build number.• Position 4 shows the software batch to build number.

An INCOMPATSW:Incompatible software alarm is generated when:• A replacement card with a (major.x.x.x) software version lower than the

compatibility ID of the Active control card—the lowest software version the Active control card can work with—is placed in the node.

• The Active control card (major.x.x.x) software version is lower than the compatibility ID of the replacement card.

• The Active control card with a (major.x.x.x) software version higher than the TransNav management system can support.In these cases, use the procedures in this section to upgrade or rollback the software version on the replacement card.

Table 7-24 TransNav GUI Command Descriptions

Command Description

Boldface Boldface indicates dialog boxes, fields, menus, and list names.

Italics Italics indicate information that you supply.

Page 394: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesTE-100 Platform SW Upgrade Compatibility Notes

Page 7-56 Force10 Networks Release OPS4.2.3

A SWMIS: Software version mismatch alarm is generated when a replacement card with either an earlier or later (major.minor.build.x) version of software than the software running on the control card is placed in the node. In this case, use the procedures in this section to upgrade or rollback the software version on the replacement card.

TE-100 Platform SW Upgrade Compatibility Notes

Review this information to understand the important compatibility items for the TE-100 and TransNav TN4.2.x software release.• TE-100 software upgrade from Release TE3.0.x.y to Release TE3.2.3. This is not

an in-service upgrade.• In-service TE3.2.x point release software upgrades (as necessary) for TE-100

nodes.• TransNav manages the in-service software upgrade for Release TE3.2.x

maintenance releases.• TE-100 hitless upgrade and warm reboot features are unavailable in this release.

Guidelines for Software Upgrade

Review the following guidelines for software upgrade:• Conduct upgrades in a specific maintenance window when you expect no

user-initiated service state changes.• Start the upgrade from the services egress node of the network (if possible).• Do not perform any new service creation, deletion, activation or deactivation (e.g.,

for Ethernet) until you complete the upgrade on the TransNav server and all network nodes.

• Do not change any fiber/link or other network (node, slot, port) objects during the upgrade.

• Due to the use of FTP libraries, bulk software downloads may fail so schedule software downloads to the TE-100 system modules at least 5 minutes apart.

• Perform an upgrade on spare modules.• Software upgrade is to be errorless. Release Notes TN3.2.x define any potential

exceptions.

Node Software Upgrade Process

Complete the software upgrade procedures in the following order:

Table 7-25 Node Software Upgrade Process

Step Procedure Reference

1 Have you read through, and do you understand, all of the Before You Begin items?

Before You Begin, page 7-54

2 Do you have the required equipment and tools ready?

Required Equipment and Tools, page 7-54

Page 395: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeDownload Node Software to the TransNav Server

Release OPS4.2.3 Force10 Networks Page 7-57

Download Node Software to the TransNav Server

You must first download the software for the upgrade from the Force10 Networks corporate website onto a TransNav server before proceeding with the upgrade procedures. Choose one of the following download procedures, depending on the TransNav EMS platform (i.e., PC or Solaris) for your network.

Download the TransNav Management System or Traverse node software from the Force10 Networks corporate website (www.force10networks.com). From Services & Support, select Customer Login. Enter your Force10 User ID and Password, then click Login.

3 Upgrade the TransNav management system server software (includes first exporting the current database off the TransNav server).

Note: Do not uninstall the previous software version. Mark the directory as old and remove the icon from the desktop.

TransNav Management System Server Guide, Section 2—Management Server Procedures, Chapter 3—“Server Administration Procedures,” Upgrade Server Software, page 2-48

4 Download the new node software to the TransNav server.

Download Node Software to the TransNav Server, page 7-57

5 Download the software to the modules.

Module Software Download Set-up, page 7-60

6 Activate the new software. Software Activation Process, page 7-66

7 The Node Software Upgrade Process is complete.

Table 7-25 Node Software Upgrade Process (continued)

Step Procedure Reference

Page 396: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesDownload Traverse Node Software to the TransNav Server

Page 7-58 Force10 Networks Release OPS4.2.3

Download Traverse Node Software to the TransNav Server

Use these steps to download the Traverse node software to the TransNav server.

Table 7-26 Download Traverse Node Software to the TransNav Server

Step Procedure

1 Navigate to the directory where the Traverse node software files were previously downloaded from the Force10 Networks website.

Figure 7-37 Example—PC System Explorer Window File Listing

2 Right-click the flash.n.n.n.n.zip file (where n.n.n.n is the latest software release number). For Windows PC systems, select the WinZip > Extract to command. For Solaris systems, use the gunzip command.

Page 397: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeDownload Traverse Node Software to the TransNav Server

Release OPS4.2.3 Force10 Networks Page 7-59

3 From the Extract dialog box, select a user-defined folder path directory (e.g., /upgrade/files), then click Extract to download the flash files into the /<user-defined>/flash directory.

Important: Verify the Use folder names check box is selected to keep the ./flash relative path structure in the zip file intact upon download.

Figure 7-38 Extract Dialog Box

4 The Download Traverse Node Software to the TransNav Server procedure is complete. Continue to Step 5 of the Traverse Node Software Upgrade Process, page 7-8.

Table 7-26 Download Traverse Node Software to the TransNav Server

Step Procedure

Page 398: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesModule Software Download Set-up

Page 7-60 Force10 Networks Release OPS4.2.3

Module Software Download Set-up

Software upgrades are done at the node level. The following procedure provides steps on how to begin a software upgrade by setting software download times for each card using the SW Upgrade dialog box.

Important: Due to repartitioning of the FLASH chip, GCM upgrades to Release TR3.2.3 will take approximately 8 to 0 minutes per GCM to upgrade instead of the 2 to 3 minutes necessary on to upgrade on earlier releases. Additionally, the Power LED on the GCM cards will blink red/green while the Active Standby light remains dark. Additionally, the Major/Critical and Minor LEDs may blink or may remain dark. THIS IS EXPECTED BEHAVIOR FOR UPGRADES TO THIS RELEASE.

Table 7-27 Card Software Download Set-up

Step Procedure

1 Verify the card software versions. Refer to Module Software Download Set-up, page 7-60.

2 In Shelf View, select SW Upgrade from the Admin menu to display the SW Upgrade dialog box.

Figure 7-39 SW Upgrade Dialog Box

3 Server IP Address: Enter the TransNav server IP address where the new node software version was downloaded.

(For example: aaa.bbb.ccc.ddd)

4 Base Path: Enter the directory path on the TransNav server to the node software files.

(For example: /files/node/flash)

Page 399: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeModule Software Download Set-up

Release OPS4.2.3 Force10 Networks Page 7-61

5 Username: Enter the user name with File Transfer Protocol (FTP) permission access to the TransNav server where the new node software version resides.

(For example: ftpusername)

6 Password: Enter the user password with FTP permission access to the TransNav server where the new node software version resides.

(For example: ftppassword)

7 Click Update and verify that there were no errors in the FTP session.

Note: This action should fill in the data for each card in the Relative Path columns.

Important: The Relative Path and Upgrade Type values must be set by the system before the download starts. Default is INIT.

Table 7-27 Card Software Download Set-up (continued)

Step Procedure

Page 400: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesModule Software Download Set-up

Page 7-62 Force10 Networks Release OPS4.2.3

8 Set each Download Time based on these requirements for each card. Approximate software download times are as follows:• Control card download time is approximately 10 to 20 minutes• Download time for all other cards is approximately 2 to 5 minutes

Note: Force10 recommends you set sequential download times based on the card requirements.

Note: Due to the use of FTP libraries, bulk software downloads may fail so schedule software downloads at least 5 minutes apart.

Note: It takes a fully loaded Traverse-specific node approximately one hour to download the new software onto all cards. The time required to download software is dependent on the IP bandwidth available to the Traverse node. Download times can increase by a factor of 2 or more if there are multiple nodes using the same DCC channel for downloading software files. The software download process is completely non-service-affecting for protected cards and services. It does not require you to stand by during the download.

Note: Force10 recommends you download the control cards individually, three line cards at a time and one node at a time.

Figure 7-40 Download Time Settings

Table 7-27 Card Software Download Set-up (continued)

Step Procedure

Page 401: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeModule Software Download Set-up

Release OPS4.2.3 Force10 Networks Page 7-63

9 From the Download Time drop-down box, select Set time to manually adjust the time. Select part of the time string (e.g., month, day, hour). Use the up and down arrows or manually re-enter the time to reset the value.

Figure 7-41 SW Upgrade Download Times

10 Verify the Relative Path is set for each card.

Relative Path: A literal sub-directory path (in relation to the Base Path directory) where the software resides for each card. It is based on the type of card in the slot and is case sensitive. For example: ds3

11 Verify the Upgrade Type is set to the default for each card.

Upgrade Type: The upgrade type for each card can be set to one of the following values:

• INIT (default): Completely erases the backup partition before copying the complete set of software upgrade files.

• MERGE: This setting is available for special cases only when working with the Technical Assistance Center.

12 Repeat Steps 7 through 11 for each card in the node.

Table 7-27 Card Software Download Set-up (continued)

Step Procedure

Page 402: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesModule Software Download Set-up

Page 7-64 Force10 Networks Release OPS4.2.3

13 You can Clear Download Time for any card by right-clicking the card in the SW Upgrade dialog box and clicking the Update button. If necessary, you can Abort Download to any card by right-clicking the card in the SW Upgrade dialog box.

Note: Force10 recommends that you do not leave the card in the upgrade abort state. Clear the download time and click the Update button to clear the abort state.

.

Figure 7-42 SW Upgrade—Clear Download Time

14 Verify the download date and times are correct.

15 The software upgrade begins based on the dates and times entered in the Download Time field. You do not have to stand by during the software download; it does not affect protected service or system performance.

You can view the status of the software upgrade in the Download Status field of the SW Upgrade dialog box. The following status displays:• NONE: The software download has not begun.• INPROGRESS: The software download has begun, but is not

complete.• OK: The software download has successfully completed.• ABORTED: The software download has stopped.• FAILED: The software download has failed. Retry the software

download. Contact Force10’s Technical Assistance Center if the software download fails a second time.

Table 7-27 Card Software Download Set-up (continued)

Step Procedure

Page 403: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeModule Software Download Set-up

Release OPS4.2.3 Force10 Networks Page 7-65

16 Continue only when the Download Status is OK and the newly downloaded software version displays in Standby SW Version field for all cards (select each card row and check the Standby SW Version field). This indicates the software download has successfully completed.

17 The Card Software Download Set-up procedure is complete.

Depending on the procedure where you started, return to either:• Step 6 of the Node Software Upgrade Flowchart (Top Level),

page 7-3• Step 3 of the Spare Card Software Activation (All Other Types),

page 7-35

Return to Step 6 of the Traverse Node Software Upgrade Process, page 7-8.

Table 7-27 Card Software Download Set-up (continued)

Step Procedure

Page 404: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesCard Software Version Verification

Page 7-66 Force10 Networks Release OPS4.2.3

Card Software Version Verification

You can determine the software version number of a card using the TransNav GUI. The software version and serial number display in the Config tab in Shelf View. Follow these steps to verify the software version.

Software Activation Process

The new software is not active until the system reboots each module. The reboot activates the backup partition with the newly downloaded software.

Table 7-28 Card Software Version Number Verification

Step Procedure

1 In Shelf View, click a card to select it.

2 Click the Config tab to view current software version information.

Figure 7-43 Card Configuration Dialog Box

3 The software version displays in the Current SW Version field in the Card Configuration dialog box. Software version numbers are broken down as follows (Current SW Version: 1.2.3.4):• 1st position indicates the major software release number• 2nd position indicates the minor software release number• 3rd position indicates the release build number• 4th position indicates the software patch to build number

4 The Card Software Version Number Verification procedure is complete.

Important: Read all important notes below before beginning the activation process.

Important: Software activation should start at the node farthest from the server that is connected to the head end node, then working inward.

Important: During software activation, the modules automatically reboot. Do not execute any external commands on the modules during software activation.

Page 405: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeSoftware Activation Process

Release OPS4.2.3 Force10 Networks Page 7-67

Table 7-29 Software Activation Process

Step Procedure Reference

1 Did you complete the upgrade of TransNav EMS server and client software, and download the node software to the TransNav server?

See the TransNav Management System Server Guide, Section 2—Management Server Procedures, Chapter 3—“Server Administration Procedures,” Upgrade Server Software, page 2-48

2 Did you download the node software to the TransNav server?

Download Node Software to the TransNav Server, page 7-57

3 Is the module software download complete?

Module Software Download Set-up, page 7-60

4 Activate software for:• Standby control module• Spare (standby) control

module(s), unless you are using the remote upgrade capability and want to upgrade your spare modules at a later time (see Chapter 1—“Release TR3.2.3 Traverse Software Upgrade,” Post-Remote Node— Upgrade the Spare Control Card Software, page 7-43).

• Active control module

Activate Software - Control Module, page 7-68

5 The Software Activation Process is complete. Continue to Step 7 of the Node Software Upgrade Process, page 7-57.

Page 406: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesActivate Software - Control Module

Page 7-68 Force10 Networks Release OPS4.2.3

Activate Software - Control Module

The new software is not active until the system reboots each module. The reboot activates the backup partition with the newly downloaded software on the control module.

The activation is scheduled for each module based on the date and time entered in the Activate Time field of the SW Upgrade dialog box. Follow these step-by-step instructions to set up software upgrade activation for control modules.

Important: Do not start the Activate Software— Control Module procedure until the downloaded software version displays in the SW Upgrade dialog box, Standby SW Ver field for all modules, indicating the software download has successfully completed.

Table 7-30 Activate Software— Control Module

Step Procedure

1 Verify the network is alarm free or validate and record any alarms present prior to activation.

2 In Shelf View, select a control module and click the Config tab.

3 Verify the Protection Status of the Active/Standby control module using the Card Configuration dialog box.

Figure 7-44 Card Configuration Protection Status

3

Page 407: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeActivate Software - Control Module

Release OPS4.2.3 Force10 Networks Page 7-69

4 Click the standby control module Activate Time field in the SW Upgrade dialog box; the current date and time displays. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Figure 7-45 SW Upgrade—Activate Time

5 Change the activation type Act Type (default=NSA) to SA for standby control module activation.

Valid values are:• NSA (non-service-affecting). Default. Indicates the activation type

will not reboot (activate) an active control module. • SA (service-affecting): Indicates the activation type will reboot the

control module regardless of its active or standby status.• SPARE (non-service-affecting): Indicates the activation type will

reboot the spare (standby) control module.

6 Click Update.

Important: View the status of the software activation in the Act Status field of the SW Upgrade dialog box. The following status types display:• NON: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.• FAILED: Software activation has failed. Retry the software activation.

Contact the Force10Technical Assistance Center if the software activation fails a second time.

Table 7-30 Activate Software— Control Module (continued)

Step Procedure

4

Page 408: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesActivate Software - Control Module

Page 7-70 Force10 Networks Release OPS4.2.3

7 Verify the new software version activation is complete and it is displayed in the SW Upgrade dialog box, Current SW Ver field.

Important: If there are any unexpected discrepancies here, STOP. Contact the Force10Technical Assistance Center.

8 With the standby control module selected in Shelf View, select the Alarms tab and check the Alarms dialog box. Verify that the EQFAIL: equipment failure alarm caused by the reboot has cleared.

9 A SWMIS: Software version mismatch alarm is generated since the standby control module software version is now mismatched with the active control module. This is normal behavior.

10 If you have spare control modules to software upgrade at this time (i.e., you are not using the remote upgrade capability), remove the standby control module from the shelf and install the spare (standby) control module. Complete the Spare Control Module Software Activation, page 7-72 procedure.

11 Click the active control module Activate Time field in the SW Upgrade dialog box; the current date and time displays. Use the Activate Time up and down arrows to reset the date and time or select the date, time, hour, or minute fields and then re-enter.

Note: You can clear the Activation Time for any module by right-clicking the module in the SW Upgrade dialog box and selecting Clear Activation Time from the shortcut menu.

12 Change the activation type Act Type (default=NSA) to SA for standby control module activation.

Valid values are:• NSA (non-service-affecting). Default. Indicates the activation type

will not reboot (activate) an active control module. • SA (service-affecting): Indicates the activation type will reboot the

control module regardless of its active or standby status.• SPARE (non-service-affecting): Indicates the activation type will

reboot the spare (standby) control module.

