OSA 5422 11.1.1 Provisioning and Operations
OSA 5422 11.1.1 Provisioning and Operations
Operations
OSA 5422
Product Release: 11.1.1
Document Issue: A
Document Number: 80000067459
Copyright © 2020-2022 ADVA Optical Networking
All rights reserved. Hardware and software mentioned in this document includes software developed by
ADVA Optical Networking ("ADVA"), the Apache Software Foundation (http://www.apache.org), Teodor
Danciu (http://jasperreports.sourceforge.net), and/or other open source software.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the Company nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
This software is provided "as is", and any express or implied warranties, including, but not limited to, the
implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the
company or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential
damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or
profits; or business interruption) however caused and on any theory of liability, whether in contract, strict
liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if
advised of the possibility of such damage.
Patents
The content described in this document may be covered by patents or pending patent applications of ADVA.
The furnishing of this document does not give you any license to these patents.
Disclaimers
Nothing in this document shall be construed as granting any license or rights with respect to its content or the
patents and trademarks mentioned above. The content of this document may include technical inaccuracies or
typographical errors, and is subject to change at any time without notice. Reliance on this content is at the
relying party's sole risk and will not create any liability or obligation for ADVA. Any references in this document
to publications and/or Internet sites that are not from ADVA are provided for convenience only and do not in
any manner serve as an endorsement of those publications and/or Internet sites. The materials within those
publications and/or Internet sites are not part of the materials for any ADVA information, product, or service,
and use of those publications and/or Internet sites is at your own risk.
THE CONTENT OF THIS DOCUMENT IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ADVA, ITS AFFILIATES, EMPLOYEES, OFFICERS
OR ITS SUPPLIERS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND BASED
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENT, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE. THE SAME APPLIES FOR ANY HARDWARE OR SOFTWARE COVERED
BY THIS DOCUMENT, UNLESS A SIGNED AGREEMENT WITH ADVA OR THE APPLICABLE PRODUCT LIABILITY
LAW EXPRESSLY STATES OTHERWISE.
ADVA
Fraunhoferstr. 9a
82152 Martinsried/Muenchen
Germany
Phone +49(0)89-890665-0
Fax +49(0)89-890665-699
http://www.adva.com
Overview 20
Management Overview 20
Management Features 21
Provisioning Communications 21
User Management and Security 21
Managing Local User Profiles 22
Managing SNMP Users 23
Access Control Lists 23
Custom Security Banner 23
RADIUS or TACACS+ 23
Provisioning Operations 24
Provisioning System Options 24
Provisioning Network Elements 24
Provisioning Secure Access 25
Provisioning Alarms 25
Provisioning Performance Monitoring 25
Provisioning Communications 46
Provisioning Communications 47
Implementing Management Communication to the OSA 5422 47
Signing In with User Names and Passwords 48
Connecting to the Serial Port 48
Setting Up the OSA 5422 DCN eth0 Port Through the Serial Port 49
Verifying the DHCP Status of the eth0 Port 51
Changing the DHCP Status of the eth0 Port 52
Configuring the eth0 Port 52
Verifying the IP Address of the eth0 Port 53
Verifying That HTTP and HTTPS Settings are Enabled 54
Verifying Connection with the Web-Based EMS 54
Disconnecting the Serial Port and Ending the Session 55
Accessing OSA 5422 with a Browser-Based IP Connection 55
Editing the DCN eth0 Configuration 56
Configuring the DCN as a DHCP Server 59
Configuring the DCN as a DHCP Client 60
Disabling DHCP 62
Manually Configuring the IP Address 64
Adding/Deleting IPV4 Static ARP Entries 65
Adding/Deleting IPv6 Static Routes 67
Adding/Deleting IPv6 Static Neighbor Entries 69
Adding/Deleting IPv4 Static Routes 72
Setting up a Network Example for GNE-to-SNE Over a Management Tunnel 74
Provisioning Operations 79
Provisioning the OSA 5422 79
Recommended Steps after the Initial Power On 80
Verifying the Installed Shelf and Oscillator Type 80
Entity State Descriptions 81
Administration State 81
Details about the Administration State Model 82
Understanding Parent-Child Rules 83
Understanding Many-to-One Relationships 84
Operational State 85
Secondary State 85
Upgrading the Software Version 88
Upgrading the Software Version 89
Validating the Upgrade 91
Canceling a Scheduled Activation 91
Provisioning System Options 92
Configuring the System for Optimal Security 92
Configuring the System Identity and Configuration 93
Configuring SNMP Traps Forwarding for Login or Logout 97
Configuring Logs 97
Configuring Security Logs 98
Configuring Alarm Logs 98
Configuring Audit Logs 99
Configuring System Logs 100
Configuring the Management Access Control List 102
Editing the Security Banner 103
Editing the Time Zone 104
Configuring an NTP Client 107
Configuring PTP or NTP Security for IP Addresses 109
Configuring the IP Traffic ACLs 109
Configuring the ICMPv4 and ICMPv6 Filters 112
Activating Software Licenses 115
Enabling a Software License 116
Provisioning Common Units 117
Configuring NE-1 117
Configuring NTEOSA 5422 119
Configuring PSUs 120
Provisioning the Display Card 121
Provisioning Line Cards 122
Layer 3 PTP Enterprise Profile or Default Profile Slave Clock Provisioning Order 227
Layer 3 Enterprise or Default Profile Grandmaster Clock Provisioning Order 227
Layer 3 PTP G.8265.1 and G.8275.2 Boundary Clock Provisioning Order 229
Layer 3 PTP Broadcast Profiles Master Clock Provisioning Order 229
Layer 3 PTP Broadcast Profiles Master Clock Provisioning Order 230
Layer 2 PTP Multicast G.8275.1 and Default Profile Grandmaster Clock Provisioning
Order 231
Layer 2 PTP Multicast G.8275.1 Boundary Clock and Slave Clock Provisioning Order 231
Layer 2 PTP Power Profiles Grandmaster Clock Provisioning Order 232
PTP Procedures 233
Editing the Delay Asymmetry Setting of an Ethernet Port 233
Creating a Telecom Slave 234
Creating a Slave-Only Ordinary Clock 236
Creating a PTP Flow Point 239
Creating an Ordinary Clock Slave Port 240
Creating a Boundary Clock 243
Steps for Creating a Boundary Clock 244
Creating a Master Clock Interface 245
Creating a Master Virtual Port 249
Creating Layer 3 PTP Master Clock 249
Creating G.8275.2 or G.8265.1 Static Remote Slave 253
Validating MCI Dynamic Remote Slave 256
Verifying a Dynamic Remote Slave Connectivity 257
Creating a PTP Clock 260
Verifying Remote Slave Connectivity 263
Creating a Power Profile Grandmaster Clock 264
Creating a PTP Flow Point 267
Creating a PTP Port 270
Creating an L3 PTP Port 275
PTP Configuration Parameter Options 280
Telecom Slave Parameter Options 280
Slave Only Ordinary Clock Parameter Options 285
PTP Flow Point Parameter Options 290
Ordinary Clock Slave Port Parameter Options 292
Boundary Clock Parameter Options 293
Master Clock Parameter Options 294
Master Clock Interface Parameter Options 295
Master Virtual Port Parameter Options 299
Static Slave Parameter Options 299
Alarms, Events, Probable Causes, and Error Codes — List of all the alarms and events
generated by the system including probable cause and troubleshooting instructions.
Documentation
Related Documentation 15
Accessing Documentation 15
Documentation Feedback 15
Related Documentation
l OSA 54xx Safety Guide
l GNSS Antennas and Accessories Installation Guide
l OSA Access Compatibility Matrix
l Pluggable Transceiver Module Specification
l OSA 5422 Installation and Commissioning Manual
l OSA 5422 System Description
l OSA 5422 Command Line Reference Guide
l OSA 5422 SNMP User Guide
Accessing Documentation
Documentation Portal https://advadocs.com/
Documentation Feedback
We want our documentation to be as helpful as possible. Feedback is always welcome.
Email [email protected]
Mail ADVA
Technical Documentation
Märzenquelle 1-3
98617 Meiningen-Dreissigacker
Germany
l 24 x 7 telephone support
l Web-based support tools
l On-site support
l Technical training, both on-site and at ADVA facilities in Germany and the USA
l Expedited repair service
l Extended hardware warranty service
Customer Portal
You can use the customer portal to:
Access https://www.adva.com/en/customer-portal
Questions [email protected]
Technical Services
Technical services are available to customers who need technical assistance with an
Oscilloquartz: An ADVA Company product that is under warranty or covered by a
maintenance contract.
Online https://www.adva.com/en/about-us/contact
Email [email protected]
Call ADVA
Europe, Middle East and Africa
Martinsried/Munich, Germany
+49 (0)89 89 06 65 0
North America
Norcross, GA, USA
+1 678 728 8600
Asia
Shenzhen, China
+86 755 8621 7400
Laser Radiation Warns you about the risk of possible laser radiation
Warning – Hazard if the system is not used as designed or altered in
Level 3B any way.
Overview
The OSA 5422 is a cost-effective, mid-scale synchronization distribution and assurance
device. You can use the OSA 5422 in a variety of network synchronization applications.
These applications include the IEEE 1588v2 PTP grandmaster clock, boundary clock, slave
clock, Assisted Partial Timing Support (APTS), and the NTP server. The built-in GNSS
receiver, Primary Reference Time Clock (PRTC) capability, and a redundant power supply
make this device ideal for reliable synchronization delivery.
Management Overview 20
Management Features 21
Management Overview
This section describes the general management communications architecture and the
management features that the OSA 5422 supports:
l Local Area Network (MGMT LAN) port, 100/1000 BaseT with an RJ45 connector to
connect to a management Data Communications Network (DCN) or a local PC.
l Serial port, RS232 with an RJ45 connector, for access to the CLI from a local PC.
l VLAN-based management tunnels. The OSA 5422 supports one management
tunnel on each access port.
Management Features
This section describes these management features:
Provisioning Communications 21
User Management and Security 21
Managing Local User Profiles 22
Managing SNMP Users 23
Access Control Lists 23
Custom Security Banner 23
RADIUS or TACACS+ 23
Provisioning Operations 24
Provisioning System Options 24
Provisioning Network Elements 24
Provisioning Secure Access 25
Provisioning Alarms 25
Provisioning Performance Monitoring 25
Provisioning Communications
The OSA 5422 provides facilities to set up a management communication configuration for
a particular site or specific network configuration. The product supports several
management configurations and options.
l HTTP
–or–
l HTTPS
You can individually set Telnet, SSH, HTTP, HTTPS, FTP, SFTP and SCP protocols to enabled
or disabled. You can disable serial port access. When a user logs off the serial port, the
system automatically logs off that user, which is a configurable setting.
The product provides three preconfigured user accounts, which are the default:
The default password for all preconfigured user accounts is ChgMeNOW. The default
inactivity timeout is 15 minutes for each preconfigured user account.
After 3 unsuccessful login attempts, the system locks a user account for a period of
5 minutes. This feature does not apply when a system uses RADIUS authentication. The
number of unsuccessful log in attempts are displayed in the user profile. You cannot
configure the lockout period.
For more information about how to manage local users, see Configuring Local Users.
The device provides these four preconfigured SNMP user accounts, by default:
l ADMIN
l MONITOR
l OPERATOR
l PROVISION
RADIUS or TACACS+
You can configure up to three RADIUS or TACACS+ servers for remote authentication. Both
types of servers support accounting.
Provisioning Operations
Provisioning operations includes these tasks:
l SNMP details
l Users, including:
o Add, edit, and delete users
o Edit passwords
o Edit GUI login time-outs
l Remote authentication
l Data anonymization (see Configuring Data Anonymity)
Provisioning Alarms
In the Maintenance application, you can modify alarm notification codes for given alarm
condition types.
For information about how to edit the default notification codes, see Modifying Default
Alarms Notification Codes.
Element Management
System
The web-based element management system (EMS) provides a graphical user interface
(GUI) for operation, administration, and maintenance (OAM) functions. Run the EMS in your
web browser where you can operate fault, configuration, performance, and security
functions. Connect your PC or laptop to a DCN interface. See Minimum System
Requirements for more information.
For all editable fields in the EMS, use only US-ASCII characters. The system
does not support extended ASCII characters.
Maintenance
The Maintenance feature provides the user with a single view from which to perform all
testing and maintenance related operations, such as:
l Create/edit/delete Telecom Slave (TS), Boundary Clock (BC), Master Clock (MC),
PTP Clock.
l Create PTP Flow Point (PTPFP).
l Monitor/configure PTPFP statistics.
l Create/edit/delete Slave Only Ordinary Clock (SOOC), Master Clock Interface (MCI),
PTP Port, and L3 PTP Port.
SyncJack
Monitor and analyze the clock and PTP Network. Functions supported include:
Logging In 30
Logging Off 32
User Session Timeout 32
Logging In
When you log in to the OSA 5422 EMS, you must enable HTTP and HTTPS access.
http://xxx.xxx.xxx.xxx
where xxx.xxx.xxx.xxx is the IP address of the DCN that the OSA 5422 connects to.
This IP address is the one that you assign to the DCN port (eth0) during the initial IP
configuration. If no IP address is set, use the default 192.168.0.2.
The default user ID is root. The default password is ChgMeNOW. For additional log in
information, see Provisioning Secure Access.
Some systems implement remote authentication through RADIUS by using a two-factor
mode authentication, such as RSA. The first time the login processes uses the secure ID
token as the password, you might be prompted to enter your old password. A prompt
asks you to define a PIN of 4 to 8 alphanumeric characters as shown in the figure that
follows.
In the New PIN and Confirm PIN fields, enter your PIN. Click Create PIN.
After you change your PIN, a prompt asks you to enter the PIN and a new six digit token
code in the Passcode field, which the authenticating device provides. You will use this
combination of PIN+token code as the password on each subsequent login.
4. Click Login.
The security banner is displayed.
After three unsuccessful login attempts, the software locks an account for
5 minutes.
Logging Off
To log off from the OSA 5422 EMS:
After a user session is inactive for the amount of time configured in the session timeout
value, the software automatically signs out the session to ensure system security. To
continue to work in EMS, sign in to EMS again.
The menu bar, toolbar, and tree pane provide easy access to the workflow of interest, such
as when you want to provision an entity or perform maintenance functions. The Details
pane displays different editing options based on which application and entity you select.
The Alarms pane displays continuous alarm monitoring.
Title Bar 34
Menu Bar 34
Toolbar 34
Tree Pane 34
Details Pane 35
Alarms Pane 36
Keyboard Navigation 37
Title Bar
The Title bar displays the current application that you select from the Application menu or
the Toolbar.
Menu Bar
The Menu bar contains the File menu and the Application menu.
Menu Description
File Provides a way to log off.
Application Provides:
l Configuration
l Maintenance
l Performance monitoring
l PTP
l NTP
l SyncJack
Toolbar
The Toolbar provides quick access to EMS applications. You can also access these
applications from the Application menu:
Tree Pane
The tree pane, located on the left of the UI, displays a hierarchical tree of the entities that
are part of the OSA 5422 system. The tree pane also displays related entities of each of
those systems. Each item on the tree represents a specific entity type such the NE, access
port, communications, SNMP, and administration.
In the tree pane, you select entities to display their current provisioning details and status in
the Details pane on the right. Or, you can right-click entities to access configuration options.
The information that the Details pane displays depends on which application you select
from the Application menu or the toolbar.
Click + to expand or – to collapse tree elements and access the system entities.
Details Pane
The Details pane displays the status of the element you select in the Tree pane. The
software sometimes displays the details on several tabs, which change according to the
application you select.
To open an edit window in the Details pane, right-click an element and select one of the
available configuration options. See Figure 4.
Alarms Pane
Alarms appear in the Alarms pane at the bottom of the EMS. This provides constant visibility
and access to current alarms, and enables you to continuously monitor alarms no matter
what application you currently view.
l Red, critical
l Orange, major
l Yellow, minor
l Interface type
l Notification code
l Description
l Date/timestamp
Keyboard Navigation
You can use the keyboard exclusively to navigate through the active EMS elements:
– or –
o Shift+Spacebar
Zoom in and out l Press Ctrl + Plus sign (+) to zoom in.
l Press Ctrl + Minus sign (–) to zoom out.
EMS Applications
The EMS provides these applications:
Each of the applications can be selected from the Menu Bar or Toolbar. The Title Bar
displays the latest application that has been selected (see Title Bar).
Configuration View
In the Configuration view you provision elements and view provisioning attributes of the
selected entity in the tree pane or the entity details pane.
System
The System entity displays system-level settings in these tabs. To edit system options,
right-click and select the required option. For more information about editing system
options, see Provisioning System Options.
l Identification
l Security Log
l Alarm Log
l Audit Log
l Syslog
l Managing Access Control List (MGMT ACL)
l Banner
l Time Zone
l Network Time Protocol (NTP)
l Traffic ACL (PTP/NTP)
l ICMP Filter
l Access ports
l Line cards
l DCN
l Power supply units
Navigate to NE-1 > NTEOSA 5422 > Resources tab to view allocated and available system
traffic resources.
Synchronization
Navigate to Synchronization > NE-1 > NTEOSA 5422 to configure frequency and time
synchronization interfaces.
Communications
Use the Communications element to add or delete static routes, static ARP entries, IPv6
static routes, IPv6 static neighbor entries, and source address configuration in
corresponding tabs.
Expand Communications to access DCN (eth0) and management tunnels for the NE.
SNMP
Use the Simple Network Management Protocol (SNMP) element to add or delete:
l SNMP communities
l Target addresses
l Target parameters
l User-based security model (USM) user entries
l SNMP dying gasp
Administration
Use the Administration element manage these elements:
l Users
l Remote authentication
l Security policy
l User data policy
l Key generation
Maintenance View
Use the Maintenance view to compete these tasks:
l Run diagnostics.
l Raise and clear test alarms
l Set and retrieve alarm attributes
l Restart the device
l Upgrade the device software
l Back up and restore the database
l Manage configuration files
l Enable software licenses
l Maintain sync and time clock reference
Element Description
System View system identification and conditions list.
NE-1 l View conditions lists associated with the device.
l Expand NE-1 > NTEOSA 5422 to view the equipment associated
with the device. Select equipment to view its operation status.
l Right-click NE-1 to perform a lamp test.
l Right-click NTEOSA 5422 to raise and clear test alarms or reboot the
shelf.
Synchronization Expand Synchronization > NE-1 > NTEOSA 5422 to access SYNC-1-1-1-
1 and Time Clock-1-1-1-1 elements. Right-click these elements to
operate the reference switch.
Element Description
Communications T
l Select the Communications entity to view the routing, ARP, IPv6
routing, IPv6 NDP tables, the results of the last ping command, and
the results of the last trace route command.
l Right-click the Communications entity to ping, trace route, flush
ARP cache, and flush NDP cache.
Alarm Attributes l Expand the Alarm Attributes entity and select an element to view the
current alarm attribute settings for this element.
l Right-click an element to edit the alarm severity of each listed
condition.
Administration Expand the Administration entity to access these maintenance
functions:
Chapter 2
Provisioning
Communications
This section contains communications provisioning information and procedures for the
OSA 5422, including how to set up initial communications to the unit. Provisioning details
and an example scenario of Gateway Network Element (GNE) to Subtending NE (SNE)
communications are provided.
Provisioning Communications 47
Implementing Management Communication to the OSA 5422 47
Accessing OSA 5422 with a Browser-Based IP Connection 55
Editing the DCN eth0 Configuration 56
Adding/Deleting IPV4 Static ARP Entries 65
Provisioning Communications
The OSA 5422 supports several management configurations and options. Deployment
scenarios of the OSA 5422 in common IP network configurations are varied and numerous.
Oscilloquartz: An ADVA Company sets the factory default settings for the OSA 5422 so that
you can connect the MGMT LAN (DCN) RJ45 connector to your local or remote DCN.
Oscilloquartz: An ADVA Company preconfigures interface eth0 with the DHCP in client
mode and with the DHCP function disabled. You can quickly ascertain the status of the DCN
using the RS-232 serial port to query the NE for the DCN settings. Use this same interface to
enable DHCP or to set the IP address of the eth0 interface if the DCN does not use DHCP.
You can deploy the unit with settings other than the factory defaults or establish a system
default database with user-specified DCN settings. You can also configure a management
tunnel on one or more network or access ports.
Implementing Management
Communication to the OSA 5422
To connect a PC or laptop to the product management interface, use the CLI through a
direct local-serial link. You can also connect to the product from a remote DCN through a
DCN network.
You must use a valid IP address for the Management LAN interface when you connect
through the DCN. Although the OSA 5422 ships with the default IP address of 192.168.0.2 /
24, the default is the same for each unit. To ensure a reliable connection to the OSA 5422,
first configure the IP address of the Management LAN interface to use a unique IP address
that is compatible with its network. In most cases, the system configures this address
automatically by using DHCP. Or, you can create a serial connection to manually configure
the IP address to the OSA 5422, and then configure the IP address during installation. See
Connecting to the Serial Port for more information.
l The use of a PC or laptop running Microsoft Windows and the terminal emulation
program are for illustration purposes only. You can use other terminal emulation
programs that run on a different platform. For more information, contact ADVA
Technical Support (see Call ADVA).
l It is outside the scope of this document to describe the use of any computer
operating system, terminal emulation program, or internet browser.
When you sign in using the default password, you must change the password to minimize
possible exposure, restrict access to the system, and increase system security. All account
names and passwords are case-sensitive.
After you use the local password file for user authentication, and after 3 unsuccessful login
attempts, the system locks the sign-in account for 5 minutes.
1. Ensure that you establish a physical serial connection from a PC or laptop to the
OSA 5422 RS-232 connector.
2. Start a serial terminal emulation program such as Tera Term Web to establish a
connection.
3. Select the outgoing communication port.
4. Set these terminal-emulation program communication settings:
o 9600 baud
o 8 data bits
o No parity bit
o 1 stop bit
o No flow control
oPassword: ChgMeNOW
A security banner is displayed.
7. Press Y to continue.
This prompt is displayed:
ADVA-->
For more information about the CLI command structure, see the OSA 5422
CLI Reference Guide.
Prerequisites
To complete this procedure, we assume that you have not yet installed the Ethernet cable
that connects the MGMT LAN to the DCN network.
Requirements
l A PC or laptop with a serial communications port such as COM1 or COM2.
l 2 Category 5 LAN cables with RJ45 connectors.
l A DB-9-to-RJ45 converter, Oscilloquartz: An ADVA Company part number
2036904035-01 or 1036904035.
l A communications program such as TeraTerm Pro Web, a free software terminal
emulator for Microsoft Windows.
l An Internet browser such as Internet Explorer or Firefox. You should complete this
procedure during the commissioning process or as a standalone procedure.
Guidelines
l You must complete this procedure during the commissioning process or as a
standalone procedure.
l The default DHCP setting for the DCN port is disabled and set as a DHCP client.
l This procedure is the optimal way to set up an IP address using the CLI. You access
the CLI through the RS-232 serial console port. If a DHCP server is unavailable for
the DCN port, you must set DHCP to disabled.
By default, DHCP is disabled on the DCN and not set as a DHCP client.
The IP addresses and subnet mask entries in these procedures are for
example only. Determine the information you enter from your local
sources.
Table 2: Setting Up the DCN eth0 Port MGMT LAN Through the RS-232 Serial Port
Task Reference
1. Connect a serial cable between the OSA 5422 RS- See Connecting to the Serial
232 serial port and a PC. Port.
2. Log in to the device.
3. Verify the DHCP status of the eth0 port for the DCN See Verifying the DHCP Status of
interface, which determines your next step. the eth0 Port.
4. Change the DHCP status of the eth0 port according See Changing the DHCP Status
to your requirements. of the eth0 Port.
Note: The next steps differ depending on whether the DHCP status is disabled or enabled.
DHCP status is disabled:
1. Configure the eth0 port with a valid IP address, See Configuring the eth0 Port.
network mask, and default gateway for the DCN
network that the NE connects to.
2. Verify that the HTTP and HTTPS settings are enabled See Verifying That HTTP and
on the system, and if not, enable them. HTTPS Settings are Enabled.
3. Use an Ethernet cable to connect the MGMT LAN Not applicable
RJ45 connector to the network DCN.
4. Verify that you correctly configured the web-based See Verifying Connection with
EMS connection for the IP address of the network the Web-Based EMS.
DCN that the device connects to.
5. Disconnect the serial port and end the session. See Disconnecting the Serial Port
and Ending the Session.
6. Disconnect the serial cable from the RS 232 Not applicable
connector on the device.
DHCP status is enabled:
Table 2: Setting Up the DCN eth0 Port MGMT LAN Through the RS-232 Serial Port
Task Reference
1. Use an Ethernet cable to connect the MGMT LAN Not applicable
RJ45 connector to the network DCN.
2. Verify the IP address of the eth0 port. See Verifying the IP Address of
the eth0 Port.
3. Verify that the HTTP and HTTPS settings are enabled See Verifying That HTTP and
on the system, and if not, enable them. HTTPS Settings are Enabled.
4. Verify that you correctly configured the web-based See Verifying Connection with
EMS connection for the IP address of the network the Web-Based EMS.
DCN that the device connects to.
5. Disconnect the serial port and end the session. See Disconnecting the Serial Port
and Ending the Session.
6. Disconnect the serial cable from the RS 232 Not applicable.
connector on the device.
To view the current DHCP setting for the DCN interface on the OSA 5422 use the show ip-
interface eth0 command. See this example:
The next step depends on the DHCP status of the eth0 port:
For example:
To verify the status after you change it, see Verifying the DHCP Status of the eth0 Port.
The next step to set up the DCN using the RS-232 serial port depends on whether you
configured the DHCP status as enabled or disabled:
l If the DHCP status of eth0 port is set to disabled, see Configuring the eth0 Port.
