ProVision Plus 2 - 4 - 0 User Guide - May2019
ProVision Plus 2 - 4 - 0 User Guide - May2019
User Guide
Version: 2.4.0
260-668271-001
LA Release
Copyright & Terms of Use
Warranty
Aviat Networks makes no representation or warranties with respect to the contents hereof and
specifically disclaims any implied warranties or merchantability or fitness for any particular purpose.
Further, Aviat Networks reserves the right to revise this publication and to make changes from time
to time in the content hereof without obligation of Aviat Networks to notify any person of such
revision or changes.
Safety Recommendations
The following safety recommendations must be considered to avoid injuries to persons and/or
damage to the equipment:
• Installation and Service Personnel: Installation and service must be carried out by
authorized personnel who have the technical training and experience necessary to be aware
of any hazardous operations during installation and service, and of measures to avoid any
danger to themselves, to any other personnel, and to the equipment.
• Access to the Equipment: Access to the equipment in use must be restricted to service
personnel only.
• Safety Norms: Recommended safety norms are detailed in the Health and Safety sections of
the product's Installation guide.
• Service Personnel Skill: Service personnel must have received adequate technical training
on telecommunications and in particular on the equipment and capabilities this addendum
refers to.
Trademarks
All trademarks are the property of their respective owners.
Americas Technical Help Desk EMEA Technical Help Desk Asia Pacific Technical Help
Desk
Graphic Cues
The following items have graphic cues to identify important supporting information.
Font Changes
Bold font is used for the names of on-screen elements such as; fields, buttons, and drop-down
selection lists, keywords, commands and for keys on the keyboard.
Courier font in blue text is used to indicate commands that the user needs to type in, with the
command prompt shown as brown text.
AOS# show radio-carrier status Carrier1/1
Any responses or report output from a command is shown as brown text and indented.
radio-carrier status Carrier1/1
oper-status up
Italic font is used to emphasize words and phrases, to introduce new terms, and for the titles of
printed publications.
Button text is highlighted to indicate a click action on the named button.
Menu Navigation through a GUI to a particular screen is highlighted to distinguish from normal text.
Common Terminology
Click or Select: Point the mouse pointer at the item you want to select, then quickly press, and
release the left mouse button.
Right-Click: Point the mouse pointer at the item you want to select, then quickly press and release
the right mouse button.
Contents
Copyright & Terms of Use .......................................................................................................... iii
Aviat Networks Technical Support .............................................................................................. v
Conventions and Terminology ................................................................................................... vii
Contents .....................................................................................................................................ix
Chapter 1. Welcome to ProVision Plus................................................................................... 15
Intended Audience ................................................................................................................... 15
What You Need to Know to Use ProVision Plus ....................................................................... 15
Additional Resources................................................................................................................ 15
About ProVision Plus ................................................................................................................ 16
Network Communication ...................................................................................................... 16
Automatic Network Topology Construction .......................................................................... 16
Multi-Layer Topology Visualization ....................................................................................... 16
Rapid Troubleshooting ......................................................................................................... 16
Configuration Validation ....................................................................................................... 17
Network Health Analysis ...................................................................................................... 17
Service Impact Analysis ....................................................................................................... 17
Service Diagnostics ............................................................................................................. 17
Network Troubleshooting With ProVision Plus .......................................................................... 17
Carrier Ethernet Network Layer Modeling ................................................................................. 19
MPLS Network Layer Modeling ................................................................................................ 20
Chapter 2. Getting Started ....................................................................................................... 25
Installing and Running the Product ........................................................................................... 25
System Administration .............................................................................................................. 25
Product License Options .......................................................................................................... 25
Product Modules and Supported Device Types ........................................................................ 26
Chapter 3. Network Deployment ............................................................................................. 27
Communication with Devices.................................................................................................... 28
Manual Deployment using Deploy Object ................................................................................. 28
Container Deployment ......................................................................................................... 29
Device Deployment .............................................................................................................. 30
Access to Deploy Objects .................................................................................................... 31
Automated Deployment via ProVision System .......................................................................... 31
Topology Import Details ....................................................................................................... 31
Handling of Device and Container Name Conflicts ............................................................... 33
Configuring SNMP Notification Initiated Event Collection ......................................................... 33
Making Changes to Deployment ............................................................................................... 33
Rename Device or Container ............................................................................................... 33
Reparent Device or Container .............................................................................................. 34
Delete Device or Container .................................................................................................. 34
Manual Deployment of Physical Links ...................................................................................... 34
Baselining of Network Deployment Changes ............................................................................ 35
Chapter 4. Device Access Control .......................................................................................... 37
Intended Audience
The information in this guide is intended for the following roles:
Additional Resources
The ProVision Plus Installation and Administration Guide (PN 260-668272-001) describes the
procedures and features associated with installing and administering the product.
Aviat Networks May 2019 15
Welcome to ProVision Plus
The ProVision Installation and Administration Guide (PN 614-330053-001) describes how to
configure ProVision which is used to provide network mediation to SNMP-based devices for
ProVision Plus.
The ProVision Plus Northbound Interface System Integration Guide (PN 260-668273-001)
describes how to integrate with external systems such as operation support system (OSS),
orchestrators, SDN super controllers, and custom SDN applications.
Network Communication
Communication with the managed network takes place either directly with network devices, or via a
ProVision mediation system. In the current version of ProVision Plus, WTM 4000 devices are
managed directly using NETCONF / YANG communications. All other devices are managed
indirectly via the ProVision Northbound Interface (NBI).
Rapid Troubleshooting
Device events from one or more devices are analyzed, normalized and automatically correlated as
service alarms for each end-to-end service, such as TE Links, TE Tunnels, PWs and VPNs. The
service alarm state for each service is prominently displayed on the topology view and the data
panels to facilitate troubleshooting.
The intuitive multi-layer topological navigation capability in combination with service alarms allow for
rapid visual root cause analysis. When the user selects an alarmed service in the topology view,
the lower-layer services are highlighted. By iteratively selecting on a lower-layer supporting service
with an alarmed state, the user can quickly identify the root cause.
Configuration Validation
Configuration changes to the network devices and IP/MPLS services are automatically detected.
The Baseline design provides a benchmark configuration of all devices and services, including (for
example) L1 links, TE Links, TE Tunnels and VPNs.
Any configuration change deviating from the Baseline design is visually highlighted and the details
identified.
Service Diagnostics
On-demand diagnostics provide the ability to quickly identify and troubleshoot L3VPN VRF routing,
TE Tunnel, and LSP services connectivity problems.
Approach Description
The ability to troubleshoot each layer independently, working either up or down to
Layer by layer the next layer, once a layer has been fully verified. This can also involve starting at
an interim layer.
Node by node (on the Fully verify all layers or a number of layers on a node, before moving onto the next
end-to-end path) node on the end-to-end path.
Often the configuration or state of a particular attribute should be identical across
Identify differences multiple devices or services in the network, and identifying differences can quickly
pinpoint the cause.
The ability to identify and analyze configuration changes to each network layer in
Analyze before and after
the live network.
For complex networks such as those delivering Carrier Ethernet or MPLS VPN services, the ability
to discover, model and troubleshoot each network layer independently is fundamental to the above
approaches. The following sections, Carrier Ethernet Network Layer Modeling (on page 19) and
MPLS Network Layer Modeling (on page 20) provide an overview of the modelled layers.
ProVision Plus intelligently constructs an accurate model of the network through a set of
interconnected layers. This facilitates the ability to apply simple and consistent layer-based
management and troubleshooting practices.
Layer Description
VLAN VLAN services layer. This layer includes both Customer VLAN (C-VLAN) and Service VLAN
(S-VLAN) representation.
Reference: IEEE 802.1Q (Virtual Bridge Local Area Networks).
VLAN Link VLAN Link layer. This layer represents the VLAN topology as a set of VLAN Links, where each
indicates a physical link configured to carry one or more VLANs. This is determined by the
VLAN configuration of the device interfaces.
Reference: IEEE 802.1Q (Virtual Bridge Local Area Networks).
Note: When the VLAN Link layer is filtered to present a VLAN service, all configured
paths are presented, including the alternate paths that need to be resolved through
Spanning Tree or ERPS protocols in order to avoid packet loops in the network.
PTP Link PTP (Precision Timing Protocol) Link layer. This layer represents the PTP topology as a set of
PTP Links, where each indicates a PTP connection between the ports on adjacent devices.
Reference: IEEE 1588v2 (Precision Clock Synchronisation Protocol).
SyncE Link SyncE (Synchronous Ethernet) Link layer. This layer represents the SyncE topology as a set of
SyncE Links, where each indicates a SyncE connection between the ports on adjacent devices.
Reference: ITU G.8262/Y.1362 (Synchronous Ethernet).
Physical The physical topology layer, indicating the devices and their physical interconnecting L1 links
(radio or Ethernet cable connection).
Layer Description
L2VPN L2VPN services layer. This layer includes the Attachment Circuits (ACs) and their mapping to the
underlying PWs that deliver the services between the PE routers.
Reference: IETF RFC 4664 (Framework for L2VPNs).
There are two fundamentally different kinds of Layer 2 VPN service that a service provider could
offer to a customer; Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS).
• A VPWS is a VPN service that supplies an L2 point-to-point service.
• A VPLS is an L2 service that emulates LAN service across a Wide Area Network (WAN).
PW L2VPN PW (Pseudowire) layer. This presents the PWs, established through Targeted LDP
sessions between the terminating PE routers, over which L2VPN services are delivered.
For VPLS this includes the configured PW mesh, and for VPWS this includes the configured
point-to-point PW.
Reference: IETF RFC 4664 (Framework for L2VPNs).
A "Pseudowire" (PW) is a relation between two PE devices. Whereas an AC is used to carry a
frame from CE to PE, a PW is used to carry a frame between two PE devices.
Layer Description
L3VPN L3VPN services layer. This layer includes the VRFs (virtual routing/forwarding instances) and the
configured Attachment Circuits (ACs) of each L3VPN.
Where vpnv4 route sharing is configured between VRFs (i.e. exported from one VRF and imported
into another), the VRFs are considered part of the same L3VPN.
Reference: IETF RFC 4364 (BGP/MPLS IP VPNs).
Consider a set of "sites" that are attached to a common network that we call "the backbone".
Now apply some policy to create a number of subsets of that set, and impose the following rule: two
sites may have IP interconnectivity over that backbone only if at least one of these subsets contains
them both.
These subsets are Virtual Private Networks (VPNs).
Two sites have IP connectivity over the common backbone only if there is some VPN that contains
them both.
RT Link L3VPN VRF RT (Route Target) Link layer. This layer presents the VRF routing topology as a set of
RT links, where each indicates the flow (export to import) of vpnv4 routes (associated with a
configured RT value) between two VRFs. Collectively the RT links for a L3VPN indicate the service
topology.
Reference: IETF RFC 4364 (BGP/MPLS IP VPNs).
A Route Target attribute can be thought of as identifying a set of sites (though it would be more
precise to think of it as identifying a set of VRFs) associating a particular Route Target attribute with
a route allows that route to be placed in the VRFs that are used for routing traffic that is received
from the corresponding sites.
TE Tunnel TE (traffic engineered) LSP Tunnels layer. This layer presents the configuration of the tunnels
together with the state of the associated RSVP-TE signaled tunnel LSPs.
Each tunnel comprises of one or more traffic engineered LSPs in either a 1:1 protected or a
non-protected configuration.
For each tunnel LSP, the ERO (Explicit Route Object) configuration and the RRO (Record Route
Object) end-to-end path state are modelled.
The RRO identifies the routers over which a TE Tunnel LSP has been signaled. This state
information is only available where RRO is enabled on the head-end PE routers.
As the RRO is discovered from the head-end PE router, this enables the model to capture the full
signaled end-to-end path of each tunnel LSP in the case where one or more of the other routers on
the path are either not supported or cannot be communicated with.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for LSP Tunnels).
A set of one or more Tunnel LSPs which carries a traffic trunk, i.e. a set of flows aggregated by their
service class and then placed on an LSP or set of LSPs.
TE Link TE (traffic engineered) Link layer. This layer presents the traffic engineering link layer topology of
the network, i.e. the set of configured TE Links in the MPLS network over which TE Tunnel LSPs
can be signaled. Each TE Tunnel LSP spans one or more TE Links.
Reference: IETF RFC 3630 (TE Extensions to OSPF).
The extensions provide a way of describing the traffic engineering topology (including bandwidth and
administrative constraints) and distributing this information.
For "global traffic engineering", a device can build a traffic engineering database, input a traffic
matrix and an optimization function, crunch on the information, and thus compute optimal or
near-optimal routing for the entire network.