13 Click Update.

Important: View the status of the software activation in the Act Status field of the SW Upgrade dialog box. The following status types display:• NONE: Software activation has not begun.• INPROGRESS: Software activation has begun, but is not complete.• OK: Software activation has successfully completed.• FAILED: Software activation has failed. Retry the software activation.

Contact the Force10Technical Assistance Center if the software activation fails a second time.

Table 7-30 Activate Software— Control Module (continued)

Step Procedure

Page 409: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeActivate Software - Control Module

Release OPS4.2.3 Force10 Networks Page 7-71

14 Verify the new software version activation is complete and it is displayed in the SW Upgrade dialog box, Current SW Ver field.

Note: Activating the active control module causes the new software to upgrade and a switchover to the protection module.

15 With the now standby (previously active) control module selected in Shelf View, select the Alarms tab and check the Alarms dialog box. Verify the EQFAIL: equipment failure alarm caused by the reboot has cleared.

16 The SWMIS: Software version mismatch alarm generated on the previously standby control module clears as both control module software versions now match. However, this alarm is now generated for all other modules in the system as their software versions are now mismatched with the active control module. This is normal behavior.

17 The Activate Software— Control Module procedure is complete. Continue to Step 5 of the Software Activation Process, page 7-66.

Table 7-30 Activate Software— Control Module (continued)

Step Procedure

Page 410: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSpare Control Module Software Activation

Page 7-72 Force10 Networks Release OPS4.2.3

Spare Control Module Software Activation

The new software is not active until the system reboots the spare (standby) control module. The reboot activates the backup partition with the newly downloaded software on the spare control module.

The activation is scheduled for each module based on the date and time entered in the Activate Time field of the SW Upgrade dialog box. Follow these step-by-step instructions to set up software upgrade activation for spare control modules.

Important: This procedure assumes you have completed upgrading the standby control module and have not yet activated the active control module.

Important: A spare control module can only be upgraded in a shelf that has the same type of control module. For example, if the standby Traverse GCM is a GCM with OC-48 module, you can only upgrade GCM with OC-48 modules in this procedure. if the standby TE-100 System module is an OC-48 module, you can only upgrade with another OC-48 system module.

Table 7-31 Activate Software—Spare Control Modules

Step Procedure

1 Remove the upgraded standby control module by restarting the module through the TransNav management system, then removing the module from the shelf.

2 Insert the spare (standby) control module.

3 Once the spare control module is online and the EQRMV and EQCOMM alarms are clear, download the new software version to the module using the Table 7-27 Card Software Download Set-up, page 7-60 procedure.

4 Once the new software downloads to the spare control module, activate the software using the steps described for the standby control module in the Table 7-30 Activate Software— Control Module, page 7-68 procedure (using ActType=SPARE).

5 Repeat Steps 1 through 4 for each spare control module.

6 Once upgrade and activation is complete for all the spare control modules, place the original standby control module back into the standby slot and continue the procedure to activate software on the active control module.

7 The Activate Software—Spare Control Modules procedure is complete. Continue to Step 11 of the procedure Activate Software - Control Module, page 7-70.

Page 411: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Release TE3.2.x TE-100 System Software UpgradeSoftware Revert Procedure

Release OPS4.2.3 Force10 Networks Page 7-73

Software Revert Procedure

Use the following procedures to revert to a previous software version used on the node and TransNav management system.• Revert Node Software, page 7-73• Revert TransNav Management System Software, page 7-74

Revert Node Software

Important: This procedure is service affecting.

Important: If you expect to revert an entire node, Force10 recommends you call the Technical Assistance Center for assistance.

Table 7-32 Revert Node Software

Step Procedure

1 Connect to the node using the Node CLI.

2 Perform the software revert command on every card that has been upgraded to the desired software load. Execute this command in the following card order:• Line cards, one at a time• Standby control card (e.g., GCM)• Active control card

CLI command sequence:For cards 1 to n (in the order described above):beginexec upgrade switch-to-stdby-load slot <slot#>Are you sure you want to execute this command?YES.endexec node restartAre you sure you want to execute this command?YES.

3 Verify the node software level has been revised to the desired version and that the system is running the desired software load.

4 The Revert Node Software procedure is complete.

Page 412: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 7: Software UpgradesSoftware Revert Procedure

Page 7-74 Force10 Networks Release OPS4.2.3

Revert TransNav Management System Software

Table 7-33 Revert TransNav Management System Software

Step Procedure

1 Stop the upgraded TransNav server.

2 Start the previous version of software on the TransNav server.

3 Open the previous software version of the Client GUI. Verify the nodes and services are correct (i.e., nodesync/com are cleared).

4 The Revert TransNav Management System Software procedure is complete.

Page 413: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 8 HARDWARE UPGRADESSECTION 8

Contents

Chapter 1Replacing Existing Traverse Hardware

Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1Fan Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-1

Software Compatibility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2Software Version Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3Electrostatic Discharge Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4Required Equipment and Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4

General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4Traverse Shelf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4

Replacement Module—Type and Software Version . . . . . . . . . . . . . . . . . . . . 8-4Preparing a Module for Removal and Replacement . . . . . . . . . . . . . . . . . . . . 8-6Remove a Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8Module Placement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9GCM Module Replacement as Standby— LED Indicators . . . . . . . . . . . . . . . 8-14Clean Fiber Optic MPX Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15Insert a Replacement Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19Replace the Front Inlet Fan Tray Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23Front Inlet Fan Tray Air Filter Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . 8-26Replace the Traverse 600 Fan Assembly . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-27Fan Assembly Air Filter Installation (Traverse 600) . . . . . . . . . . . . . . . . . . . . 8-29

Chapter 2Upgrade to a Traverse Front Inlet Fan Tray

Precautions and Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-31Required Equipment and Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32FIFT Upgrade Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-32Check the New Fan Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-33

Page 414: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8 Hardware Upgrades

Page ii Force10 Networks Release OPS4.2.3

Page 415: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 8-1

SECTION 8HARDWARE UPGRADES

Chapter 1 Replacing Existing Traverse Hardware

Introduction During the course of normal operation, various conditions may arise that require network operations personnel to replace existing system equipment. This section describes Traverse module and fan equipment replacement.

Modules

All modules in the Traverse system, including the General Control Modules (GCMs), are “hot-swappable” and can be removed and replaced while the system is in operation. During replacement procedures, service is interrupted to all connections on the removed modules. For related information about adding and removing modules using the TransNav GUI, see the TransNav Management System GUI Guide, Section 3—Network, Chapter 1—“Creating and Deleting Equipment.”

The module replacement topics in this chapter are as follows:• Software Compatibility, page 8-2• Software Version Verification, page 8-3• Electrostatic Discharge Protection, page 8-4• Required Equipment and Tools, page 8-4• Replacement Module—Type and Software Version, page 8-4• Preparing a Module for Removal and Replacement, page 8-6• Remove a Module, page 8-8• Module Placement Guidelines, page 8-9• GCM Module Replacement as Standby— LED Indicators, page 8-14• Clean Fiber Optic MPX Connectors, page 8-15• Insert a Replacement Module, page 8-19

Fan Equipment

The fan module and fan air filter can be removed and replaced while the system is in operation. For general fan assembly information, see the Traverse Product Overview Guide, Section 2—Platform Descriptions, Chapter 4—“Fan Assemblies”.

The fan equipment replacement topics are as follows:

Page 416: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesSoftware Compatibility

Page 8-2 Force10 Networks Release OPS4.2.3

• Section 8—Hardware Upgrades, Chapter 2—“Upgrade to a Traverse Front Inlet Fan Tray,” page 8-33

• Replace the Front Inlet Fan Tray Module, page 8-23• Front Inlet Fan Tray Air Filter Replacement, page 8-26• Replace the Traverse 600 Fan Assembly, page 8-29• Fan Assembly Air Filter Installation (Traverse 600), page 8-31

Software Compatibility

Control Cards. Each control card is partitioned and capable of holding two versions of software. The new software is downloaded onto the card’s backup partition during a software upgrade. You activate the new software after the software has been successfully downloaded. Software upgrade activation reboots each card and activates the back-up partition with the newly downloaded software. Provisioning data stored on the node control card is migrated to the backup partition before reboot.

Management Software. The TransNav software simultaneously manages various node releases to accommodate longer-term upgrade paths. For a detailed product compatibility matrix, see the Product Compatibility Matrix table in the Release Notes corresponding to your upgrade release.

Replacement cards. Software version numbers are broken down as follows (SW Version: 1.2.3.4):• Position 1 shows the major software release number.• Position 2 shows the minor software release number.• Position 3 shows the release build number.• Position 4 shows the software batch to build number.

An INCOMPATSW:Incompatible software alarm is generated when:• A replacement card with a (major.x.x.x) software version lower than the

compatibility ID of the Active control card—the lowest software version the Active control card can work with—is placed in the node.

• The Active control card (major.x.x.x) software version is lower than the compatibility ID of the replacement card.

• The Active control card with a (major.x.x.x) software version higher than the TransNav management system can support.In these cases, use the procedures in this section to upgrade or rollback the software version on the replacement card.

A SWMIS: Software version mismatch alarm is generated when a replacement card with either an earlier or later (major.minor.build.x) version of software than the software running on the control card is placed in the node. In this case, use the procedures in this section to upgrade or rollback the software version on the replacement card.

Refer to Section 7—Software Upgrades, Chapter 1—“Release TR3.2.3 Traverse Software Upgrade” for software upgrade procedures.

Page 417: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareSoftware Version Verification

Release OPS4.2.3 Force10 Networks Page 8-3

Software Version Verification

You can determine the software version number of a card using the TransNav GUI. The software version and serial number display in the Config tab in Shelf View. Follow these steps to verify the software version.

Table 8-1 Card Software Version Number Verification

Step Procedure

1 In Shelf View, click a card to select it.

2 Click the Config tab to view current software version information.

Figure 8-1 Card Configuration Dialog Box

3 The software version displays in the Current SW Version field in the Card Configuration dialog box. Software version numbers are broken down as follows (Current SW Version: 1.2.3.4):• 1st position indicates the major software release number• 2nd position indicates the minor software release number• 3rd position indicates the release build number• 4th position indicates the software patch to build number

4 The Card Software Version Number Verification procedure is complete.

Page 418: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesElectrostatic Discharge Protection

Page 8-4 Force10 Networks Release OPS4.2.3

Electrostatic Discharge Protection

Wear a properly grounded Electrostatic Discharge (ESD) wrist strap during the following installation and maintenance activities to avoid damaging the Traverse integrated circuits:• While handling any Traverse module• When connecting copper or optical cables to the PDAP, Traverse main backplane,

fiber optic backplane, and fan tray module

Required Equipment and Tools

The following hardware equipment and tools are required to place cards in a Traverse shelf.

General

• Electrostatic Discharge (ESD) wrist strap• Eye protection• 1-slot wide blank faceplates for any empty slots to ensure EMI protection and

proper cooling. Blank faceplates must be ordered separately.

Traverse Shelf

• MPX cleaning materials to clean fiber optic cable and card MPX connectors:– Isopropyl alcohol of at least 91% purity– Lint-free wipes– Lint-free cleaning swabs with urethane foam heads– Pressurized optical duster (canned air)

• 1 or 2 control cards, as well as any spares• System interface module (SIM) cards

Note: The number and combination of SIMs is based on your network requirements and physical cabling at the Traverse main and fiber optic backplanes.

Replacement Module—Type and Software Version

Module of Same Type and Software Version. When you replace a module with another of the same type and software version, the TransNav management system configures the replacement module in the same way the removed module was configured.

Module of Same Type with a Earlier or Later Software Version. Replacement modules that have an earlier version of software—earlier than the other modules in the Traverse node—will require a software upgrade. Replacement modules that have a later version of software—later than the other modules in the Traverse node—will require a software downgrade. Refer to Section 7—Software Upgrades, Chapter 1—“Release TR3.2.3 Traverse Software Upgrade” for procedures on how to convert software versions on a replacement module.

Page 419: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareReplacement Module—Type and Software Version

Release OPS4.2.3 Force10 Networks Page 8-5

Module of Different Type. If you replace a module with a different type of module, an Equipment Mismatch alarm is generated to indicate a failure condition. In the following Map View, the Alarm tab provides an example of an Equipment Mismatch alarm in the TransNav GUI:

Figure 8-2 Equipment Mismatch Alarm

Page 420: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesPreparing a Module for Removal and Replacement

Page 8-6 Force10 Networks Release OPS4.2.3

Preparing a Module for Removal and Replacement

The following procedures provide step-by-step instructions on how to prepare a module for removal and replacement using the TransNav GUI.

Important: GCM, Enhanced GCM (EGCM), Universal GCM (UGCM), and GCMs with integrated optics are considered different modules and must be physically removed and deleted via TransNav prior to replacement with a different GCM module type to avoid an EQMIS: Equipment Mismatch alarm.

Important: The Traverse system allows the network operator an in-service upgrade capability (protection switching) to replace older GCM modules with the newer GCM modules in a redundant configuration. The following replacement rules apply:

Replace:• GCM with a UGCM• EGCM (without optics) with a UGCM• EGCM (with OC-12/STM-4) with a UGCM with 1-port

OC-12/STM-4• EGCM (with OC-48/STM-16) with a UGCM with OC-48/STM-16

Important: The Traverse system allows the network operator an in-service upgrade capability (protection switching) to replace older DS3, E3, EC-1, and DS3 Transmux modules with the newer DS3, E3, EC-1, and DS3 Transmux modules with no greater than 50 ms traffic interruption for each module in any 1:N (where N=1,2) protection group.

Table 8-2 Preparing a Module for Removal and Replacement

Step Procedure

1 In the TransNav GUI, go to Shelf View.

2 Click the module to be removed.

3 Click the Config tab to display the Card Configuration dialog box.

4 Click the Lock icon at the bottom left portion of the screen to change the Administrative state to locked and click Apply.

Note: Force10 recommends a forced switchover if you are replacing the working module of a protection group.

5 Physically remove the module from the Traverse shelf. Refer to the procedure Remove a Module, page 8-8 for details.

You must physically remove the old module from the shelf before deleting it using the TransNav GUI. The TransNav system will continue to discover the module if it is not physically removed from the shelf.

Page 421: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwarePreparing a Module for Removal and Replacement

Release OPS4.2.3 Force10 Networks Page 8-7

6 In the TransNav GUI, right-click the module and select Delete Card to delete the card or Replace with Card to replace with a different type of module.

7 Place the new module in the Traverse shelf. Refer to the following sequence of topics for important details:• Module Placement Guidelines, page 8-9• GCM Module Replacement as Standby— LED Indicators,

page 8-14 (Standby GCM module replacement only.)• Clean Fiber Optic MPX Connectors, page 8-15• Insert a Replacement Module, page 8-19

8 Click the Lock icon at the bottom left portion of the screen to change the Administrative state to unlock and click Apply.

9 The Preparing a Module for Removal and Replacement procedure is complete.

Table 8-2 Preparing a Module for Removal and Replacement (continued)

Step Procedure

Page 422: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesRemove a Module

Page 8-8 Force10 Networks Release OPS4.2.3

Remove a Module

Follow these steps to remove a module.

Important: A properly grounded ESD wrist strap must be worn at all times while handling Traverse modules to prevent damage to the circuitry.

Important: Handle modules by the edges and face plate only. Do not touch any module connectors or components.

Table 8-3 Remove a Card

Step Procedure

1 Flip the locking tabs up to unlock the card.

Figure 8-3 Card Tabs in the Unlocked Position

2 Hold the card with the tabs parallel to the top and bottom of the card and pull it straight out of the slot.

3 The Remove a Card procedure is complete.

OPS 00083

Locking Tabs inOpen Position

Page 423: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareModule Placement Guidelines

Release OPS4.2.3 Force10 Networks Page 8-9

Module Placement Guidelines

The following restrictions apply for module placement in a Traverse shelf.

Refer to Appendix A—“Module Placement Planning and Guidelines,” page 9-1 for additional information.

Table 8-4 Card Placement Guidelines

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

GCM

• GCM• GCM Enhanced• GCM with OC-12/STM-4• GCM with OC-48/STM-16• GCM with VTX• GCM with OC-12/STM-4 plus

VTX/VCX• GCM with OC-48/STM-16 plus

VTX/VCX

GCMA and

GCMB (slots 15 and 16)

GCMA and

GCMB(slots 19 and 20)

GCMA and

GCMB(slots 5 and 6)

Redundant GCMs are recommended for equipment protection. However, if only one GCM is used, it can be placed in either slot GCMA or GCMB.