–or–
l If the DHCP status of eth0 port is set to enabled, connect the MGMT LAN RJ45
connector to the network DCN using an Ethernet cable. See step #1 in Table 2 in
the DHCP status is enabled section.
In most cases, your network administrator provides the IP address and net-
work mask information.
Example:
After you configure the port, verify the current IP address and network mask setting for the
DCN interface on the OSA 5422 using the show eth0 command. If the eth0 port settings
are incorrect, for example an incorrect IP address or network mask is displayed, reconfigure
the port using the configure eth0 command.
Example:
l If the CLI lists an IP address other than 0.0.0.0, verify that you enabled the HTTP and
HTTPS settings on the system (see Verifying That HTTP and HTTPS Settings are
Enabled).
–or–
l If the IP address displays as 0.0.0.0, wait one minute, and then re-enter the show
ip-interface eth0 command. Verify that the IP address updates. If after
four attempts, the IP address still does not change, contact your system
administrator. After an IP address other than 0.0.0.0 is present, proceed with
Verifying That HTTP and HTTPS Settings are Enabled.
Example:
ADVA:comms--> home
ADVA--> show system
If the HTTP or HTTPS settings are not enabled, use the configure system command and
specify either
l http enabled
–or–
l https enabled
Example:
ADVA:comms--> home
ADVA--> configure system
ADVA:system--> http enabled
ADVA:system--> https enabled
2. Enter a valid User ID and Password and click Login. The default user ID is root and the
default password is ChgMeNOW. The security banner is displayed.
Example:
ADVA:comms--> quit
Logged Out
Login:
For more information about using the web interface, see the OSA 5422 Pro-
visioning and Operations Manual.
1. Ensure that you configured a unique IP address for the OSA 5422 management
interface. See Setting Up the OSA 5422 DCN eth0 Port Through the Serial Port.
2. Ensure that you established a physical Ethernet connection from the DCN PC to the
OSA 5422,.
3. Verify that your PC IP address and net mask address match the values that the network
administrator provided. This step is necessary so the PC can access the OSA 5422
network.
4. In a browser window, enter this address:
http://xxx.xxx.xxx.xxx
–or–
https://xxx.xxx.xxx.xxx
where xxx.xxx.xxx.xxx is the IP address of the OSA 5422 to connect to. This IP
address is the address that you assigned to the product during initial IP configuration. If
you did not specify an address, the default is 192.168.0.2.
The Login page of the web-based EMS is displayed.
5. Unless you already changed the default settings, enter the default user ID and password,
and click Login.
o User ID: root
After you make three (3) unsuccessful login attempts, the software locks
that login account for 5 minutes.
6. Click Continue.
The web interface opens in the System view.
If you do not use the DHCP client mode, you can edit the IPv4 address and network mask. If
you disable DHCPv6 mode, you can edit the IPv5 Unicast address with its prefix.
Additionally, you can set RIPv2 and RIPng to enabled or disabled. This procedure provides
instructions to edit the DCN options.
The factory default settings specify that the DHCP for IPv4 and IPv6 is disabled in the client
role, and also set RIPv2 and RIPng to disabled.
Prerequisites
l Configure the NE with an IP address and connected the NE to a DCN or LAN. See
Setting Up the OSA 5422 DCN eth0 Port Through the Serial Port
l Sign in to the web-based EMS.
You can complete these additional DCN (eth0) configuration editing tasks:
3. In the Edit DCN (eth0) window, complete these settings to your system network
requirements:
4. After you complete the DCN (eth0) options, click OK. The software updates the DCN
(eth0) settings.
Field Description
DHCP Select Enabled.
DCCP Role Select DHCP Server. The IP Address and Netmask fields are currently
unavailable.
IP Address Enter the applicable address for IPv4.
Netmask Enter the applicable address, where the range of the netmask that you
specify determines the number of IPv4 addresses available for this server
to assign
RIVv2 Select Enabled or Disabled to define how to set the RIPv2 packets. The
default is disabled
To activate the new IP address and DCHP server function with the IP address range, you
must cycle the DHCP control as follows:
Disabling DHCP
You can disable DHCP in both IPv4 and IPv6.
For more information on flushing the ARP cache, see Flushing the ARP
Cache.
Prerequisites
1. Configure the NE with an IP address and connect the NE to a DCN or LAN. See .
2. Sign in to the web-based EMS.
4. To create a Static ARP Entry, in the Add Static ARP Entry area, set these options:
Field Setting
IP Address Enter a valid IPv4 address.
MAC Address Enter the Media Access Control (MAC) Address to be
added to the ARP entry. MAC addresses are hardcoded at
the factory.
Interface Name Select the applicable Interface Name.
When Management Traffic Bridging is enabled, only eth0
is allowed for the Interface Name. To enable
Management Traffic Bridging, see Configuring the
System Identity and Configuration.
5. Click OK.
Left-click the Communications entity, and then select the Static ARP Entries tab. The ARP
Entry Table is displayed.
1. Right-click the Communications entity, and then select Delete Static ARP Entry. The
Delete Static ARP Entry window opens.
2. In the Static ARP Entry Table, select the ARP entries that you want to delete.
3. Click OK
Prerequisites
1. Configure the NE with an IP address and connect the NE to a DCN or LAN. See .
2. Sign in to the web-based EMS.
3. Ensure that the IP Mode of the DCN (etho) is set to IPv4 and IPv6 (see ).
4. To create a IPv6 static route, in the Add IPv6 Static Route area, set these options:
Field Setting
Destination Enter a valid IPv6 address.
Gateway IP Address Enter a valid Gateway IPv6 address.
Interface Name Select the applicable Interface Name.
When Management Traffic Bridging is enabled, only eth0
configured with an IPv6 unicast address is allowed for the
Interface Name. To enable Management Traffic
Bridging, see Configuring the System Identity and
Configuration.
Metric Enter a value from 0 to 65535. The default is 0.
Advertise Route Select Enabeled to advertise the IPv6 static route or
Disabled to not advertise the IPV6 static rout.
The default is disabled. If enabled, the route is advertised
to the next hop.
5. Click OK.
Left-click the Communications entity, and then select the IPv6 Static Routes tab. The IPv6
Static Route Table is displayed.
1. Right-click the Communications entity, and then select Delete IPv6 Static Route. The
Delete IPv6 Static Route window opens.
2. In the Delete column of the table, select the routes that you want to delete.
3. Click OK.
For more information on flushing the NDP cache, see Flushing the NDP
Cache.
Prerequisites
1. Configured the NE with an IP address, connected the NE to a DCN or LAN (see ).
2. Logged in to the web-based EMS.
3. Ensure that the IP Mode of the DCN (etho) is set to IPv4 and IPv6 (see ).
4. To create a static neighbor entry, in the Add IPv6 Static Neighbor Entry area, set these
options:
Field Setting
IP Address Enter a valid IPv6 unicast address.
MAC Address Enter the MAC Address, where the Neighbor Discovery
Protocol (NDP) resolves the MAC address entered for the
target IP address.
Interface Name Select the applicable Interface Name.
When Management Traffic Bridging is enabled, only eth0,
if configured with an IPv6 unicast address, is allowed for
the Interface Name. To enable Management Traffic
Bridging, see Configuring the System Identity and
Configuration.
5. Click OK.
Click the Communications entity, and then select the IPv6 Static Neighbor Enties tab.
The IPv6 Static Neighbor Entries Table is displayed.
1. Right-click the Communications entity, and then select Delete IPv6 Static Neighbor
Entry. The Delete IPv6 Static Neighbor Entry window opens.
2. In the IPv6 Static Neighbor Entries Table, select the routes that you want to delete.
3. Click OK.
Prerequisites
1. Configure the NE with an IP address and connect the NE to a DCN or LAN. See .
2. Sign in to the web-based EMS.
4. To create a static route, in the Add Static Route area, set these options:
Field Setting
Dest IP Address Enter a valid IPv4 address.
Subnet Mask Enter a valid IPv4 mask.
Gateway IP Address Enter a valid Gateway IPv4 address.
Interface Name Select the applicable Interface Name.
When Management Traffic Bridging is enabled, only eth0
is allowed for the Interface Name. To enable
Management Traffic Bridging, see Configuring the
System Identity and Configuration.
Metric Enter a value from 0 to 65535. The default is 0.
Advertise Route Select Enabeled to advertise the IPv4 static route or
Disabled to not advertise the IPV4 static rout.
The default is disabled. If enabled, the IPv4 static route is
advertised on every other interface that is RIP enabled.
5. Click OK
Left-click the Communications entity, and then select the Static Routes tab. The Static
Route Table is displayed.
1. Right-click the Communications entity, and then select Delete Static Route. The
Delete Static Route window opens.
2. In the Delete column, select the routes that you want to delete.
3. Click OK.
l A back-to-back OSA 5422, where the EMS workstation, Gateway NE (GNE), and
Subtending NE (SNE) are on the same subnet, and the network port connectivity
between the devices is through a management tunnel.
l OSA 5422 #1 and the Workstation reside on LAN segment A.
l OSA 5422 #2 has no management LAN connection and has a network port
management tunnel connection to OSA 5422 #1.
Operations.
oConnecting to the Serial Port.
You should currently be logged in to the RS232 (serial port) of the OSA 5422 #2 using
the CLI.
2. Provision the eth0 (system) IP address using this CLI command entry:
3. Provision the network port management tunnel using this CLI command:
ADVA:comms--> add mgmttnl 1 phoenix1 ethernet vlan-based 100 disabled 10.10.10.5
255.255.255.0 network-1-1-1-1
4. To edit the management tunnel in order to enable RIPv2 packets, use this CLI command:
5. Set the Management LAN port (eth0) admin state to unassigned using this CLI
command:
ADVA:comms:mgmt_tnl-1--> home
ADVA--> network-element ne-1
ADVA-NE-1--> configure nte nteosa5422-1-1-1
ADVA-NE-1:nteosa5422-1-1-1--> configure dcn
ADVA-NE-1:dcn-1-1-1-1--> admin-state unassigned
ADVA-NE-1:dcn-1-1-1-1--> home
6. Add a static route to point to the management tunnel on the OSA 5422 #2 using this CLI
command:
7. Use a show system command and verify that you disabled the proxy ARP setting.
If proxy ARP is enabled, use this command:
ADVA:comms--> home
ADVA--> configure system
ADVA:system--> proxy-arp disabled
Verify that the Proxy ARP option is set correctly for the devices. If two or
more Oscilloquartz: An ADVA Company NEs or OSA 5422 devices are
connected through SDCC or a Management Tunnel and are connected to
the same LAN segment, then only one of the them should have the Proxy
ARP option enabled. Otherwise, there will be multiple ARP responses for a
single ARP request for a remote reachable IP address from each NE/device
in the same LAN that has Proxy ARP enabled.
8. Log off from the CLI session and remove any commissioning cables such as an Ethernet
cable and console cable from the OSA 5422 front panel connectors, as required.
9. Connect the optical cables to the OSA 5422 network port front panel connectors, if they
are not already connected.
Operations.
oConnecting to the Serial Port.
You should currently be logged in to the RS232 (serial port) of the OSA 5422 #1 using
the CLI.
2. Provision a management tunnel using this CLI command:
ADVA--> configure communication
ADVA:comms--> add mgmttnl 1 phoenix1 ethernet vlan-based 100 disabled 10.10.10.4
255.255.255.0 network-1-1-1-1
According to the example in Figure 5, these settings should be set on the OSA 5422 #1:
o The management tunnel of the OSA 5422 should be set to the Ethernet Layer 2
Protocol.
o VLAN based with the VLAN ID set to 100.
o DHCP disabled.
o The IP address should be set to 10.10.10.4 with a Subnet Mask of 255.255.255.0.
o RIPv2 should be set to enabled.
3. Edit the management tunnel to enable RIPv2 packets:
ADVA:comms--> configure mgmttnl mgmt_tnl-1
ADVA:comms:mgmt_tnl-1--> rip2Pkts-control enabled
4. Provision the eth0 (system) IP address using this CLI command entry:
ADVA:comms:mgmt_tnl-1--> home
ADVA--> configure communication
ADVA:comms--> configure eth0 ip-address 192.168.2.2 255.255.255.0
ADVA:comms-->home
Verify that the Proxy ARP option is set correctly for the devices. If two or
more Oscilloquartz: An ADVA Company NEs or OSA 5422 devices are
connected through SDCC or a Management Tunnel and are connected to
the same LAN segment, then only one of the them should have the Proxy
ARP option enabled. Otherwise, there will be multiple ARP responses for a
single ARP request for a remote reachable IP address from each NE/device
in the same LAN that has Proxy ARP enabled.
6. Log off the CLI session, and then remove any commissioning cables such as an Ethernet
cable and console cable from the OSA 5422 front panel connectors, as required.
7. Ensure the DCN connection for the LAN Segment A connects to the MGMT LAN (eth0)
port.
8. Connect the optical cables to the OSA 5422 network port front panel connectors, if they
are not already connected.
9. Observe the Network Port Net and Act LEDs on the front panel. They should be solid
green. If the LEDs are not solid green, troubleshoot the connections between the
OSA 5422 #1 and the OSA 5422 #2.
10. Depending on your configuration, either:
o Set the Web Based EMS workstation default gateway to point to the GNE of the
Provisioning Operations
This section contains system provisioning details for the OSA 5422 and provides a
recommended workflow for new installations. You can also use these procedures to
incorporate provisioning changes to existing systems.
For OSA 5422 part numbers, see Equipment Part Numbers in the OSA 5422
System Description.
Prerequisites
1. Configure the OSA 5422 with an IP address.
2. Connect the OSA 5422 to a DCN or LAN. See Setting Up the OSA 5422 DCN eth0 Port
Through the Serial Port.
3. Sign in through EMS.
3. In the Shelf Physical Inventory area, Part Number field, verify the part number to
ensure that the proper equipment is installed.
Administration State 81
Details about the Administration State Model 82
Operational State 85
Secondary State 85
Administration State
Several rules relate to the behavior of the administrative state as it relates to the parent-
child relationship of objects. For example, a parent state must already be in a certain state
for a child to be valid in that same state. The administrative state model consists of these
states.
State Description
IS (in-service) The normal, fully-operational, and configured state of an entity.
State Description
Management Also known as the Out of Service state. In this state, the system
squelches all alarms for the entity. The system clears any standing
alarm and then re-raises that alarm as being in a not-alarmed (NA)
condition. The intended use of this state is to squelch alarms that are of
no interest. In addition, for any traffic-affecting provisioning change,
the system places the entity into this state, but does not enforce this
requirement. Additional, associated characteristics of this state are that
user data and management traffic continue to flow.
Maintenance Known as an Out of Service state. For example, this state inherits the
properties described in the Management state. Additional, associated
characteristics of this state are that the system can perform
maintenance operations on an entity that is in this state. Maintenance
operations might affect user data or management data. Maintenance
state operations include, for example, loopback, Etherjack diagnostic,
and so on.
Disabled Also known as an Out of Service state. For example, this state inherits
the properties described in the Maintenance state. In addition, no user
data traffic passes in this state. Its purpose is to disable user traffic
while still preserving management connectivity with the entity.
Unassigned This state is essentially equivalent to deletion of an entity. The system
factors no entity in this state into any of the rule verification. An entity
in this state raises no alarms and carries no traffic. You must first set the
administrative state to unassigned before you change the service type
of an access port.
l The equipment administrative state model uses only the In-service and
management states.
l When in the management or maintenance state, the system supresses all alarms
against that entity. Otherwise, the entity functions normally.
l When in the disabled state, the system suppresses user data traffic.
l To perform maintenance actions such as diagnostics on an entity, you must first set
the entity into the maintenance state.
l An entity in the disabled state will not pass user data traffic. Management traffic,
such as management tunnel traffic and EFM OAM, continues to pass in this state.
l The operational state of an entity can be either:
o Normal
o Outage: The operational state of an entity is in outage when the admin state is
unassigned, or when the secondary state is FAF, FLT, SGEO, UEQ, MEA.
l The facility administrative state model uses all states described in the operational
state. The exceptions are:
o The disabled state applies only to access ports.
o Network ports do not support the disabled state. In relation to network ports,
the unassigned state does not apply to the working access port.
o The working access port cannot be unassigned.
l The DCN facility administrative state model is limited to these states:
o In-service
o Management
o Unassigned
l EVC flows, policers and shapers support these states:
o In-service
o Management
o Disabled
o Unassigned
EVC flows: The system supports the admin state control between in-service and
management and derives the disabled and unassigned states from the parent port.
Policers and Shapers: The admin state is read-only. The system always derives the state from
the parent EVC.
You can edit the state of the equipment, port, and EVC flow. The system derives the policer
and shaper states directly from the EVC flow state. According to the rules outlined as
follows, you can edit the EVC state.
The system can overwrite the state of the individual EVC by a subsequent
edit of the parent port object. See the behavior rules that follow.
l If an equipment entity is in-service, its child entity port entities can be any state
that the entity supports.
l If an equipment entity is management, its child entities can be any out of service
state or unassigned.
l If an equipment entity is unassigned, its child entities must also be unassigned.
l If a port entity is in in-service state, its child entities, or EVCs, can also be in an in-
service, management, or unassigned state.
l If a port entity is in a management, maintenance, or disabled state, its child entities
can be in a management or unassigned state.
l If a port entity is in an unassigned state, its child entities must be in an unassigned
state.
The parent-child rules for EVC flow entities are listed as follows.
l If an EVC entity is in an in-service state, its child entities such as policers and
shapers are in-service.
l If an EVC entity is in a management state, its child entities are also in management.
l If an EVC entity is in an unassigned state, its child entities are also in an unassigned
state.
If you change the equipment entity state from in-service to management, the port state will
also change from in-service to management. Any port already in an OOS state, including
management, maintenance, or disabled, remains in that state. Any port already in the
unassigned state remains in the unassigned state.
If you change an equipment entity from management to in-service, no changes occur to the
port state. The port state will remain as it was.
l You can edit a port entity from being in-service, management, maintenance, or
disabled to be unassigned. If so, all EVC flows that are children of that port change
to unassigned.
This effect will also occur if you edit the port parent entity. For example, if you edit the
equipment entity state in a way that affects the port administration state, the rules in the
previous list means that these edits will also propagate to the port child entities.
Because of the many-to-one relationship between port entities and EVC flows, you can
implement these behaviors:
l You can edit a port entity from management, maintenance, or disabled to In-
Service. This edit changes all EVC flows that are children of that port from
management to in-service. If an EVC was unassigned before you made an the edit
of the port state, the EVC will remain unassigned.
l If you edit a port entity from unassigned to management, maintenance, or
disabled, all EVCs flows that are children of that port change to management.
l If you edit a port entity from unassigned to in-service, all EVCs flows that are
children of that port change to in-service.
l If you edit a port entity from unassigned to disabled, all EVCs flows that are
children of that port change to in-service.
This effect also occurs as a result of an edit of the EVC parent entity. For example, if you edit
the port entity state in such a way that it affects the EVC admin state, the rules listed in the
previous list will apply also propagate to the EVC child entities.
Operational State
This attribute contains the current actual state of the entity. This attribute is based on both
the provisioned state and the actual physical state of the entity.
Secondary State
This attribute refines or provides added information about the operational state of the
entity.
1. Transfer the new software from an external repository to a temporary location on the
node. Supported transfer protocols are:
o HTTP (web)
o HTTPS (web)
o FTP
o SFTP
o SCP
2. Install the software on the node.
3. Activate the software. The OSA 5422 supports immediate or scheduled activation and
includes a validation timer. You can revert to the previous version:
o In scheduled activation, you can cancel the activation at any time before the
activation occurs.
o If you also set a validation timer, you must accept the upgrade by the specified time,
or the device automatically reverts to the previous version.
Activation resets the device, temporarily interrupts traffic, and cancels all
active sessions.
l We recommend that you save the configuration files before or after you upgrade
the new software, not during a software upgrade.
l The OSA 5422 provides the ongoing standing conditions to keep you informed
about the upgrade status. By default, the software sets these conditions with a
notification code of Not Reported. To view these conditions, select Maintenance >
System, and then select the Conditions List tab.
l To dynamically see the status conditions, edit the notification codes for SWDL and
Data Base condition types to NA for not alarmed. The conditions will then display
in the Alarm pane. These are the conditions:
o SWDL – File Transfer In Progress: the system copies the software from a remote
source to temporary memory.
o SWDL – Installation In Progress: the system writes the software to the shelf.
o SWDL – Activation In Progress: the system activates the software or schedules
the software for activation.
o SWDL – Validation In Progress: the system activates the software and sets the
validation timer.
l In the Configuration > System > Audit Log tab, you can see the settings for the
scheduled activation or validation timer.
Upgrading Tasks
Upgrading the Software Version 89
Validating the Upgrade 91
Canceling a Scheduled Activation 91
4. In the Method area, File Transfer Method field, select FTP, SFTP, or SCP.
The window displays a File Transfer area.
5. In the File transfer area, complete these fields to set the file transfer options required to
access the FTP, SFTP, or SCP server:
Field Setting
Server IP a. Select the applicable server IP as either IPv4 or IPv6. The default is
IPv4.
b. Enter the applicable server IP address.
User ID Enter the applicable user ID.
User Password Enter the applicable password.
Software Image Enter the path to the image file and include the IMG file extension.
6. Click OK.
The file transfer begins, and a status bar displays the progress:
The Status changes from In progress to Success, which shows that the system
completed the file transfer.
8. Click OK.
The window displays a progress bar. After the system completes the installation, the
status changes from In progress to Success.
If you did not set a validation timer, and after the upgrade you cannot access the device,
contact ADVA Technical Support.
c. Click OK.
2. Delete default SNMP communities:
a. Right-click SNMP > Delete Community.
b. Select private and click Apply.
c. Select public and click OK.
For additional security settings that are not required for general security scans, complete
these configurations:
Prerequisites
1. Configure the OSA 5422 with an IP address.
2. Connect the OSA 5422 to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port
Through the Serial Port).
3. Log in using the EMS.
1. In the selection tree pane, right-click the System entity, and then select Edit System.
The Edit System window opens.
2. You can change the system-level options shown in the table that follows. For more
information about these options, see System Configuration Options and Rules.
You can edit the system identity information that is unavailable to edit in
this window, such as Name, Description, Location, and Contact. Right-click
NE-1, and then select Edit Configuration.
3. Verify that the information you entered in Step #2 applies, and then click OK. The
window updates to reflect the data you entered.
You can configure forwarding SNMP login and logout traps on any SNMP
version. We recommend that you disable this setting if the SNMP version
does not allow encryption, such as with SNMPv1 or SNMPv2.
1. In the tree pane, right-click the System entity, and then select Edit System. The Edit
System window opens.
2. In the Configuration area, Login/Logout Trap Control field, select one of these
options:
o All: The software sends all login and logout timeout traps.
Configuring Logs
You can configure these types of logs in the system:
Prerequisites
First complete these tasks:
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN, see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port.
3. Log in using EMS.
1. In the selection tree pane, right-click the System entity, and then select Edit Security
Log. The Edit Security Log window opens.
– or –
o Disabled to exclude Security Log messages. The default is Disabled.
3. Click OK.
– or –
o Disabled to exclude Alarm Log messages in the Syslog. The default is Disabled.
3. From the Local Logging menu, select either:
o Enabled to enable sending Alarm messages to the local log (Alarm Log tab). The
default is enabled.
– or –
o Disabled to disable sending Alarm messages to the local log (Alarm Log tab)
4. Click OK.
– or –
o Disabled to exclude Audit Log messages in the Syslog. The default is Disabled.
3. From the Local Logging menu, select either:
o Enabled to enable sending Alarm messages to the Alarm Log tab local log. The
default is Enabled.
– or –
o Disabled to disable sending Alarm messages to the Alarm Log tab local log.
4. Click OK.
2. In the Log Server Configuration area, Time Stamp Format menu, select the particular
time stamp format used in the system log:
3. In the Log Server 1 Edit, Log Server 2 Edit, and Log Server 3 Edit areas, enter syslog
server information for up to 3 servers including:
Field Setting
IP Address a. Select the applicable server IP:
IPv4
– or –
IPv6.
The default is IPv4.
b. Enter the applicable server IP address.
Port Enter the Port number for the log server. The default is 514.
4. Click OK.
Perquisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in using EMS.
1. In the tree pane, right-click the System entity, and then select Edit MGMT ACL. The
Edit MGMT Access Control List window opens.
2. The Access Control List table contains 100 entries. Each entry consists of these
configurable options:
Column Setting
IP Version Select the type of IP address as either IPv4 or IPv6. The default is IPv4.
IPv4 Address Enter the IPv4 address of the user or subnet that the system allows to
access the OSA 5422. This column is enabled only if the IP version is
set to IPv4.
Column Setting
IPv4 Address Enter the IPv4 address of the user or subnet that the system allows to
access the OSA 5422. This column is enabled only if the IP version is
set to IPv4.
Network Mask Enter the network mask for the user or subnet IPv4 address that the
system allows to access the OSA 5422. This column is enabled only if
the IP version is set to IPv4.
IPv6 Address Enter the IPv6 address of the user or subnet that the system allows to
access the OSA 5422. This column is enabled only if the IP version is
set to IPv6.
Prefix Enter the prefix for the user or subnet IPv6 address that the system
allows to access the OSA 5422. This column is enabled only if the IP
version is set to IPv6.
Control Defines whether this IP address definition in the system is either:
l Enabled
– or –
lDisabled.
The default is Disabled.
3. After you define the IP addresses in the ACL, click OK. The MGMT ACL tab displays the
updated ACL.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
1. In the selection tree pane, right-click the System entity, and then select Edit Banner.
The Edit Banner window opens.
After you change the time zone or DST, the system generates any alarms and events that
occur afterwards with the new local time in the alarm timestamp. The alarm and event
timestamp field indicates a UTC offset, such as 2016-08-28, 18:40:03 (–2:00). If the time zone
changes while an event or alarm is active, existing alarms and events remain the same. The
system does not change previous alarms and events in the alarm logs, so the timestamp of
the original event remains the same.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
1. In the selection tree pane, right-click the System entity, and then select Edit Time Zone.
The Edit Time Zone window opens.