Layer Description
LSP LSP layer. This layer presents:
• LDP-signaled LSPs carrying VPN services, and
• traffic engineered (RSVP-TE signaled) TE Tunnel LSPs irrespective of whether they are
configured to carry VPN services.
Reference: IETF RFC 3031 (Multiprotocol Label Switching Architecture).
The path through one or more LSRs at one level of the hierarchy followed by packets in a particular
Forwarding Equivalence Class (FEC).
Reference: IETF RFC 5036 (LDP Specification).
LDP associates a Forwarding Equivalence Class (FEC) [RFC3031] with each LSP it creates.
The FEC associated with an LSP specifies which packets are "mapped" to that LSP. LSPs are
extended through a network as each LSR "splices" incoming labels for a FEC to the outgoing label
assigned to the next hop for the given FEC.
LSP Link LSP Link layer. This layer presents the point-to-point links between the PE and P routers over
which the LSPs presented in the LSP layer are delivered.
This includes links established through LDP and traffic engineering (RSVP-TE). Each TE Tunnel
LSP or LDP-signaled LSP spans one or more LSP Links.
The links are discovered through reading the label switching “cross connect” information from each
PE and P router in the network, hence all links are discovered irrespective of whether they were
signaled using LDP or RSVP-TE, or statically configured.
Reference: IETF RFC 3031 (Multiprotocol Label Switching Architecture).
The path through one or more LSRs at one level of the hierarchy followed by packets in a particular
Forwarding Equivalence Class (FEC).
Physical The physical topology layer, indicating the devices and their physical interconnecting L1 links (radio
or Ethernet cable connection).
The following table describes the more complex connections, where a layer is supported by multiple
underlying layers.
Table 4: MPLS Network Inter Layer Connections
System Administration
Please refer to the ProVision Plus Installation and Administration Guide for the instructions on
system administration. This guide includes the following information:
• Role based management including a description of the supported roles.
• User management functionality and the associated procedures for managing users.
• Configuration of user access security policy.
• Database management functionality including the associated procedures for backing up the
system and restoring from backup.
• A description of the available ProVision Plus product license options, including how to request,
load and manage your license.
Note: LICENSING: ProVision Plus automatically starts managing imported WTM 4000
devices directly only where the EM Fault & Performance product module (for directly
managed devices) is licensed. Where this product module is not licensed, the WTM 4000
devices are discarded on import, i.e. are nether directly nor indirectly managed in ProVision
Plus.
Note: WTM 4000 devices imported from ProVision automatically become directly managed
in ProVision Plus. Hence they become directly managed by both ProVision and ProVision
Plus. As it is not desirable to have both systems managing the same device, in this situation
it’s recommended that the WTM 4000 devices be deleted in ProVision following successful
import and deployment into ProVision Plus.
Container Deployment
The following restrictions are imposed when deploying Region or Site containers.
• Region containers can be deployed into Physical Root or another Region container.
• Site containers can be deployed into a Region or another Site container.
The following figure presents an example Deploy Object view, where a Region container is
deployed into Physical Root.
Figure 2: Example Deploy Region Object
The following figure presents an example Deploy Object view, where multiple Site containers are
deployed into Region ‘California”.
Figure 3: Example Deploy Multiple Site Objects
Deployed Containers are presented in the Devices Tree (section Devices Tree (on page 82)).
Device Deployment
Devices can be deployed into Physical Root, or into a Region or Site container.
The following figure presents an example Deploy Object view, where a single WTM 4200 device
object is deployed into Site ‘Upper Hutt’.
Figure 4: Example Deploy Device Object
The following table provides a description of the parameters to be provided when deploying a
device object.
Table 6: Device Deployment Parameters
Parameter Description
Object Name Name by which the device is represented in ProVision Plus.
Management IP Address IP address used by ProVision Plus to communicate with the device.
NETCONF Authentication Authentication credentials (username, password) used by ProVision
Credentials Plus to communicate with the device using the NETCONF protocol.
Once devices have been deployed, subsequent changes to their deployment parameters can be
made through the following features.
• Object Name and Management IP Address: Direct Device Management view (see section
Direct Device Management (on page 100)).
• NETCONF Authentication Credentials: Direct Device Access Control view (see section Direct
Device Access Control (on page 38)).
Deployed Devices are presented in the Devices Tree (section Devices Tree (on page 82)) and
Topology Map (section Topology Map (on page 45)) and Data Panel (section Data Panel (on page
78)) views.
Note: LICENSING: The ability to connect a ProVision system to ProVision Plus requires the
EM Integration For ProVision product module.
Note: USER ROLE: A user must have Engineer role access in order to connect a ProVision
system to ProVision Plus .
Note: WTM 4000 devices imported from ProVision automatically become directly managed
in ProVision Plus. Hence they become directly managed by both ProVision and ProVision
Plus. As it is not desirable to have both systems managing the same device, in this situation
it’s recommended that the WTM 4000 devices be deleted in ProVision following successful
import and deployment into ProVision Plus.
Note: Devices indirectly managed via ProVision, and containers imported from ProVision,
cannot be manually renamed, re-parented or deleted by the ProVision Plus user. These
changes can only be performed in ProVision, after which the changes are automatically
reflected in ProVision Plus.
The following table identifies the detailed behavior of ProVision Plus where changes are made to
the devices and container hierarchy in ProVision.
Table 7: Topology Import Behavior Associated with ProVision Operations
Parameter Description
IP Address IP address of the ProVision Plus server. See section How to Configure
SNMP Port of the ProVision Plus Installation and Administration Guide
for details.
Port UDP port on which ProVision Plus receives SNMP notifications. This
must match the value configured on ProVision Plus. See section How
to Configure SNMP Port of the Installation and Administration Guide for
details.
Type SNMP protocol version. Currently ProVision Plus supports SNMP v2c
only.
Note: Devices indirectly managed via ProVision, and containers imported from ProVision,
cannot be manually renamed, reparented or deleted by the ProVision Plus user. These
changes can only be performed in ProVision, after which the changes are automatically
reflected in ProVision Plus.
Note: USER ROLE: A user must have Engineer role access in order to rename, reparent or
delete devices and containers.
This is accessed through the Rename right-click menu option associated with device and container
objects in the Devices Tree, Direct Device Management, Topology Map, and Data Panel views.
Device objects can also be renamed directly in the Direct Device Management view, as described in
section Direct Device Management (on page 100).
Warning: Deleting a device results in all data associated with the device being deleted from
the database. This includes all historical event and performance data. This data cannot be
recovered, other than by restoring an earlier database backup generated prior to device
deletion.
This is accessed through the Delete right-click menu option associated with device and container
objects in the Devices Tree, Direct Device Management, Topology Map, and Data Panel views.
Note: Physical links between WTM 4000, CTR 8540/83xx and Eclipse devices can be
manually deployed. Physical links between WTM 4000 devices are automatically
discovered.
Note: USER ROLE: A user must have Engineer role access in order to access the Create
Link dialog.
Control Function
Select Enable/disable the ability to compare configuration and state of
selected devices through a specialized variant of the Detail view,
known as the Comparison view. See section Comparison View
(on page 88) for further information.
Control Function
Parameter Selection Provides the user with the ability to select the parameters to be
presented in the tabular view for analysis. See section Direct
Device ManagementView Attributes (on page 101) below for
details.
Export to CSV / JSON / PDF Export the access control settings for all directly managed devices
in CSV, JSON or PDF output format.
Control Function
Live (Model Status) Indicator warning when a change is detected in the Live network
that’s not in the Baseline design, i.e. the Baseline design and Live
configuration for the device differ.
For example, symbol indicates that a new device or service has
been detected in the Live network. See section Live Network
Configuration Change Indicators (on page 117) for a definition of
the supported Model Status indicators.
Name Name of the device that has been configured on ProVision Plus.
Type Device type, e.g. WTM 4100, CTR 8540, etc.
NETCONF Authentication Indicates the NETCONF authentication username, and provides the
Credentials ability to open the NETCONF Authentication Credentials dialog to
make changes.
Note: USER ROLE: A user must have Engineer role access in order to configure the
ProVision Network Access Control settings.
Note: As alarms convey state information, the alarm indicators provided in the Tree Context
Selector, Topology Map and Data panel are only available in the “Live + Baseline” topology
view.
Note: The summary Network Devices and Network Services Alarm Indicators in the Menu /
System Status Bar are always available, irrespective of the Baseline vs Live Selector setting.
See section Baseline / Live Selection (on page 116) for further details on the information
presented by these two options.
Topology Discovery
Discovery of the network topology, together with devices and services configuration and state
information, takes place automatically. This includes initial discovery and subsequent changes to
configuration and state.
For indirectly managed devices, the information is discovered via the ProVision NBI (Northbound
Interface), and also includes the physical deployment tree hierarchy defined in ProVision.
For further details, see section Communication with Devices (on page 28) on communication with
directly and indirectly managed devices, and section Automated Deployment via ProVision
System (on page 31) on automated topology import from ProVision NBI.
The following table provides additional details on the discovery of this information.
Table 13: Topology Discovery Details
Topology Map
The Topology Map provides the ability to graphically visualize the end-to-end services at each
networking layer, together with the dependency relationships between the layers.
The figure below highlights the main controls available for selecting the network topology to be
visualized on the map, through an example IP/MPLS network. The control types are as follows:
• Map Controls.
• Layers Selector.
• Topology Filter.
Note: LICENSING: IP/MPLS services are only presented in the Topology Map where the
IP/MPLS Fault product module is licensed.
Note: LICENSING: Carrier Ethernet services are only presented in the Topology Map where
the CE Fault & Performance module is licensed.
An example network with clock synchronisation services is presented in the figure below.
Map Controls
A set of map controls provide the ability to configure the Topology Map networking layers, managed
objects, and graphical format.
Figure 14: Topology Map Controls
Layers Selector
The Layers Selector provides the ability to display one or more networking layers on the Topology
Map and Data Panel. Through this control you can display any combination of the supported
layers.
When a layer is enabled, the end-to-end services for that layer together with the specific devices
supporting that layer are presented. For example, when only enabling the L2VPN layer, the L2VPN
services and the devices that provide an access point to the VPN services are presented. And
when only enabling the TE Tunnel layer, the TE Tunnel services and the devices that terminate the
TE Tunnels are presented.
Note: Unless the Physical layer is enabled, only the devices associated with the enabled
services layers are presented.
Note: LICENSING: IP/MPLS layers are only presented in the Layer Selector where the
IP/MPLS Fault product module is licensed.
Note: LICENSING: Carrier Ethernet (CE) layers are only presented in the Layer Selector
where the CE Fault & Performance product module is licensed.
The example figure below indicates selection of VLAN and Physical layers.
Control Function
Include the layer in the Topology Map and Data Panel.
Exclude the layer from the Topology Map and Data Panel.
The following table provides a description of the layers available for selection. See section MPLS
Network Layer Modeling (on page 20) for further details.
Table 18: Topology Map Layers Available for Selection
For WTM 4000 SD or L1LA configurations requiring paired devices, a single Radio Link is
presented between Main radio units. No link is presented on the Diversity radio units as they only
provide receiver paths and the RF module data is passed directly to the Main radio unit for
processing.
For WTM 4000 XPIC configurations requiring paired devices, a Radio Link is presented between
the matched radio units at each end of the radio link.
As a further example, the figure below presents a Topology Map for a L3VPN service with access
points on three PE routers, and service traffic delivered between the routers via LDP-signaled LSPs
Figure 19: Map Representation of Services at Each Layer (L3VPN with LSP Example)
VPLS Service:
Each VPLS service is represented by a VPN hexagonal symbol. The PE routers providing the
VPLS service to the customer are connected to the VPN symbol with purple links.
PW Service Representation
PW:
Each PW is represented by a bidirectional brown link between two terminating PE routers.
Figure 24: PW Service Representation
The user is able to unbundle and bundle the service links through the right-click menu options
described in the following table.
Table 19: Service Link Object Right-click Menu Bundling
In the case of selecting a TE Tunnel, the supporting TE Links over which the TE Tunnel LSPs are
routed can only be fully identified through the RRO operational state for each LSP.
Navigation from a TE Tunnel to the supporting TE Links is therefore only available where the
Baseline vs Live Selector is set to “Live + Baseline”.
When set to “Baseline”, only the ERO configuration for the TE Tunnel LSPs is indicated. See
below for a detailed example covering both cases (“Live + Baseline” and “Baseline” settings).
Note: Where Topology Filtering is configured, some supporting services for an enabled
layer may not be visible in the Topology Map. See section Topology Filtering (on page 89)
for details.
Any-to-any:
The following example presents an any-to-any topology, where 3 sites (providing access to the
L3VPN) export vpnv4 routes to all other sites.
