CeraViewUserGuide 11 07 PDF
CeraViewUserGuide 11 07 PDF
CeraViewUserGuide 11 07 PDF
CeraView
User Guide
Registered TradeMarks
Ceragon Networks® is a registered trademark of Ceragon Networks Ltd.
FibeAir® is a registered trademark of Ceragon Networks Ltd.
CeraView® is a registered trademark of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave
FiberTM, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice.
Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or
consequential damage in connection with the furnishing, performance, or use of this
document or equipment supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer
could void the user’s authority to operate the equipment and the warranty for such equipment.
Copyright © 2007 by Ceragon Networks Ltd. All rights reserved.
General .......................................................................................................... 1
Installation ..................................................................................................... 2
CeraView Security........................................................................................18
Menus ...........................................................................................................33
File Menu.............................................................................................................. 33
Alarms Menu........................................................................................................ 66
System Requirements
The following are system requirements for the CeraView management software.
For Windows:
For UNIX:
1. Run the CeraView installation program provided with the CeraView software.
The main window appears:
2. Click Next.
6. Click Next.
If a message appears informing you that a previous version of CeraView will be uninstalled, click
Continue.
Follow the remaining instructions.
CeraView files are installed in the directory you specified.
1. Run the CeraView installation program provided with the CeraView software.
The main window appears:
2. Click Next.
6. Click Next.
If a message appears informing you that a previous version of CeraView will be uninstalled, click
Continue.
Follow the remaining instructions.
CeraView integration files are installed in the HP OpenView directory.
1. Run the CeraView installation program provided with the CeraView software.
The main window appears:
2. Click Next.
6. Click Next.
If a message appears informing you that a previous version of CeraView will be uninstalled, click
Continue.
Follow the remaining instructions.
CeraView integration files are installed in the SNMPc directory.
Click Start on the desktop, and select Programs, CeraView, CeraView Configuration.
y Remote Hosts
y Advanced
To open a section, click on its icon on the left side of the window.
In each section, if you want to restore default values, click Restore Defaults.
If you want to reload the page after you made changes, click Reload Page.
In the Time and Intervals section, you can configure the following:
Short Refresh Interval The value (seconds) determines how often windows that require frequent
refreshing will be refreshed.
Long Refresh Interval The value (seconds) determines how often windows that do not require
frequent refreshing will be refreshed.
Keep Alive Interval The value (seconds) determines how often the network element will be
checked for connectivity.
SNMP Timeout The value (seconds) determines the maximum time the system will wait
after an SNMP command before timing out.
SNMP Number of Retries The value determines the maximum number of times a request can be
made to an element after a timeout.
Remote Hosts
User Actions Logger Host Address The IP or host name of the user actions logger server. If left blank,
logging will be disabled.
User Actions Logger Port Number The number of the port from which the user actions logger will
receive data.
Security Server Host Address CeraView’s Security Server IP or host name. Leave this field
blank if CeraView security is run locally.
Security Server Port Number The number of the port from which the Security Server will
receive data.
Primary Proxy Server Address The address of the primary proxy server to which you are
connecting.
Primary Proxy Server Port Number The port number of the primary proxy server to which you are
connecting.
Secondary Proxy Server Address The address of the secondary proxy server to which you are
connecting.
Secondary Proxy Server Port Number The port number of the secondary proxy server to which you are
connecting.
In the File Transfer Configuration section, you can configure the following:
TFTP Server Address Trivial File Transfer Protocol server IP. You must enter an IP associated
with your PC.
TFTP Files Location The directory in which the network element software files are located. If
you installed PolyView, make sure the same location is specified in the
PolyView configuration.
TFTP Timeout The value (seconds) determines when the TFTP server will time out after
a request.
TFTP Retries The value determines the maximum number of times a TFTP request can
be made to an element after a timeout.
Use Internal TFTP Server Select True if you are using an intrenal TFTP server. Select False if you
are using an external TFTP server. If you installed PolyView on this PC,
select False, since PolyView uses its own TFTP server.
VC Calculation from KLM For ADM tributary paths. Defines the formula used to calculate the VC
(Virtual Container) from the KLM values.
Use Metric Display Select True if you want values to be displayed in metric units.
SNMP Default Write Community The default SNMP write community. Leave this field blank if you didn’t
change the SNMP write community value in the network element
configuration.
Select Interface Language The language in which the CeraView application will appear.
Application Time Zone Specify the time zone in which you want CeraView to operate.
Users:
Admin - Always placed in the Admin group
Viewer - Initially placed in the Observer group
2. Enter the new user’s name and password in the fields at the top of the window.
3. User changed password at ... appears if you selected Users can change their passwords in the Setting
window (described below), and the user changed their password.
4. In the Access by Subnet area, you can assign different access rights to the new user according to
subnet. For example, you can give the user Administrator rights on one subnet and Observer rights on
another.
Notes:
* You cannot enter the same subnet twice for the same user.
* If none of the subnets you entered match an IP the user tries to connect to, the user will be denied
access to that IP.
* If more than one subnet matches an IP the user tries to connect to, the group that belongs to the
subnet that matches the IP the closest will be used for the IP access.
For example, you created the user “Joe” with the following rights: 172.24.0.0 : Observer, and
172.24.30.0 : Administrator. If Joe requests access to 172.24.30.5, he will be granted Administrator
rights for that IP.
Once you create users, you can perform several user-related operations.
Note: When a user performs an operation not related to a specific network element (such as
changing the security configuration), access permissions will be calculated by the Default Access
line (which contains the Subnet IP and Mask equal to 0.0.0.0). If a Default Access line does not
exist for a user, the user will not be able to access general network features.
1. In the main window, expand the Users list, right click the name of a user you want to modify,
and select Configure User.