Redundant GCMs can be different types. See Table 8-5 Redundancy Rules for GCM Types for a list of control cards.

Electrical

• DS1• DS3/E3/EC-1 CC (12-port)• DS3/E3/EC-1 CC (24-port)• DS3/EC-1 Transmux• E1• Universal Transmux (24-port or

48-port) (UTMX-24 or UTMX-48)

1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card.In a 1:1 equipment protection scheme with a 2-slot electrical connector card (ECM), either the left- or right-adjacent card from the protection card is the working card.

In a 1:2 equipment protection scheme, the center card protects the left- and right-adjacent working cards.

In an unprotected scheme, place cards in any valid slot; the 2-slot DS3/E3 ECM provides access to only the right-most card, so place an optical card in the left-most slot. The 3-slot DS3/E3 and 3-slot E1 ECM provides access to only the center and right-most cards, so place an optical card in the left-most slot.

For Optical Transmux card placement, see Optical Transmux in this table.

Optical Transmux

Page 424: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesModule Placement Guidelines

Page 8-10 Force10 Networks Release OPS4.2.3

• DS3/EC-1 Transmux 1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card. (SONET network only): The DS3 Transmux card supports 1:N equipment protection for high-density optical transmux applications, where N=1 to 12 in a Traverse 2000. This application has no DS3/E3 ECM requirement. One card protects all remaining adjacent cards.

• UTMX-24 or UTMX-48 1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card. (SONET network only) The UTMX cards support 1:N equipment protection for high-density optical transmux applications, where N=1 to 4 in a Traverse 2000. This application has no DS3/E3 ECM requirement. One card protects all remaining adjacent cards.

Table 8-4 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Page 425: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareModule Placement Guidelines

Release OPS4.2.3 Force10 Networks Page 8-11

Ethernet (Next Generation)

NGE or NGE Plus:• GbE [LX, SX] plus 10/100BaseTX

Combo [CEP]• GbE TX plus GbE [LX or SX] plus

10/100BaseTX Combo [CEP]

NGE only:• GbE CWDM plus 10/100BaseTX

Combo• GbE SX plus GbE CWDM plus

10/100BaseTX Combo

1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card. In a 1:1 equipment protection scheme with a 2-slot Ethernet Protection ECM, either the left- or right-adjacent card from the protection card is the working card.

In an unprotected scheme, place cards in any valid slot. The 2-slot Ethernet Protection ECM provides access to only the right-most card, so place an optical card in the left-most slot.

Use one of the following options when placing any 10/100BaseTX-inclusive cards in a Traverse shelf with DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards:• Place 10/100BaseTX-inclusive cards

directly to the left of DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards. An OC-N/STM-N card or 1-slot wide blank faceplate1 is not required if the 10/100BaseTX-inclusive cards are placed to the left of electrical interface cards.or

• Place an OC-N/STM-N card or a 1-slot wide blank faceplate1 between the 10/100BaseTX and an electrical interface card if the 10/100BaseTX-inclusive card is placed to the right of the electrical interface card.

Ethernet (Dual Slot GbE)

• 10GBASE-LR 1–14 1–18 n/a None

• 10-port GbE card, no optics 1–12 1–16 Requires an SFP connector card. See the Traverse Installation and Commissioning Guide, Section 2—Network Interface Specifications, Chapter 1—“Fiber Optic Interface Cabling Specifications,” GbE-10 SCM, Fiber Assignments, and SFPs, page 2-4.

In a 1:1 equipment protection scheme, the working and protect cards are placed in slots adjacent to each other. The protection card must be on the left; the working card on the right.

Ethernet over PDH (EoPDH)

Table 8-4 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Page 426: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesModule Placement Guidelines

Page 8-12 Force10 Networks Release OPS4.2.3

• GbE [LX, SX] plus 10/100BaseTX Combo [CEP/EoPDH]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP/EoPDH]

1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card.In a 1:1 equipment protection scheme with a 2-slot Ethernet Protection ECM, either the left- or right-adjacent card from the protection card is the working card.

In an unprotected scheme, place cards in any valid slot. The 2-slot Ethernet Protection ECM provides access to only the right-most card, so place an optical card in the left-most slot.

Use one of the following options when placing any 10/100BaseTX-inclusive cards in a Traverse shelf with DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards:• Place 10/100BaseTX-inclusive cards

directly to the left of DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards. An OC-N/STM-N card or 1-slot wide blank faceplate1 is not required if the 10/100BaseTX-inclusive cards are placed to the left of electrical interface cards.or

• Place an OC-N/STM-N card or a 1-slot wide blank faceplate1 between the 10/100BaseTX and an electrical interface card if the 10/100BaseTX-inclusive card is placed to the right of the electrical interface card.

SONET/SDH

• OC-3/STM-1• OC-12/STM-4• OC-48/STM-16

1–14 1–18 1-4 None

• OC-192/STM-64 1/2, 3/4, 5/6, 7/8,

9/10, 11/12, and

13/14

1/2, 3/4, 5/6, 7/8,

9/10, 11/12, 13/14, 15/16,

and 17/18

n/a The OC-192/STM-64 cards require two slots for placement. The left side of the OC-192/STM-64 card is placed in an odd numbered slot.

Table 8-4 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Page 427: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareModule Placement Guidelines

Release OPS4.2.3 Force10 Networks Page 8-13

Force10 recommends the following card placement scheme:• Place DS1, DS3, E3, EC-1 CC, DS3/EC-1 Transmux, or E1, and 10/100BaseTX

(see Important note above for 10/100BaseTX placement) cards in the left-most slots beginning with slots 1 and 2. Work towards the center of the shelf as required (up to Traverse 1600 slot 12 or Traverse 2000 slot 16).

• Place VT/TU 5G Switch cards next to the GCM cards. Place additional cards toward the center of the shelf as required.

• Place OC-N/STM-N and GbE cards (optical cards) beginning in the right-most available slot (starting at Traverse 1600 slot 14 or Traverse 2000 slot 18). Place additional cards towards the center of the shelf as required.

VT/TU Switching

VT/TU 5G Switch 1–14 1–18 1-4 The VT/TU 5G Switch card supports 1:N equipment protection where:• N=1 to 9 in a Traverse 2000

(SONET network only)• N=1 (SDH network only)

This card has no ECM requirement. One card protects all adjacent cards.

1 Blank faceplates must be ordered separately.

Table 8-4 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Important: For electrical port usage only, place an OC-N/STM-N or 1-slot blank faceplate1 between any 10/100BaseTX-inclusive card and an electrical card (of another type), if the 10/100BaseTX-inclusive card is placed to the right of an electrical interface card. A blank faceplate or OC-N/STM-N card is not required if the 10/100BaseTX-inclusive card is placed to the left of an electrical interface card.

If the 10/100BaseTX-inclusive card also contains optical ports, and if the user intends to ONLY use the optical ports, this electrical port usage restriction does not apply.

Important: To ensure EMI protection and proper cooling, place one-slot wide blank faceplates in any empty Traverse slots.

Page 428: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesGCM Module Replacement as Standby— LED Indicators

Page 8-14 Force10 Networks Release OPS4.2.3

The following table lists the redundancy rules for all GCM types:

GCM Module Replacement as Standby— LED Indicators

When a new GCM module is placed as the standby module, the Power and Active/Standby LED indications are as shown in the following table.

Table 8-5 Redundancy Rules for GCM Types

Active GCM Standby GCM

GCM GCM

GCM GCM Enhanced | Universal1

1 GCM Enhanced or Universal environmental alarm function should not be used in this combination.

GCM Enhanced | Universal1 GCM

GCM Enhanced | Universal GCM Enhanced | Universal

GCM with OC-N/STM-N GCM with OC-N/STM-N

Table 8-6 Power and Active/Standby—GCM Cards

LEDRED Amber GREEN OFF

Flashing Solid Flashing Solid Flashing Solid

Power

Initializing; POST is started.

Hardware failure detected; replace the card.

N/A N/A Node is in commissioning

mode

Passed initialization and is operational

No power

Active/ Standby

N/A N/A Standby mode;

synchroniza-tion with the Active card

is not complete.

Card type does not match the provisioned card type or the card is placed in an invalid slot.1

Standby mode; synchroniza-tion with the active card is complete.

Active and operational

Initializing; POST is started.

1 Please refer to Appendix A—“Card Placement Planning and Guidelines,” page 12-1 for valid card placement guidelines.

Page 429: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareClean Fiber Optic MPX Connectors

Release OPS4.2.3 Force10 Networks Page 8-15

Clean Fiber Optic MPX Connectors

It is critical that the cable and card MPX connectors are clean to ensure proper operation. Force10 recommends that you visually inspect the MPX connectors on both the fiber optic cables and optical cards using fiber optic magnification equipment. Force10 also recommends that you clean the fiber optic cable and card MPX connectors using the following procedure.

OPTIC WARNING! The Traverse system is a class 1 product that contains a class IIIb laser and is intended for operation in a closed environment with fiber attached. Do not look into the optical connector of the transmitter when power is applied. Laser output is invisible and eye damage can result. Follow these safety features to prevent looking into the optical connector.

OPTIC WARNING! The optical connector system used on the Traverse fiber optic backplane is designed with a mechanical shutter mechanism that blocks physical and visual access to the optical connector. Follow this safety feature as it is designed to prevent eye damage.

OPTIC WARNING! Follow all warning labels when working with optical fibers. Always wear eye protection when working with optical fibers. Never look directly into the end of a terminated or unterminated fiber or connector, as it may cause eye damage.

Important: Always wear a properly grounded Electrostatic Discharge (ESD) wrist strap when handling and placing cards in the Traverse shelf. Follow all warnings and instructions included in card packaging to prevent electrostatic damage.

Important: Handle cards by the edges and faceplate only. Do not touch any card connectors or components.

Important: Do not touch the end of the MPX connectors.

Page 430: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesClean Fiber Optic MPX Connectors

Page 8-16 Force10 Networks Release OPS4.2.3

Table 8-7 Clean Cable and Card MPX Connectors

Step Procedure

1 Was the fiber optic cable pre-cabled?• If yes, continue to Step 2.• If no, continue to Step 3.

2 Remove the fiber optic cable MPX connector(s) from the fiber optic backplane.

3 Clean the fiber optic cable MPX connector with 91% IPA alcohol, a lint-free wipe, and a pressurized optical duster (canned air).

4 Align the “white reference marker” on the MPX connector with the white stripe on the left side of the fiber optic backplane housing.

Note: For a Traverse 600 shelf type, see Figure 8-5 in Step 5.

Figure 8-4 Fiber Optic Backplane Housing A and B

For specifications, refer to the Traverse Installation and Commissioning Guide, Section 2—Network Interface Specifications, Chapter 1—“Fiber Optic Interface Cabling Specifications,” General MPX Connector to Optical Fiber Port Assignment, page 2-9.

Page 431: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareClean Fiber Optic MPX Connectors

Release OPS4.2.3 Force10 Networks Page 8-17

5 Align the “white reference marker” on the MPX connector with the white stripe on the left side of the Traverse 600 fiber optic backplane housing.

Figure 8-5 Traverse 600 Fiber Optic Backplane Housing A and B

6 Gently push the MPX connector back into the correct fiber optic backplane housing.

7 Repeat Steps 2 through 6 for each MPX connector.

8 Remove the dust cap from the optical card MPX connector(s).

Figure 8-6 Optical Card MPX Connector

Table 8-7 Clean Cable and Card MPX Connectors (continued)

Step Procedure

OPS 00085

Housing A

Housing B

White StripeReference Markers

OPS 00083

Dust Cap on MPX Connector

Page 432: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesClean Fiber Optic MPX Connectors

Page 8-18 Force10 Networks Release OPS4.2.3

9 Clean the optical card MPX connector with 91% IPA alcohol, a lint-free wipe, and a pressurized optical duster (canned air).

10 Continue to the next procedure, Insert a Card.

Table 8-7 Clean Cable and Card MPX Connectors (continued)

Step Procedure

Page 433: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareInsert a Replacement Module

Release OPS4.2.3 Force10 Networks Page 8-19

Insert a Replacement Module

Important: Always use a properly grounded Electrostatic Discharge (ESD) wrist strap when handling Traverse cards (cards). Plug the ESD wrist strap into the ESD jack provided on the Traverse front inlet fan card, standalone air ramp, or other confirmed source of earth ground. Refer to ESD Jack Locations, page 6-7.

Important: Do not install Traverse cards until all installation and cabling procedures are complete.

Important: Handle cards by the edges and faceplate only. Do not touch any card connectors or components.

Important: Observe all electrostatic sensitive device warnings and precautions when handling Traverse cards.

Important: Insert the card into the Traverse shelf using the guides at the top and bottom of the card cage for proper alignment. Make sure the card is vertical, from top to bottom, and that the card stays in the guides from the front to the back of the shelf.

Important: Do not place an electrical card (of another type) in the slot directly to the left of any 10/100BaseTX-inclusive card:• NGE• NGE Plus• EoPDH

Important: Cards should insert easily into the Traverse shelf. Do not force the card into position. If the card does not insert easily, slide it back out, verify you are placing it in the correct position and inserting the card into the correct guides top and bottom.

Important: Insert the card in the Traverse 600 shelf using the guides for proper alignment. If the Traverse 600 shelf is installed horizontally make sure the card is horizontal, from left to right, and that the card stays in the guides.

Page 434: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesInsert a Replacement Module

Page 8-20 Force10 Networks Release OPS4.2.3

Follow these steps to insert a card.

Important: To ensure EMI protection and proper cooling, place one-slot wide blank faceplates in any empty Traverse slots. Blank faceplates must be ordered separately.

Table 8-8 Insert a Card

Step Procedure

1 Is this an optical card with MPX connectors?• If yes, complete the Clean MPX Connectors procedure before

proceeding.• If no, continue to Step 2.

2 Flip the card locking tabs up. Hold the card with the tabs parallel to the top and bottom of the card.

Figure 8-7 Card Locking Tabs in the Unlocked Position

OPS 00083

Guide Pins

Locking Tabs in Open Position

Page 435: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareInsert a Replacement Module

Release OPS4.2.3 Force10 Networks Page 8-21

3 Important: Each slot in the Traverse shelf has guides to properly align the card into position for contact with the main and mesh backplanes. Use these guides to ensure the card is properly aligned. This is easier to do if you are eye level with the shelf. The card should insert easily into the Traverse shelf. Do not force the card into position.

Insert the card in the Traverse 1600 or Traverse 2000 shelf using the guides at the top and bottom of the card cage for proper alignment. Make sure the card is vertical, from top to bottom, and that the card stays in the guides from the front to the back of the shelf.

Figure 8-8 Traverse 1600 or Traverse 2000 Shelf with Guides

Insert the card in the Traverse 600 shelf using the guides for proper alignment. If the Traverse 600 shelf is installed horizontally as in the following figure, make sure the card is horizontal (from left to right) and that the card stays in the guides from the front to the back of the shelf.

Figure 8-9 Traverse 600 Shelf with Guides

Table 8-8 Insert a Card (continued)

Step Procedure

Card Cage Guides for Card Alignment

Card Cage Guides for Card Alignment

Page 436: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesInsert a Replacement Module

Page 8-22 Force10 Networks Release OPS4.2.3

4 Push the center of the card faceplate until the locking tabs begin to close and the locking tabs start to roll around the lip of the Traverse shelf. The optical card makes an audible “click” indicating it is making contact with the fiber optic backplane connectors.

5 Push the locking tabs down. The tabs must close around each end of the card to lock the card in place.

Figure 8-10 Card Tabs in the Locked Position

6 Press the tabs into their locked position to secure the card. The card is locked into position when the top and bottom tabs are pressed down completely and the locking tabs are secured in the lip of the Traverse shelf.

7 The Insert a Card procedure is complete.

Table 8-8 Insert a Card (continued)

Step Procedure

Locking Tabs inClosed Position

Page 437: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareReplace the Front Inlet Fan Tray Module

Release OPS4.2.3 Force10 Networks Page 8-23

Replace the Front Inlet Fan Tray Module

The front inlet fan tray assembly is bundled and shipped with the Traverse 1600 and Traverse 2000 systems. Proceed with the following steps to replace the fan tray module into an existing installation.

Note: This procedure is not service affecting if it is completed within 6 minutes. Typical time for completion of this procedure is 3 minutes.

Note: Have all necessary materials on the work site prior to beginning this procedure.

Note: Normal fan operation is indicated by the green LED being illuminated and the red LED being extinguished. An illuminated red LED indicates a fault condition on that fan module.