Note: As the RT Link object indicates the flow direction of vpnv4 routes, the TE Tunnel and
tunnel LSP objects are in the opposite direction as they indicate the resultant traffic flow
direction.
VPLS Service:
Selecting a VPLS service highlights the underlying PW mesh (dotted).
Figure 42: L2VPN VPLS Service Navigation
Note: As the RRO for each TE Tunnel LSP is an indication of the operational state, as
opposed to the configuration, an RRO path (TE Links over which an LSP has been
instantiated) is only presented when the Baseline vs Live Selector is set to “Live + Baseline”.
Note: RRO is an optional configuration setting on a PE router. This setting must be
enabled on a TE Tunnel head-end router before is able to discover and present RRO path
information.
Example TE Tunnel with Working and Protecting Paths Transiting Same TE Link
Where both Working and Protecting paths transit the same TE Link, an orange line is displayed for
that hop. This is indicated in the following example.
This same notation applies to the LSP Links.
Figure 48: Example TE Tunnel with Working and Protecting Paths Transiting Same TE Link
The L1 Links have been excluded from the Layer Selector in order to simplify the representation.
Map Coordinates
This section describes the support available for positioning nodes (device and VPN objects) on the
Topology Map. In summary, the following capabilities are provided:
• Use either System Coordinates or Local Coordinates
o See How to Configure System Coordinates
o See How to Configure Local Coordinates
• Manually position nodes on map
• Automatically define the coordinates by applying an Auto Layout algorithm
• Lock/Unlock the ability to change the coordinates
The capabilities are provided through the Coordinate Modes drop-down menu and Lock/Unlock
toggle button as indicated in the figure below and described in the table below.
Control Function
System Coordinates Through the Coordinate Modes drop-down menu, each user can select to use either
and System Coordinates or Local Coordinates to position the nodes on the Topology
Local Coordinates Map.
• System Coordinates provides the ability for all users to adopt common coordinate
positioning. When this mode is selected, any changes to the coordinates
(typically made by a designated Engineer), are automatically reflected in all client
sessions that are using System Coordinates mode.
• Local Coordinates provides the ability for users to adopt their own personal
coordinate positioning.
System Coordinates is the default mode.
USER ROLE: Modification of the System Coordinates requires Engineer user role
access.
Import Local from This Coordinates Mode drop-down menu selection provides the ability to copy the
System Coordinates current common System Coordinates positions into your personal Local Coordinates
positions. This is a recommended initial step to setting up Local Coordinates for the
first time.
This control is only available when Local Coordinates is the selected coordinate
mode.
Export Local to System Provides the ability to copy the current personal Local Coordinates positions into the
Coordinates common System Coordinates positions.
This control is only available when Local Coordinates is the selected coordinate
mode.
Manually position Position node (device or VPN) objects manually on the map by using mouse drag
and drop controls.
This control is only available when the coordinates lock toggle button is set to Unlock.
Control Function
Auto Layout Nodes can be positioned automatically by selecting Auto Layout on the Coordinate
Modes drop-down menu. This applies a CoSE (Compound Spring Embedder)
algorithm to determine the optimal coordinate positions for each node in the network.
On selecting the Auto Layout menu option, a confirmation prompt is presented to the
user. On selecting OK, the following prompt is then presented on the Main Menu /
Status Bar:
It’s recommended that Auto Layout only be used as an initial step when positioning
the network nodes for the first time. After applying Auto Layout, you may wish to
further optimize the positions manually.
This control is only available when the coordinates lock toggle button is set to Unlock.
Note: When new nodes are subsequently added to the network (following
Auto Layout), it’s recommended that they be positioned manually, as Auto
Layout will be applied to the previously positioned nodes.
Lock/Unlock The lock toggle button provides the ability to Lock/Unlock the coordinates.
Coordinates This control is applied to the currently selected System Coordinates or Local
Coordinates.
By default the lock toggle button is set to Lock.
Export to PNG Exports the graphical Topology Map view to a PNG file.
Step Action
1. Unlock the System Coordinates.
2. Optionally apply Auto Layout.
3. Complete positioning of the coordinates manually.
4. Lock the System Coordinates.
Maintain object coordinates as new nodes (devices or VPN services) are added to the network:
Step Action
1. Unlock the System Coordinates.
2. Position the new nodes manually.
3. Lock the System Coordinates
Note: It is recommended that the System Coordinates be maintained by a designated
Engineer.
Step Action
1. Unlock the Local Coordinates
2. Either:
• Import Local from System Coordinates (where System Coordinates are configured), or
• Optionally apply Auto Layout.
3. Complete positioning of the coordinates manually.
4. Save the new coordinates positions (click the presented save button).
5. Lock the Local Coordinates.
Maintain object coordinates as new nodes (devices or VPN services) are added to the network:
Step Action
1. Unlock the Local Coordinates.
2. Position the new nodes manually.
3. Save the new coordinates positions (click the presented save button).
4. Lock the Local Coordinates.
Note: LICENSING: IP/MPLS overlay data is only presented in the dropdown menu options
where the IP/MPLS Fault product module is licensed.
Figure 57: Map Overlay Data and Auto Update Controls
Overlay Description
Auto Update Toggles the function of the Refresh button between Manual Update and Auto
Update. See section Map Controls (on page 47) for details.
76 May 2019 Aviat Networks
Multi layer Network Topology Visualization
Overlay Description
Node Name Display the Name above each node object (device or VPN).
This overlay is enabled by default.
Node Severity Set the color of each node object (device or VPN) to reflect the highest active
alarm severity. See section Severity Color Coding for Events and Alarms
(on page 125) for the alarm severity colors.
Router ID Display the Router ID above each device object.
Link Name Display the Link Name above the link object (e.g. TE Link).
Link Severity Set the color of each link object (L1 Link, TE Link, etc.) to reflect the highest
active alarm severity. See section Severity Color Coding for Events and
Alarms (on page 125) for the alarm severity colors.
Model Status Display the Model Status indicator on top of node and link objects. This
indicates where there is a difference between the Baseline design and Live
network configuration. See section Live Network Configuration Change
Indicators (on page 117) for details.
RT Link: Route Target Display the Route Target (RT) value on top of the RT Link objects.
TE Link: Max Bandwidth Display the TE Link Max Link Bandwidth value on top of the TE Link objects.
TE Link: Default Metric Display the TE Link Default Metric value on top of the TE Link objects.
LSP: First Hop Transport Label Display the LSP transport label for the first hop of the LSP.
LSP Link: Transport Label Display the transport (upper) label on top of the LSP Link objects.
SyncE: Priority & Quality Display the destination configured SyncE priority and current clock quality
state information.
SyncE: Clock Source Display the clock source icon on device node for Free run mode and any
configured external clock source.
Indicator Description
Layers Indicates the Layers enabled for presentation on the Topology Map and Data
Panel using the Layers Selector.
Focus Indicates the service object (i.e. the specific VPN, PW, RT Link, TE Tunnel, TE
Link, LSP, LSP Link or L1 Link) selected on the Topology Map or Data Panel
using mouse click.
Indicator Description
Key for Focus Provides a key for the supporting layer service for the selected Focus. An
supporting example is provided below for each possible supporting layer.
layer services VPN Focus example:
PW Focus example:
Data Panel
The Data Panel provides a tabular view of the configuration and state information of the devices
and services presented in the Topology Map graphical view.
When enabling networking layers through the Layers Selector (see section Layers Selector), in
addition to the associated devices and services being presented in the Topology Map, a separate
tab for each enabled layer is presented in the Data Panel.
And when filtering on specific devices or services (see section Topology Filtering), the selections
are applied to both the Topology Map and Data Panel views in a complimentary format.
The figure below presents an example Topology Map and Data Panel. As can be seen, both panes
present the L2VPN, PW and Physical layers enabled through the Layers Selector, and the same set
of devices and services.
• 2 x L2VPNs (1 x VPLS and 1 x VPWS)
• 4 x PWs
• 20 x unidirectional L1 Links
• 8 x Devices
Note: LICENSING: IP/MPLS services are only presented in the Data Panel where the
IP/MPLS Fault product module is licensed.
Figure 59: Example Topology Map and Data Panel
Control Description
Column Sort Sort the tabular view by mouse clicking on a column heading.
Search A text search can be applied to the tabular view, resulting in only those rows
containing a match being displayed. The search is applied to all tabs in the Data
Panel, i.e. it’s not only applied to the selected/visible tab.
Row Focus When you mouse click on a row in the Data Panel, the associated device or
service object on the map is highlighted and becomes the selected focus.
Row navigation Navigate to Events and Detail views associated with a particular row through the
menu mouse <right-click> menu.
Comparison Enable/disable the ability to compare configuration and state of selected devices
or services through a specialized variant of the Detail view, known as the
Comparison view. See Comparison View for further information.
Export to Export the information on the selected Data Panel tab in CSV, JSON or PDF
CSV/JSON/PDF output format. Where the view has been filtered using the Search control, only
the information in the resultant rows is exported.
Attribute Enable/disable the attributes available for display on the Data Panel tabs. The
list of available attributes is presented in the dropdown menu for the currently
selected (displayed) tab.
Attribute Description
Live (Model Indicator warning when a change is detected in the Live network that’s not in
Status) the Baseline design, i.e. the Baseline design and Live configuration for the
device or service differ.
For example, symbol indicates that a new device or service has been
detected in the Live network. See section Live Network Configuration
Change Indicators (on page 117) for a definition of the supported Model
Status indicators.
Alarm Indicator for the highest severity alarm currently active on the device or service.
For example, symbol indicates Major severity. See section Alarm Status
Indicators (on page 131) for details.
Selection of the attributes to be included on each tab is available through the Data Panel Controls
menu described in section Data Panel Controls (on page 81) above.
Devices Tree
The Devices Tree view presents the physical network hierarchy deployed directly in ProVision Plus
and/or indirectly via ProVision. See section Network Deployment (on page 27) for details. The
Devices tree view presents the physical network hierarchy that’s been deployed on the ProVision
network mediation system, and discovered via the NBI. This includes Region, Site, Rack and
Device objects.
Changes made to the physical network hierarchy in the ProVision mediation system are reflected in
ProVision Plus within a few seconds.
The figure below presents an example Devices tree view.
Figure 60: Example Tree Context Selector Devices Tree
Services Tree
The Services tree view presents the end-to-end services, including L2VPN, PW, L3VPN, RT Link,
TE Tunnel, TE Link, LDP LSP, LSP Link and physical L1 Link services.
Note: LICENSING: IP/MPLS services are only presented in the Service Tree where the
IP/MPLS Fault product module is licensed.
Note: LICENSING: Carrier Ethernet (CE) services are only presented in the Service Tree
where the CE Fault & Performance product module is licensed.
The figures below presents an example Services tree view.
Figure 61: Example Tree Context Selector Services Tree with IP/MPLS Services
Figure 62: Example Tree Context Selector Services Tree with CE Services
Search Searches for and highlights the next device or service object in the tree
that contains the entered text.
Where the next object is contained within a collapsed tree node, the
node is automatically expanded.
Filter object(s) Objects can be selected /deselected for inclusion in the topology filter by
selection clicking on the object name in the tree.
Selected objects are indicated by a symbol to the left of the object
name.
The filter selection can be viewed / edited by clicking on the filter symbol
( ). See the figure below for an example.
Filter controls = Delete the selected filter.
= Apply the selected filter to either the Topology Map / Data Panel
view, or the Performance view.
= View / edit the selected filter.
Hide / Unhide Hide / Unhide the Tree Context Selector pane.
pane
Lock / Unlock The Lock / Unlock button in the top right corner of the Devices Tree
Tree toggles the tree lock on and off. When unlocked, the tree can be edited
(see section Making Changes to Deployment (on page 33)).
Drag and Drop When the tree is unlocked, Container or directly managed Device objects
can be reparented by drag and drop. See section Making Changes to
Deployment (on page 33) for details.
Device Tooltip Indicates the following information for a device object:
• Object: Device name
• Type: Device type (e.g. WTM 4100)
• IP Address: Management IP address used to communicate with the
device
• State: Management state (Unmanaged, Connecting, Managed or
Errored)
• Severity: Highest active event severity for the device
Container Indicates the following information for a container object
Tooltip • Object: Container name.
• Type: Container type (Region, Site or Rack).
• Children: Number of objects in the container, excluding children of
those objects.
• Severity: Highest active event severity for all devices deployed within
the container, including any child containers.
Detail View
The Detail view provides the user with the following capabilities:
• Tabular view presenting the configuration and state detail of a selected device or service.
• Indication of the adjacent dependent (upper) and supporting (lower) layer services.