For some fields, you can configure the related list selections only if you set
DST Control Enabled to Enabled.
DST Control Define whether the user can set the DST by
Enabled selecting either Enabled or Disabled. The default is
Disabled, and the other options are disabled. When
Enabled, you can set the other options.
DST Start Month Select the DST Start Month. The default is March.
IPv4 addresses must be other than zeros or all ones. For example,
255.255.255.255. IPv4 addresses must also be addresses other than a sub-
net broadcast address, multicast address, or experimental subnet.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
To configure NTP:
1. In the tree pane, right-click the System, and then select Edit NTP.
The Edit NTP window opens.
2. In the Configuration area, State field, select Enabled for the NTP state.
3. If you set the NTP state to Enabled, you must define at least one primary server, which
you designate by setting its IP address. Complete these fields.
The source address for IPv4 and IPv6 can be of any type and is not limited to unicast
addresses. You can use up to 100 entries for each IP type and individually enable or disable
each entry. Enabled entries apply to all PTP or NTP interfaces.
2. The IPv4 Traffic Access Control List table contains 100 entries. Columns for each entry
consists of these configurable options:
Column Setting
IP Address Enter the IPv4 address that contains the PTP/NTP traffic that you want
the device to filter.
Network Mask Enter the network mask for the IPv4 address that contains the PTP/NTP
traffic that you want the device to filter.
Control Defines whether this IP address definition in the system is Enabled or
Disabled. The default is Disabled.
3. After you finish defining the IP addresses in the IPv4 Traffic ACL, click OK. The Traffic
ACL tab opens.
4. To verify the changes, open the IPv4 Traffic Access Control List tab, and verify that the
IPv4 addresses are listed.
2. The IPv6 Traffic Access Control List table contains 100 entries. Each entry consists of
columns with these configurable options, where the system supports only PTP traffic:
Column Setting
Address Enter the IPv6 address that contains the PTP traffic you want the device
to filter.
Prefix Enter the prefix for the IPv4 address that contains the PTP you want the
device to filter.
Control Defines whether this IP address definition in the system is Enabled or
Disabled. The default is Disabled.
3. After you finish defining the IP addresses in the IPv6 Traffic ACL, click OK. The Traffic
ACL tab opens.
4. To verify the changes, open the IPv6 Traffic Access Control List tab, and verify that the
IPv6 addresses are listed.
1. In the selection tree pane, right-click the System entity, and then select Edit ICMPv4
Filter. The Edit ICMPv4 Filter window opens.
enabled these filters, you can set other filters. If disabled, you are unable to change
the filters. The default is Disabled.
o Drop Echo Requests: Defines whether to accept or block echo requests for ICMPv4
packets. The default is configured to accept these packets because this filter is set to
Disabled. To block echo requests, set this filter to Enabled.
3. After you complete the ICMPv4 filter option settings, click OK. The ICMP Filter tab
opens and displays the ICMPv4 Filter section changes.
1. In the selection tree pane, right-click System, and then select Edit ICMPv6 Filter. The
Edit ICMPv6 Filter window opens.
Field Setting
ICMPv6 Filter Defines whether you can edit the ICMPv6 filter options. If enabled, you
can set the other filters. If disabled, you cannot change the filters. The
default is Disabled.
Drop Echo Defines whether to accept or block echo requests for ICMPv6 packets.
Requests The default is to accept these packets because this filter is set to
Disabled. To block echo requests, select Enabled.
Drop Router Defines whether to accept or block router solicitation requests for
solicitation ICMPv6 packets. The default is to accept these packets because this filter
is set to Disabled. To block router solicitation requests, select Enabled.
Drop Router Defines whether to accept or block router advertisement requests for
Advertisement ICMPv6 packets. The default is configured to accept these packets
because this filter is set to Disabled. To block router advertisement
requests, select Enabled.
Field Setting
Drop Neighbor Defines whether to accept or block neighbor solicitation requests for
Solicitation ICMPv6 packets. The default is configured to accept these packets
because this filter is set to Disabled. To block neighbor solicitation
requests, select Enabled.
Drop Neighbor Defines whether to accept or block neighbor advertisement requests for
Advertisement ICMPv6 packets. The default is configured to accept these packets
because this filter is set to Disabled. To block neighbor advertisement
requests, select Enabled.
Redirect packets are blocked by default. You cannot configure this setting.
3. Afte you complete the ICMPv6 filter settings, click OK. The ICMP Filter tab opens and
displays the ICMPv6 Filter changes.
4. Select the software license that you want to enable and in the Status column for that
license, select Enabled. If you enable a license, a License Warning message displays.
5. Click OK. The Edit Feature Management window displays the software license as
Enabled.
6. Click OK. The Edit Feature Management window closes. You can no longer edit the
software licenses in the Feature Management window.
7. Repeat Step #3 to 6 for each additional license.
Configuring NE-1
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
window opens.
4. In the Network Element Settings and Shelf State areas, complete these settings:
Except for the CLI Prefix, the NE-1 identity information that is available for
editing in the window is the same identity information that the System
view displays.
l IS
– or –
l Management
Configuring PSUs
You can configure both PSU-1 and PSU-2, or only PSU-1. For example, if you install only the
first PSU and prefer that the second PSU reports no alarms, set the Administrative state to
Management.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
To configure a PSU:
4. In the Identification area, Alias field, enter the applicable alias to make it easy to
identify the PSU. The default is undefined.
5. In the State area, Administrative field, select IS (in service) or Management.
The default is IS. If you want to implement only PSU1 and do not want PSU2 to report
alarms, set the Administrative state to Management. For more information, see Entity
State Descriptions.
6. In the Physical Inventory area, complete these fields.
a. PSU Part Number field, verify the correct PSU is installed for this equipment.
b. In the PSU Type field, ensure that the correct PSU is installed in the applicable unit.
The OSA 5422 requires 40W power supplies.
When you install an OSA 5422 with power redundancy, ensure that the power
capacity of both PSUs is the same. The PSUs are hot swappable. You can leave the
power to the OSA 5422 on when you install a unit.
For associated part numbers, see Equipment Part Numbers in the OSA 5422
System Description.
7. After you complete these setting, click OK. The Configuration window updates with the
changes.
The application raises an Equipment Fault alarm if the system detects that the card is
faulty. The system raises an Over Temperature alarm if the ambient temperature exceeds
the threshold. For related troubleshooting information, see Line Cards Alarms.
Prerquisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
5. After you finish setting the line card options, click OK. The window updates with the
changes. The tree pane updates the line card and associated Group1 and Group2
entities.
6. In the selection tree pane, next to the new line card entity, click +. The Group1 and
Group2 entities are displayed.
7. Right-click Group1 (1-8), and then select Edit Configuration. The 8xBITS Group
Configuration window opens.
9. Click OK.
10. Repeat steps 7 to 9 to define Group2 (9 to 16) output options.
11. Repeat all the previous steps for the second line card, if applicable.
3. Click OK to apply the card options. The window updates with the changes. The tree pane
updates the line card and associated Group1 entity.
4. Right-click LC-1/2 <CLKX16> and select Edit Configuration. The Edit LC window
opens. Set these options:
5. Click OK.
6. Repeat all the previous steps for the second line card, if needed.
To set the PPS 16-port group, you must set the PPS-1-1-1-1 or
PPS-1-1-1-2 signal direction to Output.
5. After you finish setting the options, click OK. The window updates with the changes.
6. In the selection tree pane, next to the System>NE-1 entities, click +.
7. Right click LC-1 or LC-2, and then select Create Card. The Create Card (Slot-#) window
opens.
8. Set these line card options:
9. After you finish setting the line card options, click OK. The window updates with the
changes. The selection tree pane updates the line card and associated Group1 entity.
10. Right-click Group1 (1-16), and then select Edit Configuration. The PPS-X16 Group
Configuration window opens.
11. In the Configuration area, Cable Delay Compensation (ns) field, enter a value in
nanoseconds. The default is 0.
12. Click OK.
an Field Setting
Identification Alias Enter an alias to help identify the line card. The
default is undefined.
State Administrative Select the applicable administrative state,
either In Service (IS) or Management. The
default is Management. For more information,
see Entity State Descriptions.
Settings Card Type Select TOD-PPS-X16.
5. After you finish setting the line card options, click OK. The window updates with the
changes. The selection tree pane updates the line card and associated Group1 entity.
6. Right-click the Group1 (1-16) entity, and then select Edit Configuration. The
TodPPS16Ports Group Configuration window opens.
7. In the Configuration area, Cable Delay Compensation (ns) field, enter a value in
nanoseconds. The default is 0.
8. Click OK.
5. Click OK. The window updates with the changes. The tree pane updates the line card
and associated Ethernet port entities.
6. In the tree pane, next to the new line card entity, click +.
7. Right-click the required Ethernet port, and then select Edit Configuration. The Edit
Configuration window opens.
9. After you finish setting the port options, click OK. The window updates with the
changes.
10. In the selection tree, right-click the Ethernet port that you configured in the previous
steps, and then select Edit Sync-E. The Edit Sync-E window opens.
11. In the Configuration area, Sync-E Mode menu, select Enabled, and then click OK.
12. Repeat the steps for each Ethernet port, E1000-A-1 to E1000-A-4.
5. Click OK. The window updates with the changes, and the software creates these
interfaces below the line card node:
o IRIG RS242-1-[slot number]-[group index]-1
After the first sync component lock or after an holdover lock, an LPN card
can take up to 11,000 seconds to stabilize the outputs. During this time,
LPN outputs may be outside the range of the outputs performance
specifications.
5. Click OK. The window updates with the changes. The tree pane updates the line card
and associated group ports.
6. In the tree pane, next to the new line card entity, click +.
7. Right-click Group (1-4), and then select Edit Configuration.
l Serial port
l Telnet
l SSH
l HTTP
l HTTPS
l FTP
l SFTP
l SCP
Access through SSH- and SSL-based protocols, which use Configuring Security Keys.
certificates and keys that you can configure.
Configure the local-user access-security policy for low, Configuring the Security
medium, or high security levels. Policy.
Restrict access by using the ACL. The system then permits Configuring the Management
access only to designated IP addresses or subnetworks. Access Control List.
l High
l Medium
l Low
For more information about security policy strengths, see the Security Policy window Policy
Description area in the illustration that follows.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
4. In the Policy Strength area, Strength menu, select the applicable setting, and then click
OK.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
Adding a User
You need superuser privileges to add a new user to the system.
4. In the Identity area, set the new user options. For details about the function and rules
for each data entry, see System Configuration Options and Rules.
5. After you define the user information, click OK.
4. In the Identity area, edit the user options according to your requirements. For details
about the function and rules for each data entry, see System Configuration Options and
Rules.
5. After you edit the user information, click OK.
4. In the Edit Password area, Type New Password and Retype Password fields, enter the
new user password. Supported characters are:
0 - 9, a - z, A - Z, # * % - _ . @ !
A password cannot start with the # (number sign) character
5. Click OK.
Deleting a User
To delete a user, you must have superuser privileges.
4. Verify that the selected user is the one you want to delete, and then click OK. The
software deletes that user from the system.
Unlocking Users
A user might get locked out of the system. To unlock a user, you must have superuser
privileges.
4. Verify that the selected user is the one that you want to unlock, and then click OK. The
software unlocks that username.
4. In the Remote Authentication Protocol System Level Configuration area, set these
options:
Field Setting
Authentication Select the Remote Authentication Protocol type. The default is
Protocol None.
l NONE
l RADIUS
l TACACS
Authentication Type Select the remote authentication type. The default is PAP.
Field Setting
TACACS +Accounting Select Enabled or Disabled, which refers to the use of an
accounting port. The default is Disabled.
Access Order Select the RADIUS access order as follows. The default is Local.
l Local: The software firsts authenticates the user login using the
local user database. If local authentication fails, the system uses
RADIUS, if configured, to authenticate the user login by using
the remote server.
l Remote:
o You set the Access Order to remote first. If remote
5. In the Remote Authentication Server (1, 2, and 3) areas, set these options:
Field Setting
Server Status Select Enabled or Disabled to specify whether the server is operational.
The default is Disabled.
Priority Select the priority of the server in servicing requests:
l First
l Second
l Third
Multiple servers can have the same priority value. The software uses
random ordering for those servers with equal priority values. The Server 1
default is First, the Server 2 default is Second, and the Server 3 default is
Third.
Field Setting
IP Address 1. Select the IP type as either IPv4 or IPv6.
2. In the field below IP Address, enter the IP address of the specified
remote server.
Server Secret Select this field to edit the Server Secret. The default is not allowed, or not
selected.
Port Enter the UDP port to use when the system communicates with the
remote authentication server.
You can edit the accounting port only if the TACACS + Accounting is
Enabled.
Timeout Enter the timeout to be 2 to 10 seconds, after which communication with
this server fails. This option applies only if the Authentication Protocol is
set to RADIUS. The default is 3 seconds.
Retries The maximum number of tries that the software will attempt for
authentication using this server. You can select 0 to 5. The default is 5.
For more information about the function and rules of each entry, see
System Configuration Options and Rules.
By default, the system logs each action that a user performs with their user name and never
deletes the logs. Only a user with superuser privileges can configure data anonymity and
change this time interval from 1 to 1,096 days (3 years).
If you do not want to configure data anonymity for all user names and
instead leave the default configuration, a system administrator can create
an anonymous user as XXXXXXXX.
Guidelines
The system follows these guidelines to implement data anonymity:
l If the logging anonymity interval is set to NEVER, the user names are never
anonymous, which is the default setting.
l For all other values of 1 to 1,096 days, after the configured number of days pass,
the system anonymizes the user names. At midnight of that day, the system
anonymizes all the log entries that precede the configured value.
l Because the minimum value is 1 day, user data is visible for at least 24
hours.
l When you restore the factory defaults, the logging anonymity interval
changes to NEVER.
l When the system time changes, the system reviews the log files. The system then
anonymizes existing log entries depending on when the logs were created and the
logging anonymization interval.
l If you configure data anonymization, the system anonymizes any user names in the
log entries that exceed the logging anonymization interval.
l You cannot retroactively make anonymous any log information that already
transmitted, such as through the Syslog, or that the OSA 5422 transmits.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
4. In the Logging anonymization interval area, Interval in days field, select 1 to 1096
days (3 years) to specify when the software will anonymize user names in the logs after
this time interval expires.
5. Click OK.
The window updates with the changes.
Managing Certificates
This section includes SSL certificates operations. The operations you perform under
managing SSL certificates are:
Copying an SSL Certificate and Private Key from a Remote Source 157
Setting the SSL Certificate Key Pair 158
Trusting Root CA Certificates 158
Editing an HTTPS SSL Certificate Expiry Notification Period 159
Manually Enrolling a Certificate 159
Generating and Deleting RSA Key Pairs 159
Generating Certificate Signing Requests 160
Copying Certificate Signing Requests to a Remote Computer 160
Deleting Certificate Signing Requests 160
Automatic Certificate Enrollment 161
Creating Cetificate Authority Profiles 161
Editing and Deleting CA Profiles 162
Creating a Certification Authority 163
Starting Automatic Enrollment 163
Getting Certificate Authority Certificates 164
Deleting a Certification Authority 164
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see Setting Up the OSA 5422 DCN eth0 Port Through
the Serial Port).
3. Log in to EMS.
3. To regenerate the SSL certificate or SSH key, in the selection tree pane, right-click Key
Generation, and then select Regenerate Keys. The Regenerate Keys window opens.
6. In the Edit SSL Certificate Data area, edit the certificate data, and then click OK.
7. In the Generate Certificate or Key area, select Regenerate SSH Key to regenerate the
SSH key, and then click OK. A dialog box opens and displays this text:
When an SSH Key is generated, all SSH users will be logged off.
address and path of the certificate file. A certificate file must have a filename
extension of CRT.
o If you select SCP, FTP, SFTP, or TFTP as the file transfer method, complete these
settings:
Field Description
Server IP Version Select the IP version.
Server IP Enter the valid IPv4 or IPv6 address of the server.
Remote File Enter the filename of the SSL certificate that is on the
server. Include the path.
User ID Enter the remote server login username. This field does
not apply to TFTP.
User Password Enter the remote server login password. This field does
not apply to TFTP.
7. Click OK.
address and path of the certificate file. A key file must have a filename extension of
KEY.
o If you select SCP, FTP, SFTP, or TFTP as the file transfer method, complete these
settings:
Field Description
Server IP Version Select the IP version.
Server IP Enter the valid IPv4 or IPv6 address of the server.
Remote File Enter the filename of the SSL certificate that is on the
server. Include the path.
User ID Enter the remote server login username. This field does
not apply to TFTP.
User Password Enter the remote server login password. This field does
not apply to TFTP.
8. Click OK.
address and path of the certificate file. A key file must have a filename extension of
KEY.
o If you select SCP, FTP, SFTP, or TFTP as the file transfer method, complete these
settings:
Field Description
Server IP Version Select the IP version.
Server IP Enter the valid IPv4 or IPv6 address of the server.
Remote File Enter the filename of the SSL certificate that is on the
server. Include the path.
User ID Enter the remote server login username. This field does
not apply to TFTP.
User Password Enter the remote server login password. This field does
not apply to TFTP.
8. Click OK.
address and path of the certificate file. A key file must have a filename extension of
KEY.
o If you select SCP, FTP, SFTP, or TFTP as the file transfer method, complete these
settings:
Field Description
Server IP Version Select the IP version.
Server IP Enter the valid IPv4 or IPv6 address of the server.
Remote File Enter the filename of the SSL certificate that is on the
server. Include the path.
User ID Enter the remote server login username. This field does
not apply to TFTP.
User Password Enter the remote server login password. This field does
not apply to TFTP.
8. Click OK.
4. Right-click an existing SSL certificate and select Trust Root CA Certificate. The Trust
Root CA Certificate window opens.
5. Click OK.
1. Generate an RSA key pair with a specified key name and key length. See Generating and
Deleting RSA Key Pairs.
2. Generate a CSR for the generated key pair name. See Generating Certificate Signing
Requests.
3. Retrieve the CSR and provide this request to the certificate authority.
4. The certificate authority issues and provides you with an SSL certificate.
5. Copy the SSL certificate to the system. Identify the certificate according to the key pair
name that you assigned to the CSR. See Copying Certificate Signing Requests to a
Remote Computer.
6. Configure the certificate to work with HTTPS. You can also edit the certificate expiry
notification period. See Editing an HTTPS SSL Certificate Expiry Notification Period.
3. Click Certificate Signing Requests. The Certificate Signing Requests window opens.
4. Right-click an existing CSR and select Delete.
5. Click OK.
o Failure
o Pending
After successful enrollment, the certificate authority process verifies the device
certificate using the chain of trust for the applicable certificates.
If you configure the certificate authority profile to automatically renew, the certificate
automatically does so after the certificate lifetime reaches the specified percentage. See
Creating Cetificate Authority Profiles.
5. Click OK. The CA Profile window displays the new certificate authority profile.
Field Description
Name Enter a unique name for the certificate authority . The name can have 0 to
64 characters and include [a to z], [A to Z], [0 to 9], _ and -.
CA Profile Select a certificate authority profile. One or more certificate authority
profiles must already exist.
CA URL Enter the certificate enrollment URL that has a certificate authority .
CA SCEP If the server is a PKI server that uses the SCEP protocol, enter a query
Query message for a successful communication with the server. Otherwise, select
Message None. The default is None.
5. Click OK. The Certification Authority window displays the new certificate authority.
5. Click OK.
4. Set the access port options. For detailed field descriptions, see Detailed Access Port
Configuration Options and Rules
5. Click OK.
Media Type Defines the port media type, either Fiber l Fiber
or Copper. You can provision access port 1 l Copper
(E1000-A-1 to E1000-A-4) as either media
type. access port 2 (E1000-A-2) is fixed as
Fiber.
Configured Speed Sets the configured speed for the access Auto
(Copper) interface, either auto-negotiation or Auto
manual configuration.
Auto 1000 Full
Auto 1000 Full Master
If you configure the access port as an
electrical interface, you must configure this Auto 1000 Full Slave
port as Auto 1000 Full Slave. This Auto 100 Full
restriction is necessary so that a Sync Auto 10 Full
Reference can select it. You must configure 100 Full
the access port as Auto 1000 Full Master
10 Full
for the system to be use it as a Sync-E
Master to a remote node.
Configured Speed Sets the configured speed for the access Auto 1000 Full
Access Port (Fiber) interface. You can select auto-negotiation 1000 Full
or manual configuration.
100 Full
Provisioning Synchronization
The OSA 5422 provides Sync-E functionality on the access port. Complete the steps in this
section to configure Synchronous Ethernet on the OSA 5422 access port.
This table details the supported speeds for Sync-E on the main board ports:
Speed Description
1G Supported as Sync-E master and slave in 1G :Auto full 1000 full master.
1G Auto full 1000 full slave
100M Supported as Sync-E master, slave is not supported.
100M 100 full. Not supported in Auto 100 Full
l Option 1: SDH
l Option 2: SONET
The default is Option 1 SDH. For SDH, the BITS interfaces support both E1 and 2048 kHz
options. For SONET, the BITS interfaces support only T1 .
Ethernet services support one system sync domain with up to two reference sources. You
can associate these sources with an Ethernet access port, BITS-IN, CLK in, PPS in, PTP clock,
GNSS, time clock, or a Telecom slave.
Enable Sync-E on a per port basis. If you enable Sync-E mode on a port, you can select that
port as a reference source for the system clock. If you set Sync-E mode to disabled for that
port, the list of available System Clock references will not include that port.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN.
3. Log in to EMS as a superuser.
4. Provision these items:
o Access port (see Provisioning Access Ports)
For Synchronization provisioning rules, see System Configuration Options and Rules.
– or –
l Option 2-SONET Regional Clock.
WTR Time Enter the Wait To Restore (WTR) time in minutes. The
default is 5 minutes.
Selection Select the active reference selection mode, either QL
Mode Mode or Priotity Mode. The default is Priority Mode.
Clock PLL Select the clock PLL bandwidth as either EEC or SSU. The
Bandwidth default is EEC. When you change between the options,
verify that no references are assigned to the sync.
5. If you change the Network Clock Type, the options available for Sync-E functions on
BITS-IN, BITS-OUT interfaces and on the access port also change. If you previously
configured any of these interfaces for Sync-E functions, the Assumed QL, Expected QL
and Squelch QL settings revert to default values. You must reconfigure them.
6. Click OK.
l Telecom slave
l PTP clock
l SYNC
l PPS
l GNSS
l CLK
You can also use the time clock to feed the physical output interfaces, such as a TOD and
PPS Out, or the master clock and PTP clock. This section explains how to edit a time clock.
Prerequisites
Before you create a master clock or PTP clock, first provision the time clock and place it In
Service.
Editing BITS-OUT
1. On the toolbar, click Configuration, or from the Application menu, select
Configuration.
2. Expand the System>Synchronization > NE-1 > NTEOSAOSA 5422 > BITS-1 entities.
3. Right-click the BITS-OUT entity, and then select Edit Configuration.
The BITS-IN and BITS-OUT entites share the Line Type, Line Code, Frame
Format and SA Bit (for E1) settings. If you change one, the other also
changes.
l IS (In Service)
l Management
l Unassigned
The default is Unassigned. For more information,
see Entity State Descriptions.
Prerequisites
First provision the related source EID, and then provision a PPS-1-1-1-1/2 with an output
signal direction.
output according to your network system requirements for the Telecom slave, time clock,
and PTP clock.
You can provision the ToD & PPS ports TOD-1-1-1-1 and TOD-1-1-1-2 as either input or
output ports.
Prerequisites
First provision the source EID, and then set the ToD & PPS port as an output source.
l IS (In Service)
l Management
l Unassigned
The default is Unassigned. For more information,
see Entity State Descriptions.
Configuration Signal Direction Select the signal direction:
l Input, the default.
– or –
l Output, which is unavailable for the TOD-1-1-2-
1 & PPS port.
Input Rate For an input TOD & PPS, the input rate is fixed as
pulse per second.
Cable Delay l To provision the port as an input port, enter the
Compensation delay that the cable introduces in nanoseconds.
(ns) Valid values: –5000000 to 5000000. The default
is 0.
l As an output port, this port is automatically set
to 0.
Assumed Clock For the TOD & PPS port input, select the clock class:
Class 6, 7, 140, 150, 160, or 248. The default is 6.
If you configure the port as an output, this setting is
unavailable.
Source Eid Select the applicable source EID:
l GPS
l GLONASS
l BEIDOU
l GALILEO
l SBAS
l QZSS
To provision the GNSS-1-1-1-1 receiver, navigate to System > Synchronization > NE-1 >
NETOSAOSA 5422.
l Self-survey is complete
l Location reached accuracy of 1 meter
The system reports 100% survey in limited sky
view, when:
l Self-survey is complete
l Location reached accuracy of 100 meter
5. After you set the GNSS options, click OK to save the changes.
6. To view the configuration details and status, click the GNSS-1-1-1-1 entity.
In the Configuration tab, the Status area indicates tracked satellites.
In the GNSS Satellites Data tab, you can view information about the tracked GNSS
satellites and graphically view the satellites. The positioning of the satellites is based on
azimuth and elevation data that displays in the satellites table. The satellite data
refreshes every 20 seconds, but you must refresh the tab to see the new data.
7. Select the GNSS entity again and observe when Survey Progress is 100% complete.
Field Settings
Self-survey l Select Enabled to activate the automatic location control using the
GNSS self-survey.
Once the GNSS settings are configured, five valid position fixes from
five or more satellites are needed for the GNSS receiver to start the
Self Survey Period. These measurements are considered valid only
when using qualified satellites with all mask criteria passed, and good
geometry within the PDOP Mask.