Important: The instructions below support the redesigned front inlet fan tray with integrated air ramp unit.

Important: Wear a properly grounded Electrostatic Discharge (ESD) wrist strap when installing the fan module as it contains static-sensitive components.

Table 8-9 Replace a Traverse 1600 and Traverse 2000 Fan Assembly

Step Procedure

1 Loosen the captive thumb screws on the fan module (card) front cover to release it.

Figure 8-11 Front Inlet Fan Module Captive Thumb Screws

2 Use the captive thumb screws as handles to aid in the removal of the fan module.

Important: Use caution when initially handling the fan module. The fans will still be rotating for a short period of time after removal.

OPS 00088

Captive Thumb Screws

Page 438: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesReplace the Front Inlet Fan Tray Module

Page 8-24 Force10 Networks Release OPS4.2.3

3 Lift the front inlet fan module to be level with the front inlet fan tray holder. Slide the fan module into the front of the fan tray holder along the guides. Push the module straight in until the two connectors engage.

WARNING! The fans will begin to rotate as soon as the power connection mates to the fan module holder.

Figure 8-12 Traverse 1600 Front Inlet Fan Module Installation

4 The front inlet fan module is in the correct position when it is slightly recessed from the front of the fan module holder.

Important: Do not force the fan module into position. If it does not plug in easily, slide it back out. Check for any obstructions or a damaged connector that might prevent it from sliding into position and verify it is in the correct guides before attempting to insert it again.

Table 8-9 Replace a Traverse 1600 and Traverse 2000 Fan Assembly (continued)

Step Procedure

Fan Module Connectors

Fan Tray Holder Guide

Captive Thumb Screws

Page 439: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareReplace the Front Inlet Fan Tray Module

Release OPS4.2.3 Force10 Networks Page 8-25

5 Align and tighten the captive thumb screws to secure the fan module front cover.

Figure 8-13 Front Inlet Fan Module Captive Thumb Screws

6 Continue to the next procedure, Insert a Traverse 1600 and Traverse 2000 Fan Air Filter.

Table 8-9 Replace a Traverse 1600 and Traverse 2000 Fan Assembly (continued)

Step Procedure

OPS 00088

Captive Thumb Screws

Page 440: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesFront Inlet Fan Tray Air Filter Replacement

Page 8-26 Force10 Networks Release OPS4.2.3

Front Inlet Fan Tray Air Filter Replacement

The front inlet fan module requires a foam air filter that is placed at the top of the front inlet fan tray holder after the fan module is installed.

Important: The instructions below support the redesigned front inlet fan tray with integrated air ramp unit.

Table 8-10 Install a Fan Tray Air Filter with Springs (Legacy)

Step Procedure

1 If you are replacing an old air filter, carefully remove the old air filter from the fan tray holder to avoid contaminating the equipment.

2 Insert the new air filter. Rotate the air filter pull-tabs out.

Figure 8-14 Air Filter with Springs

3 Hold the air filter with the metal window-pane side down and the springs to the back.

4 Insert the air filter in the gap between the fan tray card and the top of the fan tray holder. Slide the air filter along the fan tray holder guides until the springs on the back edge are fully compressed.

5 With the springs fully compressed, lift the front edge of the air filter up and over the retaining flanges and release it.

6 Rotate the pull-tabs so they are parallel to the front edge of the air filter.

OPS 00058

Springs

Pull Tabs

Page 441: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareInstall a Fan Tray Air Filter with Handle (Legacy)

Release OPS4.2.3 Force10 Networks Page 8-27

Install a Fan Tray Air Filter with Handle (Legacy)

The following procedure provides steps on how to install the fan tray filter with a handle on the front edge.

7 Lift the fan tray holder front cover into its closed position. Tighten the captive fasteners to secure it.

Figure 8-15 Fan Tray Holder Front Cover

Note: The front cover closes very easily when the fan tray card and air filter are in position. If the cover does not close easily, check the fan tray card to make sure it is recessed from the front of the fan tray holder.

8 The Install a Fan Tray Air Filter with Springs (Legacy) procedure is complete.

Table 8-10 Install a Fan Tray Air Filter with Springs (Legacy) (continued)

Step Procedure

OPS 00059

Captive Fasteners

Table 8-11 Install a Fan Tray Air Filter with Handle (Legacy)

Step Procedure

1 If you are replacing an old air filter, carefully remove the old air filter from the fan tray holder to avoid contaminationg the equipment.

2 Hold the air filter with the metal window-pane side down with the handle facing to the front.

Figure 8-16 Air Filter with Handle

OPS 00060

Handle

Page 442: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesInstall a Fan Tray Air Filter with Handle (Legacy)

Page 8-28 Force10 Networks Release OPS4.2.3

3 Insert the air filter in the gap between the fan tray card and the top of the fan tray holder.

4 Slide the air filter along the fan tray holder guides. Lift up on the filter handle as you are pushing the filter towards the back of the fan tray holder. There is an audible “click” when the air filter is in position. The handle drops down over the front of the fan tray card.

5 Lift the fan tray holder front cover into its closed position. Tighten the captive fasteners to secure it.

Figure 8-17 Fan Tray Holder Front Cover

Note: The front cover closes very easily when the fan tray card and air filter are correctly in position. If the cover does not close easily, check the fan tray card to make sure it is recessed from the front of the fan tray holder.

6 The Install a Fan Tray Air Filter with Handle (Legacy) procedure is complete.

Table 8-11 Install a Fan Tray Air Filter with Handle (Legacy) (continued)

Step Procedure

OPS 00059

Captive Fasteners

Page 443: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareReplace the Traverse 600 Fan Assembly

Release OPS4.2.3 Force10 Networks Page 8-29

Replace the Traverse 600 Fan Assembly

The Traverse 600 fan module with integral fan tray is bundled and shipped with the Traverse 600 system. Proceed with the following steps to install the fan assembly.

Important: Wear a properly grounded Electrostatic Discharge (ESD) wrist strap when installing the fan tray module as it contains static-sensitive components.

Table 8-12 Insert a Traverse 600 Fan Assembly

Step Procedure

1 Loosen the two captive screws on the right-front cover of the Traverse 600 fan assembly to release it.

Figure 8-18 Fan Assembly Front Cover - Traverse 600

2 Open the right-front fan assembly cover.

OPS 00089

Captive Fasteners

Page 444: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesReplace the Traverse 600 Fan Assembly

Page 8-30 Force10 Networks Release OPS4.2.3

3 Hold the fan assembly vertically with the fan card facing left and lift it level with the fan cage. Slide the fan assembly into the fan cage along the guides and push it straight in until it connects to the back of the shelf.

Important: Do not force the fan tray card into position. If it does not plug in easily, slide it back out. Check for any obstructions or a damaged connector that might prevent it from sliding into position and verify it is lined up in the correct guides.

Figure 8-19 Traverse 600 Fan Assembly Installation

4 The Replace the Traverse 600 Fan AssemblyInsert a Traverse 600 Fan Assembly procedure is complete.

Table 8-12 Insert a Traverse 600 Fan Assembly (continued)

Step Procedure

OPS 00090

Traverse 600 Shelf

Fan Assembly

Page 445: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 1 Replacing Existing Traverse HardwareFan Assembly Air Filter Installation (Traverse 600)

Release OPS4.2.3 Force10 Networks Page 8-31

Fan Assembly Air Filter Installation (Traverse 600)

The Traverse 600 fan assembly (fan module with integral fan tray) requires a foam air filter that is placed to the left of the fan assembly after the fan module is installed.

The Traverse 600 fan air filters are available in 63% or 80% arrestance at 300 FPM— feet per minute (91.4 meters per minute) depending on your installation requirements.

The following procedure provides step-by-step instructions on how to insert the air filter.

Table 8-13 Insert a Traverse 600 Fan Air Filter

Step Procedure

1 If you are replacing an old air filter, carefully remove the old air filter from the fan tray holder to avoid contaminating the equipment.

2 Install the new air filter. Grasp the air filter flexible pull tab.

Figure 8-20 Traverse 600 Fan Assembly Air Filter

3 Insert the air filter in the gap between the fan assembly and the left of the fan cage. Slide the air filter along the guides until the filter is flush.

4 The Install a Fan Tray Air Filter with Springs (Legacy) procedure is complete.

OPS 00057Pull Tab (top view)

Page 446: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesFan Assembly Air Filter Installation (Traverse 600)

Page 8-32 Force10 Networks Release OPS4.2.3

Page 447: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 8-33

SECTION 8SECTION 8HARDWARE UPGRADES

Chapter 2 Upgrade to a Traverse Front Inlet Fan Tray

Introduction This chapter provides upgrade instructions for replacing separate Traverse fan tray and air ramp assemblies with a single front inlet fan tray (FIFT) assembly:• Precautions and Assumptions, page 8-33• Required Equipment and Tools, page 8-34• FIFT Upgrade Instructions, page 8-34

Precautions and Assumptions

The following precautions and assumptions apply:

WARNING! Plan this upgrade to avoid disruptions and keep the time to a minimum. This replacement operation should take no more than 4 to 5 minutes. A fully loaded Traverse shelf can sustain a non-service affecting temperature increase for approximately 6 minutes before it begins generating critical alarms.

WARNING! Depending on the number of modules in the shelf and the room temperature, Force10 recommends the use of a regular room fan blowing on the node during this operation. If you do use a standalone room fan, carefully remove any blank faceplates in the shelf and position the fan to blow directly onto the front of the shelf.

Important: A fan tray holder, with fay tray module and fan filter, must be installed directly below the Traverse 1600 or Traverse 2000 shelf so there is no gap between the shelf and fan tray holder to ensure proper air flow.

Important: The existing separate fan tray holder and air ramp use 4 inches of height. This is the required minimum replacement space to allow easy insertion of the new FIFT.

Page 448: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesRequired Equipment and Tools

Page 8-34 Force10 Networks Release OPS4.2.3

Required Equipment and Tools

The following equipment and tools are required for this upgrade:• Front inlet fan tray holder• Front inlet fan module• Air filter1

• Large straight slot screwdriver or 5/16-inch hex socket• Two technicians (to decrease the replacement time, have one in front and one in

back of the rack)• Stepladder (optional)• Electrostatic Discharge (ESD) wrist strap

FIFT Upgrade Instructions

Follow these FIFT upgrade instructions:

1 Front inlet fan tray air filters are available in 63% arrestance at 300 feet per minute (91.4 meters per minute) and 80% arrestance at 300 feet per minute (91.4 meters per minute) depending on your installation requirements.

Table 8-14 Front Inlet Fan Tray Holder Upgrade Instructions

Step Instructions

1 Check the New Fan Module, page 8-35 to ensure proper power up.

2 Power down the existing fan.

3 Is there an air ramp below the existing fan tray?• Yes. Remove it.• No. Go to the next step.

4 To avoid contamination to the equipment, carefully pull the air filter from the fan tray holder.

5 Remove the existing fan tray module.

6 Remove the power cable from the rear of the fan tray holder.

7 Remove the fan tray holder.

8 Install the new FIFT (including the fan module and air filter). Refer to the Traverse Installation and Commissioning Guide, Section 7—Hardware Installation Procedures, Chapter 2—“Traverse System Hardware Installation,” Install the Front Inlet Fan Tray Holder, page 7-11.

9 The Front Inlet Fan Tray Holder Upgrade Instructions are complete.

Page 449: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Chapter 2 Upgrade to a Traverse Front Inlet Fan TrayCheck the New Fan Module

Release OPS4.2.3 Force10 Networks Page 8-35

Check the New Fan Module

Check the new FIFT fan module as follows:

Table 8-15 New Fan Module Check

Step Procedure

1 From the rear of the existing fan tray module, loosen the two thumbscrews on the power cable cover (located on the left-hand side).

Figure 8-21 Existing Fan Tray Holder Back Panel

2 Unplug the power cable from the existing fan tray module.

3 Plug the power cable into the new FIFT fan module to verify power up.

4 Unplug the power cable from the new FIFT fan tray module.

5 Plug the power cable back into the existing fan module.

6 Did the new FIFT fan module power up?• Yes. Go to Step 9.• No. Go to Step 7.

7 Tighten the thumbscrews on the existing power cable cover and stop the upgrade procedure.

8 RMA the tested fan module.

9 The New Fan Module Check procedure is complete.

Front

Power Cable Cover

Page 450: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 8: Hardware UpgradesCheck the New Fan Module

Page 8-36 Force10 Networks Release OPS4.2.3

Page 451: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page i

SECTION 9 APPENDICESSECTION 9

Contents

Appendix AModule Placement Planning and Guidelines

Module Placement Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2Traverse 1600 Module Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7Traverse 2000 Card Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-12Traverse 600 Card Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-16

Page 452: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 9 Appendices

Page ii Force10 Networks Release OPS4.2.3

Page 453: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 9-1

SECTION 9SECTION 9APPENDICES

Appendix A Module Placement Planning and Guidelines

Introduction It is important to plan for card placement during installation, cabling, and start-up activities for the Traverse system. The following tables provide card placement guidelines for the Traverse shelf, including:• Valid slot placement for GCM, optical, electrical, and VT/VC switching cards• Equipment protection (1:N, where N=1, 2), working, and protection card

placement• Unprotected card placement

This appendix contains information on the following topics:• Module Placement Guidelines, page 9-2• Traverse 1600 Module Placement, page 9-7• Traverse 2000 Card Placement, page 9-12• Traverse 600 Card Placement, page 9-16

Important: The Traverse system allows the network operator an in-service upgrade capability (protection switching) to replace older cards with newer cards with minimal traffic interruption for each card in any 1:N protection group.

Important: Do not place an electrical card (of another type) in the slot directly to the left of any 10/100BaseTX-inclusive card:• NGE• NGE Plus• EoPDH

Important: To ensure EMI protection and proper cooling, place one-slot wide blank faceplates in any empty Traverse slots. Blank faceplates must be ordered separately.

Page 454: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 9: AppendicesModule Placement Guidelines

Page 9-2 Force10 Networks Release OPS4.2.3

Module Placement Guidelines

The following table lists guidelines for placement of modules in a Traverse shelf:

Table 9-1 Card Placement Guidelines

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

GCM

• GCM• GCM Enhanced• GCM with OC-12/STM-4• GCM with OC-48/STM-16• GCM with VTX• GCM with OC-12/STM-4 plus

VTX/VCX• GCM with OC-48/STM-16 plus

VTX/VCX

GCMA and

GCMB (slots 15 and 16)

GCMA and

GCMB(slots 19 and 20)

GCMA and

GCMB(slots 5 and 6)

Redundant GCMs are recommended for equipment protection. However, if only one GCM is used, it can be placed in either slot GCMA or GCMB.

Redundant GCMs can be different types. See Table 9-2 Redundancy Rules for GCM Types for a list of control cards.

Electrical

• DS1• DS3/E3/EC-1 CC (12-port)• DS3/E3/EC-1 CC (24-port)• DS3/EC-1 Transmux• E1• Universal Transmux (24-port or

48-port) (UTMX-24 or UTMX-48)

1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card.In a 1:1 equipment protection scheme with a 2-slot electrical connector card (ECM), either the left- or right-adjacent card from the protection card is the working card.

In a 1:2 equipment protection scheme, the center card protects the left- and right-adjacent working cards.

In an unprotected scheme, place cards in any valid slot; the 2-slot DS3/E3 ECM provides access to only the right-most card, so place an optical card in the left-most slot. The 3-slot DS3/E3 and 3-slot E1 ECM provides access to only the center and right-most cards, so place an optical card in the left-most slot.

For Optical Transmux card placement, see Optical Transmux in this table.

Optical Transmux

• DS3/EC-1 Transmux 1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card. (SONET network only): The DS3 Transmux card supports 1:N equipment protection for high-density optical transmux applications, where N=1 to 12 in a Traverse 2000. This application has no DS3/E3 ECM requirement. One card protects all remaining adjacent cards.

Page 455: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A Module Placement Planning and GuidelinesModule Placement Guidelines

Release OPS4.2.3 Force10 Networks Page 9-3

• UTMX-24 or UTMX-48 1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card. (SONET network only) The UTMX cards support 1:N equipment protection for high-density optical transmux applications, where N=1 to 4 in a Traverse 2000. This application has no DS3/E3 ECM requirement. One card protects all remaining adjacent cards.