• Single click navigation to adjacent dependent or supporting layer service.
• Indication of the configuration differences between the Live network and Baseline design.
• Comparison of configuration and state information between multiple selected devices or
services of the same type. See section Comparison View for details.
Access to the Detail modal view is available from the right-click menu associated with each device
and service object in the Tree Context Selector, Topology Map and Data Panel panes.
The following figure presents an example L2VPN where there are no differences between the
discovered Live network configuration and Baseline design.
Note: LICENSING: IP/MPLS services are only accessible in the Detail view where the
IP/MPLS Fault product module is licensed.
Note: LICENSING: Carrier Ethernet (CE) services are only accessible in the Detail view
where the CE Fault & Performance module is licensed.
Figure 64: Example L2VPN Detail View
Area Description
Title Identifies the selected device or service.
Adjacent layer services Identifies the adjacent layer dependent (upper) and supporting (lower)
layer services.
For example, a specific TE Link may have multiple dependent upper layer
TE Tunnel services, and a single supporting lower layer L1 Link service.
Service detail Indicates the configuration and state detail of the selected device or
service.
Highlighting of attributes indicates the following:
• Blue text indicates that the Live network and Baseline values differ.
• Strike through text indicates that the object or attribute no longer exists
in the Live network.
Live/ Baseline Optionally displays the Live network and Baseline values for selected
Differences pane attributes that differ in value. Multiple attributes can be added.
The pane is displayed when clicking on a blue highlighted attribute.
Table 29: Detail View Controls
Note: The symbol is used to denote a state (as opposed to configuration) attribute.
Comparison View
The Comparison view is a specialized variant of the Detail view, providing the user with the
following additional capabilities:
• Tabular view presenting the configuration and state of multiple selected devices or services of
the same type.
• Configuration or state attributes that differ in value between the presented devices or services
are highlighted.
• Comparison of Baseline or Live network configuration and state is provided, as determined by
the Baseline vs Live Selector setting.
Access to the Comparison modal view is available from the right-click menu associated with the
Data Panel.
Step Action
1. Enable the Comparison option on the Data Panel drop-down menu.
This toggles the Data Panel right-click menu option from Detail to Comparison.
The checkbox selection column is then presented in the Data Panel table.
2. Multi-select the devices or services to be compared. The following example indicates
selection of two RT Link objects.
3. Select the Comparison option on the Data Panel right-click menu. The Comparison modal
view is then presented.
The figure below provides an example comparing two RT Link objects. In this particular example,
the two RT Links originate on different VRFs on different PE routers, have different Route Target
(RT) values, and terminate on the same VRF.
Topology Filtering
Topology filtering provides the ability to view the section of the network topology (in the Topology
Map and Data Panel) that’s associated with one or more specific containers (e.g. regions), devices
or end-to-end services. For a large deployed network containing 100s or 1,000s of devices, this
type of filtering enables the user to quickly select a specific region or area. This capability also
facilitates efficient impact analysis and troubleshooting. For example, on detection of a L2VPN
service failure, filtering on the VPN service identifies the underlying supporting layer services and
devices, one of which is the probable root cause.
A filtered topology view presents the device or service objects included in the filter together with the
following:
• Dependent (higher layer) services in enabled layers.
• Direct or indirect supporting (lower layer) devices and services in enabled layers.
Depending on the method selected for configuring the topology filter, either one or more devices or
one or more services can be selected and applied. This is described further below.
Where multiple objects (devices or services) are included in the filter, the dependent and supporting
layer objects are presented for each. Hence the logic applied by the filter is to display
dependent/supporting layer services/devices for filtered object1 OR object2 etc (as opposed to
object1 AND object2 etc.).
For example, where Device 1 supports only VPN A and Device 2 supports only VPN B, including
Device 1 and Device 2 in the filter, results in both VPN A and VPN B being displayed. Hence when
planning on software upgrading multiple devices in the network, filtering on the devices can be used
to identify the set of VPN services that will be impacted.
Note: When a topology filter is applied, some supporting services on an enabled layer may
not be visible in the Topology Map and Data Panel. For example, when filtering on a device
that supports a TE Tunnel Primary Working LSP and then selecting the TE Tunnel in the
filtered view, the supporting Protecting LSP may not be presented. In this situation, a
warning message is presented to the user. See example procedure in section Example
Topology Filters (on page 90) below.
Note: A filtered topology view can also differ between viewing the “Live + Baseline” or the
“Baseline” topology, as operational state information can only be viewed when “Live +
Baseline” is set. For example, the RRO operational state (indicating the supporting TE Links
for the LSPs of a selected TE Tunnel) or LDP LSP operational state (indicating the LSPs
signaled via LDP).
Note: When a topology filter is applied, the rows presented in the Data Panel match the
selected filter, however displayed Termination fields present the full list of terminations
associated with the row device of service object. For example, when applying a TE Link
filter, the Device tab presents the two devices that support the TE Link however the L1
Terminations field lists all the interfaces that terminate L1 Links for that device.
A topology filter can be selected and applied to the topology view via the following methods:
• Tree Context Selector Controls. This method allows for including multiple devices or multiple
services in the topology filter. See section Tree Context Selector Controls (on page 84) for
details on applying a filter via the Tree Context Selector.
• Map object right-click menu. This method provides a quick and simple means of applying a
topology filter comprising a single device or service.
Step Action
1. On the main menu, select Topology > Physical to display the physical network topology.
2. Open the Layer Selector and enable layers L2VPN and PW. The Physical layer is already
enabled.
3. Select and apply the filter via one of the following methods:
Tree Context Selector:
• Select context Services on the Tree Context Selector.
• Click on a VPN service in the Services tree. The selected VPN is added to the context
filter.
• Apply the filter to the Topology view by clicking on the icon in the Tree Context
Selector.
Map object right-click menu:
• Click on the VPN service object on the Topology Map and select menu option Filter on
the right-click menu.
4. The Topology Map and Data Panel are now filtered to only display the VPN service and the
underlying layer services (in this case the PWs and L1 Links) over which the VPN is
delivered. Use the Layer Selector to enable other layers.
Step Action
1. On the main menu, select Topology > Physical to display the physical network topology.
2. Open the Layer Selector and enable layer L2VPN. The Physical layer is already enabled.
The following example presents the L1 topology for a number of VPWS point-to-point
services.
Step Action
4. The topology view is now filtered to only display the L1 Link and the dependent higher layer
L2VPN services.
In this example it can be seen that VPWS 12 and VPWS 10 will be impacted by L1 Link
[193]-[192].
5. On selecting VPWS 10, a warning message beneath the Detail / Key confirms that some
supporting links (end-to-end services) for an enabled layer may not be visible.
6. To better understand why a particular VPN service is impacted (it’s not always intuitively
obvious), simply add the VPN to the topology filter (using the method in step 3).
In this example VPWS 10 is added to the topology filter.
Step Action
7. In this example, the topology view clarifies that VPWS 10 (between PE routers [176] and
[191]) must transit L1 Link [193]-[192].
8. To better understand how each supporting layer for VPWS 10 is impacted by maintenance
on L1 Link [193]-[192], simply enable each as required using the Layer Selector.
Note: LICENSING: Configuration management features are only available where the EM
Fault & Performance product module (for directly managed devices) or the EM Integration
For ProVision product module (for devices managed via ProVision EMS) is licensed.
Topics include:
• Network Device Detail (on page 96)
• Network Inventory (on page 98)
• Direct Device Management (on page 100)
• Managing Customized Layouts (on page 102)
• Device Configuration Backup and Restore (on page 103)
• Device Licensing (on page 105)
• Device Software Loading (on page 107)
• Task Manager (on page 111)
A key is provided at the bottom of the tabular view, indicating the view mode (Live or Baseline), and
the date & time that the view was generated. An example is provided in the following figure.
Figure 69: Example Network Device Detail View Key
Control Function
View Mode Provides the user with the following mode selections:
• Live: Presents the latest configuration data collected from the live
network devices, i.e. the Live only data (as opposed to a
combination of Live+Baseline data).
• Baseline: Presents the Baseline only data.
The view defaults to the selection in the Baseline/Live Selector (see
section Baseline Live Selection (on page 116) for details).
Layout Menu Provides the user with the ability to create alternative Device Detail
layouts, which can subsequently be opened without having to
reselect the set of parameters each time. See section Managing
Customized Layouts (on page 102) for details.
General / Inventory / Radio / Provides the user with the ability to select the General, Inventory,
Interface Radio and Interface parameters presented in the tabular view for
analysis. See the Figure below for the available parameters.
Export to CSV / JSON Export the selected parameters for all devices, in CSV or JSON
output format.
General Inventory
Radio parameters: Interface parameters:
parameters: parameters:
Network Inventory
The Inventory view provides the user with a specialized variant of the Device Detail view that
includes the device inventory information for the network. The user is provided with the following
capabilities:
• Tabular view presenting the inventory information for all or a subset of the devices in the
network. This includes the date & time that the information was last updated (i.e. collected)
from each device. A separate row is presented for each physical or logical device module.
• Analyze the inventory using sort and search controls, in order to rapidly identify specific
inventory information. For example to identify all modules of a specific type and hardware
revision.
The following figure presents an example Inventory view.
Figure 71: Example Inventory View
A key is provided at the bottom of the tabular view, indicating the view mode (Live or Baseline), and
the date & time that the view was generated. An example is provided in the following figure.
Figure 72: Example Network Inventory View Key
Row navigation Provides access to the device management capabilities and views
menu associated with a particular device row, through the mouse
<right-click> menu.
Table 34: Inventory Preferences Menu Options
Control Function
View Mode Provides the user with the following mode selections:
• Live: Presents the latest inventory data collected from the live network
devices, i.e. the Live only data (as opposed to a combination of
Live+Baseline data).
• Baseline: Presents the Baseline only data.
The view defaults to the selection in the Baseline/Live Selector (see
section Baseline Live Selection (on page 116) for details).
Layout Menu Provides the user with the ability to create alternative Inventory layouts,
which can subsequently be opened without having to reselect the set of
parameters each time. See section Managing Customized Layouts (on
page 102) for details.
Control Function
General / Inventory Provides the user with the ability to select the General and Inventory
parameters presented in the tabular view for analysis. See the Figure
below for the available parameters..
Export to CSV / JSON Export the selected parameters for all devices, in CSV or JSON output
format.
Table 35: Inventory Preferences Menu Parameter Selections
Parameter Edit Button Provides the ability to edit the following parameter settings:
• Name: Device name configured on ProVision Plus.
• Management IP Address: The IP address ProVision Plus uses
to communicate with the device. For example, on selecting
the Edit button associated with the Management Name....
…the field becomes editable. The user can then change the
setting and select tick ( ) to complete the edit, or cross ( ) to
cancel.
Row navigation menu Provides access to the device management capabilities and views
associated with a particular device row, through the mouse
<right-click> menu.
Table 37: Direct Device Management Preferences Menu Options
Control Function
Select Enable/disable the ability to compare configuration and state of
selected devices through a specialized variant of the Detail view,
known as the Comparison view. See section Data Panel
Attributes (on page 81) for further information.
Parameter Selection Provides the user with the ability to select the parameters to be
presented in the tabular view for analysis. See section Direct
Device Management (on page 100) below for details.
Export to CSV / JSON / PDF Export the selected parameters for all devices, in CSV, JSON or
PDF output format.
Attribute Description
Live (Model Status) Indicator warning when a change is detected in the Live network that’s
not in the Baseline design, i.e. the Baseline design and Live
configuration for the device differ.
For example, symbol indicates that a new device or service has been
detected in the Live network. See section Live Network Configuration
Change Indicators (on page 117) for a definition of the supported Model
Status indicators.
Name Name of the device that has been configured on ProVision Plus.
Aviat Networks May 2019 101
Configuration Management
Attribute Description
Management State Indicates the current management state of the device.
Where the device is configured as Managed on ProVision Plus, the
Management State is presented as one of the following values:
• Connecting: This transition state is automatically entered when the
device is configured as Managed.
• Managed: This state is automatically entered from either the
Connecting state or Errored state once ProVision Plus successfully
communicates with the device. Fault, configuration and performance
information is periodically collected from the device when in this state.
• Errored: This state is automatically entered from the Managed state
when ProVision Plus is subsequently unable to communicate with the
device.
Where the device is configured as Unmanaged, the ProVision Plus
Management State is presented as Unmanaged. There is no active
communication with the device when in this state.
Management IP Address Management IP address of the device that has been configured on
ProVision Plus. This address is used by ProVision Plus to communicate
with the device.
Type Device type or model (e.g. WTM 4100, WTM 4200, etc.).