After the self-survey starts, four valid satellites are needed during the
self-survey period. If less than four valid satellites are available during
the self-survey period, the self-survey is suspended until at least four
valid satellites are available. The survey may take more than the
configured self-survey period if the number of valid satellites is less
than four throughout the self-survey period. When the survey
completes, the averaged location is stored and the receiver switches
to Over Determined mode, where at least one qualified satellite is
required.
l Select Disabled to manually enter the device coordinates.
Coordinate Type in the required coordinates.
Latitude,
Note: the GNSS receiver provides altitude reading according to the HAE
Coordinate
(Height Above Ellipsoid) model. To compare HAE value with orthometric
Longitude,
height (MSL), see Calculating the Elevation Value.
Coordinate
Altitude
During the self-survey, the Satellites table and the Sky View show all avail-
able GNSS satellites including satellites below the elevation mask. After the
survey is complete, the Satellites table and the Sky View show all available
GNSS satellites that are above the elevation mask.
This image shows location of GNSS satellites data for a GPS and GLONASS constellation.
–or–
–or–
l After you configure the device with a fixed position, self-survey is disabled:
a. Right-click GNSS-1-1-1-1 and select Edit Location Control.
b. In the Automatic Location Control window, change the Self-survey field to
Enabled.
–or–
l If the system is unable to determine the current position, the self-survey will
automatically restart. For example, the self-survey will automatically restart if:
o You manually enter a position that is too far from the true position, and the
1. Enter the device coordinates into a source that converts coordinates to Geoid height.
For example, https://geographiclib.sourceforge.io/cgi-bin/GeoidEval.
2. Enter the Geoid height in the formula H = h – N.
Where H is the orthometric height, h is HEA, and N is the Geoid height.
For example, enter altitude: 47.01275, longitude: 6.99213, and altitude (HAE): 492.5m.
The conversion returns Geoid 49.8422.
Then, substitute the values in the formula, so the orthometric height is 492.5 m - 49.8422
= 437.1578 m.
1. In the tree pane, expand System > Synchronization > NE-1 > NTEOSA 5422.
2. Right-click GPS-1-1-1-1 (GNSS) and select Cold Reset.
3. Click OK to confirm and execute the reset.
5. Click OK.
6. Click the System entity, and in the Identification tab verify the system date and time.
Menu Setting
System Time Of Day Select Time Clock.
Source TOD Clock Select TIMECLOCK-1-1-1-1.
3. Click OK.
4. Click the System entity, and in the Identification tab verify the system date and time.
4. In the Configuration area, select the applicable settings for Sync-E Mode, QL Mode,
Assumed QL, and Expected QL.
For detailed Sync-E configuration options and rules, see Detailed Sync-E Configuration
Options and Rules.
o If you select SDH (Option-1), and the QL Mode is Disabled, you must select an
have the same QL, the software gives precedence to the reference that supports
phase.
5. Click OK.
6. In the tree pane, select the access port and then click the Sync-E tab to review the
configuration.
5. Click OK.
6. To add another time clock reference, if required, repeat steps 3 to 5.
7. To verify the reference configuration and status, click the time clock entity, and then
select the Status tab. Wait a few minutes for alarms to clear and for the clock mode to
update to Locked.
8. Select the time clock entity again to observe the progress described here.
o The Clock Mode should indicate Locked, and the Source Status should indicate
Reference OK.
o The time clock locks to the reference within 5 to 15 minutes, depending on visibility
and conditions.
o When the time clock establishes synchronization with the reference, the clock mode
is Tracking.
o When the system determines that it can synchronize, the clock mode changes to
Locked.
o The mode might not change to Locked, and the source status might not display
Reference OK. If so, verify the previous provisioning steps and time clock
interconnectivity to the selected reference.
In e-PRTC mode, the Time Clock always uses reference with priority 1 as phase reference
and reference with another priority as frequency reference. The Time Clock can use some
references, such as PPS as either phase or frequency source. Make sure the signals are
connected properly.
Testing e-PRTC performance requires an excellent reference, 10 times better than the e-
PRTC mode. This means that the reference must be -/+ 3 to 5 ns from UTC.
After you enable e-PRTC mode, the Time Clock moves through these states as long as both
references are available and provide required performance:
l Tracking state – typically takes 4 days, in which the TimeClock tracks the GNSS and
Cesium clock. At the end of this state the TimeClock switches to locked state.
l Locked state – in this state the TimeClock is locked and keeps improving the data
that is used in holdover (if the GNSS is lost).
o Optimal holdover data is achieved after e-PRTC is locked for 26 days (30 days
o If the e-PRTC switches to holdover before 26 days, the holdover is good, but
not optimal and may not meet the G.8272.1 e-PRTC holdover specifications.
o If the e-PRTC switches to holdover after 26 days, the holdover is optimal and is
within the G.8272.1 e-PRTC holdover specifications.
Prerequisites
l All cables are connected and reference signals are available.
l Activated the e-PRTC license (see Activating Software Licenses).
1. Complete the tasks in Editing a Time Clock and in the e-PRTC Mode field, select
Enabled.
The time clock combines a stable frequency input, such as a Cesium clock, to extend
holdover capabilities to meet the e-PRTC performance standards.
The internal Time Clock algorithm restarts and the Clock Mode may change to Tracking
or Holdover state.
2. Complete the tasks in Adding a Time Clock Reference and in Time Clock Reference
Sources, select the time clock for which you enabled e-PRTC mode.
Prerequisites
Before you add a sync reference, you must provision the applicable sync reference port:
l Access port
l BITS-IN
l CLK
l Telecom slave
l PTP time clock
1. On the toolbar, click the Configuration, or from the Application menu, select
Configuration.
2. In the tree pane, expand System > Synchronization > NE-1 > NTEOSA 5422.
3. Right-click SYNC-1-1-1-1, and then select Add Sync Reference. The Add Sync
Reference window opens.
5. Click OK.
6. In the selection tree, click the SYNC-1-1-1-1 entity, and in the Configuration tab verify
the entry.
7. Click the Status tab to verify the status. An example is shown in this illustration, where
the Clock Mode is Locked and the Source Status indicates Reference OK.
4. In the Synchronization Reference List area, Select Ref column, select the reference
that you want to edit.
5. In the Priority column, select the applicable priority.
6. Click OK.
4. In the Synchronization Reference List area, Select Ref column, select the reference
that you want to delete.
5. Click OK.
l First set the system clock, and then you can provision NTP.
l If you configure a unit as a client, that unit receives its NTP packets
through the Management port (DCN).
l If you configure a unit as a server, that unit sends its NTP packets
through the operational access and network ports.
3. In the Create NTP Clock window, set these NTP clock options:
4. Click OK. The NTP clock appears below the NTEOSA 5422 element.
To complete the Symmetric Key Authentication process, upload and activate an
NTP keys file. See Activating Symmetric Key NTP Authentication.
1. Configure an NTP client as described in Configuring an NTP Client with higher stratum
servers.
2. Set the system ToD to NTP.
3. Create an NTP clock as described in Creating an NTP Clock.
4. Set Server Mode to NTP Peering, and NTP Server State to Enabled.
5. Configure NTP clock interfaces as described in Creating an NTP Clock Interface.
Authenticated NTP packets use NTP extension fields to append an encrypted message
digest. The encryption mechanism can be either MD5 or SHA1. The encryption protocols
require authentication keys that you can save to the device as a text file.
The authentication key files are separate from the system configuration
files. After you restart the system from a configuration file, you must re-load
the authentication key files as described in this procedure.
Prerequisites
1. Set System Time of Day to Time Clock.
2. Complete the steps described in Creating an NTP Clock.
To save authentication key files to your device and enable NTP authentication:
1. Expand the NTP Clock node, right-click NTP Keys, and select Files > Copy from
Remote.
2. In the Method area, File Transfer Method field, select Web, FTP, SCP, or SFTP.
o If you select the Web option, click Choose File and select the NTP Key file.
o If you select FTP, SCP, or SFTP, in the File Transfer area, complete these fields:
Field Setting
Server IP a. Select the applicable server IP as either IPv4 or IPv6. The
default is IPv4.
b. Enter the server IP address.
User ID Enter the user ID.
User Password Enter the password.
Remote File Enter the path to the key file.
3. Click OK.
The upload begins, and a status bar displays the progress. The upload is complete when
the status changes to Success.
4. Right-click NTP Keys and select File > Activate.
5. Click OK.
Prerequisites
Set System Time of Day to Time Clock.
The certificate expires one year after the generation date according to the
system time. The system issues a notification two weeks before expiration.
3. To update the certificate, right-click NTP AutoKey, and then select Certificate Update.
4. In the Update NTP Clock Auto Key area, click OK.
1. On the toolbar, select the NTP application, or from the Application menu, select NTP.
2. In the tree pane, expand System>NE-1.
3. Right-click the NTP CLOCK node, and then select Create NTP Clock Interface.
The Create NTP Clock Interface window opens.
l UTC time
l Local time - UTC time with local time zone offset
including Daylight Saving Time as configured in
Editing the Time Zone.
l GPS time
Current Time of Displays the current time of day of the NTP server.
Day
IP Interface IP Protocol Select the appropriate IP protocol, where the default
configuration is IPv4.
Default Select Enabled to activate the IPv4 or IPv6 gateway
Gateway address. The default setting is Disabled.
Control
IPv6 Address Enter the applicable address.
IPv6 Gateway An incorrect IP setting can cause service packets to
IPv4 Address leak through the default route interface.
Subnet Mask
Default GW
Interface Name This is a mandatory field. Enter the name of the
interface.
DSCP Enter a value from 0 to 63. The default is 0.
Time and Time Protocol Select Enabled to activate time protocol (RFC868) for
Daytime the NCI. The default is Disabled.
Configuration Daytime Select Enabled to activate daytime protocol (RFC867)
Protocol for the NCI. The default is Disabled.
5. Click OK. Below the NTP Clock Interface, the NTP Clock is displayed.
1. On the toolbar, click the NTP, or from the Application menu, select NTP.
2. In the tree pane, expand System>NE-1>NTP CLOCK.
3. Right-click the NTP Clock Interface, and then select Create NTP Virtual Port. The
Create NTP Virtual Port window opens.
4. In the Configuration area, NTP Flow Point menu, select an NTP flow point.
If you created an NTP flow point, the Configuration area is displayed (see
Creating an NTP Flow Point).
5. Click OK.
1. Verify that you provision the ports associated with the PTP flow point and set the port to
In Service (see Provisioning Access Ports).
2. Edit the Ethernet ports Delay Asymmetry settings (see Editing the Delay Asymmetry
Setting of an Ethernet Port).
3. Create a Telecom slave (see Creating a Telecom Slave).
4. Create a Slave-Only Ordinary Clock (SOOC). See (Creating a Slave-Only Ordinary Clock).
5. Create a PTP flow point (PTPFP) for the ordinary clock slave (see Creating a PTP Flow
Point).
6. Create an ordinary clock slave port (see Creating an Ordinary Clock Slave Port).
7. Repeat Steps 4 to 6 for a second SOOC.
1. Verify that you provision the ports associated with the PTP flow points, and that you set
the ports to In Service (see Provisioning Access Ports).
2. Edit the Ethernet port Delay Asymmetry setting (see Editing the Delay Asymmetry
Setting of an Ethernet Port).
3. Create a slave-only PTP clock with G.8275.2 profile.
4. Create a PTP flow point (see Creating a PTP Flow Point).
5. Create a Layer 3 PTP port (see Creating a PTP Port).
1. Verify that you provision the ports associated with the PTP flow points, and that you set
the ports to In Service, see Provisioning Access Ports.
2. Edit the Ethernet port Delay Asymmetry setting, see Editing the Delay Asymmetry
Setting of an Ethernet Port.
3. Create a slave-only PTP clock with ENTERPRISE or IEEE_1588_2008_ANNEX_J3, see
Creating a PTP Clock.
4. Create a PTP flow point, see Creating a PTP Flow Point.
5. Create a Layer 3 PTP port, see Creating an L3 PTP Port.
1. Activate the software license for PTP features (see Activating Software Licenses).
2. Ensure that you provision the ports associated with the PTP flow points for the master
virtual ports, and set the ports to In Service (see Provisioning Access Ports).
3. Edit the Ethernet ports Delay Asymmetry settings (see Editing the Delay Asymmetry
Setting of an Ethernet Port).
4. Create a Telecom slave clock (see Creating a Telecom Slave) or G.8275.2 slave clock (see
Creating a Telecom Slave)
5. Create a boundary clock (see Creating a Boundary Clock).
6. Create a master clock interface (see Creating a Master Clock Interface).
7. Create a PTP flow point for the ordinary clock master (see Creating a PTP Flow Point).
8. Create a master virtual port (see Creating a Master Virtual Port).
9. Create static remote slaves (see Creating G.8275.2 or G.8265.1 Static Remote Slave).
10. Validate dynamic remote slaves (see Validating MCI Dynamic Remote Slave).
l AES67 — IEEE 1588-2008 Precision Time Protocol for PTP profile for media
applications
l SMPTE ST 2059-2 — IEEE 1588-2008 Precision Time Protocol optimized to the
needs of media synchronization
Provision the Layer 3 PTP broadcast profiles master clock in this order:
6. Add a time clock reference (see Adding a Time Clock Reference). This can include editing
the GNSS receiver port (optional).
7. Create a PTP master clock with AES67_MDIA or SMPTE_ST_2059_2 profile (see Creating
Layer 3 PTP Master Clock).
8. Create an Ethernet Multicast PTP flow point (see Creating a PTP Flow Point).
9. Create a PTP port (see Creating a PTP Port).
10. Repeat steps 8 and 9 for additional PTP ports.
l AES67 — IEEE 1588-2008 Precision Time Protocol for PTP profile for media
applications
l SMPTE ST 2059-2 — IEEE 1588-2008 Precision Time Protocol optimized to the
needs of media synchronization
Provision the Layer 3 PTP broadcast profiles master clock in this order:
8. Create an PTP flow point type Eth Multicast (see Creating a PTP Flow Point).
9. Create a PTP port (see Creating a PTP Port).
10. Verify the connectivity of G.8275.2 remote slaves for boundary clock ports in Master
state (see Verifying Remote Slave Connectivity).
11. Repeat steps 8 to 10 for additional PTP ports.
l IEEE C37.238 2011 and 2017 — IEEE Standard Profile for Use of IEEE 1588™
Precision Time Protocol in Power System Applications
l IEC PAS 61850-9-3 — Precision Time Protocol Profile for Power Utility Automation
Provision the Layer 2 PTP power profiles grandmaster clock in this order:
PTP Procedures
Editing the Delay Asymmetry Setting of an Ethernet Port 233
Creating a Telecom Slave 234
Creating a Boundary Clock 243
Creating a Master Clock Interface 245
Creating a Master Virtual Port 249
Creating Layer 3 PTP Master Clock 249
Creating G.8275.2 or G.8265.1 Static Remote Slave 253
Validating MCI Dynamic Remote Slave 256
Verifying a Dynamic Remote Slave Connectivity 257
Creating a PTP Clock 260
Verifying Remote Slave Connectivity 263
Creating a Power Profile Grandmaster Clock 264
Creating a PTP Flow Point 267
Creating a PTP Port 270
Creating an L3 PTP Port 275
1. On the toolbar, click the PTP or from the Application menu, select PTP.
2. Expand the System > NE-1 > NTEOSA 5422 entities.
3. Right-click the Ethernet Port entity, and then select Edit.
4. In the Configuration area, Delay Asymmetry field, enter the appropriate value in
nanoseconds, and then click OK.
To edit a Telecom slave, right-click the Telecom slave entity (TS-1-1), and then select Edit.
To delete a Telecom slave, right-click the Telecom slave entity, and then select Delete.
Prerequisites
l Provision the master clock device.
l Verify that there is a network connection to the parent master port.
1. On the toolbar, click PTP or from the Application menu, select PTP.
2. Expand the System entity, right-click NE-1, and then select Create Telecom Slave.
The Create Telecom Slave window opens.
3. In the Create Telecom Slave window, set these Telecom slave options:
For more information about the Telecom slave parameter options, see Telecom Slave
Parameter Options.
4. After you finish setting the Telecom slave options, click OK.
A Telecom slave entity is displayed below the Ethernet ports in the selection tree.
5. To view the configuration details, click the Telecom slave entity (TS-1-1).
To edit an SOOC, right-click the SOOC entity (SOOC-1-1-1-1-1), and then select Edit. To
delete an SOOC, right-click the SOOC entity, and then select Delete. You cannot delete the
SOOC if the Telecom slave is associated with a synchronization reference.
1. Right-click the Telecom entity (TS-1-1), and then select Create SOOC to open the
Create Slave-Only Ordinary Clock window.
For more information on the SOOC parameter options, see Slave Only
Ordinary Clock Parameter Options.
4. In the selection tree, expand the Telecom slave entity, such as TS-1-1.
An SOOC entity displays below the Telecom slave entity.
5. To view the configuration details, click the SOOC entity.
For instructions to create a PTP flow point, see Creating a PTP Flow Point.
To edit the OCS port, right-click the OCS port entity, OCS PORT-1-1-1-1, and then select
Edit. To delete an OCS port, right-click the OCS port entity, and then select Delete.
For more information about the OCS port parameter options, see Ordinary Clock Slave Port
Parameter Options.
1. In the selection tree, right-click the SOOC entity, and then select Create OCS Port.
The Create Ordinary Clock Slave Port window opens.
2. In the Identification area, Alias field, enter the OCS port alias.
3. In the Configuration area, PTP Flow Point field, select the flow point associated with
the clock source.
4. After you set the OCS port options, click OK.
In the selection tree, an OCS PORT entity dislays below the associated SOOC entity.
5. To view the configuration details and port state, click the OCS PORT entity. Wait a few
minutes for alarms to clear, and the Port State updates to Slave. Click the OCS PORT
entity again to observe progress.
The OCS recovered clock locks to the selected master clock within 5 to 60
minutes, depending on network conditions. If the software receives no
messages, the Port State is Listening. After the software receives
messages from the master clock, the Port State updates to Uncalibrated.
When the system determines it can calibrate time, the Port State updates
to Slave, and the Telecom slave locks to the Master (Locked). If the lock
does not occur, verify the previous provisioning steps and whether there
is interconnectivity to the master clock.
6. To view Performance Monitoring data, click the PTP flow point entity and open the
Statistics tab. Ensure that the software is receiving messages. If not, troubleshoot
accordingly. Current PTP statistics are displayed as shown in this illustration.
7. To view Performance Monitoring data, click the SOOC entity and open the Statistics tab
and the Summary tab. If required, open the Raw PTP Messages tab to view raw PTP
messages.
Examples are provided in the next two illustrations.
8. To view configuration details and port state, click the OCS PORT entity. Wait until the
Port Status updates to Slave.
An example is shown in this illustration.
To edit a boundary clock, right-click the boundary clock entity, such as BOUNDARY CLOCK-
1-1), and then select Edit. To delete a boundary clock, right-click the boundary clock entity,
and then select Delete.
This table details support of boundary clock classes according to port speed and media
type:
Figure 6: Example Boundary Clock and Dynamic Remote Slave in a G.8265.1 Topology
For more information on the boundary clock parameter options, see Boundary Clock
Parameter Options.
To edit an MCI, right-click the master clock interface entity, such as MCI-1-1-1, and then
select Edit. To delete an MCI, right-click the MCI entity, and then select Delete.
For demonstration or debug purposes, you can configure grand master and slave clocks in
the same device and connect between the device ports via loopback. Then, configure these
static ARP settings:
l Add a static ARP entry: <slave IP address> <slave port MAC address> <master IP
interface>
l Add a static ARP entry: <master IP address> <master port MAC address> <slave IP
interface>
1. Right-click the boundary clock or master clock element and select Create Master Clock
Interface.
The Create Master Clock Interface window opens.
3. After you set the master clock interface options, click OK.
4. In the tree pane, expand the boundary clock entity.
The master clock interface entity is displayed.
5. To verify the configuration details, click the master clock interface entity.
To create or edit a master virtual port, right-click the master virtual port entity, such as
MASTER VIRTUAL PORT-1-1-1-1, and then select Edit. To delete a master virtual port, right-
click the master virtual port entity, and then select Delete.
1. Right-click the master clock interface entity, and then select Create Master Virtual
Port. The Create Master Virtual Port window opens.
For more information about the master virtual port parameter options,
see Master Virtual Port Parameter Options.
3. After you set the master virtual port options, click OK.
The master virtual port entity is displayed below the associated master clock interface
entity in the selection tree pane.
4. To view the configuration details, click the master virtual port entity.
The OSA 5422 supports the G.8275.2 profile only as a Grandmaster clock,
not as a Boundary clock.
Figure 7: Example Grandmaster Clock and Dynamic Remote Slave in a G.8265.1 Topology
1. On the toolbar, click PTP, or from the Application menu, select PTP.
2. In the tree pane, expand System, right-click NE-1, and then select Create Master Clock.
The Create Master Clock window opens.
o 1: Drop-frame
l Bit 1: Color Frame Identification
o 0: Not in use
o 1: In use
l Bits 2-7: Reserved
Default is 0.
The number of static slaves that you can create depends on the Max Slaves Supported and
Max Static Slaves Supported settings that you specify when you create the master clock
interface, up to 4. If you set the applicable PTP-MC-BC-IP-UNICAST-Profile-<number of
remote slaves>-Remote-Slaves to enabled, the number of supported remote slaves will
depend on the number displayed in the name of the license.
To edit a static slave, right-click the static slave entity, such as STATIC SLAVE-1-1-1-1, and
then select Edit. To delete a static slave, right-click the static slave entity, and then select
Delete.
1. In the toolbar, click the Precision Time Protocol (PTP) icon on the toolbar or from the
Application menu, select PTP.
2. In the selection tree, right-click the static slaves entity, and then select Create Static
Slave. The Create Static Remote Slave window opens, shown in this illustration. The
output changes depending on whether the slave clock is configured for an IPv4 or IPv6
For more information about the static remote slave parameter options,
see Static Slave Parameter Options.
4. After you set the static remote slave options, click OK.
5. In the selection tree, click the static slaves entity that now displays a number within the
bracket to indicate the new static slave, for example Static Slave (1).
The Static Remote Slave Table is displayed with the new static slave listed. An example
is shown in this illustration.
6. To view the configuration details and status, click the Static Slave entity in the table.
The Configuration tab opens, shown in this illustration.
If the statistics do not indicate the message receive and transmit statistics as
expected, troubleshoot connectivity and provisioning.
When the statistics update as expected, you can verify the static remote slave
connectivity.
l A remote slave node with Unicast Message Negotiation Enabled, a dynamic slave.
l The master clock interface entity at the boundary clock or master clock node with
the correct number of Maximum Slaves Supported (where Maximum Slaves
Supported = <maximum number of Dynamic Slaves> + <maximum
number of Static Slaves>) to accept the Dynamic Slave unit.
You must also complete a set of prerequisite steps at the remote slave node if you want the
system to automatically create a dynamic slave. For these steps, see Prerequisite Steps.
The number of dynamic slaves that you can create depends on the Max Slaves Supported
entries completed when Creating a Master Clock Interface (up to 4). If the PTP-MC-BC-IP-
UNICAST-Profile-<number of remote slaves>-Remote-Slaves license is activated, the
number of remote slaves depends on the number of remote slaves displayed in the license
name.(max 1024).
After you create a dynamic remote slave, you can verify its connectivity (see Verifying a
Dynamic Remote Slave Connectivity).
To edit a dynamic slave, right-click the dynamic slave entity, such as DYNAMIC SLAVE-1-1-
1-1, and then select Edit. To delete a dynamic slave, right-click the dynamic slave entity, and
then select Delete.
For more information about the dynamic slave parameter options, see
Dynamic Slave Parameter Options.
Prerequisite Steps
Before the software can automatically create a G.8265.1 dynamic remote slave, first
complete these steps at the OSA 5422 remote slave node:
1. Ensure that a cable runs from the OSA 5422 to the Ethernet port associated with the
master clock or boundary clock node.
2. Activate the software license for the PTP feature (see Activating Software Licenses).
3. Provision the Ethernet port associated with the PTP flow point for the OCS port and set
this port to In Service (see Provisioning Access Ports).
4. Edit the Delay Assymmetry setting for the Ethernet port that is associated with the PTP
flow point (see Editing the Delay Asymmetry Setting of an Ethernet Port).
5. Create a Telecom slave (see Creating a Telecom Slave).
6. Provision the boundary clock or master clock node to accept this dynamic remote slave
(see Creating a Boundary Clock or Creating Layer 3 PTP Master Clock). When this static
remote slave operates with another type of node, such as an FSP 150, provision the
other node according to its documentation and verify connectivity.
Prerequisites
Ensure that you create and verify the G.8265.1 static remote slave (see Validating
MCI Dynamic Remote Slave).
After you provision the remote slave as a dynamic slave and correctly provision the master
clock entity, the dynamic slave entity displays in the selection tree.
Complete these tasks to ensure that you correctly provisioned the dynamic remote slave
entity:
l Set the Unicast Message Negotiation of the dynamic remote slave to Enabled
(Dynamic Slave).
l Provision the master clock interface with the correct number of master slaves
supported to accept the dynamic slave ( where Maximum Slaves Supported =
the maximum number of Dynamic Slaves + the maximum number of
Static Slaves)
l Provision the master clock interface for the correct MAX PTP rates (Max Announce
Message Rate, Max Sync Message Rate, and Max Delay Response Message Rate).
l Provision the master clock interface for the correct IP Address and PTP Domain
Number.
1. On the toolbar, click PTP, or from the Application menu, select PTP.
2. In the selection tree, next to the System>NE-1 entity, click +, and then navigate to the
dynamic slave. If the dynamic slave entity is not present as expected, troubleshoot
connectivity and provisioning.