Or, select the user in the list, and in the Edit menu, select Configure User.
The User Configuration window appears (shown above in the section Creating a New User).
2. Change the user configuration as desired in accordance with the explanation provided in the Creating a
New User section above.
Copy User
1. In the main window, expand the Users list, right click the name of a user you want to copy, and
select Copy User.
Or, select the user in the list, and in the Edit menu, select Copy User.
2. Enter the new user’s name and password, and click OK.
A new user will be created with the same access rights as the user you chose to copy.
In the main window, expand the Users list, right click the name of a user you want to delete, and
select Delete User.
Or, select the user in the list, and in the Edit menu, select Delete User.
Import/Export Users
To import users from an external file to your current CeraView session, in the main window select File,
Import Users.
To export users from your current CeraView session to a different CeraView session, in the main window
select File, Export Users.
1. In the main window, click Groups, and in the Edit menu select Add read-only Group or Add
read-write Group.
If you select Read-Only Group, initially the group will only have read-only access rights. If you select
Read-Write Group, initially the group will have read-write access rights.
2. Enter the name of the group in the window that appears, and click OK.
Once you create groups, you can perform several group-related operations.
1. In the main window, expand the Groups list, and click the name of the group you want to work with.
2. In the Edit menu, select Configure Group if you want to rename the group.
Note that you cannot rename the Admin group.
3. Select Copy Group if you want to duplicate the group you selected.
In the Copy Group window that appears, enter the group’s name, and click OK. A new group will be
created with the same access rights as the group you chose to copy.
4. Select Delete Group if you want to delete the group you selected.
Note that you cannot delete the Admin group.
5. For each group, to configure access rights for specific CeraView components, double-click the key icon
beside the component name.
Mark the checkbox of each CeraView component you want the group to have access to, and click OK.
To log in to CeraView:
Below is a description of the menus, toolbars and other features of the Main window.
Main Window for FibeAir 1500P 311 Mbps with Diversity Protection
Title Bar
The Title Bar displays the CeraView version, the agent’s system name, and the agent’s IP address.
Menu Bar
The Menu Bar contains menus and menu items used to perform CeraView operations.
Status Line
The line at the bottom of the window indicates if the unit is connected directly to the management station, or
through a designated server. The text in the line can include Connected directly, Connected via server, or
Connected via server (secured), whereby secured refers to an encoded connection. A secured connection is
indicated by a lock icon .
Status Panel
The Status Panel appears on the right side of the window, and includes icons that represent different system
information (described in detail below).
The Toolbar includes several icons that you can click to perform different operations.
Icon Function
System Information - used to view and define system information, such as contact
personnel and system up time.
Trap Forwarding Configuration - used for trap configuration, such as designating
managers to which traps will be forwarded.
Refresh - used to update the front panel view in the main window.
AES
AES is active in the left drawer, AES failure in the right drawer.
XPIC
XPIC is enabled.
External Protection
External protection, unit is in standby mode, and the protection or diversity is locked.
Internal Protection
Internal protection, left drawer is active, and the protection or diversity is locked (described below).
Internal protection, right drawer is active, and the protection or diversity is locked (described below).
The key icon indicates that the system is in the Lockout or Forced Switch mode. It appears as a result of
either a Force Switch or Lockout option selection from the Protection menu.
If you select Force Switch, a switch will occur between the active and standby shelfs, and there will be no
further switching until you select Clear Force.
Physical View
A physical view of the FibeAir unit is displayed in the Main window. The view provides a virtual display of
the IDU front panel.
The LEDs that appear in the physical view indicate the actual status of the LEDs on the front panel of the
IDU. (LED changes on the actual front panels of the units will be updated in the physical views after a slight
delay.)
Notes:
y When a hot swap occurs (a front panel shelf is replaced while the FibeAir unit is operating) the physical
view in CeraView will be updated and continue its display.
y Clicking on some areas in the physical view front panel display will invoke a configuration window. If
a hand icon appears when you move the mouse over an area in the panel display, you can click on that
area to invoke the relevant configuration window.
Green - OK -----
Yellow - SD Minor
Green - OK -----
Menus and buttons invoke windows that relate to the floor you are working with. However, some windows
relate to all floors, such as the Current Alarms, Alarm Log, and H/W Protection Type windows.
Note that FibeAir 1500P panels may be inserted in the carrier levels. When inserted, the panels will operate
the same way as those in a FibeAir 1500P system.
Upper Level
The top level in the window contains the RF unit interfaces, power interfaces, and auxiliary interfaces for all
floors in the subrack.
The right side of the panel shows the carrier connections to the RF units. Clicking on a connector will invoke
the radio configuration window for that carrier.
The power input connectors are shown in the middle of the panel. Clicking on a power input connector will
invoke the Power input configuration window.
At the extreme left side of the panel, the two 9-pin connectors can be used for user channels. When you click
the connectors, the auxiliary window opens for configuration. Clicking the upper connector will open the
auxiliary window for the upper floor, and clicking the lower connector will open the auxiliary window for
the lower floor.
The first two RJ-45 type connectors from the left support two management channels.
The second pair of RJ-45 type connectors from the left support two Ethernet wayside channels or user
channels. When you click the connectors, the appropriate Auxiliary window opens for wayside channel
configuration.
The upper port of the fourth pair of RJ-45 type connectors from the left supports EOW (Engineer Order
Wire) cascading. The LED beside the lower connector indicates EOW presence. When you click the
connector, the Auxiliary window opens for channel configuration. The window that appears is the auxiliary
channel configuration window for the second floor.