Physical Parent The parent container of the device in the Devices Tree.
Control Function
Default Layout Resets the view to the default settings, including parameter selection and column
ordering.
Open Presents previously saved customized device layouts as a set of submenu options.
On selection, the saved layout is applied to the Device Detail view.
Save Saves the currently presented parameters selection and column ordering as a
customized Device Detail view on the local client machine.
Delete Deletes the currently viewed customized Device Detail layout. The layout is
removed from the local client machine, and is no longer available for selection.
Step Action
1 Navigate to the view by selecting one of the following:
• Network > Configuration > Device Detail menu
• Network > Configuration > Inventory menu
The default view is presented.
Step Action
2 Select the parameters to be presented in the new customized layout, through the General,
Inventory, Radio and Interfaces options in the Preferences pull-down menu ( ).
3 Select the column ordering required through drag and drop of the column headers.
4 Select the Save option in the Layout menu. In the presented dialog, enter a name for the
customized layout and then press the OK button.
5 The name of the new customized layout is now selectable through the Layout > Open
menu.
Note: Configuration Backup and Restore is only provided for devices that are directly
managed from ProVision Plus.
The device configuration backups are listed in two sections, Automatic Backups and Retained
Backups.
Automatic Backups indicates the last N successful backups automatically read from the device,
where N is the maximum number defined on the Device Config Backup Settings (on page 104)
dialog. Once N backups have been collected for a device, new backups result in the previously
collected backups being automatically purged from the ProVision Plus server.
Retained Backups indicates backups that the user has selected to retain permanently on the
ProVision Plus server. This includes backups initiated by the user on demand, and automatic
backups that the user has subsequently selected to retain.
Note: A configuration backup from WTM 4000 running R2.3 or earlier software is not
supported by a device running R2.4 or later software, and the restored operation is therefore
disallowed.
The controls available with Config Backup and Restore are listed in the table below.
Table 40: Config Backup and Restore Controls
Note: USER ROLE: A user must have Engineer role access in order to access the Config
Backup and Restore feature.
Field Description
Enable Automatic Provides the ability to Enable/Disable automatic backup of device
Backups configurations. The setting defaults to Enabled.
Automatic Backup Time (in hours) between automatic checking for device configuration
Period changes. The configuration is only backed up on the ProVision Plus
server when a change is detected. The setting defaults to 12 hours.
Maximum Automatic The maximum number of automatic backups kept on the ProVision
Backups Plus server for each device. Once the maximum is reached for a
device, a new backup results in the oldest backup being purged from
the ProVision Plus server. The setting defaults to 5.
Save Applies the changes in settings, and persists the changes to the
ProVision Plus database.
Defaults Resets all Configuration Backup Settings to their default values.
The configuration backup settings view is accessed through the Admin > Device Config Backup
Settings menu.
Note: USER ROLE: A user must have Engineer role access in order to change the
configuration backup settings.
Device Licensing
The Licensing view provides the user with the following capabilities:
• Tabular view presenting all devices that have unlicensed features.
• Ability to register licenses for devices on the ProVision Plus server.
• Ability to activate trial licenses on devices.
• Ability to apply registered licenses to devices.
Note: USER ROLE: A user must have Engineer role access in order to access this view.
Activate Trial Selecting Activate Trial opens the Licensing Task dialog (see below for
details) with the following header:
The Activate Trial button is only presented after selecting a device (using the
tick box) with "Trial Features" available on the device.
Apply License Opens the Licensing Task dialog (see below for details), allowing the user to
apply licenses to devices.
When this button is clicked, the Licensing Task dialog is displayed (see
below for details).
The Apply License button is only presented after selecting a device (using
the tick box) with "New Features" registered on the Provision Plus server.
Register Allows the user to select device license files for registering on the Provision
License Plus server.
Where the selected license files contain new features not yet licensed on the
managed devices, these features are presented in the New Features column.
Filter table rows Filters the tabular view. The available selections are as follows:
• All – Presents all devices that Provision Plus can manage licensing for.
• New Feature – Presents devices for which there are new features
registered, however the features are not yet applied to the devices.
• Trial – Presents devices that have trial licenses applied, however not yet
activated.
• Unlicensed – Presents devices with features defined as unlicensed.
• No Action – Presents devices for which there are no new license
features and no trial licenses to apply.
By default, the Unlicensed option is selected.
Search A text search can be applied to the tabular view, resulting in only those rows
containing a match being displayed.
Select Devices are selected through the tick box mechanism in the first column of
the table. This allows the user to select one or more devices.
Selecting a device with "Trial Features" available results in the Activate Trial
button being presented and selecting a device with "New Features" available
results in the Apply License button being presented.
Column Sort Sort the tabular view by mouse clicking on a column heading.
Task This icon is presented when a licensing task is currently running against this
device. The device is not selectable (through the tick box) until the licensing
task completes.
Detail Opens the Device Detail dialog with the Licensing tab open.
Where mode is selected, the differences between
registered licenses and licenses currently on the device are presented in the
Device Detail.
Where mode is selected, only the registered licenses are
presented in the Device Detail.
Note: USER ROLE: A user must have Engineer role access in order to access this view.
Figure 79: Example Software Loading View
Load Software Selecting Load Software opens the Task dialog with the following header.
See section Licensing Task Dialog (on page 107) for details on the Task
dialog.
The Load Software button is only enabled once software loading has
been configured, and one of more devices that support the software
product and version have been selected.
Register Software Allows the user to select the device software files to be registered on the
ProVision Plus server.
Search A text search can be applied to the tabular view, resulting in only those
rows containing a match being displayed.
Product Allows the user to select the software product to be loaded.
Each software product supports a specific device platform, or a subset of
the device variants of a platform. For example, software product
"wtm4100" version 2.4.0 supports 4100, 4200, 4500 and 4500T variants
of the WTM 4000 platform.
Version Allows the user to select the version of the software product to be loaded.
The list of software versions registered on the ProVision Plus server are
available for selection, with latest versions presented first in the picklist.
Note: Different software versions may support different subsets of
a device platform’s variants. Where a selected version is not
supported by a device, a is presented beside the active version
for that device.
Remove Allows the user to remove the selected registered software version from
the ProVision Plus server.
Show Devices Presents all the devices that support the selected software product and
version.
Alternatively, the user can select specific devices for through the Tree
Context Selector controls. See section Tree Context Selector (on page
82) for details.
Max Concurrent Defines the maximum number of software transfers that can take place
concurrently for the task.
Transfer time Allows the user to define when the software transfer takes place. The
available selections are as follows:
• Manually – Allows the user to start the transfer on-demand.
• Later – Allows the user to define the date and time at which the
transfer takes place.
• Immediately – Start the transfer straight away (when the task is
created in Task Manager)
By default, the Immediately option is selected.
Activate time Allows the user to define when the software activation takes place. The
available selections are as follows:
• Manually – Allows the user to start the activation on-demand.
• Later – Allows the user to define the date and time at which the
activation takes place.
• After Transfer – Start the activation immediately after the transfer is
complete.
By default, Manually option is selected.
Global Rollback Allows the user to define the rollout behaviour to be applied by all
Software Activation tasks.
When Global Rollback is enabled (through the tick box), rollback to the
previous software for all devices in the task takes place where software
activation for any of the devices doesn’t occur within the specified "Within
minutes" time.
When Global Rollback is disabled, no rollout occurs irrespective of a
device failing to activate the software.
Within minutes The number of minutes allowed for software activation to take place on all
devices in a task.
This field is only presented when Global Rollback is enabled (through the
tick box).
Apply Now Immediately applies the changes to the Global Rollback settings.
The Apply Now button is only presented when changes have been made
to the settings and have not yet been applied.
Column Sort Sort the tabular view by mouse clicking on a column heading.
Detail Opens the Device Detail dialog with the Software tab presented.
The Detail button is only presented when mode is
selected.
Remove Allows the user to remove the device from the table.
The following table describes the fields in the software loading device table.
Software Indicates when there is currently a software loading task active in the Task Manager
loading task for this device.
indicator When the icon is presented, the Load Software button is disabled.
Device state Indicates the device is currently unmanaged or loss of comms.
indicator
Device The name of the device.
Type The device platform variants supported by the selected software product and version,
e.g. WTM4100, WTM4200, WTM4500 and WTM450T variants are supported by the
"wtm4100" software product.
Active Version Presents the currently active (running) software version in the device.
Version action Presents the action that will occur from a software version perspective.
indicator = The software will be downgraded.
= The software will be upgraded.
= The software is not compatible with the device.
(blank) = The software is active, however has not been Acknowledged. This can occur
where activation has been performed using the device craft tool, without
Acknowledging on activation completion. See the device help documentation for
details.
(blank) = The software is active and acknowledged.
Inactive Version Presents the inactive software version in the device.
Where this is the version you wish to load, this can be performed through Software
Activation without first performing Software Transfer, as the software version is
already on the device.
Detail Opens the Device Detail dialog with the Software tab presented.
The Detail button is only presented when mode is selected.
Remove Allows the user to remove the device from the table.
Task Manager
The Task Manager view provides the user with the following capabilities:
• Tabular view presenting all tasks in the Task Manager.
• Ability to run actions on a task.
• Ability to monitor progress of a task.
• Ability to view details of a task.
Note: USER ROLE: Operator and Engineer users have access to the Task Manager and
can view details about each task, however a user must have Engineer role access in order to
execute actions on a task.
Table 46: Task Manager Progress Indicator
Progress Description
The task has started and the % completion of the task is known.
Progress Description
The task is attempting to run however devices are not in a ready state or device
comms has been lost.
The device problem needs to be resolved, and then the user can Retry the task.
The identified radio has reported an unexpected state condition. Retry the
operation and if the problem persists, attempt to apply the operation using the
device craft tool.
The task has failed. The user can either Retry or Delete the task.
The task has completed successfully, and the user can Delete the task.
Delete Provides the user with the ability to delete all successfully completed tasks
Successful where all successor tasks have been successfully completed.
Search A text search can be applied to the tabular view, resulting in only those rows
containing a match being displayed.
Column Sort Sort the tabular view by mouse clicking on a column heading.
Retry Provides the ability to Retry a running task where the task has failed, loss of
comms with the device has occurred, or the device is not ready.
When the task is retried, the Task Manager reads the state of all the devices
and if none are loss of comms the task will restart.
Abort Provides the ability to Abort a running task where none of the devices are
restarting.
On Abort completion the task is set to failed, and the user can then Retry or
Delete the task.
Start Provides the ability to start the task manually, where the task is set to Manual
and not yet started.
The start button is only presented in this situation.
Delete Provides the ability to Delete the task. This is only supported where the task
is in one of the following states and there are no successor tasks:
• Failed
• Not Started
• Waiting
• Invalid State
• Loss of Comms
• Not Ready
Log Opens the Task Log dialog. See section Task Log Dialog (on page 113)
for details.
When a task is selected, a table of devices is presented with a Detail button for each device. The
Detail button opens the Device Detail dialog with the relevant tab opened.
The following table identifies the controls available in the Task Manager view when a task is
selected that has not been started.
Table 48: Task Manager Detail Control
Start Allows the user to define when the task starts. The available
selections are as follows:
• Manually – Allows the user to start the task when the Start
button is pressed.
• Later – Allows the user to define the date and time at
which the task automatically starts.
Save Allows the user to apply the changes to the task.
changes
Cancel Allows the user to cancel the current changes to the task.
The upper table presents details on the selected task. This includes the details available in the
Task Manager view, together with the following additional fields:
• Concurrent: Indicates the number of subtasks currently running.
• Max Concurrent: Indicates the maximum number of concurrent subtasks supported.
The lower table presents a log of the actions associated with the selected task. The following
types of entry are captured in the log:
• Subtask: This is typically a Netconf Action sent to an individual device.
• Task: A task may have multiple phases. For example, the Transfer Software task has
phases "Load Software", "Load Error" and "Resetting Error". A separate log entry is created
for each phase.
The following table describes the Task Log fields.
Table 49: Task Log Table Fields
Name Description
Action For a subtask entry, this typically indicates a Netconf protocol Action. For a task
entry, this field is blank.
Error Indicates an error occurred during execution of the subtask. The perceived
severity of the error is indicated (critical, major, minor, or warning).
Message This is the message returned from the action sent to the device or the task phase
to be applied to "All" devices.
Date The date and time the task or subtask was executed.
Device Name of the device to which the subtask applied. This field indicates All for a
task entry.
Subtask # Indicates the order of execution of the subtasks. This field is left blank for task
entry.
Indicator Description
The device or end-to-end-service object is in the Baseline design, however is
Not in Live ( )
not in the Live network.
Probable cause(s):
• Device has been removed from the ProVision mediation system’s
topology.