Ethernet (Next Generation)

NGE or NGE Plus:• GbE [LX, SX] plus 10/100BaseTX

Combo [CEP]• GbE TX plus GbE [LX or SX] plus

10/100BaseTX Combo [CEP]

NGE only:• GbE CWDM plus 10/100BaseTX

Combo• GbE SX plus GbE CWDM plus

10/100BaseTX Combo

1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card. In a 1:1 equipment protection scheme with a 2-slot Ethernet Protection ECM, either the left- or right-adjacent card from the protection card is the working card.

In an unprotected scheme, place cards in any valid slot. The 2-slot Ethernet Protection ECM provides access to only the right-most card, so place an optical card in the left-most slot.

Use one of the following options when placing any 10/100BaseTX-inclusive cards in a Traverse shelf with DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards:• Place 10/100BaseTX-inclusive cards

directly to the left of DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards. An OC-N/STM-N card or 1-slot wide blank faceplate1 is not required if the 10/100BaseTX-inclusive cards are placed to the left of electrical interface cards.or

• Place an OC-N/STM-N card or a 1-slot wide blank faceplate1 between the 10/100BaseTX and an electrical interface card if the 10/100BaseTX-inclusive card is placed to the right of the electrical interface card.

Ethernet (Dual Slot GbE)

Table 9-1 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Page 456: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 9: AppendicesModule Placement Guidelines

Page 9-4 Force10 Networks Release OPS4.2.3

• 10GBASE-LR 1–14 1–18 n/a None

• 10-port GbE card, no optics 1–12 1–16 Requires an SFP connector card. See the Traverse Installation and Commissioning Guide, Section 2—Network Interface Specifications, Chapter 1—“Fiber Optic Interface Cabling Specifications,” GbE-10 SCM, Fiber Assignments, and SFPs, page 2-4.

In a 1:1 equipment protection scheme, the working and protect cards are placed in slots adjacent to each other. The protection card must be on the left; the working card on the right.

Ethernet over PDH (EoPDH)

• GbE [LX, SX] plus 10/100BaseTX Combo [CEP/EoPDH]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP/EoPDH]

1–12 1–16 1–4 Important: Do not place an electrical card (of another type) to the left of any 10/100BaseTX-inclusive card.In a 1:1 equipment protection scheme with a 2-slot Ethernet Protection ECM, either the left- or right-adjacent card from the protection card is the working card.

In an unprotected scheme, place cards in any valid slot. The 2-slot Ethernet Protection ECM provides access to only the right-most card, so place an optical card in the left-most slot.

Use one of the following options when placing any 10/100BaseTX-inclusive cards in a Traverse shelf with DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards:• Place 10/100BaseTX-inclusive cards

directly to the left of DS1, DS3/E3/EC-1 CC, DS3/EC-1 Transmux, or E1 cards. An OC-N/STM-N card or 1-slot wide blank faceplate1 is not required if the 10/100BaseTX-inclusive cards are placed to the left of electrical interface cards.or

• Place an OC-N/STM-N card or a 1-slot wide blank faceplate1 between the 10/100BaseTX and an electrical interface card if the 10/100BaseTX-inclusive card is placed to the right of the electrical interface card.

Table 9-1 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Page 457: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A Module Placement Planning and GuidelinesModule Placement Guidelines

Release OPS4.2.3 Force10 Networks Page 9-5

Force10 recommends the following card placement scheme:• Place DS1, DS3, E3, EC-1 CC, DS3/EC-1 Transmux, or E1, and 10/100BaseTX

(see Important note above for 10/100BaseTX placement) cards in the left-most slots beginning with slots 1 and 2. Work towards the center of the shelf as required (up to Traverse 1600 slot 12 or Traverse 2000 slot 16).

SONET/SDH

• OC-3/STM-1• OC-12/STM-4• OC-48/STM-16

1–14 1–18 1-4 None

• OC-192/STM-64 1/2, 3/4, 5/6, 7/8,

9/10, 11/12, and

13/14

1/2, 3/4, 5/6, 7/8,

9/10, 11/12, 13/14, 15/16,

and 17/18

n/a The OC-192/STM-64 cards require two slots for placement. The left side of the OC-192/STM-64 card is placed in an odd numbered slot.

VT/TU Switching

VT/TU 5G Switch 1–14 1–18 1-4 The VT/TU 5G Switch card supports 1:N equipment protection where:• N=1 to 9 in a Traverse 2000

(SONET network only)• N=1 (SDH network only)

This card has no ECM requirement. One card protects all adjacent cards.

1 Blank faceplates must be ordered separately.

Table 9-1 Card Placement Guidelines (continued)

Card TypeTraverse

1600 Slot #s

Traverse 2000

Slot #s

Traverse 600

Slot #s

Comments(Front-shelf Perspective)

Important: For electrical port usage only, place an OC-N/STM-N or 1-slot blank faceplate1 between any 10/100BaseTX-inclusive card and an electrical card (of another type), if the 10/100BaseTX-inclusive card is placed to the right of an electrical interface card. A blank faceplate or OC-N/STM-N card is not required if the 10/100BaseTX-inclusive card is placed to the left of an electrical interface card.

If the 10/100BaseTX-inclusive card also contains optical ports, and if the user intends to ONLY use the optical ports, this electrical port usage restriction does not apply.

Important: To ensure EMI protection and proper cooling, place one-slot wide blank faceplates in any empty Traverse slots.

Page 458: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and Maintenance Guide, Section 9: AppendicesModule Placement Guidelines

Page 9-6 Force10 Networks Release OPS4.2.3

• Place VT/TU 5G Switch cards next to the GCM cards. Place additional cards toward the center of the shelf as required.

• Place OC-N/STM-N and GbE cards (optical cards) beginning in the right-most available slot (starting at Traverse 1600 slot 14 or Traverse 2000 slot 18). Place additional cards towards the center of the shelf as required.

The following table lists the redundancy rules for all GCM types:

Table 9-2 Redundancy Rules for GCM Types

Active GCM Standby GCM

GCM GCM

GCM GCM Enhanced | Universal1

1 GCM Enhanced or Universal environmental alarm function should not be used in this combination.

GCM Enhanced | Universal1 GCM

GCM Enhanced | Universal GCM Enhanced | Universal

GCM with OC-N/STM-N GCM with OC-N/STM-N

Page 459: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 1600 M

odule Placement

Page 9-7Force10 N

etworks

Release O

PS4.2.3

Traverse 1600 Module Placement

The following table provides card placement guidelines for the Traverse 1600 shelf.

Legend: Gray Fill=valid slot for card, No Fill=invalid card slot, Standby or Active (S/A), Protecting (P), Working (W), Open (O).

Important: For standard electrical connector card (ECM) placement, the 2-slot ECMs plug into slot n of an n and n+1 slot combination. The 3-slot ECMs plug into slot n+1 of an n, n+1, and n+2 slot combination. For example, in a Traverse 1600 slot 11 and 12 combination, the 2-slot ECM plugs into the slot 11 backplane connectors. Some ECMs require specific placement, see the Traverse Installation and Commissioning Guide, Section 2—Network Interface Specifications, Chapter 3—“ECM Interface Specifications” for ECM slot placement details.

Important: For standard 10-port GbE card SFP connector card (SCM) placement, the 2-slot SCMs plug into slot n+1 of an n and n+1 slot combination. For example, in a Traverse 1600 slot 11 and 12 combination, the 2-slot SCM plugs into the slot 12 backplane connectors.

Table 9-3 Traverse 1600 Card Placement Guidelines

Card TypeTraverse 1600 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

GCM S/A S/A

• GCM

• Enhanced GCM1

• GCM OC-12/STM-41

• GCM OC-48/STM-161

OPTICAL (Note: Optical cards are protected at the port level. There are no slot or card placement restrictions for optical working/protection.)

• OC-3/STM-1• OC-12/STM-4• OC-48/STM-16

W W W W W W W W W W W W W W

• OC-192/STM-64 Slots 1/2 Slots 3/4 Slots 5/6 Slots 7/8 Slots 9/10 Slots 11/12 Slots 13/14

ETHERNET (Dual slot)

Page 460: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 1600 M

odule Placement

Page 9-8Force10 N

etworks

Release O

PS4.2.3

• 1-port 10GbE• 10-port GbE

Slots 1/2P

Slots 3/4W/P

Slots 5/6W/P

Slots 7/8W/P

Slots 9/10W/P

Slots 11/12W/P

Slots 13/14W

ETHERNET (Single slot) 1:1 equipment protection with a 2-slot Ethernet Protection ECM

(Note: The Ethernet Combo cards have both optical ports and electrical ports. The card placement restriction is due to the electrical ports.)

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus

10/100BaseTX Combo [CEP\[EoPDH]]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP\[EoPDH]]

NGE only:• GbE CWDM plus

10/100BaseTX Combo• GbE SX plus GbE CWDM

plus 10/100BaseTX Combo

P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W

ETHERNET (Single slot) unprotected with a 2-slot 10/100BaseT ECM

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus

10/100BaseTX Combo [CEP\[EoPDH]]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP\[EoPDH]]

NGE only:• GbE CWDM plus

10/100BaseTX Combo• GbE SX plus GbE CWDM

plus 10/100BaseTX Combo

W W W W W W W W W W W W

ETHERNET (Single slot) unprotected with a 2-slot Ethernet (Protection) ECM

Table 9-3 Traverse 1600 Card Placement Guidelines (continued)

Card TypeTraverse 1600 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Page 461: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A

Module P

lacement P

lanning and Guidelines

Traverse 1600 Module Placem

ent

Release O

PS4.2.3Force10 N

etworks

Page 9-9

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus

10/100BaseTX Combo [CEP\[EoPDH]]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP\[EoPDH]]

NGE only:• GbE CWDM plus

10/100BaseTX Combo• GbE SX plus GbE CWDM

plus 10/100BaseTX Combo

O W/O W/O W/O W/O W/O W/O W/O W/O W/O W/O W

TDM 1:2 equipment protection with the corresponding ECM

• DS1 • DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W

TDM 1:1 equipment protection with a 2-slot ECM

• DS1 • DS3/E3/EC-1 CC • DS3/EC-1 Transmux • E1

W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P

TDM 1:1 equipment protection with a 3-slot ECM

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O W/P/O

TDM unprotected with the corresponding ECM

Table 9-3 Traverse 1600 Card Placement Guidelines (continued)

Card TypeTraverse 1600 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Page 462: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 1600 M

odule Placement

Page 9-10Force10 N

etworks

Release O

PS4.2.3

• DS1 • E1

W W W W W W W W W W W W

TDM unprotected with a 2-slot DS3/E3 ECM (Note: The card placement restriction is due to the electrical connector card.)

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux

O W/O W/O W/O W/O W/O W/O W/O W/O W/O W/O W

TDM unprotected with a 3-slot DS3/E3 ECM (Note: The card placement restriction is due to the electrical connector card.)

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux

O W/O W/O W/O W/O W/O W/O W/O W/O W/O W W

VT/VC Switching 1:N equipment protection (Note: No ECM requirement with VT/VC switching cards.)

VT/TU 5G Switch W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P

GCM with optics plus VTX2 W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P W/P

VT/VC Switching unprotected

VT/TU 5G Switch W W W W W W W W W W W W W W

GCM with optics plus VTX2 W W W W W W W W W W W W W W

1 Redundant GCMs can be different types; e.g., a GCM with integrated optics (OC-12/STM-4 and OC-48/STM-16) placed with an Enhanced GCM for GCM redundancy.

2 While the VTX can be in a 1:1 or unprotected group, the related OC-N/STM-N facilities can be unprotected or in a 1+1 APS/MSP, UPSR/SNCP, or BLSR/MS-SPRing protection group.

Important: For electrical port usage only, place an OC-N/STM-N or 1-slot blank faceplate between any 10/100BaseTX-inclusive card and an electrical card (of another type), if the 10/100BaseTX-inclusive card is placed to the right of an electrical interface card. A blank faceplate or OC-N/STM-N card is not required if the 10/100BaseTX-inclusive card is placed to the left of an electrical card.

If the 10/100BaseTX-inclusive card also contains optical ports, and if the user intends to ONLY use the optical ports, this electrical port usage restriction does not apply.

Table 9-3 Traverse 1600 Card Placement Guidelines (continued)

Card TypeTraverse 1600 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Page 463: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A

Module P

lacement P

lanning and Guidelines

Traverse 1600 Module Placem

ent

Release O

PS4.2.3Force10 N

etworks

Page 9-11

Important: Place 1-slot wide blank faceplates in empty slots to ensure EMI protection and proper cooling. Blank faceplates must be ordered separately.

Page 464: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 2000 C

ard Placement

Page 9-12Force10 N

etworks

Release O

PS4.2.3

Traverse 2000 Card Placement

The following table provides card placement guidelines for the Traverse 2000 shelf.

Legend: Gray Fill=valid slot for card, No Fill=invalid card slot, Standby or Active (S/A), Protecting (P), Working (W), Open (O).

Important: For standard electrical connector card (ECM) placement, the 2-slot ECMs plug into slot n of an n and n+1 slot combination. The 3-slot ECMs plug into slot n+1 of an n, n+1, and n+2 slot combination. For example, in a Traverse 1600 slot 11 and 12 combination, the 2-slot ECM plugs into the slot 11 backplane connectors. Some ECMs require specific placement, see the Traverse Installation and Commissioning Guide, Section 2—Network Interface Specifications, Chapter 3—“ECM Interface Specifications,” page 2-15 for ECM slot placement details.

Important: For standard 10-port GbE card SFP connector card (SCM) placement, the 2-slot SCMs plug into slot n+1 of an n and n+1 slot combination. For example, in a Traverse 1600 slot 11 and 12 combination, the 2-slot SCM plugs into the slot 12 backplane connectors.

Table 9-4 Traverse 2000 Card Placement Guidelines

Card TypeTraverse 2000 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

GCM S/A S/A

GCM

Enhanced GCM1

GCM OC-12/STM-41

GCM OC-48/STM-161

OPTICAL (Note: Optical cards are protected at the port level. There are no slot or card placement restrictions for optical working/protection.)

• OC-3/STM-1• OC-12/STM-4• OC-48/STM-16

W W W W W W W W W W W W W W W W W W

OC-192/STM-64 Slots 1/2 Slots 3/4 Slots 5/6 Slots 7/8 Slots 9/10 Slots 11/12 Slots 13/14 Slots 15/16 Slots 17/18

ETHERNET (Dual slot)

• 1-port 10GbE Slots 1/2P

Slots 3/4W/P

Slots 5/6W/P

Slots 7/8W/P

Slots 9/10W/P

Slots 11/12W/P

Slots 13/14W/P

Slots 15/16W/P

Slots 17/18W

Page 465: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A

Module P

lacement P

lanning and Guidelines

Traverse 2000 Card Placem

ent

Release O

PS4.2.3Force10 N

etworks

Page 9-13

• 10-port GbE P W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W W/P

W/P

W/P

W

ETHERNET unprotected with a 2-slot 10/100BaseT ECM

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus

10/100BaseTX Combo [CEP\[EoPDH]]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP\[EoPDH]]

NGE only:• GbE CWDM plus

10/100BaseTX Combo• GbE SX plus GbE CWDM

plus 10/100BaseTX Combo

W W W W W W W W W W W W W W W W

ETHERNET unprotected with a 2-slot Ethernet (Protection) ECM

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus

10/100BaseTX Combo [CEP\[EoPDH]]

• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo [CEP\[EoPDH]]

NGE only:• GbE CWDM plus

10/100BaseTX Combo• GbE SX plus GbE CWDM

plus 10/100BaseTX Combo

O W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W

TDM 1:2 equipment protection with corresponding ECM

Table 9-4 Traverse 2000 Card Placement Guidelines (continued)

Card TypeTraverse 2000 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Page 466: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 2000 C

ard Placement

Page 9-14Force10 N

etworks

Release O

PS4.2.3

• DS1 • DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W

TDM 1:1 equipment protection with a 2-slot ECM

• DS1 • DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

TDM 1:1 equipment protection with a 3-slot ECM

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

W/P/O

TDM unprotected with the corresponding ECM

• DS1 • E1

W W W W W W W W W W W W W W W W

TDM unprotected with a 2-slot DS3/E3 ECM (Note: The card placement restriction is due to the electrical connector card.)

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux

O W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W

TDM unprotected with a 3-slot DS3/E3 ECM (Note: The card placement restriction is due to the electrical connector card.)

• DS3/E3/EC-1 CC• DS3/EC-1 Transmux

O W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W/O

W W

VT/VC Switching with 1:N equipment protection (Note: No ECM requirement with VT/VC switching cards.)