3. To view the configuration details of the dynamic slave, click Dynamic Slaves or L2
Dynamic Slaves. The Dynamic Remote Slave table opens.
o The number of slaves refreshes once per minute in both the table and the
navigation pane.
o Click the Dynamic Slaves node to refresh the number of slaves if 15 seconds passed
seconds to load.
4. Expand the remote slave node, and then click the OCS PORT entity to view the
configuration details and port state of the OCS port.
5. Wait until the Port Status changes to Slave.
6. To view the receive statistics of the SOOC entity, click the SOOC entity, and then open
the Statistics tab, as shown in this illustration.
If the output does not indicate message receive statistics as expected, troubleshoot
connectivity and provisioning.
Figure 10: Example Grandmaster Clock and Dynamic Remote Slave in G.8275.1
Topology - No Backup
PTP Domain #= 24
PTP Port: ACC PTP FLOWPT-1-1-1-1-1,
ETH Multicast
Dest Mac Addr Type: Forwardable
Expected QL
Received QL
For more information about PTP clock parameter options, see PTP Clock
Parameter Options.
1. On the toolbar, click PTP, or from the Application menu, select PTP.
2. In the tree pane, expand System >NE-1 > PTP Clock > PTP Port, and click L2
Dynamic Slaves. The Dynamic Remote Slave table opens.
View remote slaves in the table:
o The number of slaves refreshes once per minute in both the table and the
navigation pane.
o Click the Dynamic Slaves node to refresh the number of slaves if 15 seconds passed
seconds to load.
To edit a PTP clock, right-click the PTP clock entity, such as PTP CLOCK-1-1, and then select
Edit. To delete a PTP clock, right-click the PTP clock entity, and then select Delete.
Prerequisites
1. Ensure that a cable runs from OSA 5422 to the Ethernet ports associated with the
remote unit (master clock or remote slave).
For more information about PTP clock parameter options, see PTP Clock
Parameter Options.
1. In the tree pane, expand System > NE-1 > NTEOSA 5422.
2. Right-click the required network or access port and select Create PTPFP. The Create
PTP Flow Point window opens.
4. After you set the PTP flow point options, click OK.
5. In the selection tree, expand the access port or access port entity that is associated with
the PTP flow point you just created.
A PTP FLOW PT element displays below the associated Ethernet port in the tree pane.
6. To view the configuration details, click the PTP FLOW PT entity, and open the
Configuration tab.
To edit a PTP port, right-click the PTP port entity (PTP PORT-1-1-1), and then select Edit. To
delete a PTP port, right-click the PTP port entity, and then select Delete.
1. Right-click the PTP clock entity, and then select Create PTP Port.
The Create PTP Port window opens, shown in this illustration.
For more information on the PTP Port parameter options, see PTP Port
Parameter Options.
3. After you finish setting the PTP port options, click OK.
The PTP Port node is created below the associated PTP clock.
4. To view the configuration details, click the PTP Port entity. Review the port status in the
Status area:
Time Traceable Status — indicates the status of the transmitted (for master clock) or
the received (for slave clock) time traceable flag.
Frequency Traceable Status — indicates the status of the transmitted (for master
To edit a PTP port, right-click the PTP port entity, and then select Edit. To delete a PTP port,
right-click the PTP port entity, and then select Delete.
1. Right-click the PTP clock entity, and then select Create PTP Port.
The Create L3 PTP Port window opens.
Outer VLAN Defines the Ethertype for the Outer VLAN tag. 0
Ethertype
(Create only)
Outer VLAN Tag Defines the VLAN tag and priority that is associated 0 to 4095
(Create only) with this PTP Flow Point Outer VLAN Tag. 0 to 7
Inner VLAN1/2 Defines whether the Inner VLAN1/2 tag is allowed. Selected
Check Box Only selectable if the Untagged check box is
(Create only) unselected. Unselected
Inner VLAN1 Defines the Ethertype for the Inner VLAN1/2 tag. 0
Ethertype
(Create only)
Inner VLAN1/2 Defines the VLAN tag and priority that is associated 0 to 4095
Tag (Create with this PTP Flow Point Inner VLAN1/2 Tag.
only) 0 to 7
PTP Profile Defines the PTP Profile by selecting the applicable G.8265.1
one. PTP_ENTERPRISE
(applicable for both
L3 PTP and
Enterprise profiles)
G.8275.2
PTP Domain This PTP domain number is used in the domain 0-127
Number (Create Number field of the PTP header in the PTP packet.
0
only)
Priority 1 Priority 1 (based on IEEE 1588v2). 0-255
128
Priority 2 Priority 2 (based on IEEE 1588v2). 0-255
128
Timing Clock The timing reference of the Master Clock. Drop-down list of
Eid (Create only) available clock
sources.
Provisioning Rules
This section provides provisioning rule information for the OSA 5422 and includes these
topics:
When you first commission your system after shipment from ADVA, these three database
versions are identical. As you provision your system, the process updates the current
running configuration database with each change.
See Table 21 for the Oscilloquartz: An ADVA Company factory default configuration
settings. Each functional area and default configuration settings are shown in the same
orderthat you see them in EMS. See Table 27 for access port maximum bandwidth, access
port maximum bandwidth, and default access port CIR/PIR values. For default TCA settings,
see TCA Monitored Types.
All maximum values shown in the above table are indicative of a port
without a management tunnel, which utilizes a configurable amount of
bandwidth. At default configuration, no management tunnels are
provisioned.
System Configuration
Table 28: System Configuration: Edit System
Option
Parameter Description and Applicable Rules Settings and
Defaults
CLI Prefix When you use the CLI, this string is displayed at the ADVA
login prompt. This string can be up to 64 printable ASCII
characters, but cannot use the spacebar as a character.
Provisioning For OSA 5422, this feature has no effect on normal l Autoprov
Mode operation. The user should not modify the default l Autoprov
setting. Off
l Autoprov
Confirm
Management This option is used to enable the management traffic Enabled or
Traffic Bridging bridging feature. Disabled
When bridging is disabled, existing http, https, telnet,
and ssh sessions are unresponsive for up to 3 seconds.
When bridging is enabled, existing http, https, telnet,
and ssh sessions are unresponsive for up to 10 seconds
Mgmt Traffic This option limits acceptance of DCN packets to those Enabled or
Bridging with an ADVA OUI in the source MAC Disabled
Security (00:80:EA:XX:XX:XX, 00:0B:90:XX:XX:XX, or
00:D0:8B:XX:XX:XX). This option is only available if
Management Traffic Bridging is enabled.
Note: the available MAC addresses within the valid
range have run out. We suggest not to use this option in
new deployments.
SNMP Engine Allows the user to edit the SNMP Engine ID, which 0xhhhhhhhhhh
ID consists of 22 Hexadecimal characters. hhhhhhhhhhhh
Table 40: NTE Configuration: Power Supply Units PSU-1 to PSU-2, Edit
Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Alias A text or number string, or combination, that you enter to up to 64
uniquely identify this entity. This string can be up to 64 characters or
printable ASCII characters long. Undefined
Administrative Enables or disables PSU-1 to PSU-2. Depending on your IS or
State network system configuration, you might want to Management
implement only one PSU, not both. For example, if you
intentionally do not install the second PSU and do not the
PSU to report alarms, set the Administrative state to
Management. See Entity State Descriptions.
SNMP Dying Enables or disables a dying gasp message through SNMP. Enabled or
Gasp If enabled, the system sends OAM dying-gasp messages Disabled
on EFM-enabled interfaces.
SNMP dying gasp is supported only with IP management
tunnel and when the system management IP uses DCN0.
Access Ports
See Access Port Configuration Options and Rules.
Bit 5
Bit 6
Bit 7
Bit 8
QL Mode Set the quality level mode. If you set the Line Type to Enabled or
2048 kHz, this option does not apply. Disabled
Table 49: Power Supply Units PSU-1 and PSU-2: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Alias A text or number string, or combination, that you enter to Up to 64
uniquely identify this entity. This string can be up to 64 characters
printable ASCII characters long. Undefined
Administrative Enables or disables PSU-1 and PSU-2. Depending on your IS or
State network system configuration, you might want to Management
implement only 1 PSU. For example, if you intentionally do
not install a second PSU and you do not want the PSU to
report alarms, set the Administrative state to
Management. See Entity State Descriptions.
Line Impedance Selects the Line Impedance. The settings for BITS-1 120 Ohm
(BITS-X16) determine the available options. 75 Ohm
Cable Delay Sets the Cable Delay Compensation in ns. 0 to 9999999
Compensation (ns)
for TOD-PPS-X16,
PPS-X16
Synchronization
Default settings are shown in bold text, if applicable.
Table 55: NE-1 NTE OSA 5422Sync-1-1-1-1: SYNC-1-1-1-1: Delete Sync Reference
Option
Parameter Description and Applicable Rules Settings and
Defaults
Select Ref If you add an access port, Time Clock, Telecom Slave, CLK- List of
IN, or BITS-IN as a Sync Reference source, you can select it provisioned
and then delete it from the list. Sync Reference
sources
Table 56: NE-1 NTE OSA 5422 Time Clock-1-1-1-1: Edit Time Clock
Option
Parameter Description and Applicable Rules Settings and
Defaults
Alias A text or number string, or combination, that you enter up to 64
to uniquely identify this entity. This string can be up to characters or
64 printable ASCII characters long. Undefined
Administrative Defines the time clock administrative state. See Entity IS or
State State Descriptions. Management
WTR Time Time delay in minutes from the recovery of a clock 0 to 12
source to its restoration as usable in an active state. 5
Selection Mode Defines what method to use for selecting the active Priority Mode
reference source.
Time Holdover Configure this value in nanoseconds to determine when 0, 100, 500,
Performance (ns) the system should change from Holdover to Freerun 1000, 1500,
clock mode. When the device time-error estimation 5000, 10000,
exceeds the configured value, the time clock changes NA
from Holdover to Freerun.
Table 56: NE-1 NTE OSA 5422 Time Clock-1-1-1-1: Edit Time Clock
Option
Parameter Description and Applicable Rules Settings and
Defaults
Expected QL Set the Expected Quality Level. If Line Type is set to QL-NONE, QL-
2048 kHz, this option does not apply. PRC, QL-SSU,
QL-SSUB, QL-
EEC1
Time Scale Set the Time Scale as either: PTP, ARB
l PTP: This is the default setting. The TimeClock epoch
is based on the TimeClock reference, the GNSS, PTP
slave, and PPS+ToD input.
l ARB: The TimeClock epoch drives the system ToD
with a maximum error of 300 seconds. If you specify
this setting, the system locks to the reference, which
is not traceable to the TAI (SYNC-1-1-1-1).
e-PRTC Mode Select Enabled or Disabled. If you set this field to Enabled or
enabled, the time clock combines the stable frequency Disabled
input, such as a Cesium Clock, to extend the holdover
capability to meet the e-PRTC holdover standards.
Before you configure this setting, ensure that you
activate the e-PRTC license (see Activating Software
Licenses).
Note: This setting applies only to Rb/HQ++ oscillators.
Table 57: NE-1 NTE OSA 5422 Time Clock-1-1-1-1: Add Time Clock
Option
Settings
Parameter Description and Applicable Rules
and
Defaults
TimeREF Time reference index. 1 to 2
Index
Alias A text or number string, or combination, that you enter to up to 64
uniquely identify this entity. This string can be up to 64 characters
printable ASCII characters long. Undefined
Table 57: NE-1 NTE OSA 5422 Time Clock-1-1-1-1: Add Time Clock
Option
Settings
Parameter Description and Applicable Rules
and
Defaults
Priority Se the priority for this Time Clock Reference. The time 1 to 10
traceable reference will have the highest internal priority. If
two references have the same time or frequency traceable, the
system uses the prority that you configure.
Time Clock Select the Time Clock Reference Source. List of
Reference provisioned
Sources Time Clock
Reference
sources
Table 58: NE-1 NTE OSA 5422 Time Clock-1-1-1-1: Edit Time Clock Reference
Option
Settings
Parameter Description and Applicable Rules
and
Defaults
Select Ref Select the corresponding Time Clock Reference that you want Select the
field to edit. field
Alias A text or number string, or combination, that you enter to up to 64
uniquely identify this entity. This string can be up to 64 characters
printable ASCII characters long. Undefined
Priority Sets the priority for this Time Clock Reference. 1 to 10
Table 59: NE-1 NTE OSA 5422 Time Clock-1-1-1-1: Delete Time Clock Reference
Option Settings and
Parameter Description and Applicable Rules
Defaults
Select Ref Select the corresponding Time Clock Reference that Select the field.
field you want to delete.
Table 60: NE-1 NTE OSA 5422 BITS-1 BITS-IN: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Alias A text or number string, or combination, that you enter to up to 64
uniquely identify this entity. This string can be up to 64 characters
printable ASCII characters long. Undefined
Administrative Defines the administrative state. See Entity State Unassigned,
State Descriptions. If you set the administrative state to IS, or
unassigned, the entity does not display as a potential Management
synchronization reference.
Line Type Sets the BITS line type. If the appropriate BITS Line Type is E1, T1,
2048 kHz
l 2048kHz or E1, set the Network Clock Type to Option 1.
SA Bit Select the Signalling Associated (SA) Bit. SA Bit applies only None, Bit 4,
if Line Type is set to E1. Bit 5, Bit 6, Bit
7, Bit 8
QL Mode Set the Quality Level Mode. If Line Type is set to 2048 kHz, Enabled or
this option does not apply. Disabled
Table 60: NE-1 NTE OSA 5422 BITS-1 BITS-IN: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Assumed QL l If the interface QL Mode is disabled, the specified QL-NONE,
Assumed QL value is the Quality Level of the interface. QL-PRC, QL-
In this case, you cannot set the Assumed QL to QL- SSU-A, QL-
SSU-B, QL-
NONE.
EEC1
l If the interface QL Mode is enabled, the specified
Assumed QL value overrides the received Quality Level
of the interface, unless Assumed QL is set to QL-NONE.
l If the Network Clock Type is SONET (Option2) and QL
Mode is disabled, the software automatically sets the
Assumed QL set to QL-STU. And, you cannot edit this
setting.
l If you change the Network Clock Type from SONET to
SDH and QL Mode is Disabled, the Assumed QL setting
defaults to QL-EEC1.
l For both SDH and SONET options, if QL-Mode is
Enabled and you change the the Network Clock Type,
the Assumed QL defaults to QL-NONE.
l Valid entries for SDH Network Clock: QL-NONE, QL-
PRC, QL-SSU-A, QL-SSU-B, QL-EEC1. The default is QL-
EEC1, QL Mode Disabled.
Table 60: NE-1 NTE OSA 5422 BITS-1 BITS-IN: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Valid entries for SONET Network Clock: QL-NONE, QL-PRS, QL-EEC2,
QL-STU, QL-ST2, QL-TNC, QL-ST3E, QL-EEC2, QL-SMC, QL- QL-PROV,
PROV. The default is QL-NONE. QL-PRS,
QL-SMC,
QL-STU,
QL-ST2,
QL-ST3E,
QL-TNC
Assumed QL l If the interface QL Mode is disabled, the specified QL-NONE,
Assumed QL value is the Quality Level of the interface. QL-PRC,
In this case, you cannot set the Assumed QL to QL- QL-SSU-A,
NONE. QL-SSU-B,
l If the interface QL Mode is enabled, the specified QL-EEC1
Assumed QL value overrides the received Quality Level
of the interface, unless Assumed QL is set to QL-NONE.
l If the Network Clock Type is SONET (Option2) and QL
Mode is disabled, the software automatically sets the
Assumed QL to QL-STU. And you cannot edit this
setting.
l If you change the Network Clock Type from SONET to
SDH and QL Mode is Disabled, the Assumed QLdefaults
to QL-EEC1
l For both SDH and SONET options, if QL-Mode is
Enabled and you change the Network Clock Type, the
Assumed QL defaults to QL-NONE.
l Valid entries for SDH Network Clock: QL-NONE, QL-
PRC, QL-SSU-A, QL-SSU-B, QL-EEC1. The default is QL-
EEC1, QL Mode Disabled.
Table 60: NE-1 NTE OSA 5422 BITS-1 BITS-IN: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Valid entries for SONET Network Clock: QL-NONE, QL-PRS, QL-EEC2,
QL-STU, QL-ST2, QL-TNC, QL-ST3E, QL-EEC2, QL-SMC, QL- QL-PROV,
PROV. The default is QL-STU, QL Mode Disabled. QL-PRS,
QL-SMC,
QL-STU,
QL-ST2,
QL-ST3E,
QL-TNC
Expected QL Sets the Expected quality level. If Line Type is set to 2048 QL-EEC2
kHz, this option does not apply. QL-PROV
QL-PRS
Valid entries for SDH Network Clock: QL-NONE, QL-PRC, QL-SMC
QL-SSU-A, QL-SSU-B, QL-EEC1. The default is QL-NONE. QL-STU
QL-ST2
Valid entries for SONET Network Clock: QL-NONE, QL-
QL-ST3E
PRS, QL-STU, QL-ST2, QL-TNC, QL-ST3E, QL-EEC2, QL-
QL-TNC
SMC, QL-PROV. The default is QL-NONE.
Table 61: NE-1 NTE OSA 5422 BITS-1 BITS-OUT: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Alias A text or number string, or combination, that you enter up to 64
to uniquely identify this entity. This string can be up to characters or
64 printable ASCII characters long. Undefined
Administrative Defines the SYNC administrative state. See Entity State Unassigned,
State Descriptions. BITS will not show up as a potential IS, or
synchronization reference if the administration state is Management
set to Unassigned.
Table 61: NE-1 NTE OSA 5422 BITS-1 BITS-OUT: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Line Type Sets the BITS line type. If the applicable BITS Line Type is E1, T1, or
2048 kHz
l 2048 kHz or E1, set the Network Clock Type to
Option 1.
l T1, set the Network Clock Type to Option 2.
Table 61: NE-1 NTE OSA 5422 BITS-1 BITS-OUT: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Squelch QL Set the Squelch Quality Level. The Squelch QL attribute QL-NONE,
defines the minimum QL that the system timing can QL-PRC,
accept. If the system timing QL falls below this selected QL-SSU-A,
value, the software turns off BITS-OUT and priovides no QL-SSU-B,
BITS-OUT signal. QL-EEC1,
QL-DNU
Line Build Out Option to set impedance for cable length or dB. Applies 0 to 133 ft,
only if Line Type is T1. 133 to 266 ft,
266 to 399 ft,
339 to 533 ft,
533 to 655 ft,
7.5 dB,
15 dB,
22.5 dB
Table 62: NE-1 NTE OSA 5422 PPS-1-1-1-1 and PPS-1-1-1-2: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
alias A text or number string, or combination, that you enter to up to 64
uniquely identify this entity. This string can be up to 64 characters or
printable ASCII characters long. Undefined
Administrative Defines the administrative state.The entity does not show Unassigned,
up as a potential synchronization reference if the IS,or
administration state is set to Unassigned. See Entity State Management
Descriptions.
Signal Defines the signal direction for this interface. Options are Input or
Direction Input or Output, that you can select from a list. PPS-1-1-1- Output
(PPS-1-1-1-2) 1 is input only, and Signal Direction is unavailable.
For a PPS-X16 line card: If the Signal Direction of PPS-1-1-
1-2 is Input, you cannot create a pps16port group.
Table 62: NE-1 NTE OSA 5422 PPS-1-1-1-1 and PPS-1-1-1-2: Edit Configuration
Option
Parameter Description and Applicable Rules Settings and
Defaults
Squelch You must establish this hierarchy for Squelch control of Never,
Control the PPS timing interfaces if you configured these interface Holdover,
as Outputs: Lock
l NEVER, where the output is never squelche.d
l HOLDOVER, where output is squelched only in freerun
state.
l LOCK, where output is squelched in holdover and
freerun states.
Table 63: NE-1 NTEOSA 5422 TOD-1-1-1-1 & PPS: Edit Configuration
Option Settings and
Parameter Description and Applicable Rules
Defaults
alias A text or number string, or combination, that up to 64 characters or
you enter to uniquely identify this entity. This Undefined
string can be up to 64 printable ASCII characters
long.
Administrative Defines the administrative state. See Entity State Unassigned or IS
Descriptions.
Table 63: NE-1 NTEOSA 5422 TOD-1-1-1-1 & PPS: Edit Configuration
Option Settings and
Parameter Description and Applicable Rules
Defaults
Signal Defines the signal direction for this interface. Input or Output
Direction Options are Input or Output, that you can select.
Input Rate Defines the input rate. Applies if you set the Pulse Per Second
Signal Direction to Input.
Cable Delay If you configure the ToD & PPS port as an input, 0 ns
Compensation this value defines the delay compensation. The
time is –100000 to 100000 nanoseconds.
Source Eid Defines the source EID to provide as a ToD +PPS Defaults change
input or output depending on the defined Signal according to the
Direction. configured Signal
Direction:
Input: GPS-1-1-1-1 The
ToD source is from
GPS/GNSS, not from
serial ToD.
Output: List of
provisioned Clock
Reference sources.
Squelch You should establish this hierarchy for Squelch Never, Holdover, Lock
Control control of TOD & PPS timing interface. This
setting applies only if you set the Signal
Direction ito Output.
Communications
For more information about how to add, delete, or display IPv4 static
routes, see Adding/Deleting IPv4 Static Routes.
Table 65: NE-1 NTEOSA 5422 IPv4 Static Route: Add Static Route
Settings and
Parameter Description
Defaults
Dest IP Defines the IPv4 address of the destination. The IPv4 0.0.0.0
Address address of 0.0.0.0 is reserved for default routes. You can
only enter the IPv4 static default route of 0.0.0.0 if the
system default router is 0.0.0.0.
Subnet Mask Defines the subnet mask for the destination. The valid 0.0.0.0
values are IPv4 mask. If you set the IP address to 0.0.0.0,
the only available choice for subnet mask is 0.0.0.0.
Gateway IP Defines the IPv4 address of the next hop for remote 0.0.0.0
Address destinations. For the routes that the specified interface can
directly reach, set this value to 0.0.0.0.
Interface Defines the interface to use to create an IPv4 static route. eth0
Name List of valid
interface
entries
Metric Metric of the route. 0 to 65,535
Advertise Defines whether the IPv4 static route is to be advertised or Enabled or
Route not. When enabled, the IPv4 static route advertises on Disabled
every other interface that has RIP enabled.
Table 66: [NE-1 NTEOSA 5422 IPv4 Static ARP Entry: Add Static ARP Entry
Parameter Description Settings and Defaults
IP Address IPv4 address to add to the Address Resolution 0.0.0.0
Protocol entry.
Table 66: [NE-1 NTEOSA 5422 IPv4 Static ARP Entry: Add Static ARP Entry
Parameter Description Settings and Defaults
MAC Address MAC Address to add to the ARP entry. MAC 00:00:00:00:00:00
addresses are hardcoded at the factory. hh:hh:hh:hh:hh:hh
Interface Name Defines the interface to use create the ARP eth0
entry. List of valid interface
names
For more information about how to add, delete, or display IPv6 static
routes, see Adding/Deleting IPv6 Static Routes.
Table 67: [NE-1 NTEOSA 5422 IPv6 Static Route: Add Static Route
Paramete
Description Settings and Defaults
r
Destina- Defines the IPv6 unicast address of the 0000:0000:0000:0000:0000:
tion added destination. The IP address of 0000:0000:0 000 /64
0000:0000:0000:0000:0000:0000:
0000:0000/64 is reserved for default
routes. You can enter the static default
route of
0000:0000:0000:0000:0000:0000:0000:
0000 only if the system default router
is
0000:0000:0000:0000:0000:0000:0000:
0000.
The range is 2000::/3 (2000::0000 to
3FFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFF
F).
Gateway Defines the IPv6 address for the 0000:0000:0000:0000:0000:0000:00
IP Address management interface gateway. For 00:0 000
routes that the specified interface can
directly reach, this value should be
0000:0000:0000:0000:0000:0000:
0000:0000. For the routes that the
specified interface cannot directly
reach, this value is the IP address of the
next hop and should not be all zeros.
Table 67: [NE-1 NTEOSA 5422 IPv6 Static Route: Add Static Route
Paramete
Description Settings and Defaults
r
Interface Defines an IPv6 management interface List of valid IPv6 management
Name to use to create a static route. The interface EIDs.
management interfaces in IPv6 mode
automatically display in the list. If you
enable Management Traffic Bridging,
and you configure eth0 with an IPv6
unicast address, you can use only eth0
for the interface name.
Metric Specify the metric as the priority for the 0 to 65535
route that you add. 1
Advertise Enable or Disable advertising the route Enabled or Disabled
Route to the next hop.
For more information about how to add, delete, or display IPv6 static neigh-
bor entries, see Adding/Deleting IPv6 Static Neighbor Entries.
Table 69: NE-1 NTE OSA 5422Source Address Code Edit Source Address Config
Option
Parameter Description and Applicable Rules Settings and
Defaults
Address Type Specifies whether the software should use the system IP Outgoing
address or the IP address of the outgoing interface in interface IP
outgoing IP PDUs. address or
system
IP address
Source Specifies the IP interface name when you set Address Type eth0 or
Address to System IP Address. The software sets the IP address Configured
Interface associated with the IP interface name as the source IP Management
Name address in outgoing PDUs. Tunnel entries
Configured Configured Management Tunnel entries. eth0 or
Management Configured
Tunnel entries Management
Tunnel entries
SNMP
To delete an existing community name, in the selection tree, right-click the
SNMP entity and select Delete Community. Select the appropriate Com-
munity Name from the list and select OK.
To delete an existing USM user, in the selection tree, right-click the SNMP
entity and select Delete USM User Entry. In the Details pane, select the USM
User to delete and click OK.
Administration
Users: Add User, Edit User, or Edit Password
In addition to configuring Syncjack options, TIE-History stats are available in the Syncjack
application.