• End-to-end service has been removed from the configuration of one or
more devices in the network.
Proposed action(s):
• If planned, the change should be explicitly promoted to the Baseline
design. See section Promoting Live Network Changes to Baseline (on
page 118) for details.
• If unplanned (unauthorized or accidental), resolve on ProVision mediation
system or configuration of devices in the network.
The device or end-to-end-service object is in the Live network only, i.e. is not
In Live Only ( )
in the Baseline design.
Probable cause(s):
• New device deployed in ProVision mediation system’s topology.
• New end-to-end service has been configured on one or more devices in
the network.
Proposed action(s):
• Assuming the change is planned, promote to the Baseline design. See
section Promoting Live Network Changes to Baseline (on page 118) for
details.
Configuration Differs The configuration of a device or end-to-end service object in the Live network
differs from the configuration in the Baseline design.
( )
Probable cause(s):
• Configuration attributes of the device or service object have been changed
in the Live network.
Proposed action(s):
• If planned, promote to the Baseline design. See section Promoting Live
Network Changes to Baseline (on page 118) for details.
• If unplanned (unauthorized or accidental), resolve by undoing the
configuration changes on the network devices.
Reconciliation Report
The Reconciliation Report provides the user with a list of the inconsistencies (or misconfiguration
issues) detected in the Live network.
The following figure presents an example Reconciliation Report with a L2VPN inconsistency.
Figure 85: Example Reconciliation Report
The following table describes the parameters presented with each inconsistency.
Table 52: Reconciliation Report Parameters
Name Description
ID ID generated by ProVision Plus for display purposes only. When combined
with the other fields, this ensures each row is unique.
Rule Identifies the inconsistency rule not adhered to. The supported rules are
listed in the table below.
Summary Summary description of the inconsistency.
Description Fuller description of the inconsistency, indicating the change required in order
to resolve the issue.
Inconsistent Objects Names of the device or service objects exhibiting the inconsistency.
Data Origins Names of the device objects from which the inconsistent data has been
obtained.
The following table presents the set of inconsistencies that are currently detectable.
Table 53: Reconciliation Report Detectable Inconsistencies
Once the changes have been promoted, the Baseline design is now in sync with the Live network
configuration, and the Live network configuration change indicators (Model Status) should clear.
Services Alarms
A common set of service-centric alarms (Services Alarms) are implemented for most end-to-end
services in ProVision Plus’s model of the network topology, hence are provided for each IP/MPLS,
Carrier Ethernet, and physical L1 Link service.
The state of the Services Alarms is determined by automatically correlating the Devices Alarms
detected from the network with the services in the network topology model.
The table below indicates the common Services Alarm types. See section Services Alarms
Reference for a more detailed and accurate definition of the Services Alarms supported at each
layer, and description of the correlation of Devices Alarms.
Table 54: Services Alarm Types
Attribute Description
Severity Perceived severity value. Based on reference ITU-T X.733.
Supported values and a summary of their meaning are as follows:
• Critical :- A traffic affecting condition is active
• Major :- A potentially traffic affecting condition is active
• Minor :- A non-traffic affecting condition is active
• Warning :- A minor fault condition is active
• Cleared or Normal :- No fault condition is active
• Informational :- Informational only event (not a fault condition)
See section Severity Color Coding for Events and Alarms (on page 125) for
a definition of the colors used to indicate each severity value.
Active (state) Supported event/alarm states are Active (meaning up) or Cleared (meaning
down or inactive).
Events that are considered informational only (e.g. user logged into device)
only have state Active.
Attribute Description
Acknowledged Indicates whether the event/alarm has been acknowledged by the user.
For indirectly managed devices the Acknowledged / Unacknowledged setting is
discovered from ProVision.
Indicates whether the event/alarm has been acknowledged by a user in the
ProVision mediation system.
Supported values are as follows:
• Acknowledged
• Unacknowledged
Event (name) A short descriptive name that uniquely identifies the type of event/alarm.
Object Identifies the managed object that the event/alarm is associated with:
• For a device the format is [<device-name>/<plugin>]<interface>.
• For a service the format is <service-name>.
Raised (date/time) Date and time that the event/alarm was detected:
• For a device, this reflects the time that the device detected and generated
the event (i.e. the device generates this timestamp).
• For a service, this reflects the time that detected the fault and raised the
event (i.e. generates this timestamp).
Cleared Date and time that the event/alarm was cleared:
(date/time) • For a device, this reflects the time that the device detected the clearing
condition (i.e. the device generates this timestamp).
• For a service, this reflects the time that ProVision Plus detected the clearing
condition (i.e. generates this timestamp).
Cause Provides a brief description of the probable cause.
Category Categorizes events and alarms into different types. Based on reference ITU-T
X.733.
Supported values are as follows:
• Communication
• Environmental
• Equipment
• Processing Error
• Quality of Service
• Security
• MPLS
Event Browser
The Event Browser provides the ability to view events and alarms detected from the network
devices and services in a tabular view.
In summary, the user is provided with the following capabilities:
• Tabular view presenting the history of detected events and alarms associated with devices
and services.
• Analyze the events using sort and search controls.
• Mark events as acknowledged.
• Manually clear events.
• Customize the view, and save for future access.
• For a selected event, locate the device or service in the Topology Map.
Area Description
Event Browser Identifies the title of the Event Browser view.
Title When viewing a customized browser filter, this reflects the name defined by the user
when the filter configuration was saved. See section Acknowledge Event (on
page 126) below for further details.
Events Table Presents the events history in a tabular format.
The columns included are determined by the Events Browser configuration. See
section Acknowledge Event (on page 126) below for details.
Pagination is enabled when there are more events than fit the display.
Events Summarize the total numbers of active alarms by severity. Separate indicators are
Summary
Indicators provided for Critical, Major and Minor severity. For example,
indicates that 2 x Critical and 8 x Major severity alarms are active.
Table 58: Event Browser Controls
Events Search Searches for and displays only those events (table rows) containing
the entered text.
The search is applied to all event attributes, including attributes that
are currently not enabled for display (through the Events Browser
configuration settings).
Browser Filter Toggle control, enabling/disabling access to the browser filter
Configuration configuration settings. See section Acknowledge Event (on page
126) below for details.
Browser Saved Dropdown menu providing access to previously saved browser filter
Filters configurations.
Row navigation Provides access to the management capabilities and views
menu associated with a particular event row, through the mouse
<right-click> menu.
Acknowledge Event
Acknowledging an event notifies other operators that the event is currently being handled.
The Event Browser provides the user with the ability to acknowledge events that are raised against
directly managed devices and service events derived by ProVision Plus. This is available through
the Acknowledge right-click menu option associated with each event. Acknowledged events can
be unacknowledged through the same menu option.
The acknowledged setting is presented in the Event Browser by default, through the Ack column.
Figure 88: Example Event Browser with Acknowledged Events
Note: Acknowledge of events raised against indirectly managed devices (i.e. devices
managed via ProVision) is not supported. This can only be performed in ProVision, resulting
in the acknowledge state being imported and reflected in ProVision Plus.
Note: USER ROLE: A user must have Operator role access in order to acknowledge /
unacknowledged events.
Note: Manual clearing of device events raised against indirectly managed devices (i.e.
devices managed via ProVision) is not supported. This can only be performed in ProVision,
resulting in the acknowledged state being imported and reflected in ProVision Plus.
Note: Manual clearing of service events is not supported. As service events are
automatically derived from the state of the dependent device events, they are cleared when
all active dependent device events are cleared.
Note: USER ROLE: A user must have Engineer role access in order to manually clear
events.
Area Description
Filter Configuration The configurable settings are broken down into the following groups, each
Tabs accessible via a separate filter configuration tab.
• Simple – Filter based on attribute values
• Date – Filter based on date range(s)
• View – Select the columns and max events in the event view
Filter Configuration Presents the user configurable event attributes for a given settings type
Settings (filter configuration tab), and provides the user with the ability to determine
the events to be displayed in the browser based on the attribute values.
For example, only display events with the State attribute value Active and
Severity attribute value Critical.
Table 60: Event Browser Filter Configuration Controls
Apply filter Selecting the Apply button immediately applies the changes
made (on any of the filter configuration tabs) to the viewed
Event Browser.
Note: Selecting the Apply button does not save the
changes.
Save filter Selecting the Save button immediately saves the changes
made (on any of the filter configuration tabs) to the filter
identified by the Filter Name field.
To create a new browser configuration filter, edit the Filter
Name before selecting the Save button.
Note: Select the Save button does not apply the
changes to the viewed Event Browser.
Note: Customized browser filters are saved on the client machine for personal use.
Step Action
1. Open an Event Browser.
2. Select the Browser Filter Configuration toggle button (), and make the desired
changes/edits to the Filter Configuration Settings on each tab.
Step Action
3. Check the desired changes by selecting the Apply button, to immediately apply the
changes to the viewed Event Browser.
The Apply button is now highlighted dark blue:
And the changes are now reflected in the viewed Event Browser.
4. Edit the Filter Name to reflect the behavior of the new Event Browser filter.
5. Select the Save button to immediately save the new Event Browser filter.
The Saved button is now highlighted dark blue.
And a system message confirms when the save has successfully completed.
Step Action
1. Open an Event Browser.
2. Select the existing customized Event Browser filter to be deleted, from the Browser Saved
To illustrate this capability, the figure below presents the example where a traffic affecting fault is
reported for a L3VPN service. In this example the Event Browser indicates service "L3VPN 1" has
a Critical severity "VPN service down" alarm active. By clicking the symbol prefixing the service
alarm name, it can be seen that the fault is due to Ethernet AC (Attachment Circuit) port down on
PE router service access node "10.18.47.2 - CTR 8540".
Figure 90: Example Services Alarm Root Cause
As displayed in the Context Selector Devices Tree example above, indicators are also provided for
the device interface plugins (physical or logical), in this case ETHERNET interfaces and TRIB
interfaces logical plugins. In addition, aggregated indicators are provided for container objects (e.g.
Sites), each reflecting the highest active severity of the objects (e.g. Devices) in that
container. See section Devices Tree (on page 82) for further details on the Devices Tree.
Context Selector: Services Data Panel: Topology Map: VPN: Topology Map: PW,
Tree TE Tunnel, TE Link,
LDP LSP, LSP Link,
L1 Link:
As displayed in the Context Selector Services Tree example above, aggregated indicators are also
provided for the service types, each reflecting the highest active severity of the services of that
type. See section Services Tree (on page 82) for further details on the Services Tree.
Note: LICENSING: Performance management is only available where the EM Fault &
Performance or EM Integration for ProVision product module is licensed.
Data Collection
Performance data is automatically collected every 15 minutes from sensors and configured
traffic-carrying interfaces on the managed devices. This includes the following types of
information:
• Transmitter, receiver and modem statistics for radio interfaces
• Packet statistics for Ethernet and radio interfaces (where available), including error, discard,
throughput and utilization statistics
Some devices provide the performance data associated with interfaces and sensors in the form of
15-minute and Daily (24-hour) bins. For example WTM 4000 provides 15-minute and Daily bins for
radio interfaces. And some devices provide the data as a set of online values that continually
change over time. Irrespective of the format provided by the device, ProVision Plus saves all
collected raw performance data in the form of a historical set of 15-minute and Daily bins.
Note: Performance data is not collected from device interfaces that have been configured
as disabled.
Resource Performance
The Resource Performance view provides the ability to perform deep-dive analysis of the
performance data associated with one or more network resources, i.e. radio and Ethernet traffic
interfaces and device sensors for one or more devices.
The user is able to select traffic interfaces and sensors (including the specific performance
parameters) for up to 4 devices, together with the time period over which the analysis is to be
performed. Analysis of the associated data can be performed through the following complimentary
views.
• Overview: Presents a graphical performance summary for the selected resources over time,
including an indication of performance issues for each bin period.
• Chart: Presents a performance line chart for the selected resources.
• Detail: Presents the performance data for the selected resources in a tabular view that can be
sorted and filtered.
Figure 93: Example Resource Performance View
Control Function
Exclude Invalid Data Excludes the raw bin data marked as invalid by the devices. The invalid bins are
greyed out in the Resource Performance Overview timeline, and are not presented in
the Chart and Detail views.
Note: Where Aggregation is also enabled (i.e. set to a value other than None),
invalid bin data is excluded from the aggregated bin calculation. For example,
for Bin selection 15-minute and Aggregation setting 1 hour and 3 of 4 15-minute
bins are invalid, the data for the single valid 15-minute bin would be used.
Note: WTM 4000 radios mark bins as invalid when the radio hasn’t been
operating for the full measurement period of the bin (e.g. a power cycle or reset
has occurred), or the date & time has been adjusted.