Table 9-4 Traverse 2000 Card Placement Guidelines (continued)

Card TypeTraverse 2000 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Page 467: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A

Module P

lacement P

lanning and Guidelines

Traverse 2000 Card Placem

ent

Release O

PS4.2.3Force10 N

etworks

Page 9-15

VT/TU 5G Switch with 1:1 Equipment Protection

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

GCM with optics plus VTX2 W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

W/P

VT/VC Switching unprotected

VT/TU 5G Switch without Equipment Protection

W W W W W W W W W W W W W W W W W W

GCM with optics plus VTX2 W W W W W W W W W W W W W W W W W W

1 Redundant GCMs can be different types; e.g., a GCM with integrated optics (OC-12/STM-4 and OC-48/STM-16) placed with an Enhanced GCM for GCM redundancy.

2 While the VTX can be in a 1:1 or unprotected protection group, the related OC-48/STM-16 facilities can be unprotected or in a 1+1 APS/MSP, UPSR/SNCP, or BLSR/MS-SPRing protection group.

Table 9-4 Traverse 2000 Card Placement Guidelines (continued)

Card TypeTraverse 2000 Slot Numbers

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Important: For electrical port usage only, place an OC-N/STM-N or 1-slot blank faceplate between any 10/100BaseTX-inclusive card and an electrical card (of another type), if the 10/100BaseTX-inclusive card is placed to the right of an electrical interface card. A blank faceplate or OC-N/STM-N card is not required if the 10/100BaseTX-inclusive card is placed to the left of an electrical card.

If the 10/100BaseTX-inclusive card also contains optical ports, and if the user intends to ONLY use the optical ports, this electrical port usage restriction does not apply.

Important: Place 1-slot wide blank faceplates in empty slots to ensure EMI protection and proper cooling. Blank faceplates must be ordered separately.

Page 468: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 600 C

ard Placement

Page 9-16Force10 N

etworks

Release O

PS4.2.3

Traverse 600 Card Placement

The following table provides card placement guidelines for the Traverse 600 shelf.

Legend: Gray Fill=valid slot for card, No Fill=invalid card slot, Standby or Active (S/A), Protecting (P), Working (W), Open (O).

Important: For standard electrical connector card (ECM) placement, 2-slot ECMs plug into slot n of an n and n+1 slot combination. The 3-slot ECMs plug into slot n+1 of an n, n+1, and n+2 slot combination. For example, in a Traverse 600 slot 3 and 4 combination, the 2-slot ECM plugs into the slot 3 backplane connectors. Some ECMs require specific placement, see the Traverse Installation and Commissioning Guide, Section 2—Network Interface Specifications for ECM slot placement details.

Table 9-5 Traverse 600 Card Placement Guidelines

Card TypeTraverse 600 Slot Numbers

1 2 3 4 5 6

GCM S/A S/A

• GCM

• Enhanced GCM1

• GCM OC-12/STM-41

• GCM OC-48/STM-161

OPTICAL (Note: Optical cards are protected at the port level. There are no slot or card placement restrictions for optical working/protection.)

• OC-3/STM-1• OC-12/STM-4• OC-48/STM-16

W W W W

• OC-192/STM-64 (Note: Not available on the Traverse 600.)

ETHERNET (Dual slot) (Note: Not available on the Traverse 600.)

ETHERNET (Single slot) 1:1 equipment protection with a 2-slot Ethernet Protection ECM

Page 469: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A

Module P

lacement P

lanning and Guidelines

Traverse 600 Card Placem

ent

Release O

PS4.2.3Force10 N

etworks

Page 9-17

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus 10/100BaseTX Combo

[CEP\[EoPDH]]• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo

[CEP\[EoPDH]]

NGE only:• GbE CWDM plus 10/100BaseTX Combo• GbE SX plus GbE CWDM plus 10/100BaseTX Combo

P W/P W/P W

ETHERNET (Single slot) unprotected with a 2-slot 10/100BaseT ECM

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus 10/100BaseTX Combo

[CEP\[EoPDH]]• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo

[CEP\[EoPDH]]

NGE only:• GbE CWDM plus 10/100BaseTX Combo• GbE SX plus GbE CWDM plus 10/100BaseTX Combo

W W W W

ETHERNET (Single slot) unprotected with a 2-slot Ethernet (Protection) ECM

NGE, NGE Plus, EoPDH:• GbE [LX, SX] plus 10/100BaseTX Combo

[CEP\[EoPDH]]• GbE TX plus GbE [LX or SX] plus 10/100BaseTX Combo

[CEP\[EoPDH]]

NGE only:• GbE CWDM plus 10/100BaseTX Combo• GbE SX plus GbE CWDM plus 10/100BaseTX Combo

O W/O W/O W

Table 9-5 Traverse 600 Card Placement Guidelines (continued)

Card TypeTraverse 600 Slot Numbers

1 2 3 4 5 6

Page 470: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 600 C

ard Placement

Page 9-18Force10 N

etworks

Release O

PS4.2.3

TDM 1:2 equipment protection with the corresponding ECM

• DS1 • DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W W/P W/P W

TDM 1:1 equipment protection with a 2-slot ECM

• DS1 • DS3/E3/EC-1 CC • DS3/EC-1 Transmux• E1

W/P W/P W/P W/P

TDM 1:1 equipment protection with a 3-slot ECM

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux

W/P/O W/P/O W/P/O W/P/O

TDM unprotected with the corresponding ECM

• DS1 • E1

W W W W

TDM unprotected with a 2-slot DS3/E3 ECM (Note: The card placement restriction is due to the electrical connector card.)

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux

O W/O W/O W

TDM unprotected with a 3-slot DS3/E3 ECM (Note: the card placement restriction is due to the electrical connector card.)

• DS3/E3/EC-1 CC • DS3/EC-1 Transmux

O W/O W W

VT/VC Switching with 1:N Equipment Protection (Note: No ECM requirement with VT/VC switching cards.)

VT/TU 5G Switch W/P W/P W/P W/P

OC-48/STM-16 with VTX2 W/P W/P W/P W/P

Table 9-5 Traverse 600 Card Placement Guidelines (continued)

Card TypeTraverse 600 Slot Numbers

1 2 3 4 5 6

Page 471: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Appendix A

Module P

lacement P

lanning and Guidelines

Traverse 600 Card Placem

ent

Release O

PS4.2.3Force10 N

etworks

Page 9-19

VT/VC Switching without Equipment Protection

VT/TU 5G Switch W W W W

OC-48/STM-16 with VTX W W W W

1 Redundant GCMs can be different types; e.g., a GCM with integrated optics (OC-12/STM-4 and OC-48/STM-16) placed with an Enhanced GCM for GCM redundancy.

2 While the VTX Switch can be in a 1:1 or unprotected protection group, the related OC-48/STM-16 facilities can be unprotected or in a 1+1 APS/MSP, UPSR/SNCP, or BLSR/MS-SPRing protection group.

Important: For electrical port usage only, place an OC-N/STM-N or 1-slot blank faceplate between any 10/100BaseTX-inclusive card and an electrical card (of another type), if the 10/100BaseTX-inclusive card is placed to the right of an electrical interface card. A blank faceplate or OC-N/STM-N card is not required if the 10/100BaseTX-inclusive card is placed to the left of an electrical card.

If the 10/100BaseTX-inclusive card also contains optical ports. If the user intends to ONLY use the optical ports, this electrical port usage restriction does not apply.

Important: Place 1-slot wide blank faceplates in empty slots to ensure EMI protection and proper cooling. Blank faceplates must be ordered separately.

Table 9-5 Traverse 600 Card Placement Guidelines (continued)

Card TypeTraverse 600 Slot Numbers

1 2 3 4 5 6

Page 472: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Operations and M

aintenance Guide, S

ection9: A

ppendicesTraverse 600 C

ard Placement

Page 9-20Force10 N

etworks

Release O

PS4.2.3

Page 473: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 1

INDEX

Numerics1 for 1 equipment protection

module placement, 9-11 for 2 equipment protection

module placement, 9-11 for N equipment protection

module placement, 9-110/100BaseT

module placementprecaution statement, 8-19

10/100BaseTXmodule placement

precaution statement, 9-1port

performance monitoring, 2-71

AAccess

identifiertest access, 5-2, 5-5

Activatesoftware

protected modules, 7-29unprotected modules, 7-32

status, 7-22time, 7-20, 7-21, 7-23, 7-29, 7-35, 7-43, 7-68, 7-69,

7-70, 7-72type, 7-30

Activationstatus, 7-30, 7-69, 7-70

Activehop, 2-12, 2-14

Administrativestate

card or port, 4-19AID, see Access identifierAir

filtercooling function, 6-2replacement, 6-2

Alarmsavailability status

behavior, 1-13behavior

NSA/SA settings, 1-13categories, 1-2colors, 1-12

defaultseverity levels, 1-33, 4-2

definition, 1-1definitions, 1-12filter, 1-30generate

front inlet fan tray, 8-23, 8-33HP-SQM (port), 1-68list, 1-33

APSMM (port), 1-120APSWTR (MSP) (shelf), 1-134COM (TA200), 1-51COM (te50), 1-51DBCRPT, 1-52DBFAIL, 1-52DBMIS, 1-52DBRED, 1-52DBSIGN, 1-53DCCFAIL, 1-53DOWN, 1-54DQL, 1-54DS1AIS, 1-54DS1LOF, 1-54DS1LOS, 1-55DS1RAI, 1-55DS3AIS, 1-55DS3RAI, 1-55, 1-56DSR, 1-56DTR, 1-57E1AIS, 1-57E1LOMCAS, 1-57E1LOMCRC, 1-57E1RAI, 1-57E3 AIS, 1-57E3 RAI, 1-57EFMFAIL, 1-57ENGINE, 1-58ENGOPRG, 1-58EQCOMM, 1-58EQFRCSW, 1-58EQINV, 1-58, 1-120EQLOCK, 1-58EQMANSW, 1-58EQMIS, 1-59EQPT, 1-59EQRMV, 1-59ERFI-V, 1-59EXER_SWITCH, 1-60EXPLGS, 1-60

Page 474: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 2 Force10 Networks Release OPS4.2.3

EXTA-REF1-ALM, 1-60EXTA-REF2-ALM, 1-60EXTA-REF3-ALM, 1-60EXTA-REF4-ALM, 1-60EXTB-REF1-ALM, 1-61EXTB-REF2-ALM, 1-61EXTB-REF3-ALM, 1-61EXTB-REF4-ALM, 1-61FANCOMM, 1-61FANCOND, 1-61FANFLTR, 1-61FANRMV, 1-61FEP, 1-62FILE_UPLOAD, 1-62FIRDETR, 1-62FIRE, 1-62FLOOD, 1-62FOPR, 1-62FOPT, 1-62FORCE_ONLINE, 1-63FORCED, 1-63FORCED_ON_EAST, 1-64FORCED_ON_PROT, 1-63FORCED_ON_SECT1, 1-63FORCED_ON_SECT2, 1-64FORCED_ON_WEST, 1-64FORCED_ON_WORK, 1-64, 1-124FUSE, 1-64GENFAIL, 1-64GFPLOF, 1-65GIDERR, 1-65GIDM, 1-65H4-LOM, 1-65HIAIR, 1-65HIHUM, 1-65HITEMP, 1-66HIWTR, 1-66HP-BERSD, 1-67HP-BERSF, 1-67HP-LOM, 1-67HP-MND, 1-68HP-PLM, 1-68HP-RDI, 1-68HP-RFI, 1-68HP-RFICON, 1-68HP-RFIPAY, 1-69HP-RFISVR, 1-69HP-SQM, 1-68HP-TIM, 1-69HP-UNEQ, 1-69HWFAULT, 1-69IDLE, 1-69INCOMPATSW, 1-70

INDICATION, 1-70INTRUDER, 1-70KBYTE, 1-70LBC, 1-72LBCNRML, 1-72LCAS-INACTIVE, 1-72LCAS-REM, 1-72LCAS-RES, 1-72LEAK, 1-72LFD, 1-73LINKFAIL, 1-73LNKBCPTY, 1-73LNKBLKCNT, 1-73LOA, 1-75LOCK_WORK1, 1-75LOCK_WORK10, 1-75LOCK_WORK11, 1-76LOCK_WORK12, 1-76LOCK_WORK13, 1-76LOCK_WORK14, 1-76LOCK_WORK2, 1-76LOCK_WORK3, 1-76LOCK_WORK4, 1-77LOCK_WORK5, 1-77LOCK_WORK6, 1-77LOCK_WORK7, 1-77LOCK_WORK8, 1-77LOCK_WORK9, 1-77LOCKOUT, 1-75LOCKOUT-LPS, 1-75LOF, 1-78LOG, 1-79LOGINFAIL, 1-79LOGINSUCC, 1-79LOGINTERM, 1-79LOL, 1-79LO-LBC, 1-74LOM, 1-79LOM-P, 1-79LOM-V, 1-80LO-OPR, 1-74LO-OPT, 1-74LOP- VT, 1-81LOP-P, 1-80LOP-VC, 1-81LOS, 1-82LO-TEMP, 1-75LO-VCC, 1-75LP-BERSD, 1-82LP-BERSF, 1-83LPBKEQPT, 1-83LPBKFACILITY, 1-83LPBKINBAND, 1-84

Page 475: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 3

LPBKTERM, 1-84LP-LOM, 1-84LP-MND, 1-84LP-PLM, 1-84LP-RDI, 1-85LP-RFI, 1-85LP-RFICON, 1-85LP-RFIPAY, 1-85LP-RFISVR, 1-85LP-SQM, 1-86LP-TIM, 1-86LP-UNEQ, 1-86LSDBOVFL, 1-86LSM, 1-86LWBATVG, 1-86LWFUEL, 1-86LWHUM, 1-86LWPRES, 1-86LWTEMP, 1-86LWWTR, 1-86MAN_ON_PROT, 1-87MAN_ON_WORK, 1-87MAN-TX-OFF, 1-87MAN-TX-ON, 1-87MANUAL, 1-87MAXAGE, 1-87MBD-P, 1-87MISC, 1-87MND (EoPDH), 1-87MND-V, 1-88MPU_BATTERY_A, 1-88MPU_BATTERY_B, 1-88MS-AIS, 1-88MS-BERSD, 1-89MS-BERSF, 1-89MS-RDI, 1-90MSSP_NOT_SYNC, 1-90MSSP_SYNC_UNKNOWN, 1-90MULT_PRIMARY_SERVER, 1-90NEIGHSC, 1-90NETSYNC, 1-90NEWLSA, 1-90NO_OUTPUT, 1-90NO_PRIMARY_SERVER, 1-90NODEEQMIS, 1-91NODEMIS, 1-91NODESYNC, 1-91NO-REMOTE-LCAS, 1-91NPM, 1-91OPENDR, 1-92OPR, 1-92OPT, 1-92OPTNORM, 1-92

ORPNORM, 1-92OVERTEMP, 1-92OVERVOLTAGE_A, 1-93OVERVOLTAGE_B, 1-93PCASQLCH, 1-93PDI-n, 1-93PKTRETX, 1-94PLC, 1-94PLCPLOF, 1-94PLCPRFI, 1-94PLCR, 1-94PLCT, 1-94PLINESQL, 1-94PLM, 1-95PLM-P, 1-95PLM-V, 1-95PLM-VC, 1-95PMCFG, 1-96PMDATALOST, 1-96POWER, 1-96PS, 1-96PUMPFAIL, 1-96PWFAIL-A, 1-96PWFAIL-B, 1-96PWR-48, 1-96QEFAIL, 1-96RAI, 1-97RECTFAIL, 1-97RECTHIGH, 1-97RECTLOW, 1-97REMOTE-LINKFAIL, 1-97RESOURCE_MISMATCH, 1-97RFICON, 1-100RFICON-V, 1-100RFICON-VC, 1-100RFI-L, 1-98RFI-P, 1-98RFIPAY, 1-101RFIPAY-V, 1-101RFIPAY-VC, 1-101RFISVR, 1-102RFISVR-V, 1-102RFISVR-VC, 1-102RFI-V, 1-99RFI-VC, 1-99RLSD, 1-103RMLF, 1-97RS-TIM, 1-103RTS, 1-103SENSORFAIL, 1-103SERVER_LOGINFAIL, 1-103SERVER_ROLE, 1-103SETOPER, 1-103