Reference PPS-1-1-1-1
(con't) PPS-1-1-1-2
ACCESS PORT-1-
1-1-1
ACCESS PORT-1-
1-1-2
NETWORK PORT-
1-1-1-1
NETWORK PORT-
1-1-1-2
TIME CLOCK-1-1-
1-1
GPS-1-1-1-1
PTP CLOCK-1-1
Reference Defines the expected Quality Level of the QL-NONE
Expected QL selected reference for the Clock Probe. Available QL-PRC
QL levels are presented in a drop-down list.
QL-SSU-A
QL-SSU-B
QL-EEC1
Source Defines the source of the clock to be measured CLK-1-1-1-1
by the Clock Probe. Sources available are CLK-1-1-1-2
presented in a drop-down list.
SYNC-1-1-1-1
BITS IN-1-1-1-1
TS-1-1
PPS-1-1-1-1
Source PPS-1-1-1-2
(con't) ACCESS PORT-1-
1-1-1
ACCESS PORT-1-
1-1-2
NETWORK PORT-
1-1-1-1
NETWORK PORT-
1-1-1-2
TIME CLOCK-1-1-
1-1
GPS-1-1-1-1
PTP CLOCK-1-1
Source Type Selection for measuring frequency or phase. Frequency
Phase
MTIE Mask Define the predefined MTIE Mask to use for G823 E1 Ssu
measurements. Choices are presented in a drop- G823 E1 Sec
down list.
G823 E1 Traffic
G823 Pdh
G824 T1 Sync
G824 T1 Traffic
G8261 E1 Case 1
Master Port Enter the hex master port identity. This field is Blank
Identity only enabled depending on the PTP
Flowpoint selected.
Direction Direction of PTP Clock Probe operation. Slave to Master
Max TE Clear Maximum Time Error Clear Threshold (in ns). 0-100000000
Threshold (ns) This option is only applicable if Measurement
Type is set to Phase. If the measurement
meets this threshold (+ or - direction in
respect to 0 on the phase TE graph) will clear
an existing SJ Max TE Threshold Exceeded
alarm.
Const TE Constant Time Error Threshold (in ns). This 0-100000000
Threshold (ns) option is only applicable if Measurement
Type is set to Phase. If the constant
measurement (average measurement)
exceeds this threshold (+ or - direction in
respect to 0 on the phase TE graph) then this
will create an SJ Constant TE Threshold
Exceeded alarm. Constant TE threshold must
be at least 50 ns greater than the clear
threshold. Setting both Const TE Threshold
and Const TE Clear Threshold to 0 will disable
this TCA.
Const TE Clear Constant Time Error Clear Threshold (in ns). 0-100000000
Threshold (ns) This option is only applicable if Measurement
Type is set to Phase. If the constant
measurement (average measurement) meets
this threshold (+ or - direction in respect to 0
on the phase TE graph) will clear an existing
SJ Constant TE Threshold Exceeded alarm.
Const TE Window Constant Time Error Window Size (in 10-20000
(s) seconds).
1000
This is the size of the sliding window of
sampled measurements made for constant
TE calculation.
Inst TE Threshold Instant Time Error Threshold (in ns). This 0-100000000
(ns) option is only applicable if Measurement
Type is set to Phase. If the constant
measurement (average measurement)
exceeds this threshold (+ or - direction in
respect to 0 on the phase TE graph) then this
will create an SJ Instant TE Threshold
Exceeded alarm. Instant TE threshold must
be at least 50 ns greater than the clear
threshold. Setting both Inst TE Threshold and
Inst TE Clear Threshold to 0 will disable this
TCA.
Inst TE Clear Instant Time Error Clear Threshold (in ns). 0-100000000
Threshold (ns) This option is only applicable if Measurement
Type is set to Phase. If the constant
measurement (average measurement) meets
this threshold (+ or - direction in respect to 0
on the phase TE graph) will clear an existing
SJ Instant TE Threshold Exceeded alarm.
RPDV rev Low (ns) Residual Packet Delay Variation, reverse, 1 - 4294967295
low (in nanoseconds).
200
RPDV rev Medium Residual Packet Delay Variation, reverse, 1 - 4294967295
(ns) medium (in nanoseconds). Must be higher
500
than the RPDV rev Low setting and lower
than the RPDV rev High setting.
RPDV rev High (ns) Residual Packet Delay Variation, reverse, 1 - 4294967295
high (in nanoseconds).
2000
MTIE Mask Define the predefined MTIE Mask to use for G823 E1 Ssu
measurements. Choices are presented in a drop- G823 E1 Sec
down list.
G823 E1 Traffic
G823 Pdh
G824 T1 Sync
G824 T1 Traffic
G8261 E1 Case 1
G8261 T1 Case 1
G8261 E1 Case 2
G8261 EEC Opt1
G8263
G8263 temp
G8272 PRTC
G8261 1
G8262 EEC Opt1
G8262 EEC Opt1
temp
G8262 EEC Opt2
G8262 EEC Opt1
Tolerance
Test Result Selects the Probes that have been previously Any available
Entity Checkbox scheduled. To add a Probe, select a Probe from the probes will be
Test Result Entity list. Multiple Probes (up to 4) may displayed in the
be selected. Test Result list as a
checkbox selection
For more information on how to provision the raw data collection server,
see Provisioning Raw Data Collection.
File Transfer Drop-down list to select the desired File Transfer FTP
Method Method. The desired protocol must be enabled
SCP
at the System level (see System Configuration
Options and Rules). SFTP
Server IP The IP Address of the Raw Data Server. 0.0.0.0
User ID The User ID of the Raw Data Server. (empty)
User Password The User Password of the Raw Data Server. (empty)
Maintenance Operations
This section includes these topics:
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the tree pane, expand System>Alarm Attributes, right-click an element and select
Edit Alarm Attributes.
3. Under the NC column, select the required notification for each alarm you want to
change. The notification code options include:
o CR — Critical. A severe, service-affecting condition has occurred and that immediate
Pinging an IP Address
For any IPv4 or IPv6 address, you can ping the IP network to test the communication with a
host. You can also ping a DCN (eth0) port.
To ping an IP address:
Field Description
IP Address Select the type of IP address that you want to test (default IPv4)
and enter the address in the applicable format.
Link-Local Addr IPv6 only. Leave this option selected if the IPv6 address is linked
to a local address.
Other Addr IPv6 only. Leave this option selected if the IPv6 address is linked
to another address that is not local.
Interface Name Select the applicable PTP interface. When you enable
management traffic bridging only eth0 is possible for Interface
Name. To enable Management Traffic Bridging, see Configuring
the System Identity and Configuration.
The system supports ping only to PTP IPv6 interfaces. You cannot ping
IPv6 multicast addresses that begin with FF, local link, or unique local link
address.
3. Click OK.
The Last Ping tab displays the progress of the ping operation. This figure displays the
output when you ping an IPv4 address.
Implementing Traceroute
You can traceroute an IPv4 or a management IPv6 address to display the path and measure
the transit delays of packets across the IP network. You can also traceroute a DCN (eth0)
port.
To traceroute an IP address:
2. Select the type of IP Address that you want to traceroute (default IPv4) and enter the
address in the applicable format.
3. Click OK.
The Last Trace Route tab displays the traceroute operation progress. This figure shows
the output when you traceroute an IPv4 address.
2. Click OK.
The Routing Table tab along with other communications tab display the results, so you
can verify that the entries have been deleted in the appropriate tabs.
l Managing ICF Configuration Files (binary) using the web-based EMS, SNMP, and
CLI.
l Managing Configuration Files using CLI (text based) through the CLI and web-
based EMS.
These two types of files can be used in a complimentary fashion, or they can be used
independently. Each type of file and its use is described under the headings Managing ICF
Configuration Files and Managing Configuration Files using CLI.
There is a third type of Database File supported by the OSA 5422 called the Default Settings
File. This is an XML based file that changes the default settings applied when a new entity
(such as an EVPL Flow) is created. This file is downloaded and applied to the unit if the
factory default values are determined to be not applicable or unacceptable to the user’s
application. See Default Settings File.
A configuration file can be created ONLY after software has been com-
pletely downloaded.
If you are using Internet Explorer 8, to view certain web-based EMS elements correctly,
specifically data provided in the Maintenance View, such as Restore factory defaults,
Restore system defaults, Restore database, and New System Defaults File, enable
Compatibility View in IE. This is performed by selecting Tools, Compatibility View Settings,
and adding the OSA 5422 IP address to the list of websites data field.
Database and configuration files are managed in the Maintenance view. These options are
accessible in the web-based EMS by performing either of these tasks:
As provisioning occurs, the current running configuration database is updated with each
change entered. At some point, the user may determine that the current copy should be the
default database for this unit, at which time the user should perform the Setting a Default
Database procedure. Then, if required the database can be restored to these settings by
performing the Restoring System Defaults procedure.
The Factory Default Database never changes, and as a last resort troubleshooting tool, or
upon decommissioning, the current database can be reset to factory defaults by performing
the Restoring Factory Defaults procedure.
The Default Database can also be reset to Factory Defaults using the “New” option in the
Setting a Default Database procedure. The difference is, when using the “New” option
selection, any user uploaded “Default Settings” will be erased.
To view the configuration database information in the Web Based EMS, select Maintenance
view, expand the Administration entity, and then select the Database entity. See Figure 12
for an example of a default database configuration. The display shows the current database
version for both the active and standby partitions as well as the status.
The OSA 5422 permits the user to designate the current configuration as the Default
Database or to reset the Default Database to factory defaults using this procedure.
This procedure includes steps for setting a Default Database using the web-based EMS. It is
also possible to perform this process using the CLI. For more information, see the OSA 5422
CLI Guide.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see ).
3. Log in to the web-based EMS.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System>Administration entities, click +.
3. Right-click Default Database, and then select Save.
The Save Configuration to System Defaults window opens.
4. Click OK.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System>Administration entities, click +.
3. Right-click Default Database, and then select Copy to Remote.
The Copy System Default Database to Remote window opens.
a. In the Method area, File Transfer Method menu, leave the Web option.
b. Click OK.
c. To receive the HTTP File Transfer, click the here link.
You are prompted to open or save the file.
The options presented for saving a file are dependent on the browse and the
settings configured. For example, MS Internet Explorer prompts you for file
name and the location to save the file; Firefox saves the file with the default file
5. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the Method area, File Transfer Method menu, select either FTP, SFTP, or
SCP.
The window opens with a File Transfer area, which is identical for each
selection. This example figure displays the window contents when SCP is
selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server:
Field Setting
Server IP Select the type of server IP as either:
l IPv4
– or –
l IPv6
Field Setting
User ID Enter the User ID to access the server.
User Password Enter the password to access the server.
Remote File Enter the name of the log including the complete file path that
you want to transfer.
c. Click OK.
The file transfer begins, and is indicated in the window.
When the Status changes from In Progress to Success, the file has been
transferred.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System>Administration entities, click +.
3. Right-click Default Database, and then select Copy from Remote.
The Copy System Default Database From Remote window opens.
a. In the Method area, File Transfer Method menu, leave the Web option
selected.
b. In the HTTP Transfer area, Remote File field, enter the path to the remote file
to restore, or browse to the file location, then click OK.
The file is copied from the source location and the Detail Pane indicates when
the file transfer is 100% complete.
c. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the Method area, File Transfer Method menu, select either FTP, SFTP, or
SCP.
The window opens with a File Transfer section, which is identical for each
selection. This example figure displays the window contents when SCP is
selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server.
Field Setting
Server IP Select the type of server IP as either:
l IPv4
– or –
l IPv6
c. Click OK.
The file transfer begins, and is indicated in the window.
The file is copied from the source location and the Detail Pane indicates when
the file transfer is 100% complete.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System>Administration entities, click +.
3. Right-click Default Database, and then select New.
The New System Defaults File window opens.
Resetting the database to factory defaults drops all traffic and erases all
communications and user settings, including the loss of the Web Based
EMS connection to the NE. When using the New option selection, any
user uploaded Default Settings are erased. It may be advisable to backup
the current database so that it can be restored later.
3. Click OK.
The System resets the Default Database and Active Database to Factory Defaults.
You can also backup the database using the CLI. For more information, see
the OSA 5422 Command Line Reference Guide.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see ).
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System>Administration entities, click +.
3. Right-click Database, and then select Backup Database.
The Backup Database window opens.
4. Click OK.
5. In the tree selection pane, right-click Database, and then select Copy to Remote.
The Copy Database to Remote window opens.
a. In the Method area, File Transfer Method menu, leave the Web option
selected.
b. Click OK.
7. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the Method area, File Transfer Method menu, select either FTP, SFTP, or
SCP.
The window opens with a File Transfer section, which is identical for each
selection. This example figure displays the window contents when SCP is
selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server.
Field Setting
Server IP Select the type of server IP as either:
l IPv4
– or –
l IPv6
c. Click OK.
The file transfer begins, and is indicated in the window.
When the Status changes from Progress to Success, the file has been
transferred.
Restoring a Database
Restoring the database is a multi-step process:
1. Transfer the database file from an external repository to a temporary location on the NE.
The NE supports transfer through HTTP (Web), FTP, SFTP and SCP protocols.
2. Transfer the database file to standby memory on the NE.
3. Activate the database, which causes the NE to reset and temporarily interrupt traffic, and
cancel active user sessions.
You can also restore the database using the CLI. For more information, see the OSA 5422
CLI Reference Guide.
Prerequisites
1. Configure the NE with an IP address.
2. Connect the NE to a DCN or LAN (see ).
3. Log in to the web-based EMS.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System>Administration entities, click +.
3. Right-click Database, and then select Copy from Remote.
The Copy From Remote window opens.
a. In the Method area, File Transfer Method menu, leave the Web option
selected.
b. In the HTTP Transfer area, Remote File field, enter the path to the remote file
to restore, or browse to the file location, then click OK.
The file is copied from the source location and the Detail Pane indicates when
the file transfer is 100% complete.
5. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the Method area, File Transfer Method menu, select either FTP, SFTP, or
SCP.
The window opens with a File Transfer section, which is identical for each
selection. This example figure displays the window contents when SCP is
selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server.
Field Setting
Server IP Select the type of server IP as either:
l IPv4
– or –
l IPv6
c. Click OK.
The file transfer begins, and is indicated in the window.
When the Status changes from Progress to Success, the file transfer is
complete.
6. In the selection tree, right-click Database, and then select Restore Database. The
Restore Database window opens.
7. Click OK.
A progress bar is displayed in the window.
8. When the restore completes, in the selection tree, right-click Database, and then select
Activate Database.
The Activate Standby Database window opens.
The difference between System Defaults and Factory Defaults is explained in Determining
the Database Configuration Status.
Restore System Defaults may result in the loss of all Provisioning Data Base settings
including DCN, SNMP, Remote Access and User data. This is normally only done only when
a system is decommissioned and moved to a new location or when the software or
database is corrupted. It is advisable to backup the database before performing this
procedure.
Prerequisites
1. Configured the NE with an IP address.
2. Connected the NE to a DCN or LAN (see ).
3. Logged in to the web-based EMS.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System entity, click +.
3. Right-click Administration, and then select Restore System Defaults.
The Restore System Defaults window opens.
Resetting the database to system defaults may drop all traffic and erase
all communications and user settings, including the loss of the web-
based EMS connection to the NE. It may be advisable to backup the
current database so that it can be restored later.
There are two types of database resets available on the OSA 5422:
The difference between System Defaults and Factory Defaults is explained in Determining
the Database Configuration Status.
Prerequisites
1. Configured the NE with an IP address.
2. Connected the NE to a DCN or LAN (see ).
3. Logged in to the web-based EMS.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. In the selection tree, next to the System entity, click +.
3. Right-click Administration, and then select Restore Factory Defaults.
The Restore Factory Defaults window opens.
Resetting the database to factory defaults drops all traffic and erases all
communications and user settings, including the loss of the web-based
EMS connection to the NE. We recommend to backup the current
database so that it can be restored later, if needed.
You use the configuration files to configure new installed systems, transition from an
installation network to the traffic-carrying network, or to provision a system following a
restore operation.
The system supports up to five configuration files in persistent memory. You can operate
configuration files using CLI commands or the web EMS.
For more information about these commands, see the OSA 5422 CLI Refer-
ence Guide
From the highest level prompt, all configuration file commands are accessed by entering
admin config-file. The configuration file transfer-file command under config-
file is:
This command uses the selected file transfer protocol to move a configuration file to (put)
or from (get) a remote server.
The command response shows the filename and the description for the file. The description
can be edited using the description command.
#
#CLI:ACCESS PORT-1-1-1-1 Edit
#
home
network-element ne-1
configure nte nteosa5422-1-1-1-1
configure access-port access-1-1-1-1
#
#CLI:FLOW-1-1-1-6-1 Create
#
home
network-element ne-1
configure nte nteosa5422-1-1-1-1
configure access-port access-1-1-1-1
#end
home
admin config-file
ADVA:config-file-->
The description can be up to 127 characters long, ASCII with no spaces (unless in quotes) or
question marks.
Example:
ADVA:config-file--> description configfile4 "set access6 to EVPL and create a flow"
ADVA:config-file--> list
|File Name |Description
|-------------------------|----------------------|
|configfile2 |root
|configfile3 |
|configfile4 |set access6 to EVPL and create a flow
ADVA:config-file-->
remove <configfile-name>
Example:
ADVA:config-file--> remove configfile2
ADVA:config-file--> list
|File Name |Description
|-------------------------|----------------------|
|configfile3 |
|configfile4 |set access1 to EVPL and create a flow
ADVA:config-file-->
1. Configure the NE with an IP address and connected the NE to a DCN or LAN (see ).
2. Log in using the web-based EMS.
3. On the toolbar, click the Maintenance, or from the Application menu, select
Maintenance.
4. In the tree pane, expand System > Administration.
Configuration files tasks:
Task Link
Create a new configuration file. Creating a New Configuration File
Update an existing configuration file. Updating an Existing Configuration File
List/check status of the configuration Verifying the Status of the Configuration Files
files.
Restart the system with a Restarting the System with a Configuration File
configuration file.
Import a configuration file. Importing a Configuration File
Export a configuration file. Exporting a Configuration File
Edit the description of a configuration Editing the Description of a Configuration File
file.
Delete a configuration file. Deleting a Configuration File
Done working with configuration files. If configuration changes were implemented
using the tasks in this table, verify the changes,
then save the configuration using the Creating
a Backup Database procedure.
1. In the selection tree, right-click the Configuration Files entity, and then select Create.
The Create Configuration Files window opens.
2. In the File Name field, enter the applicable file name with no spaces or slashes (/).
3. Select OK. The configuration file contains the delta between the default database and
the current active database.
4. Click the Configuration Files entity to view the configuration file status.
1. In the selection tree, click the Configuration Files entity. The Configuration Files
window opens.
2. In the Files table, right-click the configuration file that you want to update, and then
select Save.
The configuration file is updated and contains the delta between the default database
and the current active database, and overwrites the existing file.
1. In the selection tree, click the Configuration Files entity. The Configuration Files
window opens.
1. In the selection tree, click the Configuration Files entity. The Configuration Files
window opens.
2. In the Files table, right-click the configuration file that you want to run when the system
is restarted, and then select Restart with File.
The device restarts with the selected configuration file.
1. In the selection tree, right-click the Configuration Files entity, and then select Copy
from Remote. The Copy Configuration File From Remote window opens.
a. In the Method area, File Transfer Method menu, leave the Web option
selected.
b. In the HTTP Transfer area, Remote File field, enter the path to the remote file
to restore, or browse to the file location, then click OK.
The file is copied from the source location and the Detail Pane indicates when
the file transfer is 100% complete.
3. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the Method area, File Transfer Methodmenu, select either FTP, SFTP, or
SCP.
The window opens with a File Transfer section, which is identical for each
selection. This example figure displays the window contents when SCP is
selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server.
Field Setting
Server IP Select the type of server IP as either:
l IPv4
– or –
l IPv6
c. Click OK.
The file transfer begins, and is indicated in the window.
When the Status changes from Progress to Success, the file transfer is
complete.
2. In the Files table, right-click the configuration file that you want to export, and then
select Copy to Remote. The Copy Configuration File to Remote window opens.
3. To copy the file using the web, in the Method area, File Transfer Method menu, leave
the Web option selected, and continue to step #5.
a. In the Method area, File Transfer Method menu, select one of these options:
FTP, SFTP, or SCP.
The window displays with a File Transfer area, which is identical for each
selection. This example illustration displays the window contents when SCP is
selected.
b. In the File transfer area, set the file transfer options required to access the FTP,
SFTP, or SCP server:
Field Setting
Server IP a. From the menu, select the applicable server IP as either:
IPv4
– or –
IPv6.
The default is IPv4.
b. In the field, enter the applicable server IP address.
User ID Enter the applicable User ID to access the server.
User Password Enter the applicable password to access the server.
Path Enter the file path where to export the file.
5. Click OK.
The export begins. When the Status changes from In Progress to Success, the file has
been exported.
1. In the selection tree, click the Configuration Files entity. The Configuration Files
window opens.
2. In the Files table, right-click the configuration file with the description you want to edit,
and then select Edit Description. The Edit File Description dialog box is displayed.
3. In the Description field, enter the description for the file of up to 127 ASCII characters
with no spaces or slashes (/).
4. Click OK.
In the Files table, the description is updated.
1. In the selection tree, click the Configuration Files entity. The Configuration Files
window opens.
2. In the Files table, right-click the configuration file that you want to run when the system
is restarted, and then select Remove. The configuration file is deleted from the table.
If you determine that the default settings applied when a new entity is created are not
applicable or unacceptable, you can download an XML file containing alternate settings and
apply it to the OSA 5422.
The restore factory defaults function erases any user defined default
settings.
Prerequisites
1. Configure the NE with an IP address and connected the NE to a DCN or LAN (see ).
2. Log in to the web-based EMS.
1. On the toolbar, click Maintenance, or from the Application menu, select Maintenance.
2. Expand System > Administration, and select Default Settings.
The Copy System Default Settings From Remote window displays.
b. In the File Transfer area, set these options, which are required to access the FTP,
SFTP, or SCP server.
l Server IP: Select the type of server IP as either IPv4 (default) or IPv6, and in
the field enter the server IP address.
l User ID: Enter the User ID to access the server.
l User Password: Enter the password to access the server.
l Remote File: Enter the name of the file including the complete file path that
you want to transfer.
c. Click OK. The file transfer begins, and is indicated in the window.
When the Status changes from Progress to Success, the file transfer is complete.
These tasks are performed in the Maintenance view, which is accessible by either clicking
the Maintenance icon on the toolbar, or from the Application drop-down menu, selecting
Maintenance.
In the Maintenance view, expand System >Administration, and select Last Reset Cause.
The Last Reset Cause window displays with the last reset cause information.
3. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the File Transfer Method drop-down menu, select either FTP, SFTP, or SCP.
The window displays with a File Transfer section, which is identical for each
selection. This example figure displays the window contents when SCP is selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server.
o Server IP: Select the type of server IP as either IPv4 (default) or IPv6, and in the
This task is performed in the Maintenance view, which is accessible by either clicking the
Maintenance icon on the toolbar, or from the Application drop-down menu, selecting
Maintenance.
Prerequisites
1. Configure the NE with an IP address and connected the NE to a DCN or LAN (see ).
2. Log in to the web-based EMS.
window. The Transfer Alarm Log window is provided as an example, and used in the
subsequent steps. These steps can be used for each log.
2. In the File Transfer Method drop-down menu, select either FTP, SFTP, or SCP.
The window displays with a File Transfer section, which is identical for each selection.
This example figure displays the window contents when SCP is selected.
3. Set the file transfer options required to access the FTP, SFTP, or SCP server:
l Server IP: Select the type of server IP as either IPv4 (default) or IPv6, and
in the field enter the server IP address.
4. Click OK.
The file transfer begins, and is indicated in the window.
When the Status changes from In Progress to Success, the file has been transferred.
l HTTPS (web)
l FTP
l SFTP
l SCP
Prerequisites
1. Configure the NE with an IP address and connect the NE to a DCN or LAN (see ).
2. Log in to the web-based EMS as a Superuser.
1. From the Maintenance view, in the selection tree, next to the System>Administration
entities, click +.
2. Right-click Diagnostics Files, and then click Save. The Save Diagnostics Files window
opens.
3. Click OK. The Save Diagnostics Files Progress window opens, which indicates the
status of the task.
When the files are saved successfully, the Save Diagnostics Files window is updated, as
shown in this image.
4. In the selection tree, select the Diagnostic Files entity to view the status and timestamp
of the diagnostic files.
l HTTPS (web)
l FTP
l SFTP
l SCP
1. From the Maintenance view, in the selection tree, next to the System>Administration
entities, click +.
2. Right-click Diagnostics Files, and then click Copy to Remote. The Transfer
Diagnostics Files window opens.
A browser that blocks pop-ups can prevent the diagnostics files from
being successfully downloaded to the system. The system logs can
indicate a successful file download, when the browser has not properly
saved the file. We recommend to disable pop-up blocking or use the
browser’s pop-up override.
c. Choose whether to open or save the files by clicking Open or Save. The files are
zipped to a file called diagnostics.
4. To transfer the file using FTP, SCP, or SFTP, perform these steps:
a. In the File Transfer Method drop-down menu, select either FTP, SFTP, or SCP.
The window displays with a File Transfer section, which is identical for each
selection. This example figure displays the window contents when SCP is selected.
b. Set the file transfer options required to access the FTP, SFTP, or SCP server.
o Server IP: Select the type of server IP as either IPv4 (default) or IPv6, and in the
field enter the server IP address.
o User ID: Enter the User ID to access the server.
o User Password: Enter the password to access the server.
o Remote File: Enter the name of the log including the complete file path that you
want to transfer.
c. Click OK.
The file transfer begins, and is indicated in the window.
When the Status changes from Progress to Success, the files are transferred.
Performance Monitoring
This section contains information and procedures related to performance monitoring:
Performance monitoring view allows you to view performance monitoring counts and view
performance monitoring thresholds. You can edit performance monitoring thresholds and
initialize registers (with a proper access permission level).