Radio / Ethernet / Sensor Provides the user with the ability to select the types of radio (transmitter, receiver and
modem), Ethernet, and Sensor parameters presented in the performance view for
analysis. See the Performance Parameter Selections table below for example
selections.
Export to CSV / JSON Export the performance data for the selected resources in CSV or JSON output
format.
Table 66: Example Performance Parameter Selections for WTM 4000
Overview Scroll Scrolls the timeline between the selected Start and End times.
Missing Bin Grey background indicates that data isn’t available for this bin.
For example, where ProVision Plus was unable to communicate
with the device (i.e. no data collected), or the data has been
removed from the database (i.e. collected and subsequently
purged).
See section Database Management of the Installation and
Administration Guide for details on performance data purging.
Errored or Below Red square indicates that the performance parameter for this bin
threshold parameter is below the threshold value identified in the table above.
Chart Tab
The Chart view provides the user with the following capabilities:
• Performance timeline chart for selected resources over a selected time period.
• Presents time correlated view of performance across multiple device interfaces and sensors.
The figure and table below identify the analysis controls available to in the Chart view.
Figure 96: Resource Performance Chart Controls
Detail Tab
The Resource Performance Detail view provides the user with the following capabilities:
• Tabular view presenting the performance data for the selected resources.
• Analyze the data using sort and search controls.
Figure 97: Resource Performance Detail Controls
Control Description
Search A text search can be applied to the tabular view, resulting in only those rows
containing a match being displayed.
Column Sort Sort the tabular view by mouse clicking on a column heading.
Network Health
The Network Health view provides the ability to proactively analyze the performance of all (or a
subset of) the traffic interfaces or device sensors in the network over a selected time period, and
rapidly identify current or historical performance issues. This includes the following types of
problems:
• Traffic interfaces experiencing capacity over (or under) utilization.
• Traffic interfaces experiencing a degradation in performance over time.
• Radio interfaces not meeting expected G.826 availability.
• Radio interfaces with low RSL.
• Ethernet interfaces experiencing packet errors or packet discards.
• Devices experiencing high temperature or low input power.
When accessed from the Devices Tree, the view is rendered in a floating dialog and is automatically
populated with data for the selected Container or device.
By default the available performance data for the previous 7 days is presented.
Control Function
Exclude Invalid Data Excludes the raw bin data marked as invalid by the devices from the analysis
calculations.
Note: Where Aggregation is also enabled (i.e. set to a value other than None),
invalid bin data is excluded from the aggregated bin calculation. For example,
for Aggregation setting 7 days and 3 of 4 daily bins are invalid, the data for the
single valid daily bin would be used.
Note: WTM 4000 radios mark bins as invalid when the radio hasn’t been
operating for the full measurement period of the bin (e.g. a power cycle or reset
has occurred), or the date & time has been adjusted.
Select Parameters Provides the user with the ability to select the types of radio (transmitter, receiver and
modem) and Ethernet parameters presented in the performance view for analysis.
The parameters available for selection are the same for both the Resource
Performance and Network Health views. An example is included in section
Resource Performance View Controls (on page 137).
Export to CSV / JSON Export the performance data for the selected resources in CSV, JSON or PDF output
/ PDF format.
Detail Tab
The Network Health Detail view provides the user with the following capabilities:
• Tabular view presenting the performance data for the selected resources.
• Analyze the data using sort and search controls.
The tabular view presents one or more rows for each Radio or Ethernet interface, or each device
(for the device sensors), depending on the Aggregation parameter setting. See the Aggregation
parameter description in the Network Health View Controls table above for further information.
As an example, the figure below presents 4 rows for each Radio interface, where the Start / End
reporting period is 28 days and the Aggregation setting is 7 days. The parameters in each row are
aggregated values over the collected 7 daily raw samples in the aggregation period.
Figure 103: Example Network Health Detail with Multiple Rows Per Interface
Control Description
Search A text search can be applied to the tabular view, resulting in only those rows
containing a match being displayed.
Column Sort Sort the tabular view by mouse clicking on a column heading.
Row navigation menu Provides access to the device management capabilities and views associated with a
particular device row, through the mouse <right-click> menu.
Supported
Service Type Description
Diagnostics
RT Link (VRF routing) Ping + TraceDetermines whether there is L3VPN routing connectivity from a VRF
to a selected network address destination, through executing a VRF
ping or trace diagnostic. This is performed on the VRF at the
terminating end of a selected the RT Link (i.e. the VRF that imports
the RT value tagged routes).
TE Tunnel Ping + Trace Validates connectivity of a selected TE Tunnel, through executing a
TE Tunnel ping or trace diagnostic on a selected TE Tunnel ID.
This is initiated on the head-end PE router for the tunnel.
LSP Ping + Trace Determines whether there is LSP connectivity to a selected network
address destination, through executing an LSP ping or trace
diagnostic. This is initiated on the PE router at the ingress end of
the LSP.
The above ping and trace diagnostics are performed by establishing an SSH session between the
ProVision Plus server and the device on which the diagnostic is initiated, and then executing the
corresponding ping or traceroute CLI commands.
Area Description
Service Identifier Unique identifier for the selected RT Link, TE Tunnel or LSP service.
Diagnostic Type Indicates MPLS Ping or MPLS Trace, together with associated settings.
Diagnostic Result The following result information is presented. For a Trace diagnostic test, this is
presented for each node on the path.
• Type: transit or dest (destination) node
• Address / Device: Node IP address
• MTU: Interface Maximum Transmission Unit
• Label(s): Input label(s).
• Time (ms): Round-trip time in milliseconds.
History Selector Lists up to the last 5 diagnostics executed on the selected service, indicating the
service, diagnostic type, execution time and result for each entry.
Table 79: Diagnostics View Controls
Example Diagnostics
This section provides some examples ping and trace diagnostics executed on RT Link (VRF
routing), TE Tunnel and LSP services.
Step Action
1. Select an RT Link service and initiate a Ping diagnostic from the right-click menu.
Result: The selected service and diagnostic is populated on the Diagnostics Data Panel Tab.
Step Action
2. Select the Destination Address and then press the Start button to execute the diagnostic.
Result: On completion the results are presented as shown below.
Optionally press the Console button to view the associated CLI commands and results.
Step Action
1. Select a TE Tunnel service and initiate a Trace diagnostic from the right-click menu.
Result: The selected service and diagnostic is populated on the Diagnostics Data Panel Tab.
Step Action
2. Press the Start button to execute the diagnostic.
Result: On completion the results are presented as shown below.
Optionally press the Console button to view the associated CLI commands and results.
Step Action
1. Select an LSP service and initiate a Trace diagnostic from the right-click menu.
Result: The selected service and diagnostic is populated on the Diagnostics Data Panel
Tab.
Step Action
2. Press the Start button to execute the diagnostic.
Result: On completion the results are presented as shown below.
Optionally press the Console button to view the associated CLI commands and results.
The figure and table below identify the controls available in the Diagnostic History view.
Figure 110: Diagnostic History View Controls
New Baseline created Warning A new Baseline has been created. Please select the Refresh
button to display the new Baseline design. Save any edits in
progress (e.g. map coordinate repositioning) before selecting
the Refresh button.
User Roles
ProVision Plus provides role based access control, i.e. where a user’s access to the system is
determined by the roles the user has been assigned. More accurately the relationship of users and
roles is described as follows:
• A user may be assigned zero or more roles, and
• A role may be assigned to zero or more users.
For example, a user could be assigned both Operator and Engineer roles. Or a number of users
could be assigned the Engineer role.
The equivalent user access restrictions apply to the northbound interface (NBI). See the ProVision
Plus Northbound Interface System Integration Guide for the supported roles, and access provided
for each role, via the NBI.
The table below identifies the supported roles, and describes the access provided with each role.
User Profile
You are able to view and modify your user profile by clicking on your Display Name presented on
the top left side of the Main Menu / Status Bar. This provides access to the User Profile page.
The figure below presents the User Profile page, together with the Change Password dialog that’s
accessible from this page.
The table below describes the settings available for view and modification.
Table 83: User Profile Attributes
Attribute Description
User Account Id A unique identifier automatically allocated to each new user account created
in the system. This cannot be modified.
Email Your email address. This cannot be modified as it’s used to activate and
maintain your user account.
Display Name An alternative and easier to read configurable name (than your email
address). This can be modified.
Attribute Description
Assigned Roles Identifies the roles you’ve been assigned in the system.
A user can be assigned zero, one or multiple roles. The supported roles
are as follows:
• Administrator
• Engineer
• Operator
See section User Roles (on page 166) for details on the access provided by
each supported role.
Password (Current, Enter a new password that adheres to the composition rules defined by an
New) Administrator user.
Note: The first character must always be a letter, including where the
password needs to contain one or more numbers.
Step Action
1. An email containing a user activation link is received from the server.
2. Select the activation link to active the new user account.
3. Follow the instructions and enter a new password.
4. When presented with the login page, enter email address (user name) and password.
Step Action
1. Select the Forgot Password? link on the login page.
2. Enter email address when prompted and then select the Request Password Reset link.
Aviat Networks May 2019 169
Managing Your Access to the System
Step Action
3. An email containing a password reset link is received from the server.
4. Select the link.
5. Follow the instructions and enter a new password.
6. When presented with the login page, enter email address and password.
Device Attributes
Attribute Description
Device Name Name of the device.
Discovered from the ProVision mediation system.
Device Type Device type, e.g. WTM 4100 or CTR 8540
Management IP Address IP address by which the device is managed by ProVision Plus.
For indirectly managed devices, this is the same as the address
used by ProVision.
Management Admin State Device management admin state (unmanaged or managed).
Management Status Device management status (unmanaged, connecting, managed
or errored).
Physical Parent Name of the parent container object, as defined by the network
container hierarchy.
Router ID Router IDs and loopback addresses.
L1 Termination Identifier for device interface/port that terminates a L1 Link.
Notation <plugin_ID>/<port_number> is used. For example,
“Slot2/1” indicates port 1 of the plugin in slot 2.
TE Terminations Identifier for device interface/port that terminates a TE Link.
Notation <plugin_ID>/<port_number> is used. For example,
“Slot2/1” indicates port 1 of the plugin in slot 2.
Interface Name Identifier for a device interface/port.
Notation <plugin_ID>/<port_number> is used. For example,
“Slot2/1” indicates port 1 of the plugin in slot 2.
VPN AC VPN Attachment Circuit (AC) configured on the
device. Indicated by the identifier for a device interface/port.
Notation <plugin_ID>/<port_number> is used. For example,
“Slot0/1” indicates port 1 of the bank of Ethernet ports on the
CTR mainboard.
Interface Phys Address Media Access Control address (MAC address) of a device
interface.
Reference: IETF RFC 1213 (MIB II).
Interface MTU Maximum Transmission Unit (MTU) for a device interface.
Indicates the largest datagram which can be transmitted on the
interface.
Reference: IETF RFC 1213 (MIB II).
Interface Admin Status Administrative state of a device interface.
Indicates the configured/desired state of the interface. Valid
states are up, down and testing.
Reference: IETF RFC 1213 (MIB II).
Interface Oper Status Operational state of a device interface.
Valid values are up, down and testing.
Reference: IETF RFC 1213 (MIB II).
PW Termination Device interface/port that terminates a PW.
Notation <plugin_ID>/<port_number> is used. For example,
“Slot0/1” indicates port 1 of the bank of Ethernet ports on the
CTR mainboard.
Attribute Description
L2VPN AC L2VPN Attachment Circuit (AC) configured on the device.
Indicated by the identifier for a device interface/port.
Notation <plugin_ID>/<port_number> is used. For example,
“Slot0/1” indicates port 1 of the bank of Ethernet ports on the
CTR mainboard.
L3VPN AC L3VPN Attachment Circuit (AC) configured on the device.
Indicated by the device VRF name followed by the identifier for
the device interface/port.
Notation <VRF name>,<plugin_ID>/<port_number> is used.
For example, “VRFA, Slot0/1” indicates port 1 of the bank of
Ethernet ports on the CTR mainboard that’s mapped to VRFA.
L1 Link Attributes
Attribute Description
L1 Link Source Source Device name + Interface of the L1 Link.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
L1 Link Destination Destination Device name + Interface of the L1 Link.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
L1 Link Endpoint A/Z Source/destination device name + Interface of the L1 Link.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
TE Link Attributes
Attribute Description
TE Link Name Name/ID of the TE Link configured on the device.
The name/ID is made unique by combining with the source and
destination device name.
Where a TE Link is configured on device “DUT A” as “teAB”, the
Services Tree presents the name full name (for example) as
“teAB – [DUT A] radio4/1 – [DUT B] radio4/1”.