Page 476: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 4 Force10 Networks Release OPS4.2.3

SFO, 1-104SFPMIS, 1-104SFPRMV, 1-104SHELFMIS, 1-104SMOKE, 1-104SQLCHTBL, 1-105SQM, 1-105SQM-P, 1-105SQM-V, 1-105SSF, 1-105SVC_ERROR, 1-106SW_UPG, 1-107SW_UPG_PROG, 1-107SWCRPT, 1-106SWERR, 1-106SWITCH, 1-106, 1-107SWITCH_TO_PROT, 1-106SWITCH_TO_SECT1, 1-106SWITCH_TO_SECT2, 1-107SWMIS, 1-107SYNCFAIL, 1-107SYSREF, 1-107SYSREF_EVENT, 1-107T2OOF, 1-118, 1-119T2XBIT, 1-118TA200_CLOCK, 1-118TA200_PM13E_G747FESmry, 1-118TA200_PM13E_G747OOFSmry, 1-118TCA, 1-108TE-206, 1-119TEMP, 1-108TEMPCRIT, 1-108TEMPWARN, 1-108TIM, 1-108TIMEDOUT, 1-109TIMEOUTWARN, 1-110TIM-P, 1-109TIM-S, 1-109TIM-V, 1-109TIU-V, 1-109, 1-110TLC, 1-110TLCR, 1-110TLCT, 1-110TOOMANYEVENTS, 1-110TOPOMIS, 1-110TOXIC, 1-110TSSALM, 1-114TSS-EXTA-OOB-A, 1-111TSS-EXTA-OOB-B, 1-111TSS-EXTB-OOB-A, 1-111TSS-EXTB-OOB-B, 1-111TSS-FRC, 1-111TSS-FREERUN-GCMA, 1-111

TSS-FREERUN-GCMB, 1-111TSSGEN, 1-114TSS-HOLDOVER-GCMA, 1-111TSS-HOLDOVER-GCMB, 1-111TSS-LINE1-OOB-GCMA, 1-112TSS-LINE1-OOB-GCMB, 1-112TSS-LINE2-OOB-GCMA, 1-112TSS-LINE2-OOB-GCMB, 1-112TSS-LINE3-OOB-GCMA, 1-112TSS-LINE3-OOB-GCMB, 1-112TSS-LINE4-OOB-GCMB, 1-112TSS-LOCK, 1-112TSS-MAN, 1-113TSSREF, 1-114TSS-REF1-ALM, 1-113TSS-REF2-ALM, 1-113TSS-REF3-ALM, 1-113TSS-REF4-ALM, 1-113TSS-REFL-GCMA, 1-113TSS-REFL-GCMB, 1-113TSS-REFS, 1-113TSSSETS, 1-114TSS-SSM, 1-113TU-AIS, 1-114TU-AIS (optical port), 1-37TU-LOP, 1-114TX-OFF-LI, 1-114TX-ON-LI, 1-114UNDERVOLTAGE_A, 1-115UNDERVOLTAGE_B, 1-115UNEQ, 1-115UNEQ-P, 1-115UNEQ-V, 1-116UNEQ-VC, 1-116UP, 1-116VCC, 1-116VENTFAIL, 1-116WARMREBOOT, 1-116WLMIS, 1-116X86_ABORT, 1-117X86_CRC, 1-117XPT-FAIL-RX, 1-117XPT-FAIL-TX, 1-117XPTRX, 1-117XPTTX, 1-117

managementcustomization, 1-15

profilecreation, 1-17DS1 port, 1-18DS3 port, 1-18DS3⁄EC3 port, 1-18E1 port, 1-18

Page 477: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 5

E3 port, 1-18EOP ctp, 1-18EOP port, 1-18EOS ctp, 1-18EOS port, 1-18GbE port, 1-18LAG, 1-18Mux, 1-18probable cause, 1-16SDH EOS ctp, 1-18SDH EOS port, 1-18SDH high order path, 1-18SDH low order path, 1-18SDH port, 1-18server, 1-18shelf, 1-18SONET port, 1-18SONET sts, 1-18SONET vt, 1-18synchronize, 1-19TE50, 1-18

recommended actions, 1-33reporting, 1-2

hierarchy, 1-13settings, 1-10severity

default levels, 1-1sort by, 1-30

software upgradeSWMIS, 7-28

StickyMode, 1-31suppress

service CTP automatically, 1-24types, 1-2view, 1-13viewing, 1-28

Automatic in Serviceservice CTP path alarms

overview, 1-24Availability status

alarmdegrade, 1-13

BBackground

block errorsLO VC3 path, 2-50LO VC3 path, far end, 2-52SDH port–MS, 2-55SDH port–MS, far end, 2-56SDH port–RS, 2-53VC11 path, 2-59VC11 path, far end, 2-60

VC12 path, 2-59VC12 path, far end, 2-60VC3 path, 2-50VC3 path, far end, 2-52VC4 path, 2-50VC4 path, far end, 2-52

BackupsTE-206

manage from GUI, 6-30TE-206 nodes, 6-26

Backward compatibilitysoftware, 7-5, 7-55, 8-2

Base path, 7-11, 7-60Bulk service activation

unavailable resources, 1-140

CCapacity monitoring

intervals, 2-16parameters

SONET, 2-41print data, 2-16refresh values, 2-16samples, 2-16save data, 2-16SDH section parameters, 2-61SONET section, 2-41threshold crossing alert

number generated, 2-4VT/TU data

viewing, 2-16Captive fasteners

PDAP-2S, 6-13PDAP-4S, 6-19

Cardadministrative state, 4-19equipped state, 4-19GCM list, 8-14, 9-6operational state, 4-19optic, 8-12, 9-5placement

planning guidelines, 9-1protection

DS3/EC-1, 8-10, 9-2electrical, 8-9, 9-2Ethernet, 8-11, 9-3GCM, 8-9, 9-2UTMX, 8-10, 9-3

Circuit breakerPDAP-2S

replacing, 6-10toggle switch, 6-11

Cleaning MPX connectors, 8-15

Page 478: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 6 Force10 Networks Release OPS4.2.3

Clearactivation time, 7-23, 7-70

CLIcommands

conventions, 6-24exec node database backup, 6-25exec node database restore, 6-25node, 6-23

Coding violationsDS1 port, 2-22line layer, far-end

EC1 port, 2-29SONET line layer, 2-32SONET line layer, far end, 2-33SONET path, 2-36SONET path, far end, 2-37SONET section layer, 2-31SONET VT path, 2-39SONET VT path, far end, 2-40

Colorsalarm

, 1-12Compatibility

alarms, 7-5, 7-55, 8-2product matrix, 7-5, 7-55, 8-2replacement modules, 7-5, 7-55, 8-2software, 7-5, 7-55, 8-2software version, 7-5, 7-55, 8-2

Connectors, cleaning, 8-15Corrected bits by forward error correction

SONET section layer, 2-31Corrected bytes by forward error correction

SONET section layer, 2-32Counter

resetting, see Performance monitoringCreate

alarm profiles, 1-17Current

SW version, 7-22, 7-23, 7-70, 7-71CVFE

coding violations, far end–line, 2-29

DDefault

alarm and event severity levels, 1-1, 1-33severities

alarms, 4-2DFAD, see Dual facility access digroupDiagnostics

alarm cut-off, 4-21environmental alarm conditions, 4-1LED lamp test, 4-21loopback tests, 4-11

power on self test, 4-21transmit and receive signal levels, 4-3, 4-7

Downloadarchive

from Force10 website, 7-4from Infocenter, 7-54

time by module, 7-13, 7-62DS1

portalarm profile, 1-18performance monitoring, 2-22

port, SDHperformance monitoring parameters, 2-22

DS3port

alarm profile, 1-18performance monitoring, 2-25

DS3/E3/EC-112-port, 8-9, 9-224-port, 8-9, 9-2card placement, 8-9, 9-2

DS3/EC-1Transmux, 8-9, 9-2

DS3⁄EC3port

alarm profile, 1-18Dual facility access digroup

test access point, 5-2

EE1

portalarm profile, 1-18facility loopback, 4-13facility loopback tests, 4-13performance monitoring, 2-44terminal loopback, 4-13

E3port

alarm profile, 1-18facility loopback, 4-13

tests, 4-13performance monitoring, 2-47terminal loopback, 4-13

EAM, see Environmental Alarm ModuleEC1

portperformance monitoring, 2-28

Electrostatic dischargeprotection, 8-4

EMSservice error codes, 1-137, 1-139

Page 479: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 7

software compatibility, 8-2Endpoint

servicesCTP alarm suppression, 1-24

Environmentalalarm module

guides, 6-21plastic standoffreplacing, 6-20

alarmsobserving incorrect conditions, 4-1symptom, incorrect input/output, 4-2

EOPalarm profile

ctp, 1-18port, 1-18

EOSctp

alarm profile, 1-18performance monitoring

GFP FCS DISCARDS, 2-77, 2-79RX BROADCAST, 2-77, 2-78RX BYTES, 2-77, 2-78, 2-79RX FRAMES, 2-77, 2-78RX MTU DISCARDS, 2-77, 2-79RX MULTICAST, 2-76, 2-78RX UNICAST, 2-76, 2-78TX BROADCAST, 2-76, 2-78TX BYTES, 2-76, 2-78TX DISCARDS, 2-76, 2-77, 2-78, 2-79TX FRAMES, 2-76, 2-78TX UNICAST, 2-76, 2-78

portalarm profile, 1-18

Equipment protectionmodule placement

1 for 1, 9-11 for 2, 9-11 for N, 9-1

Equipped statecard or port, 4-19

Error codesEMS, 1-137service

EMS, 1-139Errored blocks

LO VC3 path, 2-49LO VC3 path, far end, 2-52SDH port–MS, 2-54SDH port–MS, far end, 2-55SDH port–RS, 2-53VC11 path, 2-58VC11 path, far end, 2-60

VC12 path, 2-58VC12 path, far end, 2-60VC3 path, 2-49VC3 path, far end, 2-52VC4 path, 2-49VC4 path, far end, 2-52

Errored secondsline layer, far end

EC1 port, 2-29LO VC3 path, 2-49

far end, 2-52SDH port–MS, 2-54

far end, 2-55SDH port–RS, 2-53SONET line layer, 2-32

far end, 2-33SONET path, 2-36SONET path, far end, 2-37SONET section layer, 2-31SONET VT path, 2-39

far end, 2-40VC11 path, 2-58

far end, 2-60VC12 path, 2-58

far end, 2-60VC3 path, 2-49

far end, 2-52VC4 path, 2-49

far end, 2-52Errors

show last, 1-139ESFE

errored secondsline layer, far end, 2-29

Ethernetdual-slot, 9-7, 9-12, 9-16LEDs, 3-9, 3-10module placement, 9-8performance monitoring

RX, 2-72RX BROADCAST, 2-71RX BYTES, 2-73, 2-74RX DELAY DISCARDS, 2-72RX DISCARDS, 2-72RX FCS ERR, 2-72RX FRAMES, 2-71RX MTU DISCARDS, 2-72RX MULTICAST, 2-71RX PAUSE, 2-73RX PKT > 1518, 2-72RX PKT 1024-1518, 2-72RX PKT 128-255, 2-72RX PKT 256-511, 2-72

Page 480: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 8 Force10 Networks Release OPS4.2.3

RX PKT 512-1023, 2-72RX PKT 64, 2-72RX PKT 65-127, 2-72RX UNICAST, 2-71TX BROADCAST, 2-71TX BYTES, 2-73, 2-74TX DEFERRED FRAMES (10/100 only), 2-73TX DISCARDS, 2-72TX EXCESSIVE COLL (10/00 only), 2-73TX FRAMES, 2-71TX LATE COLL (T10/00 only), 2-73TX MULTICAST, 2-71, 2-76, 2-78TX MULTIPLE COLL (10/100 only), 2-73TX PAUSE, 2-73TX SINGLE COLL (10/100 only), 2-73TX UNICAST, 2-71

performance parameters, 2-63port

terminal loopbacks, 4-14protection ECM, 9-8unprotected with 10⁄100BaseT ECM, 9-8, 9-13, 9-17unprotected with Ethernet (protection) ECM, 9-8, 9-

13, 9-17Event

categories, 1-2default severity levels, 1-33filter

setting, 1-8list

detail view, 1-4grouping, 1-7new window, 1-4refresh, 1-4set filters, 1-4settings, 1-4sorting, 1-4

logserver output, 1-2

logs, 1-2recommended actions, 1-33reporting, 1-2settings, 1-10severity levels

default, 1-1tab

column order, 1-4types, 1-2

Eventsdefinition, 1-1

FFacility

access digroup

test access point, 5-2loopback

DS1, 4-12DS3, 4-12

payload loopbackE1, 4-13E3, 4-13

FAD, see Facility access digroupFailure counts

line layer, far endEC1 port, 2-30

LO VC3 path, 2-50LO VC3 path, far end, 2-52SDH port–MS, 2-55SDH port–MS, far end, 2-56SONET line layer, 2-33SONET line layer, far end, 2-34VC11 path, 2-59VC11 path, far end, 2-60VC12 path, 2-59VC12 path, far end, 2-60VC3 path, 2-50VC3 path, far end, 2-52VC4 path, 2-50VC4 path, far end, 2-52

Fanfan tray and module, 6-1maintenance

air filter, 6-2front inlet fan tray module, 6-1

speeds, 6-2tray

air filters, 6-2tray air filters

replacing, 6-2tray holder

inlet fan LEDs, 3-3tray module

replacing, 8-23, 8-29upgrade to FIFT, 8-33

Faultmanagement

customization, 1-15viewing alarms, 1-28

FCFE see Failure countsFiber optic

cabling, 8-16, 8-17Filter

airrole, 6-2

alarms, 1-30Force switch, 7-27, 7-31

Page 481: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 9

Front inlet trayfan upgrade, 8-33

Fusereplacing

GMT, 6-9PDAP-2S, 6-9, 6-11PDAP-4S, 6-18

GGbE

portalarm profile, 1-18performance monitoring, 2-71

GCMalarm LEDs, 3-7list, 8-14, 9-6module placement, 9-7Power On Self Test (POST), 4-21redundancy rules, 8-14, 9-6status

active/standby, 7-20active⁄standby, 7-68protection, 7-20, 7-68

with VTX/VCX, 8-9, 9-2GFP

FCS DISCARDSEOS port, 2-77, 2-79

GMTfuse block

PDAP-2S, 6-11PDAP-4S, 6-18

replacing fusePDAP-2S, 6-11PDAP-4S, 6-18

GuidesEAM, 6-21PDAP-2S LED module, 6-14PDAP-4S LED module, 6-19

HHierarchy

alarms, 1-13

IInserting modules, 8-4Interval

capacity monitoring, 2-16performance monitoring, 2-10, 2-13

LLast error

show, 1-139LEDs

electrical module port, 3-8Ethernet, 3-9, 3-10fan tray holder

inlet, 3-3GCM

alarm, 3-7power and standby, 8-14

locations, 1-14, 3-4module

status, 3-1optical modules, 3-9PDAP, 3-2PDAP-2S, 3-2PDAP-4S, 3-2power and standby, 3-6statusvisual status

GCM start-up, 3-11Light emitting diodes, see LEDsLine

CVFE (coding violations, far end), 2-29FC (failure counts, far end)SESFE (severely errored seconds, far end), 2-29UASFE (unavailable seconds, far end), 2-30

LO VC3 pathperformance monitoring

BBE-LP, 2-50EB-LP, 2-49ES-LP, 2-49FC-LP, 2-50FE BBE-LP, 2-52FE EB-LP, 2-52FE ES-LP, 2-52FE FC-LP, 2-52FE SES-LP, 2-52FE UAS-LP, 2-52NPJC-DET-LP, 2-51NPJC-GEN-LP, 2-51PPJC-DET-LP, 2-51PPJC-GEN-LP, 2-51SES-LP, 2-50UAS-LP, 2-50

Loopbackfacility

DS1, 4-12DS3, 4-12

optical receiverpower restriction, 4-4

tests, 4-11description, 4-11E1 facility, 4-13

Page 482: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 10 Force10 Networks Release OPS4.2.3

E1 terminal, 4-13E3 facility, 4-13E3 terminal, 4-13Ethernet terminal, 4-14facility

DS1 facility, 4-12DS3 CC, 4-12DS3 TMUX, 4-12DS3/EC-1, 4-12E1, 4-12E3, 4-12EC1, 4-12