The remaining pair of 9-pin connectors are used to connect external alarms. FibeAir 3200T supports eight
alarm inputs and five outputs. When you click the connectors, the External Alarms window opens for alarm
input/output configuration. The lower connector is used for external alarms inputs and the upper is used for
external alarms outputs. When you click the input connector, the External Alarms window opens for alarm
input/output configuration for the second floor. When you click the output connector, a window opens for
floor selection. After choosing a floor, the External Alarms window opens for alarm output configuration for
the relevant floor. This feature is relevant only for subrack #1.
Lower Levels
The lower (carrier) levels in the main window include the following functions:
Modem area, which includes the LED indicators, similar to those of FibeAir 1500P.
Mux area, whereby clicking on a connector will invoke the interface configuration window for that
carrier. The LED indicators are similar to those for FibeAir 1500P.
Cross-connect drawer, which controls the protected system data flow. Clicking on the connector will
invoke the cross-connect configuration window.
File Menu
System Information
This option allows you to view and define information for the FibeAir system.
2. In the Current Time area, click Date/Time Configuration and set the date and the time (in the format
HH:MM:SS).
3. The read-only Description field provides information about the FibeAir system.
4. (Optional) In the Name field, enter a name for this link. By convention, this is the node’s fully-qualified
domain name.
6. (Optional) In the Location field, enter the actual physical location of the node or agent.
7. The Up Time field is read-only and shows how long the system has been operating continuously.
8. For Left/Right Carrier Name, specify the name you want to give the carrier for identification
purposes.
This window enables you to save important information for customer support service.
1. Select File, Local/Remote, Save Unit Information.
2. In the Output File Characteristics and Location area, specify the file to which the information will be
written.
Versions
The Versions window displays current software versions and relevant serial numbers. It also displays
software versions that will take effect after the unit is reset.
Versions Window
Software Download
This option enables you to download the latest software versions.
1. Select File, Software Download.
The Software Download window appears.
Configuration Report
This option generates a report that includes various parameters and their values, such as system description,
software versions, and Tx/Rx frequencies.
This option is used to upload a configuration file from a FibeAir unit to the management module, or
download a file from the management module to the FibeAir unit.
2. When uploading, click Browse, and select the directory and name of the file you want the configuration
to be uploaded into. Then click Upload.
When downloading, click Browse and select the configuration file you want to download. Then click
Download.
After the file is uploaded/downloaded, changes will take place only after the unit is reset.
Disk Files
This option is used to view information about the disks and files stored in the IDU.
2. The window displays disk space information and information concerning each file stored in the disk.
In the Properties column, the following icons may appear:
When FibeAir is configured with encryption, data received from the line interface (plain text) is coded, and
sent via the radio. The remote site will receive the data in its coded form, decode it back to plain text, and
then send it on through the line to the user.
The encryption used is the AES (Advanced Encryption Standard) algorithm, as specified by the FIPS 140-2
Level 2 Security standard.
AES is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information.
Integrated in the FibeAir IDU, the encryption algorithm is completely transparent to the operator,
functioning automatically without the need for manual key loading or replacement.
2. If AES is configured for your system, this window displays the AES state, which is configured via the
terminal setup.
New Session
Select this item to log in for a new CeraView session. The new session will appear in addition to the current
session.
When you select this item, the CeraView login window appears for you to specify the IP address of the
FibeAir unit you want to access.
Remote Session
Select this item to log in for a new CeraView remote session. The new session will appear in addition to the
current session.
When you select this item, the CeraView login window appears for you to specify the IP address of the
FibeAir unit you want to access.
Exit
Select this item to exit the CeraView application. You can also exit by clicking on the Close icon (x) in the
title bar.
If you select Exit and a continuous logging operation is still active, you will be prompted to confirm the exit.
Note: It is recommended to use this option if you need to manage more than one FibeAir unit
simultaneously.
External Alarms
The procedure detailed in this section is required only if alarms generated by external equipment are
connected to the IDU, or if the IDU alarm outputs are connected to other equipment (alarms I/O connector).
1. Select Configuration, IDU, External Alarms, or click the External Alarms icon, or click the Alarms
In/Out area in the physical view.
The External Alarms window appears.
Note: The window above appears in a FibeAir 1500P system. Other systems support different numbers
of external alarm inputs/outputs. For example, In FibeAir 3200T systems, the middle floor manages 8
external alarm inputs and 5 alarm outputs, and the top and bottom floors manage 5 external alarm
inputs.
The microcontroller in the IDU reads alarm inputs (dry contact) and transfers them to CeraView. This
allows FibeAir to report external alarms that are not related to its own system.
For each alarm on the left side of the window, do the following:
2. Click the box next to the alarm number to enable/disable the alarm.
3. If you enable an alarm, enter a description of the alarm in the text field.
4. Select the alarm’s severity level from the drop-down list (Major, Minor, Warning, Critical, or Event).
5. FibeAir provides three or five alarm outputs that can be used by other systems to sense FibeAir alarms.
The outputs are configured in the Alarm Outputs area.
The alarm outputs are Form C Relays. Each output relay provides three pins, as follows: Normally Open
(NO), Normally Closed (NC), Common (C).
The example above shows a dual Ethernet Wayside channel. A different channel may appear (such as
T1 or RJ-45 bridge) according to the system configuration. In addition, other options may or may not
appear, depending on your system configuration.
2. Select Enabled to activate the respective EOW, Wayside, or User channels.
3. Select the Cascade Enabled option to activate the dual EOW channels in cascade mode.
4. The Route to Radio is read-only, and shows the default route, whereby the right drawer is set for
Channel 1 and the left drawer is set for Channel 2.
5. In the Wayside/User Channel Type areas, select the type of channel you want to use.
6. If Bandwidth is supported for the channel, specify the desired rate, Low or High.
7. Click Apply to save the settings.
8. Click Close.
2. Click the drop-down list and select the protocol your radio is using.
3. Click Apply to save the settings.
4. Click Close.
2. Select the power source for which you want to enable alarms.
1. Select Configuration, RFU, Left/Right, RFU Configuration, or click the Left/Right RFU
Configuration icon.