TE Link Source Source device name + Interface of the TE Link.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
TE Link Destination Destination device name + Interface of the TE Link.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
TE Link Protection Type Link protection type (e.g. unprotected, dedicate 1+1, etc.).
Presents the capability that exists for a link, for use in path
computation when setting up LSPs.
Reference: IETF RFC 4204 (Routing Extensions in Support of
GMPLS).
Max Link Bandwidth (kbps) Maximum bandwidth (kbps) that can be used on this TE Link.
Reference: IETF RFC 3630 (TE Extensions to OSPF), and RFC
5305 (IS-IS Extensions for TE).
Attribute Description
TE Link Default Metric TE Link metric administratively assigned on the router.
For OSPF-TE, referred to as TE Metric. For ISIS-TE, referred to
as TE Default Metric.
Reference: IETF RFC 3630 (TE Extensions to OSPF), and RFC
5305 (IS-IS Extensions for TE).
TE Link Admin Status Admin status (up or down) for the TE Link.
TE Link Oper Status Oper status (up or down) for the TE Link.
TE Link Access Type Link access type (point-to-point or multi-access) for a TE Link.
Reference: IETF RFC 3630 (Traffic Engineering (TE) Extensions
to OSPF).
Max Reservable Link Bandwidth Maximum amount of bandwidth (kbps) that can be reserved over
(kbps) this TE Link.
Reference: IETF RFC 3630 (TE Extensions to OSPF), and RFC
5305 (IS-IS Extensions for TE).
TE Tunnel Attributes
Attribute Description
Tunnel ID Tunnel ID.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Tunnel Source IP Address of the source (ingress) PE router of a TE Tunnel.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Tunnel Destination IP Address of the destination (egress) PE router of a TE Tunnel.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP RRO Identifies the RRO (Record Route Object) operational state of
the Working or Protecting LSP, by identifying the hop-by-hop TE
Links providing the LSP path.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels), RFC 4872 (RSVP-TE Extension in Support of
E2E Recovery).
Working / Protecting LSP ERO Identifies the ERO (Explicit Route Object) for the Primary
Working or Protecting LSP, listing the nodes along the explicit
route.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels), RFC 4872 (RSVP-TE Extension in Support of
E2E Recovery).
Tunnel Active LSP Identifies whether the Working or Protecting LSP is currently
active.
Tunnel Admin Status Admin status (up or down) for a TE Tunnel.
Reference: IETF RFC 1213 (MIB II).
Tunnel Oper Status Oper status (up or down) for a TE Tunnel.
Reference: IETF RFC 1213 (MIB II).
Tunnel Name Name for a TE Tunnel.
Notation <“mplstunnel”><Tunnel ID> is used.
Tunnel Type Always set to tunnel-ptp.
Tunnel Setup Priority Setup priority for a TE Tunnel.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Attribute Description
Tunnel Holding Priority Holding priority for a TE Tunnel.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Tunnel Protection Protection (lsp-prot-unprotected or lsp-prot-1-for-n) configuration
for a TE Tunnel.
Note: 1-for-1 protection is indicated as a form of 1-for-n.
Reference: IETF RFC 4872 (RSVP-TE Extension in Support of
E2E Recovery).
Working / Protecting LSP ERO Index for an ERO (Explicit Route Object) subobject.
Index Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP ERO Usage (include or exclude) for an ERO (Explicit Route Object)
Usage subobject.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP ERO IP IP address for an ERO (Explicit Route Object) subobject.
Address Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP ERO Identifies whether an ERO (Explicit Route Object) subobject is
Loose loose or strict (true=loose, false=strict).
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP RRO Index for an RRO (Record Route Object) subobject.
Index Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP RRO IP IP address for an RRO (Record Route Object) subobject.
Address Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Working / Protecting LSP RRO IP IP address prefix length for an RRO (Record Route Object)
Prefix Length subobject.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Tunnel LSP ID ID for a TE Tunnel LSP.
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Tunnel LSP Type Tunnel LSP type (tunnel-p2p or tunnel-p2mp).
Reference: IETF RFC 3209 (RSVP-TE: Extensions to RSVP for
LSP Tunnels).
Tunnel LSP Origin Type Tunnel LSP origin type (ingress or egress).
Reference: IETF RFC 4872 (RSVP-TE Extension in Support of
E2E Recovery).
Tunnel LSP Resource Status Tunnel LSP resource status (primary or secondary).
Reference: IETF RFC 4872 (RSVP-TE Extension in Support of
E2E Recovery).
Tunnel LSP Protection Role Tunnel LSP protection role (working or protecting).
Reference: IETF RFC 4872 (RSVP-TE Extension in Support of
E2E Recovery).
Attribute Description
PW Source Source PE router name + Interface for the PW.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
Reference: IETF RFC 4664 (Framework for L2VPNs).
PW Destination Destination PE router name + Interface for the PW.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
Reference: IETF RFC 4664 (Framework for L2VPNs).
PW Endpoint A/Z Source/destination PE router name + Interface for the PW.
Notation <plugin_ID>/<port_number> is used for the
Interface. For example, “Slot2/1” indicates port 1 of the
plugin/card in slot 2.
PW Admin Status Admin status (up or down) for a PW.
Reference: IETF RFC 1213 (MIB II).
PW Oper Status Oper status (up or down) for a PW.
Reference: IETF RFC 1213 (MIB II).
L2VPN Tab Attributes
Attribute Description
L2VPN Name For a VPLS service the name is discovered from the device.
For a VPWS service notation <“VPWS”><PW
ID><[source_name] - [destination_name]> is used. For
example “VPWS 10 - [CTR1] - [CTR2]”.
L2VPN ACs List of VPN Attachment Circuits.
Notation <device_name>,<plugin_ID>/<port_number> is used
for each AC.
For example, “CTR1, Slot0/1” indicates CTR1 port 1 of the bank
of Ethernet ports on the mainboard.
Reference: IETF RFC 4664 (Framework for L2VPNs).
L2VPN Signaling Type Signaling type used to signal the PW.
Supported types include ldp-signaled and static.
For a Targeted-LDP signaled PW, the type is ldp-signaled.
Reference: IETF RFC 4664 (Framework for L2VPNs).
L2VPN Service Type Type of L2VPN PW service (Ethernet or TDM).
L2VPN AC VLAN ID L2VPN VLAN Attachment Circuit.
Dot1Q trunking VLAN ID.
Reference: IEEE 802.1Q.
L2VPN AC S-VLAN ID L2VPN S-VLAN Attachment Circuit.
Q-in-Q service provider tunneling S-VLAN ID.
Reference: IEEE 802.1Q.
L2VPN AC C-VLAN ID L2VPN C-VLAN Attachment Circuit.
Q-in-Q customer tunneling C-VLAN ID.
Reference: IEEE 802.1Q.
Attribute Description
L3VPN VRF Name VRF name configured on a PE router.
Note: VRF name is only unique within a PE router.
VRFs on different PE routers that are members of the VPN
can have different VRF names.
Reference: RFC 4364 (BGP/MPLS IP VPNs).
L3VPN VRF Device PE router name.
L3VPN VRF RD Route Discriminator (RD) value configured on a VRF.
Reference: RFC 4364 (BGP/MPLS IP VPNs).
L3VPN VRF Import RTs List of import Route Target (RT) values configured on a VRF.
Reference: RFC 4364 (BGP/MPLS IP VPNs).
L3VPN VRF Export RTs List of export Route Target (RT) values configured on a VRF.
Reference: RFC 4364 (BGP/MPLS IP VPNs).
L3VPN VRF ACs List of Attachment Circuits (ACs) mapped to a VRF.
Each Attachment Circuit is identified by the interface name (e.g.
Slot4/1) and the interface IP address.
Reference: RFC 4364 (BGP/MPLS IP VPNs).
SyncE Link Tab Attributes
Attribute Description
SyncE Link Source Source device name + Interface of the SyncE Link.
Notation <plugin_ID>/<port_number> is used for the Interface.
For example, "Slot2/1" indicates port 1 of the plugin/card in slot
2.
SyncE Link Destination Destination device name + Interface of the SyncE Link.
Notation <plugin_ID>/<port_number> is used for the Interface.
For example, "Slot2/1" indicates port 1 of the plugin/card in slot
2.
Priority SyncE priority set on the interface. The value can be minimum
1 and maximum 1024.
ESMC Ethernet Synchronization Messaging Channel (ESMC) value can
be either receive-only, transmit-only, both or disabled.
Clock Direction Configured clock direction which can set on GigabitEthernet
ports, otherwise it will be same as ESMC value.
Wait to Restore The wait-to-restore timer ensures that a previously failed clock
source has been fault-free for a specified time (0 to 86,400 sec)
before becoming available for selection, while in the meantime
the QL-Failed status is maintained.
Hold Off Time The hold-off timer ensures that short signal-fail conditions are not
acted on (with settings from 50 to 10,000 msec), while in the
meantime the previous QL level is maintained.
Override Quality Tx/Rx Override quality level.
Quality Currently received clock quality level.
PTP Link Tab Attributes
Attribute Description
PTP Endpoint A Endpoint A device name + Interface of the PTP Link.
Notation <plugin_ID>/<port_number> is used for the Interface.
For example, "Slot2/1" indicates port 1 of the plugin/card in slot
2.
Attribute Description
PTP Endpoint Z Endpoint Z device name + Interface of the PTP Link.
Notation <plugin_ID>/<port_number> is used for the Interface.
For example, "Slot2/1" indicates port 1 of the plugin/card in slot
2.
PTP Enabled Boolean value to represent whether PTP enabled on the
endpoint.
L1 link fault L1 Link Minor A network facing device interface (wireless or Ethernet) that
terminates the L1 Link has a fault or diagnostic mode active.
L1 link admin L1 Link Info The L1 link is admin disabled.
disabled This is raised as a severity Informational event, to assist with
identifying the root cause of dependent (upper) layer service faults.
Table 85: Carrier Ethernet Services
VLAN service down VLAN Critical An access port is down on one or more devices.
Note: This alarm is supported for customer bridge C-VLANs
and provider bridge (QinQ) S-VLANs.
VLAN service fault VLAN Minor A fault condition exists with the VLAN or supporting layer service.
Note: This alarm is supported for customer bridge C-VLANs
and provider bridge (QinQ) S-VLANs.
VLAN Link down VLAN Major VLAN Link interface is down on one or both devices that terminate
Link the VLAN Link.
VLAN Link fault VLAN Minor A fault condition exists with the VLAN Link or supporting layer
Link service.
PTP Link Down PTP Link Major The PTP Link interface is down on one or both devices that
terminate the PTP Link
PTP Link Fault PTP Link Minor A fault condition exists with the PTP Link or supporting layer service.
PTP Link PTP Link Minor A supporting layer service is admin disabled.
supporting layer
admin disabled
SyncE Link Down SyncE Major The SyncE Link interface is down on one or both devices that
Link terminate the SyncE Link
SyncE Link Fault SyncE Minor A fault condition exists with the SyncE Link or supporting layer
Link service.
SyncE Link SyncE Minor A supporting layer service is admin disabled.
supporting layer Link
admin disabled
VPN service down L2VPN Critical PW (carrying SAToP traffic) between the PE routers is down, or a
service AC (Attachment Circuit) is down on one or both PE routers.
VPN service down L3VPN Critical AC (Attachment Circuit) is down on one or more PE routers.
VPN service L2VPN, Minor VPN service is degraded due to loss of protection in a supporting
degraded L3VPN layer service.
For example, failure of either the Working or Protecting LSP for a
supporting TE Tunnel 1:1 protection configuration, results in "TE
Tunnel degraded" alarm, which is propagated to a "VPN service
degraded" alarm.
VPN service fault L2VPN Minor One or more of the L2VPN ACs has a fault or a diagnostic mode
enabled.
VPN service L2VPN, Minor A supporting layer service is admin disabled.
supporting layer L3VPN
admin disabled
PW down PW Major PW (carrying Ethernet traffic) between PE routers is down.
TE link down TE Link Minor The TE link interface is down on one or both routers that terminate
the TE link.
TE link degraded TE Link Minor TE Link is degraded due to loss of protection in a supporting L1 link
service.
For example, protection is lost in a radio link hot standby protection
configuration.
TE link fault TE Link Minor A fault condition exists with the TE Link or a supporting layer
service.
TE link supporting TE Link Minor A supporting layer service is admin disabled.
layer admin
disabled
TE link admin TE Link Info TE Link is admin disabled.
disabled This is raised as a severity Informational event, to assist with
identifying the root cause of dependent (upper) layer service faults.
WWW.AVIATNETWORKS.COM