SDH facility, 4-16SDH terminal, 4-16SONET facility, 4-16SONET terminal, 4-16terminal

DS1, 4-12DS3, 4-12DS3 CC, 4-12DS3 TMUX, 4-12EC1, 4-12

MMaintenance

alarm boardPDAP-2S, 6-13PDAP-4S, 6-19

fan trayair filter, 6-2air filter replacement, 6-2

fusePDAP-2S, 6-9, 6-11PDAP-4S, 6-18

replace circuit breakerPDAP-2S, 6-10

replacing EAM, 6-20routine, shelf, 6-1TPA fuse

PDAP-4S, 6-16Management

systemevent logs, 1-2login, 7-55verify software version, 7-17, 7-66, 8-3

MeasuredSFP optic port

supply voltage, 2-30, 2-80temperature, 2-30, 2-80TX bias current, 2-30, 2-80TX input power, 2-30, 2-80

TX output power, 2-30, 2-80Modules

GCM list, 8-14, 9-6inserting, 8-4placement

equipment protection, 9-1planning guidelines, 9-1

power and standby LEDs, 3-6replacing, 8-1, 8-33

preparations, 8-6required equipment, 8-4

softwaredownload times, 7-13, 7-62

software version compatibility, 7-5, 7-55, 8-2Monitoring

performance, 2-1signals

types, 2-1VT/TU capacity, 2-1

MPX connectorscleaning, 8-15cleaning material, 7-4, 8-4inspection, 8-15

Multiplex sectionperformance monitoring parameters, 2-54

Muxalarm profile, 1-18

NNegative pointer justifications detected

LO VC3 path, 2-51VC11 path, 2-59VC12 path, 2-59VC3 path, 2-51VC4 path, 2-51

Negative pointer justifications generatedLO VC3 path, 2-51VC11 path, 2-59VC12 path, 2-59VC3 path, 2-51VC4 path, 2-51

Nodeupgrade

see Upgrade

OOC-192

power restriction, 4-4Operational

statecard or port, 4-19

Page 483: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 11

Opticcards, 8-12, 9-5module placement, 9-7

Opticalpower specifications, 4-4

PPassword, 7-12, 7-61Path

overheadview hop, 2-15

PDAP-15Areplace GMT fuse, 6-9

PDAP-2S see Power Distribution and Alarm Panelcaptive fasteners, 6-13circuit breaker, 6-11GMT

fuse block, 6-11LED

module, 6-14LEDs, 3-2replace circuit breaker, 6-10replacing

alarm board, 6-13PDAP-4S

see Power Distribution and Alarm Panelcaptive fasteners, 6-19GMT

fuse block, 6-18LED module guides, 6-19LEDs, 3-2replacing

alarm board, 6-19TPA fuse, 6-16

TPA fuse, 6-17Performance monitoring, 2-1

10/100BaseTX port, 2-71DS1 port, 2-22DS3 port, 2-25E1 port, 2-44E3 port, 2-47EC1 port, 2-28FE BBE_P

E1 port far end, 2-46FE EB_P

E1 port far end, 2-46E3 port near end, 2-48

FE ES_LE1 port far end, 2-44

FE ES_PE1 port far end, 2-46E3 port near end, 2-48

FE FC_PE1 port far end, 2-46

FE SES_PE1 port far end, 2-46E3 port near end, 2-48

FE UAS_PE1 port far end, 2-46E3 port near end, 2-48

GbE port, 2-71intervals, 2-10, 2-13NE AISS_P

E1 port near end, 2-45NE BBE_P

E1 port near end, 2-45NE BBER_P

E1 port near end, 2-45NE CV_L

E1 port near end, 2-44E3 port near end, 2-47

NE EB_PE1 port near end, 2-44, 2-47, 2-48

NE ES_LE1 port near end, 2-44E3 port near end, 2-47

NE ES_PE1 port near end, 2-45E3 port near end, 2-47

NE ESR_PE1 port near end, 2-45

NE FAS_LE1 port near end, 2-44

NE FC_LE1 port near end, 2-44

NE FC_PE3 port near end, 2-48

NE LOSS_LE1 port near end, 2-44E3 port near end, 2-47

NE SES_LE1 port near end, 2-44E3 port near end, 2-47

NE SES_PE1 port near end, 2-45E3 port near end, 2-47

NE SESR_PE1 port near end, 2-45

NE UAS_PE1 port near end, 2-45E3 port near end, 2-48

printing PM data, 2-11, 2-13refreshing PM values, 2-11, 2-13reports

generating, 2-17

Page 484: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 12 Force10 Networks Release OPS4.2.3

resetting PM counterssamples, 2-10, 2-13saving data, 2-11, 2-13SDH path, 2-49, 2-58SDH port, 2-53services

SONET STS, 2-36SONET VT, 2-39

SONET port parameters, 2-31template

synchronize, 2-5templates

restriction, changing on service PM, 2-2, 2-8timing

refresh time, 2-9samples, 2-9

viewing port PM data, 2-10, 2-16viewing service PM data, 2-12, 2-14VT/TU capacity

viewing, 2-16Performance monitoring template

EOP port, 2-78EOP port member, 2-79Ethernet

service port, 2-74Performance parameters

Ethernet, 2-63SDH, 2-43SONET, 2-21

Periodic conditionsmonitoring, 2-1

Plastic standoff, see Environmental Alarm ModulePM

see Performance monitoringPort

administrative state, 4-19equipped state, 4-19operational state, 4-19

Positive pointer justifications detectedLO VC3 path, 2-51VC11 path, 2-59VC12 path, 2-59VC3 path, 2-51VC4 path, 2-51

Positive pointer justifications generatedLO VC3 path, 2-51VC11 path, 2-59VC12 path, 2-59VC3 path, 2-51VC4 path, 2-51

Powerrestriction

optical cards, 4-4

Power and standby LEDs, 3-6Power Distribution and Alarm Panel

alarm boardreplacing, 6-13

LEDs, 3-2replacing

circuit board, 6-19circuit breaker, 6-10TPA fuse, 6-16

Power On Self Test (POST) for GCM, 4-21Problems, see SymptomsProtected modules, 7-29Protection

card, 8-10, 9-3DS3/EC-1, 8-10, 9-2electrical, 8-9, 9-2Ethernet, 8-11, 9-3GCM, 8-9, 9-2

Ethernet, 8-12, 9-4groups, 7-29switch

forced, 7-27release, 7-27

Protection switchforced, 7-31release, 7-31

Protection switch countprotecting

SDH port–MS, 2-57SONET line layer, 2-35

workingSDH port–MS, 2-57SONET line layer, 2-34

Protection switch durationprotecting

SDH port–MS, 2-57SONET line layer, 2-35

workingSDH port–MS, 2-57SONET line layer, 2-34

RRecommended actions

alarms and events, 1-33non-alarmed symptoms, 4-2

Refreshing PM values, 2-11, 2-13Regenerator section

performance monitoringEB-RS, 2-53ES-RS, 2-53SES-RS, 2-53

performance monitoring parameters, 2-53Release path, 7-14, 7-63

Page 485: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 13

Release protection switch, 7-27, 7-31Remote test access, 5-3Replacing

alarm boardPDAP-2S, 6-13PDAP-4S, 6-19

cardsrequired equipment, 7-4

circuit breakerPDAP-2S, 6-10

EAM circuit board, 6-20fan tray module, 8-23, 8-29fuse

PDAP-2S, 6-9, 6-11PDAP-4S, 6-18

GCMpower and standby LEDs, 8-14

modules, 8-1, 8-4, 8-33compatibility, 7-5, 7-55, 8-2required equipment, 7-54, 8-4, 8-34

Reports, see also AlarmsReports, see also EventsResetting counters, see Performance monitoringRTU, see Remote test unitRX

Ethernet port, 2-72RX BROADCAST

EOS port, 2-77, 2-78Ethernet port, 2-71

RX BYTESEOS port, 2-77, 2-78, 2-79Ethernet port, 2-73, 2-74

RX DELAY DISCARDSEthernet port, 2-72

RX DISCARDSEthernet port, 2-72

RX FCS ERREthernet port, 2-72

RX FRAMESEOS port, 2-77, 2-78Ethernet port, 2-71

RX MTU DISCARDSEOS port, 2-77, 2-79Ethernet port, 2-72

RX MULTICASTEOS port, 2-76, 2-78Ethernet port, 2-71

RX PAUSEEthernet port, 2-73

RX PKT > 1518Ethernet port, 2-72

RX PKT 1024-1518Ethernet port, 2-72

RX PKT 128-255Ethernet port, 2-72

RX PKT 256-511Ethernet port, 2-72

RX PKT 512-1023Ethernet port, 2-72

RX PKT 64Ethernet port, 2-72

RX PKT 65-127Ethernet port, 2-72

RX UNICASTEOS port, 2-76, 2-78Ethernet port, 2-71

SSDH

alarm profileHO path, 1-18LO path, 1-18port, 1-18

pathperformance monitoring, 2-49, 2-58

performance parameters, 2-43port

facility loopback tests, 4-16terminal loopback tests, 4-16

SDH portperformance monitoring, 2-53

Securitymonitoring

administrative use, 1-33administrative use, events, 1-1PM information, not collecting, 2-1, 2-21, 2-43,

2-63Self test, GCM

see GCM, Power On Self TestServer alarm profile, 1-18Server IP address, 7-11, 7-60Service

performance monitoringSONET VT, 2-39

performance monitoring SONET STS, 2-36Service error codes

EMS, 1-139system resources unavailable (1035), 1-140

SESFEseverely errored seconds, far end–line, 2-29

Severely errored framing secondsSONET section layer, 2-31

Severely errored secondsline layer, far end

EC1 port, 2-29LO VC3 path, 2-50

Page 486: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 14 Force10 Networks Release OPS4.2.3

LO VC3 path, far end, 2-52SDH port–MS, 2-54SDH port–MS, far end, 2-56SDH port–RS, 2-53SONET line layer, 2-32SONET line layer, far end, 2-34SONET path, 2-36SONET path, far end, 2-38SONET section layer, 2-31SONET VT path, 2-39SONET VT path, far end, 2-40VC11 path, 2-58VC11 path, far end, 2-60VC12 path, 2-58VC12 path, far end, 2-60VC3 path, 2-50VC3 path, far end, 2-52VC4 path, 2-50VC4 path, far end, 2-52

SeverityNSA, 1-16SA, 1-16

Severity levelsalarm and event

defaults, 1-1, 1-33defined, 1-12

SFP optic portperformance monitoring

measured supply voltage, 2-30, 2-80measured temperature, 2-30, 2-80measured TX bias current, 2-30, 2-80measured TX input power, 2-30, 2-80measured TX output power, 2-30, 2-80

Shelfalarm profile, 1-18

Showlast error, 1-139

Signalmonitoring, 2-1

Softwareactivation, 7-29compatibility, 7-5, 7-55, 8-2download

abort, 7-15, 7-64clear, 7-15, 7-64status, 7-15, 7-64

download times, 7-13, 7-62upgrade, 7-1, 7-53

activate GCM, 7-20, 7-24, 7-34, 7-35, 7-43, 7-68, 7-72

activate time, 7-21, 7-23, 7-29, 7-69, 7-70hitless warm reboot, 7-8status, 7-15, 7-64

upgrade order, 7-29upgrade type

initiate, 7-14, 7-63version

current, 7-17, 7-30, 7-66, 8-3standby, 7-16, 7-65verify, 7-17, 7-66, 8-3

SONETcapacity monitoring parameters, 2-41line layer

performance monitoring parameters, 2-32performance monitoring, port parameters, 2-33

performance monitoringpath parameters, 2-36

performance monitorngVT path, 2-39

performance parameters, 2-21port

alarm profile, 1-18facility loopback tests, 4-16performance monitoring parameters, 2-31terminal loopback tests, 4-16

section layerperformance monitoring parameters, 2-31

STSalarm profile, 1-18

VTalarm profile, 1-18

Speedcooling fan, 6-2

Standbyhop, 2-12module, 7-40, 7-41

Start-upLED

GCM visual status, 3-11Status

activation, 7-22, 7-69, 7-70time, 7-30

GCM protection, 7-20, 7-68StickyMode, see AlarmsSymptoms

incorrect environmental alarms, 4-2recommended actions, 4-2

System resourcesunavailable, 1-140

TTabs

events, see Event tabTAC, see Test access cross-connectTAP, see Test access point

Page 487: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Release OPS4.2.3 Force10 Networks Page 15

TE-206list

alarms, 1-119events, 1-119

TE50alarm profile, 1-18

Termination pointTP, test access, 5-2

Test Accesstest system controller (TSC), 5-23

Test access, 5-5ADM, 5-1AID, 5-2cross-connect, 5-2DCS3/1, 5-1digital signals, 5-1DS1 module, 5-8DS3 module, 5-8DS3 transmux module, 5-8dual facility access digroup, 5-2E1 module, 5-8facility access digroup, 5-2intrusive, 5-1management system, 5-8monitor, 5-9non-intrusive, 5-1OC-N/STM-N, 5-8per side split, 5-13point, 5-2remote test access, 5-3remote test unit, 5-2series split, 5-17termination point, 5-2test system controller, 5-2VCX component, 5-8VT/TU 5G switch, 5-8

Test system controller, 5-2TSC, 5-23

Threshold crossing alertcapacity monitoring

number generated, 2-4Thresholds

capacity parameter settings, 2-4PM parameter settings, 2-4

Toggle switchPDAP-2S circuit breaker, 6-11

TPtermination point, test access, 5-2

TPA fusePDAP-4S, 6-17

Transmit and receive signal levels, 4-3, 4-7Transmux

DS3/EC-1, 8-9, 9-2

UTMX-24, 8-9, 9-2UTMX-48, 8-9, 9-2

Troubleshootingerror codes, 1-137loopback tests, 4-11transmit and receive signal levels, 4-3, 4-7

troubleshooting, 4-11TSC, see Test access test system controllerTX BROADCAST

EOS port, 2-76, 2-78Ethernet port, 2-71

TX BYTESEOS port, 2-76, 2-78Ethernet port, 2-73, 2-74

TX DEFERRED FRAMESEthernet port (T10/00 only), 2-73

TX DISCARDSEOS port, 2-76, 2-77, 2-78, 2-79Ethernet port, 2-72

TX EXCESSIVE COLLEthernet port (10/100 only), 2-73

TX FRAMESEOS port, 2-76, 2-78Ethernet port, 2-71

TX LATE COLLEthernet port (10/100 only), 2-73

TX MULTICASTEthernet port, 2-71, 2-76, 2-78

TX MULTIPLE COLLEthernet port (10/-100 only), 2-73

TX PAUSEEthernet port, 2-73

TX SINGLE COLLEthernet port (10/00 only), 2-73

TX UNICASTEOS port, 2-76, 2-78Ethernet port, 2-71

UUASFE

unavailable secondsfar end, line, 2-30

Unavailable secondsline layer, far-end

EC1 port, 2-30LO VC3 path, 2-50LO VC3 path, far end, 2-52SDH port–MS, 2-54SDH port–MS, far end, 2-56SONET line layer, 2-33SONET line layer, far end, 2-34SONET path, 2-36SONET path, far end, 2-38

Page 488: Traverse Operations Guide - Force10 · 2010-03-12 · Operations and Maintenance Guide, Section 1: Fault Management Event List on the Events Tab Page 1-4 Force10 Networks Release

Page 16 Force10 Networks Release OPS4.2.3

SONET VT path, 2-39SONET VT path, far end, 2-40VC11 path, 2-59VC11 path, far end, 2-60VC12 path, 2-59VC12 path, far end, 2-60VC3 path, 2-50VC3 path, far end, 2-52VC4 path, 2-50VC4 path, far end, 2-52

Upgradesoftware, 7-1

TE-100, 7-53Traverse node, 7-1

tray fanfront inlet, 8-33

Username, 7-12, 7-61UTMX, 8-10, 9-3

Transmux, 8-9, 9-2

VVC11 path

performance monitoring, parameters, 2-58VC12 path

performance monitoring, parameters, 2-58VC3

pathperformance monitoring parameters, 2-49, 2-51

VC4path

performance monitoring parameters, 2-49, 2-51Viewing

alarms, 1-13, 1-28all nodes, 1-28card, 1-28one node, 1-28port, 1-28service CTP, 1-28

PM dataport, 2-10, 2-16service, 2-12, 2-14

VT/TU Switchcard placement, 8-13, 9-5

WWarm reboot

hitless software upgrade, 7-8