For performance monitoring commands using the CLI, see the OSA 5422
Command Line Reference Guide.
Performance Parameters
The system collects performance parameters in several categories:
l Equipment presence and type, such as small form-factor pluggable (SFP) Interface
type and presence, module type, and presence.
l Physical Layer monitoring, such as optical power and temperature.
l Ethernet Statistics, such as the number of Ethernet packets received or transmitted.
l Protocol Statistics, such as the number of protocol dependent packets received or
transmitted.
l These entities are monitored for performance data which is accumulated into
performance parameters:
o Ethernet Access ports.
(1) The 32 Historical 15-Minute Bins provide the most recent 8 hours of performance data.
(2) The Historical 1-Day Bin provides the performance data from the previous day starting
from 12:00am, such as midnight, 00:00.
Rollover Counter
For Ethernet managed entities only, a Rollover Counter is provided. This gives the current
performance data since monitoring began. The counter accumulates until it reaches its
maximum size (64 bits). When this happens the counter will ‘roll over’ to zero and begin
again.
Unlike Bins, the Rollover Counter is not related to the time of day, but to system uptime.
Each Access Port and Flow entity type has default thresholds for its PPs, which are used
when an entity is provisioned. The default thresholds are configurable.
A TCA is only reported once during a bins time period unless it is initialized and then is
crossed again.
3. In the Settings area, PM Interval menu, select the applicable performance monitoring
period.
4. Click OK.
l Summary: Displays a summary of both transmit and receive statistics. See Figure
13 for an example view of an Access port summary.
l 15 Minute (or 5 Minute): Displays the performance monitoring counts in the
current 15 Minute (or 5 Minute) performance bin. See Figure 14 for an example
view of an Access port 15 Minute performance monitoring counters. If the History
check box is selected, the previous 32 periods are also displayed.
l 1 Day: Displays the performance monitoring counts in the current 1 Day
performance bin. If the History check box is selected, the previous period is also
displayed.
l Thresholds: Displays the details and the thresholds that have been set for each PP.
See Figure 15 for an example view of an Access port Threshold values.
1. On the toolbar, select Performance Monitoring, or from the Application menu, select
Performance Monitoring.
2. In the tree pane, next to the System > NE-1 > NTEOSA 5422 entities, click +.
3. Select the applicable Access Port. The performance monitoring Counts pane is displayed
(see Figure 14).
4. Select the applicable tab to view the Summary, 15 Minute (or 5 Minute) counters, 1 Day
counters, or Threshold levels. Use sliding bars to view data, as required. An asterisk in
the Time column indicates data that is suspect. (See Figure 14 and Figure 15.)
5. Optional, you can export 15 Minute (or 5 Minute), and 1 Day counts to an Excel
spreadsheet by clicking Excel. A dialog box is displayed at the bottom of the window.
6. Choose whether to open or save the file by clicking Open or Save. The file in the format
[Port]_[YYYY-MM-DD] is saved in the selected application. Excel is the default
application (see Figure 16). Edit or save the exported file as required.
Figure 13: Access Port Summary performance monitoring Counts
During LoS (link down) of a port, the Summary page displays N/A for the Optical
Power Received (OPR) field and the PM Rport page displays -100.
Current intervals are indicated as “current” and older periods are assigned incremental
numbers. The index allows a user to identify the current, previous (Bin Index=1) or one of
the historical bins (Bin Index = 2 to 32), with 32 being the oldest bin.
4. In the Register and Interval Selection area, Interval and Bin Index menus, select the
applicable interval and bin index.
5. Click OK. The designated performance monitoring count registers are cleared.
An Access Port entity type has default thresholds for its PPs, which are used when an entity
is provisioned. The default thresholds are configurable.
4. In the Entity Selection area, Entity menu, select the applicable port entity, and then
click OK. The Edit Thresholds window opens with a table listing the performance
monitoring thresholds related to the applicable port entity selected.
5. Edit the applicable thresholds for the applicable Monitored Type. Use the sliding bars on
the right of the window to view the data, as required.
6. Click OK.
Monitoring PTP
The OSA 5422 PTP feature provides performance monitoringfor PTP Port, PTP Flow points
and the Slave Only Ordinary Clock (SOOC). Additionally, the Syncjack feature provides stats
for the Telecom Slave (TS), Clock Probes (Clock Accuracy), PTP Clock Probes (Clock Analysis)
and the PTP Network Probe (PTP Network Analysis) as well has history results for Clock
Probes (Clock Accuracy) and PTP Clock Probes (Clock Analysis). These PMs follow the same
patterns and rules as the Ethernet interface PMs (see Monitoring Access PortsMonitoring
Access PortsMonitoring Access PortsMonitoring Access Ports)
The Performance monitoring view allows you to view performance monitoring counts and
view performance monitoring thresholds. Performance monitoring thresholds can be
edited, and registers can be initialized for users with proper user access permission level.
l Viewing PTP Port, PTP Flow Point and SOOC Performance Monitoring Counts and
Threshold Values
l Initializing PTP Port, PTP Flow Point and SOOC Performance Monitoring Registers
l Editing PTP Port, PTP Flow Point and SOOC Performance Monitoring Thresholds
l Probing Features
l Performing Clock Accuracy Testing
l Performing Clock Analysis
l Performing PTP Network Analysis
For performance monitoring commands using the CLI, see the OSA 5422
Command Line Reference Guide.
Performance Parameters
There are several categories of Performance Parameters (PPs) that are collected. These
entities are monitored for performance data which are accumulated into PPs:
(1) The 32 Historical 15-Minute Bins provide the most recent 8 hours of performance data.
(2) The Historical 1-Day Bin provides the performance data from the previous day starting
from 12:00 AM, such as midnight, 00:00.
Provisioning a threshold to zero will disable threshold monitoring for that entity.
Each entity type has default thresholds for its PPs, which are used when an entity is
provisioned. The default thresholds are configurable.
A TCA is only reported once during a bins time period unless it is initialized and then is
crossed again.
l Summary: Displays a summary of both transmit and receive statistics. See Figure
17 for an example view of an Access port summary.
l 15 Minute: Displays the performance monitoring counts in the current 15 minute
performance bin. See Figure 19 for an example view of a PTP flow point 15 minute
performance monitoring counters. If you select History, the previous periods are
also displayed.
l 1 Day: Displays the performance monitoring counts in the current 1 day
performance bin. If you select History, the previous period are also displayed.
l Thresholds: Displays the details and the thresholds that have been set for each
performance parameter. See Figure 21 for an example view of an access port
threshold values.
1. On the toolbar, click PTP, or from the Application menu, select PTP.
2. In the tree pane, expand System > NE-1.
3. Expand the applicable entity depending on performance monitoring counts and
thresholds you want to view:
o For Network/ Access PTP flow point: expand NTEOSAOSA 5422 > E1000-A-
1/E1000-N-1.
o For SOOC: expand TS-1-1.
o For PTP Port or L3 PTP Port: expand PTP Clock-1-x.
4. Select the Statistics tab. The performance monitoring Counts window opens (see Figure
17 and Figure 18).
5. Select the applicable tab to view Summary, 15 Minute counters, 1 Day counters, or
Threshold levels. Use the sliding bars to view data, as required. An asterisk in the Time
column indicates data that is suspect (see Figure 19, Figure 20, Figure 21, and Figure 22).
7. Select to open or save the file. The filen ame in the format [Entity name]_[YYYY-MM-DD],
such as NET_PTP_FLOW_PT-1-1-1-1_2018-01-02, is created in the selected application.
Excel is the default application. Edit or save the exported file as required.
Figure 17: Summary performance monitoring Counts — PTP Flow point
Current intervals are indicated as “current” and older periods are assigned incremental
numbers. The index allows a user to identify the current, previous (Bin Index=1) or one of
the historical bins (Bin Index = 2 to 32), with 32 being the oldest bin, or All History.
1. On the toolbar, click PTP, or from the Application menu, select PTP.
2. In the tree pane, expand System>NE-1.
3. Expand the applicable entity depending on the performance monitoring counts and
thresholds you want to view:
o For access PTP flow point: expand NTEOSA 5422 > E1000-A-1 to 10.
4. To view PTP performance monitoring counts, select the Statistics tab and Summary
tab.
5. To initialize counters, right-click the applicable PTP Port, PTP Flow point, or SOOC entity,
and then select Init Registers. The Initialize Registers window opens.
6. In the Register and Interval Selection area, Interval and Bin Index menus, select the
applicable interval and bin index.
7. Click OK. The designated performance monitoring count registers are cleared.
Each entity type has default thresholds for its PPs, which are used when an entity is
provisioned. The default thresholds are configurable.
1. On the toolbar, click PTP, or from the Application menu, select PTP.
2. In the tree pane, expand System > NE-1.
3. Expand the applicable entity depending on the performance monitoring counts and
thresholds you want to edit:
o For Access PTP flow point: expand NTEOSA 5422 > E1000-A-1 to 10.
4. Right-click the applicable PTP Port, PTP Flow point, or SOOC entity, and then select Edit
Thresholds. The Edit Thresholds window opens.
5. Edit the applicable thresholds for the applicable Monitored Type. Use the sliding bars to
view the data, as required.
6. Click OK.
For procedures on viewing, editing and initializing PMs using the web-based EMS, see
Monitoring Access Ports.
1. Valid only when the port is configured to use the fiber interfaces.
OSA 5422 R11.1.1 Provisioning and Operations - Issue: A 474
Oscilloquartz: An ADVA Company
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
ABR-RX Average Bit Rate Received (in the Receive Near End 0 0
A2N direction). The average bit
rate received over the specific
interval in the ingress direction.
This counter is based on RMON
etherStatsOctets.
ABR-TX Average Bit Rate Transmitted (in Transmit Near End 0 0
the N2A direction). The average
bit rate transmitted over a specific
interval in the egress direction,
based on Bytes Sent.
APFD AFP Priority-tagged Frames Receive Near End 0 0
Dropped. Priority-tagged frames
dropped due to AFP setting. AFP
Priority-tagged Frames Dropped.
Priority-tagged frames dropped
due to AFP setting.
AUFD AFP Untagged Frames Dropped. Receive Near End 0 0
Untagged frames dropped due to
AFP setting.
ESBF EtherStats Broadcast Frames. If Receive Near End 0 0
there is link down during the
interval, the bin is not accessible.
ESBP EtherStats Broadcast Packets Receive Near End 0 0
Received (in the A2N direction).
The total number of good packets
received that were directed to the
broadcast address. Note that this
does not include multicast
packets.
ESBS EtherStats Bytes Sent. Transmit Near End 0 0
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
ESC EtherStats Collisions. The best Receive Near End 0 0
estimate of the total number of
collisions on this Ethernet
segment. The value returned will
depend on the location of the
RMON probe. Section 8.2.1.3
(10BASE-5) and section 10.3.1.3
(10BASE-2) of IEEE standard 802.3
states that a station must detect a
collision, in the receive mode, if
three or more stations are
transmitting simultaneously. A
repeater port must detect a
collision when two or more
stations are transmitting
simultaneously.
ESCAE EtherStats CRC (Cyclic Receive Near End 37055 3557280
Redundancy Check) Aligned
Errors. The total number of
packets received that had a length
(excluding framing bits, but
including FCS octets) of between
64 and 1518 octets, inclusive, but
had either a bad Frame Check
Sequence (FCS) with an integral
number of octets (FCS Error) or a
bad FCS with a non-integral
number of octets (Alignment
Error).
ESDE EtherStats Drop Events. The total Receive Near End 37055 3557280
number of events in which
packets were dropped due to lack
of resources. Note that this
number is not necessarily the
number of packets dropped; it is
just the number of times this
condition has been detected.
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
ESF EtherStats Fragments. The total Receive Near End 37055 3557280
number of packets received that
were less than 64 octets in length
(excluding framing bits but
including FCS octets) and had
either a bad Frame Check
Sequence (FCS) with an integral
number of octets (FCS Error) or a
bad FCS with a non-integral
number of octets (Alignment
Error). Note that it is entirely
normal for etherStatsFragments
to increment. This is because it
counts both runts (which are
normal occurrences due to
collisions) and noise hits.
ESFS EtherStats Frames Sent. The Transmit Near End 0 0
Frames Sent in the egress
direction.
ESJ EtherStats Jabbers. The total Receive Near End 0 0
number of packets received that
were longer than 1518 octets
(excluding framing bits, but
including FCS octets), and had
either a bad Frame Check
Sequence (FCS) with an integral
number of octets (FCS Error) or a
bad FCS with a non-integral
number of octets (Alignment
Error).
Note that this definition of jabber
is different than the definition in
IEEE-802.3 section 8.2.1.5
(10BASE5) and section 10.3.1.4
(10BASE2). These documents
define jabber as the condition
where any packet exceeds 20 ms.
The allowed range to detect
jabber is between 20 ms and 150
ms.
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
ESMF EtherStats Multicast Frames. The Transmit Near End 0 0
Multicast Frames Sent in the
egress direction.
ESMP EtherStats Multicast Packets Receive Near End 0 0
Received. EtherStats Multicast
Packets Received. The total
number of good packets received
that were directed to a multicast
address. Note that this number
does not include packets directed
to the broadcast address.
ESO EtherStats Octets Received. The Receive Near End 0 0
total number of octets of data
(including those in bad packets)
received on the network
(excluding framing bits but
including FCS octets).
ESOF EtherStats Oversize Frames. The Transmit Near End 0 0
total number of frames
transmitted that were oversized.
ESOP EtherStats Oversize Packets. The Receive Near End 37055 3557280
total number of packets received
that were longer than 1518 octets
(excluding framing bits, but
including FCS octets) and were
otherwise well formed.
ESP EtherStats Packets Received. The Receive Near End 0 0
total number of packets
(including bad packets, broadcast
packets, and multicast packets)
received.
ESP64 EtherStats Packets - 0 to 64 Octets Receive Near End 0 0
Frames. The total number of
packets (including bad packets)
received that were 64 octets in
length (excluding framing bits but
including FCS octets).
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
ESP65 EtherStats Packets - 65 to 127 Receive Near End 0 0
Octets Frames. The total number
of packets (including bad packets)
received that were between 65
and 127 octets in length inclusive
(excluding framing bits but
including FCS octets).
ESP128 EtherStats Packets - 128 to 255 Receive Near End 0 0
Octets Frames. The total number
of packets (including bad packets)
received that were between 128
and 255 octets in length inclusive
(excluding framing bits but
including FCS octets).
ESP256 EtherStats Packets - 256 to 511 Receive Near End 0 0
Octet Packets. The total number
of packets (including bad packets)
received that were between 256
and 511 octets in length inclusive
(excluding framing bits but
including FCS octets).
ESP512 EtherStats Packets - 512 to 1023 Receive Near End 0 0
Octets Frames. The total number
of packets (including bad packets)
received that were between 512
and 1023 octets in length
inclusive (excluding framing bits
but including FCS octets).
ESP1024 EtherStats Packets - 1024 to 1518 Receive Near End 0 0
Octets Frames. The total number
of packets (including bad packets)
received that were between 1024
and 1518 octets in length
inclusive (excluding framing bits
but including FCS octets).
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
ESP1519 EtherStats Packets - 1519 to 1536 Receive Near End 0 0
Octets Frames. The total number
of packets (including bad packets)
received that were between 1519
and 1536 octets in length
inclusive (excluding framing bits
but including FCS octets).
ESUF EtherStats Unicast Frames sent. If Transmit Near End 0 0
there is link down during the
interval, the bin is not accessible.
ESUP EtherStats Undersize Packets Receive Near End 37055 3557280
received. The total number of
packets received that were less
than 64 octets long (excluding
framing bits, but including FCS
octets) and were otherwise well
formed.
L2CPFD Layer 2 Control Protocol Frames Receive Near End 0 0
Discarded. Number of Layer 2
Control Protocol Frames
discarded on the interface.
L2CPFP Layer 2 Control Protocol Frames Receive Near End 0 0
Processed. Number of Layer 2
Control Protocol Frames
processed on the interface.
LBC1 Laser Bias Current retrieved from Receive Near End 0 0
the SFP. Applicable only if the
media type is Fiber.
LES Line Errored Seconds detected. Receive Near End 0 0
Increments if a False Carrier or
Errored Symbol event occurs
since the last 1 second poll.
OPR1 Optical Power Receive. Received Receive Near End -80 -80
Optical Power (in dBm) retrieved
from the SFP.
1. Valid only when the port is configured to use the fiber interfaces.
OSA 5422 R11.1.1 Provisioning and Operations - Issue: A 481
Oscilloquartz: An ADVA Company
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
OPT1 Optical Power Transmit. Transmit Receive Near End -80 -80
Optical Power (in dBm) retrieved
from the SFP.
OPR-VAR1 Optical Power Received - Receive Near End 4 4
Variance. The variance from the
configured OPR threshold that
does not result in generating a
TCA. For example, if OPR is -80
and OPR-VAR is 4, no TCA is
generated if OPR is between -76
and -84. Applicable only if the
media type is Fiber.
OPT-VAR1 Optical Power Transmit - Transmit Near End 4 4
Variance. The variance from the
configured OPT threshold that
does not result in generating a
TCA. For example, if OPT is -80
and OPR-VAR is 4, no TCA is
generated if OPT is between -76
and -84. Applicable only if the
media type is Fiber.
TEMP Temperature for the physical layer None Near End 0 0
(Applicible (expressed in Celsius).
only to
Fiber)
Table 94: Ethernet Access Port Monitored Types and Default TCA Settings
Monitored 5/15
Description Direction Location 1 Day
Type Min.
UAS Unavailable Seconds. Used by Receive Near End 0 0
Network/Service Management
Systems to compute port-based
service unavailability. Counted if
one or more of following exists in
that second:
l Link down
l link deactivated (triggered by
LLF)
l SFP faults
l EFM-OAM discovery failure
l EFM-OAM loopback
l Port-based cross-connect
defect (unexpected MD level
or MAID Mismatch/Mismerge)
l Port-based MEP Error CCM
Defect (Unexpected MEP or
unexpected period)
l Port-based MEP RMEP CCM
Defect (Loss of Connectivity)
l Port-based MEP RDI Defect
(unidirectional failure makes
the port based service
unavailable)
Precision Time Protocol application when PTP Flow Points are created.
Table 95: PTP Flow Point Monitored Types and Default TCA Settings
5/15 1
Monitored Type Definition Direction Location
Min. Day
ANNOUNCESRX PTP Announce Messages Receive Near End 0 0
Received
ANNOUNCESTX PTP Announce Messages Transmit Near End 0 0
Transmitted
DELAYREQSRX PTP Delay_Req Messages Receive Near End 0 0
Received
DELAYREQSTX PTP Delay_Req Messages Transmit Near End 0 0
Transmitted
DELAYRSPSRX PTP Delay_Resp Receive Near End 0 0
Messages Received
DELAYRSPSTX PTP Delay_Resp Transmit Near End 0 0
Messages Transmitted
FOLLOWUPSRX PTP Follow_Up Messages Receive Near End 0 0
Received
FOLLOWUPSTX PTP Follow_Up Messages Transmit Near End 0 0
Transmitted
MGMTFRAMESRX PTP Management Frames Receive Near End 0 0
Received
MGMTFRAMESTX PTP Management Frames Transmit Near End 0 0
Transmitted
PDELAYREQSRX PTP Pdelay_Req Receive Near End 0 0
Messages Received
PDELAYREQSTX PTP Pdelay_Req Transmit Near End 0 0
Messages Transmitted
PDELAYRSPSRX PTP Pdelay_Resp Receive Near End 0 0
Messages Received
PDELAYRSPSTX PTP Pdelay_Resp Transmit Near End 0 0
Messages Transmitted
PDELAYRSPFOLUPSRX PTP Pdelay_Resp_Follow_ Receive Near End 0 0
Up Messages Received
PDELAYRSPFOLUPSTX PTP Pdelay_Resp_Follow_ Transmit Near End 0 0
Up Messages Transmitted
Table 95: PTP Flow Point Monitored Types and Default TCA Settings
5/15 1
Monitored Type Definition Direction Location
Min. Day
PTPUNKNOWNSRX Unknown PTP Messages Receive Near End 0 0
Received
PTPUNKNOWNSTX Unknown PTP Messages Transmit Near End 0 0
Transmitted
SIGNALINGRX PTP Signaling Messages Receive Near End 0 0
Received
SIGNALINGTX PTP Signaling Messages Transmit Near End 0 0
Transmitted
SYNCSRX PTP Sync Messages Receive Near End 0 0
Received
SYNCSTX PTP Sync Messages Transmit Near End 0 0
Transmitted
Table 97: PTP MCI Monitored Types and Default TCA Settings
15 1
Monitored Type Definition Direction Location
Min. Day
MCI_ANNCANCELEVTS Announce Service Receive Near End 0 0
Canceled Events
MCI_ANNOUNCEDENEVTS Announce Service Receive Near End 0 0
Denied Events
MCI_ Delay Response Receive Near End 0 0
DELAYRESPCANCELEVTS Service Canceled
Events
MCI_DELAYRESPDENEVTS Delay Response Receive Near End 0 0
Service Denied Events
MCI_ Dynamic Slaves Receive Near End 0 0
DYNSLAVESLEARNCOUNTS Learned Count
MCI_DYNSLAVESDROPPED Dynamic Slaves Receive Near End 0 0
Service Dropped
MCI_PTPDISCARDS PTP Message Discards Receive Near End 0 0
MCI_SYNCCANCELLEVTS Sync Service Canceled Receive Near End 0 0
Events
MCI_SYNCDENEVTS Sync Service Denied Receive Near End 0 0
Events
Table 98: PTP Port Monitored Types and Default TCA Settings
15 1
Monitored Type Definition Direction Location
Min. Day
AVGANNOUNCERATE PTP Port Receive Near End 0 0
Average
Announce Rate
AVGSYNCRATE PTP Port Receive Near End 0 0
Average Sync
Rate
AVGDELAYREQRATE PTP Port Receive Near End 0 0
Average Delay
Req Rate
AVGDELAYRESPRATE PTP Port Receive Near End 0 0
Average Delay
Resp Rate
PTPUNKDOMAIND PTP Port Receive Near End 0 0
Mismatch
Domain
Discards
MSGWRONGTYPEDSCRD Receive Near End 0 0
PTP Port
Message
Wrong Type
Discards
PTPINVMSGLEND PTP Port Receive Near End 0 0
Messages
Wrong Length
Discards
MINOFM PTP Port Min Receive Near End 0 0
Offset From
Master
Table 98: PTP Port Monitored Types and Default TCA Settings
15 1
Monitored Type Definition Direction Location
Min. Day
MAXOFM PTP Port Max Receive Near End 0 0
Offset From
Master
AVGOFM PTP Port Receive Near End 0 0
Average Offset
From Master
MINSYNCPD PTP Port Min Receive Near End 0 0
Sync Path Delay
MAXSYNCPD PTP Port Max Receive Near End 0 0
Sync Path Delay
AVGSYNCPD PTP Port Receive Near End 0 0
Average Sync
Path Delay
AVGDELAY_RESPPD PTP Port Receive Near End 0 0
Average Delay
Resp Path
Delay
MAXDELAY_RESPPD PTP Port Max Receive Near End 0 0
Delay Resp
Path Delay
MINDELAY_RESPPD PTP Port Min Receive Near End 0 0
Delay Resp
Path Delay
MINMEANPATHDELAY PTP Port Min Receive Near End 0 0
Mean Path
Delay
MAXMEANPATHDELAY PTP Port Max Receive Near End 0 0
Mean Path
Delay
AVGMEANPATHDELAY PTP Port Receive Near End 0 0
Average Mean
Path Delay
UNKNOWNMASTERDISCARDS PTP Port Receive Near End 0 0
Unknown
Master Discards
Table 99: PTP Remote Slave Monitored Types and Default TCA Settings
15 1
Monitored Type Definition Direction Location
Min. Day
RS_ANNOUNCEMSGSGEN Announce Transmit Near End 0 0
Messages
Generated
RS_ Delay_Req Receive Near End 0 0
DELAYREQMSGSDROPPED Messages
Dropped
RS_DELAYREQMSGSRX Delay_Req Receive Near End 0 0
Messages
Received
RS_DELAYRESPMSGSGEN Delay_Resp Transmit Near End 0 0
Messages
Generated
RS_INVTLVLENDISCARDS PTP messages Receive Near End 0 0
with invalid PTP
TLV length
RS_INVTLVTYPEDISCARDS PTP messages Receive Near End 0 0
with unknown
PTP TLV type
RS_SIGNALMSGSGEN Signaling Transmit Near End 0 0
Messages
Generated
RS_SIGNALMSGSRX Signaling Receive Near End 0 0
Messages
Received
RS_SYNCMSGSGEN Sync Messages Transmit Near End 0 0
Generated
RS_ Times Announce Receive Near End 0 0
TIMESANNOUNCELEASEEXP lease duration
expired
Table 99: PTP Remote Slave Monitored Types and Default TCA Settings
15 1
Monitored Type Definition Direction Location
Min. Day
RS_TIMESDELAYRESPEXP Times Delay_Resp Receive Near End 0 0
lease duration
expired
RS_TIMESSYNCLEASEEXP Times Sync lease Receive Near End 0 0
duration expired
Table 100: Telecom Slave Clock Analysis Monitored Types and Default TCA
Settings
Monitored 5/15 1
Definition Direction Location
Type Min. Day
TOTALTIMECR5 Total time clock recovery Receive Near End 0 0
score = 5
TOTALTIMECR4 Total time clock recovery Receive Near End 0 0
score = 4
TOTALTIMECR3 Total time clock recovery Receive Near End 0 0
score = 3
TOTALTIMEPR5 Total time pulse recovery Receive Near End 0 0
score = 5
TOTALTIMEPR4 Total time pulse recovery Receive Near End 0 0
score = 4
TOTALTIMEPR3 Total time pulse recovery Receive Near End 0 0
score = 3
Table 101: PTP Network Probe Monitored Types and Default TCA Settings
5/15 1
Monitored Type Definition Direction Location
Min. Day
AVGMEANPATHDELAY Average Mean Receive Near End 0 0
Path Delay, ns
MINMEANPATHDELAY Minimum Mean Receive Near End 0 0
Path Delay, ns
MAXMEANPATHDELAY Maximum Mean Receive Near End 0 0
Path Delay, ns
AVGSYNCPD Average Path Receive Near End 0 0
Delay From
Master To Slave,
ns
MINSYNCPD Minimum Path Receive Near End 0 0
Delay From
Master To Slave,
ns
MAXSYNCPD Maximum Path Receive Near End 0 0
Delay From
Master To Slave,
ns
MINRPDVFWD Minimum Residual Receive Near End 0 0
Packet Delay
Variation Forward
Direction, ns
AVGRESPDVFWD Average Residual Receive Near End 0 0
Packet Delay
Variation Forward
Direction, ns
RESPDVFWDLOW Total Number Of Receive Near End 0 0
Forward Residual
Packet Delay
Variation Results
In Low Range
RESPDVFWDMEDIUM Total Number Of Receive Near End 0 0
Forward Residual
Packet Delay
Variation Results
In Medium Range
Table 101: PTP Network Probe Monitored Types and Default TCA Settings
5/15 1
Monitored Type Definition Direction Location
Min. Day
RESPDVFWDHIGH Total Number Of Receive Near End 0 0
Forward Residual
Packet Delay
Variation Results
In High Range
RESPDVFWDTOTAL Total Number Of Receive Near End 0 0
Valid RPDVfrw
Results
MINRPDVREV Minimum Residual Receive Near End 0 0
Packet Delay
Variation Reverse
Direction
AVGRESPDVREV Average Residual Transmit Near End 0 0
Packet Delay
Variation Reverse
Direction
RESPDVREVLOW Total Number Of Receive Near End 0 0
Reverse Residual
Packet Delay
Variation Results
In Low Range
RESPDVREVMEDIUM Total Number Of Receive Near End 0 0
Reverse Residual
Packet Delay
Variation Results
In Medium Range
RESPDVREVHIGH Total Number Of Receive Near End 0 0
Reverse Residual
Packet Delay
Variation Results
In High Range
RESPDVREVTOTAL Total Number Of Receive Near End 0 0
Valid RPDVrev
Results
FWDSCORE5 Total Time Receive Near End 0 0
Forward Score=5,
s
Table 101: PTP Network Probe Monitored Types and Default TCA Settings
5/15 1
Monitored Type Definition Direction Location
Min. Day
FWDSCORE4 Total Time Receive Near End 0 0
Forward Score=4,
s
FWDSCORE3 Total Time Receive Near End 0 0
Forward Score=3,
s
REVSCORE5 Total Time Receive Near End 0 0
Reverse Score=5,
s
REVSCORE4 Total Time Receive Near End 0 0
Reverse Score=4,
s
REVSCORE3 Total Time Receive Near End 0 0
Reverse Score=3,
s
SYNCSRX Number of Receive Near End 0 0
Received Sync
Messages
LOSTSYNCMSGS Number of Lost Receive Near End 0 0
Sync Messages
DELAYRSPSRX Number of Receive Near End 0 0
Received Delay
Response
Messages
LOSTDELAYRSPMSGS Number of Lost Receive Near End 0 0
Delay Response
Messages
MINDELAYREQPATHDELAY Minimum Delay Receive Near End 0 0
Req Path Delay
MAXDELAYREQPATHDELAY Maximum Delay Receive Near End 0 0
Req Path Delay
AVGDELAYREQPATHDELAY Average Delay Receive Near End 0 0
Req Path Delay
MINPATHASYMMETRY Minimum Path Receive Near End 0 0
Asymmetry
Table 101: PTP Network Probe Monitored Types and Default TCA Settings
5/15 1
Monitored Type Definition Direction Location
Min. Day
MAXPATHASYMMETRY Maximum Path Receive Near End 0 0
Asymmetry
AVGPATHASYMMETRY Average Path Receive Near End 0 0
Asymmetry
Syncjack Testing
Syncjack is a collection of monitoring and measurement tools that allows maintenance and
performance monitoring of synchronization services.