The RFU Configuration window appears.
2. The RFU Parameters area is read-only. The Duplex Frequency value changes in accordance with the
TX/RX frequency values.
3. You can change the TX and RX frequencies of the RFU in one of the following ways:
Manually enter the TX frequency and/or RX frequency (6, 7, 8, 10, 11 GHz only) in the respective
fields.
Or click the up/down arrows in the TX Channel field to select the channel (the frequency will be
updated accordingly).
4. For the Frequency Control area, note the following:
Only one standard is generally shown, predetermined by the RFU parameters. When the standard is
unknown, the Tx Channel field will be disabled.
1. Select Configuration, RFU, Left/Right, RFU Configuration, or click the Left/Right RFU
Configuration icon.
The RFU Configuration window appears.
The fields in the RFU Configuration window are the same as those described in the 1500 RFU
Configuration section above.
Additional fields in the RFU Configuration window for other FibeAir products include the following:
Location - This field indicates the physical location of the RFU.
Receiver Mode - the Rx path, which can be set to Main, Diversity, or Combined. This field appears
only if IFC (IF Combiner) is supported.
RSL Connector Source - can be Diversity or Main. This field appears only if XPIC is not supported
and IFC is supported.
Monitored Rx Level (Diversity) - (read-only) displays the received power level of the Diversity
channel.
The RFU log file is a cyclic log file that records system parameters in an RFU-based memory module.
For more information about the file, see the FibeAir Troubleshooting Guide.
3. For RFU Log Period, specify the amount of time, in seconds, that the file will be active.
This option allows you to set the modulation and bit rate of the system.
2. Select a bit rate and an occupied bandwidth. The selection you make will determine the modulation (16,
32, 64, 128, or 256 QAM), and the system will be configured accordingly.
3. Click Apply.
Delay Calibration
This window enables you to calculate the data transfer delay between antennas, for system use.
2. For Time Delay, if you know the amount of time (in nanoseconds) of the delay between antennas, enter
it in the field manually, or use the up/down buttons.
If you don't use the Time Delay field, you can use the WG Length Difference field to enter the
waveguide length difference (in meters) between the Main and Diversity paths.
If you select this option, you must first use the Select WG Type field to specify the waveguide you are
using. The type can be EW63, EW64, EW77, EW85, or EW90.
3. After you enter the waveguide type and length difference, and click Apply, CeraView will calculate the
delay difference in nanoseconds and record the result as the delay calibration value, for system use.
4. If you do not use the manual calibration fields described above, you can instruct CeraView to send a
request to the agent to calculate the delay automatically. To do so, select Click to Auto Calibrate, and
click Calibrate. A message will appear warning that the delay calculation process will affect traffic.
Confirm the operation in the window by clicking Yes.
Note: If you do not have a license to work with adaptive modulation, only a Fixed Constellation field will
appear.
2. In the Code Modulation Configuration area, select either Adaptive or Fixed. If you select Adaptive,
choose the maximum modulation you want the system to allow, and the modulation below which the
system will mute the GbE transmission, without shutting down the radio.
3. The Current Tx/Rx Constellation fields are read-only and display the current modulation scheme.
Interfaces
STM1/OC3
1. Select Configuration, Interfaces, Left/Right, STM1/OC3, or click the STM1/OC3 area in the
physical view of the CeraView main window.
STM1 Interface Configuration:
1. Select Configuration, Interfaces, Left/Right, Fast Ethernet, or click the Fast Ethernet interface area
in the physical view of the CeraView main window.
Note: Two Fast Ethernet tabs will appear only if the unit is configured with a
2 x Fast Ethernet port.
2. Select Enabled to activate the channel.
3. Select Auto Negotiation if you want the unit to determine the Fast Ethernet data transfer protocol
automatically and operate accordingly.
4. If you did not select Auto Negotiation, select either 10BaseT or 100BaseT, and either Half Duplex or
Full Duplex.
5. If the unit is configured for 2 x Fast Ethernet and QOS (Quality of Service), in the Priority Options
area, select the traffic type to which you want to assign top priority.
For Queuing Scheme, select one of the following:
Fixed Priority - Algorithm used to ensure that a queue with a higher priority is always served before a
queue with a lower priority.
Gigabit Ethernet
1. Select Configuration, Interfaces, Left/Right, Gigabit Ethernet, or click the Gigabit Ethernet
interface area in the physical view of the CeraView main window.
Note about Priorities: The First Rule parameter takes precedence over the other parameters. After the
first rule, the VLAN range takes precedence, and last in the priority order are the Priority Bit options.
In the First Rule area, select the rule you want for first priority traffic.
In the Second Rule area, click Add to add a VLAN range.
7. Click Apply in the QoS window to save the settings, and then Close to close the window.
8. Click Apply in the Gigabit Ethernet Configuration window, and then Close to close the window.
DS3/E3
1. Select Configuration, Interfaces, Left/Right, DS3/E3, or click the DS3/E3 interface area in the
physical view of the CeraView main window.
2. In the Excessive Error field, select the level above which an Excessive BER alarm is issued for errors
detected over the line.
3. In the Signal Degrade field, select the level above which a Signal Degrade alarm is issued for errors
detected over the line.
5. The Line Coding fields show the coding system used for each DS3/E3 line.
6. For Cable Length, select the length of the cable used for each DS3 line.
E1/T1
1. Select Configuration, Interfaces, Left/Right, E1/T1, or click the E1/T1 interface area in the physical
view of the CeraView main window.
2. In the Trib Thresholds area, for Excessive Error, select the level above which an Excessive BER
alarm is issued for errors detected over the line.
For Signal Degrade, select the level above which a Signal Degrade alarm is issued for errors detected
over the line.
3. In the E1/T1 Ports area, select the ports you want to enable.
4. For T1s, in the Line Coding area, select the appropriate protocol.
5. For T1s, in the Cable Length area, select the lengths of the cables that will connect the ports to the
network.
6. Click Apply to save the settings.
7. Click Close.
1. Select Configuration, Interfaces, Left/Right, Radio, or click the Radio or East or West area in the
physical view.
The Radio Configuration window appears.
2. In the Radio Thresholds area, for Excessive Error, click the drop-down list and select the level above
which an Excessive BER alarm is issued for errors detected over the radio link.
For Signal Degrade, select the level above which a Signal Degrade alarm is issued for errors detected
over the radio link.
The BER field is read-only and shows the value above which a BER alarm is issued for errors detected
over the radio link.
3. In the Link Parameters area, select the direction of the FibeAir radio. The direction you select will be
indicated in the physical view.
4. For Link ID, specify the identification number of the link.
Note: When working with an IDU that has the Link ID feature on one end and an IDU that does not
have this feature on the other end, set the Link ID to 1.
5. For Latency Type, select High (default value) if you want the ATM and channel interleavers to be
active. Select Low to bypass the interleavers. If you select Low, the latency of the link will be lower
than the high latency by 50-200 msecs (depending on the modem's Fsymbol), and the system gain will
be approximately 0.2 dB lower.
Note: If you change the latency value and click Apply, you will be prompted to reset the drawer you
were configuring.
6. Click Apply to save the settings.
7. Click Close.
IP Configuration
IP Configuration Window
2. In the Ethernet Addresses area, specify the Ethernet IP Mask and Default Router IP Address.
3. In the Serial NMS area, select Enabled to enable the serial port. Then specify the IP Mask, Baud Rate,
and Modem Phone Number.
4. Click Apply to save the changes.
5. Click Close.
Trap Configuration
Used to configure traps sent from a Network Element to the NMS system.
To configure traps sent from Ceragon's NMS to other NMS systems, see Trap Forwarding Configuration
Utility at the beginning of this guide.
1. Select Configuration, Management System, Trap Forwarding, or click the Trap Forwarding icon.
The Traps Configuration window appears.
2. In the Managers IP Address area, specify the IP addresses of the managers to which you want traps to
be sent.
3. For each manager IP you specify, specify the Trap Port.
4. In the Send Trap for Alarms area, for of Group, you determine which alarms will be sent as SNMP
traps to each manager.
In each manager column, select the alarm types you want to include for that manager. To select/deselect
all traps in a column, click the Select All checkbox at the bottom of the column.
5. For with Severity, select the severity filter to determine which types of alarms will be forwarded. To
select/deselect all alarm types in a column, click the Select All checkbox at the bottom of the column.
6. In the Trap Options area, select Standard traps include serial number if you want trap messages to
include the IDU serial number.
Select Report local traps of far end IDU if you want remote IDU trap messages to be reported locally.
Select Use different ID for each alarm type if you want each type of alarm to receive a unique ID.
Select Send “clear” traps with zero severity if you want to receive information concerning “clear”
traps.
Select Send traps with extended alarm information if you want the Alarm ID, origin, and unit from
the current alarm table to be added to the end of each FibeAir-related trap.
In-band Configuration
In-band Management refers to a method in which the network management software sends management
packets through the same network it is managing. This differs from out-of-band management in which the
network management software uses a different network (overlay network) to communicate with the managed
elements.
Up to 9 In-band channels are avialable for selection in the window (when 4 RFUs are installed). The
channels in the upper section (up to 4) represent the radio mapping of the In-band management, and those in
the lower section (up to 4) represent the line mapping of the In-band management. An additional virtual
mapping channel, PPPoE, is available on the IDC.
A total of 1 or 2 channels may be selected for In-band management mapping. If you select 2 channels, you
will not be able to select an additional channel.
Notes:
- Upon a change of the protection configuration from internal to no protection, all In-band channels will be
disabled automatically.
- After you set the required channels, the window will refresh and display the values in the unit. In some
cases, the values will not be the same as those you requested. For example, the virtual mapping channel
(PPPoE) is automatically selected if you did not select a line channel.
Neighbors
The Neighbors window displays a table of all STM-1 interfaces (radio, line, trib) and their remote
connections.
1. Select Configuration, Management System, Neighbors.
The Neighbors window appears.
2. Select Manual in the Detect Mode column to enter the unit's IP address manually.
When you enter an IP address, CeraView will try to connect to the unit and learn the Neighbor Type and
Interface.
If the IP address you entered is not configured or not able to be reached, the Neighbor Type field will
display “Unknown”, and the Neighbor Interface field will list all available options than can be
configured.
SNMP Configuration
2. For Read Community, enter the community name for read-only access.
For Write Community, enter the community name for read-write access.
For Trap Community, enter the community name for trap forwarding.
Note: Changes to community settings will take effect only after the unit is reset.
NTP (Network Time Protocol) configuration is performed when an NTP server is used to synchronize
network activity.
The Network Time Protocol is used to synchronize the time of a computer client or server to another server
or reference time source, such as a radio or satellite receiver or modem. It provides accuracies typically
within a millisecond on LANs and up to a few tens of milliseconds on WANs relative to Coordinated
Universal Time (UTC) via a Global Positioning Service (GPS) receiver, for example. Typical NTP
configurations utilize multiple redundant servers and diverse network paths in order to achieve high accuracy
and reliability.
To configure FibeAir for operation with NTP:
Alarms Menu
Current Alarms
Each line in the window describes a different alarm. You can click on a column title to sort the information
in the table accordingly.