l Clock Probe: The Clock Probe is used to measure clock frequency and phase
accuracy.
l PTP Clock Probe: The PTP Clock Probe is used for PTP clock analysis.
l PTP Network Probe: The PTP Network Probe is used for network analysis of PTP
message transport.
The Syncjack suite is comprised of a Syncjack Network Management System (NMS) and
Syncjack embedded applications. See Figure 23 for an example.
l Clock Accuracy
l Clock Analysis
l PTP Network Analysis.
Probing Features
To measure meaningful results, the accuracy of the reference used by the probes should be
accurate by at least one order of magnitude compared to the signal under test, such as
when using GNSS as a reference, the time error generated by the GPS/GNSS receiver/PRTC
can be up to 100 +/- nsec (according to G.8272). Therefore, the TE/ TIE/MTIE can be
effected by the GNSS reference time error and wander.
We recommend not to change the GNSS constellation while the probe runs.
This can cause incorrect probe results. If the GNSS constellation changed
during the measurement, we recommend that you restart the probe.
Prerequisites
The procedure for performing Clock Accuracy testing assumes that the OSA 5422 is
properly connected to the clock inputs to be measured and the appropriate OSA 5422
interfaces have been configured. See Provisioning the OSA 5422.
l Enabled
– or –
l Disabled
The default is Disabled.
When restarted, the values of the Mask
Failure, Mask Crossed Time, Mask Margin
Failure, and Mask Margin Crossed Time
are reinitiated and start from a new time
period.
Note: If this setting is disabled, the MTIE
measurement is calculated over the
entire period from when the clock probe
is activated. Therefore, the MTIE graph
can include measurements that are not
relevant as they are dated.
5. Click OK.
6. In the tree pane, next to Clock Probes, click +.
The newly created Clock Probe entity is displayed.
7. Select the Clock Probe entity and in the window select the Status tab to verify the entry
and connection status as illustrated in the image below.
If any Source or Reference Failures are indicated, troubleshoot, and clear the failure as
necessary.
A Clock Probe can be edited after creation by right-clicking the entity name, and then
selecting Edit Clock Probe. All fields except the Clock Probe Index can be edited. Once
a probe is scheduled, it cannot be modified or deleted.
Prerequisites
l The OSA 5422 is properly connected to the clock inputs to be measured and the
appropriate OSA 5422 interfaces have been configured. See Provisioning the
OSA 5422.
l The Slave port under test must populate the origin timestamp t3 in Delay_Req
messages to allow monitoring.
l This procedure requires a PTP Flow Point and a reference. To create a PTP Flow
Point, see Provisioning the Precision Time Protocol.
3. Verify the Syncjack Schedule State and Test Progress (see Verifying the Syncjack
Schedule State and Testing Progress).
l Slave to Master
– or –
l Master to Slave
l Enabled
– or –
l Disabled
5. Click OK.
6. In the selection tree, next to PTP Clock Probes, click +. The newly created PTP Clock
Probe entity is displayed.
7. Select the PTP Clock Probe entity and in the window select the Status tab to verify the
entry and connection status as illustrated in the image below.
If any Failures are indicated, troubleshoot, and clear the failure as necessary.
All PTP Clock Probes must use the same reference.
A PTP Clock Probe can be edited after creation by right-clicking the entity name, and
then selecting Edit PTP Clock Probe. All fields except the PTP Clock Probe Index can be
edited. Once a probe is scheduled it cannot be modified or deleted.
8. Repeat Steps #3 to 7 to create additional PTP Clock Probes, if applicable (up to 4).
This scoring is used to estimate the frequency and phase accuracy of the internal OSA 5422
slave clock. Unlike network usability, this is the quality of the slave clock, not the network.
The input is PTP packets, the output is a frequency accuracy and a phase accuracy score of
3, 4, or 5 for each as performance monitor.
5. Click OK.
Prerequisites
l Connect the OSA 5422 to the clock inputs you want to measure.
l Configure the appropriate OSA 5422 interfaces. See Provisioning the OSA 5422.
3. Verify the PTP Network Probe (see Verifying the PTP Network Probe).
5. Click OK.
In the selection tree, expand PTP Network Probes. The newly created PTP Network
Probe entity is displayed.
6. Select the newly created PTP Network Probe entity, and in the window that is displayed
select the Configuration tab to verify the entry.
A PTP Network Probe can be edited after creation by right-clicking the entity name and
selecting Edit Clock Probe. All fields, except the Clock Probe Index, can be edited.
When a probe is scheduled, it cannot be modified or deleted.
2. Click the PTP Network Probe entity again to observe when the test is completed. If a
fixed Syncjack schedule fixed duration time was entered.
3. During the test or after the test is completed, the results are available by selecting the
applicable PTP Network Probe, and selecting the Statistics tab.
4. In the selection tree, select the PTP Network Analysis entity to view the PTP Network
Analysis results through the Dashboard meter.
5. In the selection tree, select the Network Element entity to view the PTP Network Analysis
and Global results through the Dashboard meter.
The Clock Analysis meter displays test results only if the associated Syncjack schedule is
present. Each result is associated with a color coded radio button according to its
Probe/Score (green, yellow, or red). If grey, this indicates the Syncjack schedule has been
deleted or no score results are present.
6. To initialize the performance monitoring registers, right-click the PTP Network Probe,
and then select Init Registers. Then follow the procedure in Initializing Performance
Monitoring Registers.
7. To edit the performance monitoring Thresholds, right-click the PTP Network Probe, and
then select Edit Thresholds. Then follow the procedure in Editing Performance
Monitoring Thresholds.
Creating a Schedule
You can create a Syncjack Schedule for any type of probe. The task below provides an
example of creating a schedule for a clock probe, but the same steps would be followed for
a PTP clock probe or network probe.
If the scheduled time expires, the probe sends raw data file without measurements with this
status: #Adva Status: NOTSCHEDULED.
1. In the selection tree, right-click SyncJack Schedules, and then select Create Schedule.
A Create Schedule window opens.
3. Click OK.
4. In the selection tree, expand Syncjack Schedules.
A new Syncjack Schedule entity is displayed.
5. To verify the entry, select the Syncjack Schedule entity.
Deleting a Schedule
1. In the selection tree, next to the System>NE-1>Syncjack Schedules entities, click +.
2. Right-click the applicable schedule entity, and then select Delete Schedule.
A Delete SyncJack Schedule window opens.
3. Click OK.
When viewing the clock probe or PTP clock probe test results, there are a number of
different tabs available:
l Status
l Tests
l TIE/TE Graph
l Recent TIE/TE Graph
l Statistics
Each of these tabs are explained in the sections below with sample output.
Prerequisites
Verify that you set up raw data collection (see Provisioning Raw Data Collection).
l Not Scheduled
l Failed
l Waiting [Scheduled - Future]
l Running
l Completed
After the test is completed, a subset of the clock probe or PTP clock probe Status tab data
is available in a history entity (see Viewing History Results).
The task below provides an example for a clock probe, but the same
steps would be followed for a PTP clock probe.
To verify Syncjack Schedule State and test progress in the Status tab:
2. Click the Clock Probe entity again to observe continued progress while the test is
running. Observe the Actual Test Duration (s) status to determine how long the test
has been running and how much time is left before completion, if a Fixed Duration was
scheduled.
3. Click the Clock Probe entity again to observe when the test is completed, if a fixed
Syncjack schedule duration time was entered. An example is provided in this figure.
4. Observe the test result details by interval by viewing the Test Result table or hovering
the mouse over the interval marker in the graph.
5. Test results can be exported to Microsoft Excel or other programs by selecting the
Export button. A dialog box is displayed at the bottom of the window.
After opening the Excel file, the output is displayed as illustrated in this example.
Figure 26 provides an example for a clock probe. Similar output is displayed for a PTP clock
probe.
If the clock probe or PTP clock probe threshold levels are provisioned, select the Zoom to
TIE/TE Graph check box in the TIE/TE graph tab to zoom in on the threshold levels along
with measured results. Provisioned Threshold levels are identified in the legend at the
bottom of the window. For examples of the TIE/TE graphs with thresholds, see Figure 29
and Figure 30.
If the clock probe or PTP clock probe threshold levels are provisioned and thresholds have
been exceeded, the Clock Probe threshold exceeded alarms should be present once the
threshold has been crossed. For an example, see Figure 31. Provisioned Threshold levels are
identified in the legend at the bottom of the window.
If the test duration is longer than 2000 seconds, select the Recent TIE Graph tab to view
the last 2000 seconds of the test results.
The example figures provided in this section are for a clock probe. Similar
output is displayed for a PTP clock probe.
Figure 28: Example Clock Probe TIE/TE Graph with Failed Region
Figure 29: Clock Probe - TIE/TE Graph Tab With Threshold Levels Identified
Figure 30: Clock Probe - TIE/TE Graph Tab With Zoom to TE Graph Selected
The figures provided in this section are for a clock probe. Similar output
is displayed for a PTP clock probe.
l Summary: Contains the most relevant information related to the MTIE and TE,
which are calculated from the beginning of the measurement. The TE measurement
performance monitoring is calculated and presented as the maximum average
signed value for 1s, 10s, 100s, 1000s, 10,000s, and 50,000s. For example, if the
current performance monitoring value is 150 ns and the next average calculation
bears -200 ns, the current performance monitoring value is -200 ns (see Figure 32).
l Thresholds: Displays the thresholds you have configured when editing the
thresholds of the clock accuracy probe or clock analysis probe. Threshold SNMP
traps are generated if these thresholds are exceeded. See Figure 35.
For more information on the Status tab, see Viewing the Status Tab.
Once the history results are displayed, you can export the results and obtain a MTIE
comparison (see Obtaining an MTIE Comparison).
You can also edit or delete a history result by right-clicking the applicable entity, and
selecting either Edit History Result or Delete History Result.
The task below provides an example of viewing history results for a clock
probe, but the same steps would be followed for a PTP clock probe.
When viewing PTP clock probe history results, expand the System>NE-
1>Clock Analysis>History Estimations entities.
2. Select the applicable Clock Probe Result entity that you want to view.
A clock probe history Result window opens.
3. History Test results can be exported to Microsoft Excel or another program by selecting
the Export button.
1. In each applicable clock probe or PTP clock probe history Result window, select the Add
To Result Analysis check box .
2. In the selection tree, next to the System>NE-1>Result Analysis entities, click +.
3. Select MTIE comparison. The MTIE comparison results are displayed in the window. An
example is provided in this illustration for a clock probe.
l Clock Accuracy: Displays the Clock Accuracy results for each scheduled clock
probe.
l Clock Analysis: Displays the Clock Analysis results for each scheduled PTP clock
probe.
l PTP Network Analysis: Displays the PTP Network Analysis results for each
scheduled PTP network probe.
The meter displays test results only if the associated Syncjack schedule is
present. Each Probe/Score is associated with a color coded radio button
according to its test result (green, yellow, or red). If gray, this indicates the
Syncjack schedule has been deleted or no score results are present.
l NE-1: Displays the Syncjack Global results and individual probe results.
The task below provides an example of viewing results for a clock probe
through the Clock Analysis entity. Follow the same steps for a PTP clock
probe or PTP network probe for the applicable entity.
o Select the check box for each applicable Probe Results, for a maximum of four, to
include in the comparison.
5. Click OK.
6. In the selection tree, select the MTIE Comparison entity. The MTIE Comparison results
are displayed in the window.
1. From the toolbar, select SyncJack or from the Application menu, select SyncJack.
2. Under NE-1, right-click User MTIE Mask and then select Edit User Mask.
The User Mask Configuration screen is displayed.
Field Description
MTIE Mask Specify an easy to remember name for this custom mask. Default:
Name UserDefined.
Field Description
X, Y Display Specify up to 64 X, Y pairs that are used to display the mask on a graph.
Points Use a comma (,) to separate X from Y and a semicolon (;) to separate
pairs.
X – predefined observation intervals in seconds: 0.1, 0.2, 0.5, 1, 2, 5, 10,
20, 50, 100, 200, 500, 1000, 2000, 5000, 10000, 20000, 50000, 100000
Valid range: 0.1 to 100000.
Y – the expected MTIE results you have calculated in Measurement
Points.
Valid range: integers.
Measurement Enter a string of 19 expected MTIE results in nanoseconds (rounded to
Points the nearest integer). Calculate the results according to the standard
definition.
Each MTIE result corresponds to one of the observation intervals (X).
For example, the first element in the string corresponds to interval 0.1
0.5 — 40
1 — 40
2 — 53
5 — 76
10 — 100
20 — 100
50 — 100
100 — 100
200 — 100
500 — 100
1000 — 100
2000 — 100
5000 — 100
10000 — 100
20000 — 100
50000 — 100
2. In the Measurement Points field, enter 19 expected results as a comma-separated
string (round fractions to the nearest integer).
3. In the X, Y Display Points field, enter pairs of observation intervals (X) and expected
results (Y):
0.1,40;1,40;2,53;5,76;7,87;10,100;100000,100
Intervals between 10 and 10000 were omitted because they have the same value.
For security reasons, the system does not save raw data collection configuration such as
server IP and passwords in the configuration file.
Prerequisites
Ensure that the relevant file transfer protocol is enabled. See Configuring the System
Identity and Configuration.
1. In the selection tree, right-click Raw Data Collection, and then select Edit Raw Data
Server.
The Raw Data Collection window opens.
3. Click OK.
4. In the selection tree, click Raw Data Collection to verify the entry.
1. In the selection tree, next to the NE-1>Clock Accuracy / Clock Analysis entities, click +.
2. Right-click the relevant Clock Probe or PTP Clock Probe, and then select Edit Clock
Probe / Edit PTP Clock Probe.
The Edit Clock Probe/Edit PTP Clock Probe window opens.
3. In the Configuration area, Raw Data Collection menu, select Enabled, and then click
OK.
4. Schedule the Probe (see Performing Clock Accuracy Testing or Performing Clock
Analysis).
5. Concatenate the relevant files on the server.
For example, this script can be used in Linux:
#!/bin/bash
out_file=$1
shift
header_lines=11
temp_file=tmp.txt
rm -f $temp_file
rm -f $out_file
echo processing $1
head -n -1 $out_file > $temp_file
gzip -dc $1 | tail -n +$header_lines >> $temp_file
mv $temp_file $out_file
shift
done
For example, this command concatenates all files with CLOCK_PROBE-1-1 string to CLOCK_
PROBE_ALL.txt output file:
adva_raw_data_unzip CLOCK_PROBE_ALL.txt `ls *CLOCK_PROBE-1-
1*.gz`
Example:
2.3950001938E+03, 4.0000000000E-09
2.3951001938E+03, 4.0000000000E-09
2.3952001938E+03, 8.0000000000E-09
2.3953001938E+03, 4.0000000000E-09
2.3954001938E+03, 4.0000000000E-09
2.3955001938E+03, 4.0000000000E-09
2.3956001938E+03, 4.0000000000E-09
2.3957001938E+03, 4.0000000000E-09
To clear an alarm:
1. Ensure that an interface device, such as a craft interface, is connected to the network and
is operating correctly before continuing.
2. Establish a communication connection to the OSA 5422 and log in to the web-based
EMS (see Logging In).
3. Observe the Alarms pane to view all current alarms, and record the alarm severity. For an
overview of the web-based EMS components and the location of the Alarm window, see
Getting to Know the User Interface.
4. Determine which current alarm has the greatest service effect, and record the alarm.
Troubleshoot alarms according to this order:
a. Service-affecting (SA) critical alarms.
b. Major SA alarms.
c. Minor SA alarms.
d. Non-service-affecting (NSA) major alarms.
e. NSA minor alarms.
5. Locate the appropriate alarm indication description and suggested troubleshooting
techniques for the specific problem.
6. For identifying, interpreting, and troubleshooting alarms, see Alarm Attributes, Probable
Cause, and Troubleshooting.
For descriptions of connectors and front-panel LEDs, see the OSA 5422 Installation and
Commissioning guide.
7. After performing suggested troubleshooting actions, verify that the alarm or status
condition is now clear.
o If it is clear, record the time the alarm was cleared, and continue with the next step.
l Authentication failed
l Radius setup failed
l Invalid password
ENTITY CONDITIONS
256 Entity does not exist.
257 Entity already exists.
258 Next child entity does not exist.
259 Set operation is not supported.
260 Create operation is not supported.
261 Delete operation is not supported.
262 _actiontype_ operation is not supported.
263 Get variable objects operation is not supported.
Object is transient
_configFileName_failed_command
Init load failed
Login failed
8000 MEIATTR_TIMING_SOURCE
8001 MEIATTR_MAX_SLAVE_SUPPORTED
8002 MEIATTR_MAX_STATIC_SLAVE_SUPPORTED
8003 MEIATTR_SLAVE_ANNOUNCE_MSG_RATE
8004 MEIATTR_SLAVE_SYNC_MSG_RATE
8005 MEIATTR_SLAVE_DELAY_RESP_MSG_RATE
8006 MEIATTR_ALIAS_ERROR
The tables in this section list all OSA 5422 system alarms and default notification codes.
Each table contains a description of the alarm condition, probable cause and suggested
troubleshooting procedure.
To clear alarm conditions, start with the troubleshooting procedure in Recommended Steps
for Clearing Alarms.
System Alarms
Table 103: System Alarms and Events
Default
Condition Description /
Troubleshooting Notification SA/NSA LED
Type Probable Cause
Code
Primary NTP Attempt to 1) Verify that the IP Minor NSA N/A
Server Failed connect to the address responds to
Primary NTP pings by performing
Server failed.1 both a ping and a trace
route from the
management tunnel’s
IP address.
2) Verify management
communication
configuration.
a) Target IP a) Repair IP address
address connectivity or routing
connectivity or problem.
routing problem.
b) No NTP server b) Switch to Backup
/ NTP server NTP Server. Repair NTP
down. server.
1When using Ethernet encapsulated management tunnels, the source IP address of the
ping used to validate reachability of the trap host is the IP address assigned to the
management tunnel, and not the system IP address.
OSA 5422 R11.1.1 Provisioning and Operations - Issue: A 565
Oscilloquartz: An ADVA Company Alarms, Events, Probable Causes, and Error Codes
Leap Second An expected leap This alarm cannot be Minor NSA N/A
Expected second update is cleared.
scheduled for
midnight. This
alarm is
generated 12
hours before the
scheduled
update time.
PPS Not The GNSS Ensure that enough Major NSA N/A
Generated receiver does not usable satellites are
generate a PPS available to generate
signal. accurate PPS output.
Sat Min1 The number of Change the Sat Min1 Major NSA N/A
Threshold satellites in use is Threshold value.
Crossed below the SAT_
Min1 threshold.
Sat Min2 The number of Change the Sat Min2 Major NSA N/A
Threshold satellites in use is Threshold value.
Crossed below the SAT_
Min2 threshold.
If a 2048kHz or E1 is the
desired BITS Line Type,
then Network Clock
Type should be set to
"Option 1".
Loss of BITS Loss of Signal. Verify and troubleshoot Minor N/A N/A
Signal BITS incoming clock reference
signal is lost. connection.
Table 112: Time of Day (TOD) & PPS Port Alarms and Events
Condition Default
Description Troubleshooting SA/NSA LED
Type Notification
Output Output of the Verify and Minor NSA N/A
Squelch TOD & troubleshoot TOD &
PPS port has PPS port source.
been
squelched due
to change of
state of the
entity serving
as the port's
source.
Table 112: Time of Day (TOD) & PPS Port Alarms and Events
Condition Default
Description Troubleshooting SA/NSA LED
Type Notification
Time TOD Check TOD & PPS port Minor NSA N/A
Reference & PPS port sync references,
Unavailable provisioned as ensure that TOD &
time reference PPS port operational
state is normal and
of time clock
clock code is locked.
and is
unavailable to
serve as valid
reference.
LOSS No signal at Major SA N/A
the PPS port
for three
seconds.
Leap Second Pending leap Minor NSA N/A
Expected second event.
No Valid TOD No TOD Major SA N/A
Input messages.
Message
Synchronization Alarms
Table 114: Synchronization (SYNC-1-1-1( Alarms and Events
Condition Default
Description Troubleshooting SA/NSA LED
Type Notification
All Input Sync All non-locked out Verify and Major NSA N/A
Referenced synchronization troubleshoot clock
Failed references in the reference.
system clock
selector list have
failed. The system
clock selector list
must have at least
one SyncRef
member for the
condition to exist.
Sys Clock System Clock No action necessary. Not Reported NSA N/A
Mode - Fast Mode - Fast
Acquisition Acquisition
Synchronization.
This indicates the
clock selector is
acquiring the
phase of the
selected reference.
Sys Clock System Clock Verify synchronization Not Reported NSA N/A
Mode - Mode - Free provisioning to ensure
Freerunning Running option is set correctly.
Synchronization. Otherwise, no action is
necessary.
This indicates the
internal oscillator
is the source of
the system clock.
Average Clock was not No action necessary. Not Reported NSA N/A
Holdover synced long
Frequency enough to enter
Not Ready holdover and is
now freerunning.
PTP Alarms
This section describes PTP alarm conditions:
SOOC Alarms
This table details PTP Slave-Only Ordinary Clocks (SOOC) alarm conditions and their
associated probable cause, default notification code, and suggested trouble clearing
procedure.
Syncjack Alarms
This section describes Syncjack alarm conditions:
Alarm Masking
These tables provide the alarm masking rules, where certain alarms or conditions can mask
the raising of an underlying condition, and until the “masking” alarms are cleared, the
underlying alarms cannot be seen.
1When using Ethernet encapsulated management tunnels, the source IP address of the ping used to
validate reach ability of the trap host is the IP address assigned to the management tunnel, and not the
system IP address.