When you move the cursor over a line, a window appears with the details of the alarm, it's probable cause,
and the corrective actions to perform.
In the Severity Filter area, select one or more alarm severity types to be displayed in the list.
The time and date the alarm was triggered appear in the Time and Date column.
The unit associated with the alarm is indicated in the Origin column.
- You can view alarms related to a specific floor by selecting the floor from the drop-down list in the Floor
Filter area.
- If you opened the window using the icon in the main window status panel, the window that appears will
be filtered for the selected floor.
Alarm Log
The Alarm Log displays the last 200 alarms that occurred. If the number of alarms exceeds 200, the first
alarms will be removed.
You can click on a column title to sort the information in the table accordingly.
Time and Date - The time and date the alarm was triggered.
Severity - The severity of the alarm. You can determine which severity levels will be displayed in the
window by selecting the levels at the top of the window.
Origin - The drawer containing the unit that generated the alarm.
Note: The alarms in the window are not saved in a file, unless you click Save.
- The window includes alarms for all unit floors. However, if you open the window using the icon in the
main window status panel, the window will be filtered for the selected floor.
- You can view alarms related to a specific floor by selecting the floor from the drop-down list in the Floor
Filter area.
To save alarms in a continuous logging file, select Alarms, Start Saving Log.
In the Choose Alarm Log File window that appears, select the file you want to save the alarms to and click
Save.
Alarms will be added to the file you selected until you select Stop Saving Log. or exit the application. If you
exit CeraView and the log file is still active, you will be notified.
RSL
The RSL Performance Monitoring window displays received signal level values measured over the past 24
hours.
1. Select Performance, Radio, Left/Right, RSL.
The RSL Monitoring window appears.
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
Current Min RSL values are the minimum received level measured during the interval.
Current Max RSL values are the maximum received level measured during the interval.
Threshold Exceeded displays the number of seconds threshold values were exceeded during the
current interval.
Current MSE is the Mean Square Error value, which quantifies the performance of the receiver. The
value should be less than -33 dB.
Value Table
The value table displays RSL values over the last 24 hours. The values are the same as those that appear
in the graph, only in table format.
The columns show the levels measured during the current interval.
The Integrity column indicates whether or not the values received at that time and date are reliable. A
red x in the column indicates that the values are not reliable due to a possible power surge or power
failure that occurred at that time. The values in this column are indicated in the graph as "Doubtful"
(red) values.
2. To view historical RSL values over a one-month period, click History.
The values shown in the window are values that were received over the last 30 days.
Note that since the current day's data is not complete until the end of the day, its partial data is presented
above the table area.
Click Save to save the values to a file.
Click Print to send the listed values to the printer.
TSL
The TSL Performance Monitoring window displays details about the transmitted signal level measured every
15 minutes, over the last 24 hours.
Select Performance, Radio, Left/Right, TSL.
The TSL Monitoring window appears.
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
Current Min Set TSL values are the minimum transmitted level measured during the interval.
Current Max Set TSL values are the maximum transmitted level measured during the interval.
Threshold Exceeded displays the number of seconds the threshold value was exceeded during the current
interval.
Doubtful values are values that were not generated during normal system operation. For example, the values
may have been generated during a system reset or failure.
Set TSL Threshold is a value that you can set. When a TSL value exceeds the threshold you set, the
Threshold Exceeded field will display the number of seconds the threshold value was exceeded.
The format of the value table is similar to the RSL value table described above.
Click Save to save the values to a file.
Click Print to send the listed values to the printer.
Click History to view historical values. The values shown in the window that appears are values that were
received over the last 30 days.
The SDH Performance Monitoring window displays values measured every 15 minutes, over the last 24
hours.
Select Performance, Radio, Left/Right, SDH/Aggregate.
The SDH or Aggregate Monitoring window appears.
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
UAS is the Unavailable Seconds value of the current interval. The value can be between 0 and 900 seconds
(15 minutes).
ES is the number of seconds during which errors occurred.
SES is the number of severely errored seconds.
BBE is the number of background block errors.
OFS is the number of out-of-frame seconds.
Doubtful values are values that were not generated during normal system operation. For example, the values
may have been generated during a system reset or failure.
The format of the value table is similar to the RSL value table described above.
Click Save to save the values to a file.
Click Print to send the listed values to the printer.
Click History to view historical values. The values shown in the window that appears are values that were
received over the last 30 days.
The Tributaries Performance Monitoring window displays values measured every 15 minutes, over the last
24 hours, for the E1/T1 or DS3 interface.
Select Performance, Tributaries, E1 # / DS3.
The Tributary monitoring window appears.
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
UAS is the Unavailable Seconds value of the current interval. The value can be between 0 and 900 seconds
(15 minutes).
ES is the number of seconds during which errors occurred.
SES is the number of severely errored seconds.
BBE is the number of background block errors.
OFS is the number of out-of-frame seconds.
Doubtful values are values that were not generated during normal system operation. For example, the values
may have been generated during a system reset or failure.
Cross Connect
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
PSAC - Protection Switch Actual Count
The number of occurrences of a switch from the protected channel to the protecting channel.
PSAD - Protection Switch Actual Duration
The number of seconds the channel is in the switched state for at least a fraction of one second.
FSRC - Failed Switch Request Count
The number of occurrences of the following events:
Gigabit Ethernet
The Gigabit Ethernet monitoring window displays Gigabit Ethernet-related values measured every 15
minutes, over the last 24 hours.
Select Performance, Ethernet, Left/Right, Monitoring.
Ethernet Statistics
The Ethernet Statistics window displays various Ethernet related values received from the radio or line.
Select Performance, Ethernet, Left/Right, Statistics.
ACM
The ACM Monitoring window displays ACM related values measured every 15 minutes, over the last 24
hours.
Select Performance, Radio, Left/Right, ACM.
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
Current Min ACM is the current minimum modulation value detected.
Current Max ACM is the current maximum modulation value detected.
The format of the value table is similar to the RSL value table described at the beginning of the Performance
Monitoring section in this guide.
The Min Constellation column displays the minimum modulation value detected over the last 15 minutes.
The Max Constellation column displays the maximum modulation value detected over the last 15 minutes.
Doubtful values are values that were not generated during normal system operation. For example, the values
may have been generated during a system reset or failure.
Line
The Line Performance Monitoring window displays values measured every 15 minutes, over the last 24
hours.
Select Performance, Line, Left/Right.
The Line monitoring window appears.
Time Elapsed is the current interval in seconds. The value can be between 0 and 900 (15 minutes).
UAS is the Unavailable Seconds value of the current interval. The value can be between 0 and 900 seconds
(15 minutes).
ES is the number of seconds during which errors occurred.
SES is the number of severely errored seconds.
Loopback
Click the button on the east side to select an internal line loopback test.
Click the button on the RFU to select an internal RFU loopback test.
3. Set the LoopBack Clear Timeout scale to the amount of time you want the test to run.
When a radio or line loopback test is running, a pie display above the timeout scale shows how much
time is left for the test (see the figure above).
4. Click Apply to run the test.
5. When you are done with loopback testing, click Close to close the window.
Note that closing the window will not stop the loopback test. To stop a test, unmark it by clicking on the
relevant button, and then click Apply.
Software Reset
Select Maintenance, Software Reset to reset the software for maintenance purposes, as follows:
Left ODC Performs a software reset for the Left Outdoor Unit Controller.
Right ODC Performs a software reset for the Right Outdoor Unit Controller.
Hardware Reset
Select Maintenance, Hardware Reset to reset the hardware for maintenance purposes, as follows:
Auxiliary Interface Performs a hardware reset of the Auxiliary Interface Module (AIM).
Left/Right Mux: Performs a hardware reset of the left or right multiplexer module.
Left/Right RFU: Performs a hardware reset of the RFU for the left or right drawer.
Clear PM Data
Select this item to reset Performance Monitoring in the unit (the number of available intervals will be 0).
Entire PM Data Clears the performance monitoring log files for both the left and right units.
Right PM Only Clears the performance monitoring log files for the right drawer only.
Copy Configuration
Select this item to copy a hardware configuration from one source to another.
Auxiliary to IDC - copies the configuration from the auxiliary interface to the IDC.
IDC to Auxiliary - copies the configuration from the IDC to the auxiliary interface.
Left/Right IDC to Drawer - copies the configuration from the IDC to the drawer.
Left/Right Drawer to IDC - copies the configuration from the drawer to the IDC.
IDC to XC # - copies the configuration from the IDC to the relevant cross-connect.
XC # to IDC - copies the configuration from the relevant cross-connect to the IDC.
Select this item to force the remote Tx level to the value set for the local IDU.
When the test is activated, the local modem sends a pseudo-random-binary-sequence to the remote side, and
the quality of the link can be evaluated based on the amount of defective blocks detected by the remote
(receiving) modem (the larger the amount is, the poorer the radio link quality).
2. If you prefer not to interrupt traffic, transmit the tested carrier over the protecting channel, and lock the
mux to its mate input.
3. Activate the PRBS test in the local subrack (a warning will appear informing you of traffic interruption).
4. Reset the defected block counter in the same carrier in the remote subrack. This will start the counting
from zero.
6. Check the resulting amount of defective blocks. The value indicates the quality of the link.
7. Stop the test, unlock the mux, and change the cross-connect back to its previous configuration.
Note that upon activating the test, a PRBS alarm will be raised in the local subrack. In addition, if you did
not perform step 1 above, an LOF alarm will be raised in the remote drawer until the test is stopped.
Temporary License
The temporary license extends the time period for system usage and supports the maximum system rate,
configured in the Multi Rate Multi Constellation (MRMC) window, for one week, or until a permanent
license is obtained.
You can use the temporary license as long as the counter does not run out. The counter, which is updated
every hour, is active only when the temporary license is enabled.
If you disable the temporary license, the counter will not be updated.
The license is drawer-specific and is enabled for each drawer separately. When the counter of the temporary
license reaches 0, the temporary license for the specific drawer will be terminated.
Once enabled, a message appears at the bottom of the Main Window, indicating the time left for the license.
In addition, an event will appear in the Current Alarms list, informing you about the license.
If you select Disable, the selected drawer will be reset and the MRMC settings in effect before the temporary
license option was active, will be restored.
As with other configuration values, enabling the temporary license for a drawer will also enable it for the
other drawer, and both period counters for the drawers will be activated.
As in non-protection mode, if you disable the temporary license, or let the counter end, both drawers will be
reset, and the previously selected MRMC will be restored for both drawers.
In the event that the two drawers have different temporary counters (which may occur when the IDU was
previously operated in non-protection mode, and the temporary license was enabled for only one of the
drawers), the lowest counter will determine the time period. The drawer with lowest counter will
automatically be reset when the counter ends, and the previous MRMC value will be restored for both
drawers.
Important! In internal protection mode, a temporary license should not be enabled for an IDU in which one
of the drawers has a counter equal to zero. Doing so may cause erratic IDU behavior.
Built-In Test
The built-in test is used to test system operability. It transmits packets internally in a stand-alone IDU, and
works together with the relevant loopback window (described in the sections above).
Select Maintenance, Built-in Test, Left/Right.
2. In the Protection Switch Criteria / Radio Block Criteria area, select the criteria that will cause a
protection switch (only if Off is selected for Protection Lockout), or radio transmission blocking.
Note that for FibeAir 1500AL, radio related options do not appear. In addition, for STM-1 Trib
interfaces, The "Line Output" area will appear as "Trib Output".
Note that if ACM is used, the Radio Excessive BER Alarm and Radio SD options will not appear.
3. In the Line Output area, select either a single or dual fiber input.
In Single STM-1 Line Output mode, an optical splitter is used and the transmission standby channel is
muted. This mode is used when the external SDH multiplexer does not support an MSP 1+1 protection
mode for two STM-1 optical interfaces.
In Dual STM-1 Line Output mode, a direct connection is made via two STM-1 channels to the external
SDH multiplexer. This mode is used when the external SDH multiplexer supports MSP 1+1 protection
mode for two STM-1 optical interfaces. In this configuration, both optical STM-1 transmitters in the
radio are active and the multiplexer chooses the one transmitting the best quality signals.
4. The Multi Radio area is read-only and displays the overhead (management data) source (left or right
carrier).
5. Click Apply to save the settings.
6. Click Close to close the window.
Protection Type
2. For MSP Connection, select either Dual Fiber lines or a Single Fiber line.
In Single Fiber mode, an optical splitter is used and the transmission standby channel is muted. This
mode is used when the external SDH multiplexer does not support an MSP 1+1 protection mode for two
STM-1 optical interfaces.
In Dual Fiber mode, a direct connection is made via two STM-1 channels to the external SDH
multiplexer. This mode is used when the external SDH multiplexer supports MSP 1+1 protection mode
for two STM-1 optical interfaces. In this configuration, both optical STM-1 transmitters in the radio are
active and the multiplexer chooses the one transmitting the best quality signals.
3. For MSP Type, select Uni Direction if you want a switch to the standby unit to affect only the Tx or Rx
channel. Select Bi Direction if you want a switch to the standby unit to affect both the Tx and Rx
channels.
4. For Revertive Mode, select Revertive if you want normal traffic on the protection path to be switched
back to the original path after it recovers from a fault.
Revertive mode may be required to support specific services, whereby the shortest physical route offers
better performance.
If you select Non Revertive, no switching to the original fault-cleared path will be performed to prevent
unnecessary traffic hits and management event reports.
5. In the Protection Role area, select either Main or Standby to designate a role for the unit.
6. Click Apply to save the settings.
7. Click Close to close the window.
Copy Configuration
This option causes the configuration of one unit (left or right) to be copied to the other.
1. Select Protection, H/W Protection, Commands, Copy Configuration, IDU to Mate/Left to
Mate/Right to Mate.
IDU to Mate will copy the IDU configuration to another IDU.
Right to Mate will copy the right drawer configuration to the left drawer.
Left to Mate will copy the left drawer configuration to the right drawer.
2. In the confirmation message that appears, click Yes.
Request Switch
This option requests a switch between the active and standby radios.
1. Select Protection, H/W Protection, Commands, Request Switch.
2. In the confirmation message that appears, click Yes.
Force Switch
This option forces a switch between the active and standby radios.
1. Select Protection, H/W Protection, Commands, Force, Force Switch/Clear Force.
2. In the confirmation message that appears, click Yes.
3. To disable the Force Switch option, select Clear Force.
Lockout
Block
Request Switch
This option requests a switch between the active and standby radios.
1. Select Protection, Diversity, Commands, Request Switch.
2. In the confirmation message that appears, click Yes.
Lockout
2. Click the Protection Topology drop-down list and select the required configuration, as follows:
5. Select Switch On Early Warning if you want the switch to occur when the system reaches an MSE
of -28.
6. For Revertive Link, select the carrier that will be transmitted over the protecting carrier when no
other fault exists in the system. Your selection will be used in cases where a switch occurs and then
the system returns to normal operation.
Examples:
Revertive = Extra Traffic
If a radio or hardware fault occurs at site A, a request is sent to site B to transmit the faulty carrier
also through the protecting channel. The switch that is performed is Hitless (up to 10 mS), and the
Extra Traffic channel will no longer exist on both sides by definition (generally, the system can
protect up to two faults at different sides). The moment the alarm is cleared, the +1 (protecting)
modem will refer to the input from the +1 (extra traffic) MUX.
Revertive = None
The last protected MUX (the carrier in which the last protection switch occurred) will receive two
inputs: its own modem, and the +1 modem. The Extra Traffic channel will not exist. Data to the
other MUX cards (for each of the defined carriers) will be received from its own modem until the
first hitless fault. When the fault is cleared, the last protected MUX will receive data from two
sources: the +1 modem, and its own modem, meaning the next fault in this channel will be errorless
(if other carriers fail, the switch performed will be hitless).
Revertive = Carrier#X
MUX number X will always receive two sources: the +1, and its own, unless there is a fault in
another carrier. If MUX number X receives two sources, and a fault occurs, the switch is errorless. In
all the other cases, the switch is hitless.
7. For Revertive Switch Timeout, specify the period (in seconds) after which the revertive mode will
be activated.
8. For High Priority Threshold, click the drop-down list and select the minimum fault severity
criteria. If the crietria is met, the system will perform a switch to the channel you chose as high
priority, rather than switch to a normal priority channel (even if its fault severity is higher).
The options include: Baseband Loss of Frame, Baseband Excessive BER, Baseband Signal Degrade,
and Early Warning.
9. In the priority table, designate the high priority channel(s). A high priority channel will be switched
first when the criteria chosen for the threshold is met, even if a higher severity fault occurs in a lower
priority channel.
- High Priority
Note that Current Protected Carrier Tx is the index number of the carrier currently transmitted
over the protecting channel (to the remote side). Current Protected Carrier Rx is the index number
of the carrier currently received over the protecting channel (from the remote side).