- About this Manual
- Chapter 1, Shelf and Backplane Hardware
- Chapter 2, Card Reference
- Chapter 3, Card Protection
- Chapter 4, Cisco Transport Controller Operation
- Chapter 5, Security
- Chapter 6, Timing
- Chapter 7, Circuits and Tunnels
- Chapter 8, SDH Topologies and Upgrades
- Chapter 9, Management Network Connectivity
- Chapter 10, Ethernet Operation
- Chapter 11, Alarm Monitoring and Management
- Chapter 12, Performance Monitoring
- Chapter 13, SNMP
- Appendix A, Hardware Specifications
- Appendix B, Administrative and Service States
- Appendix C, Network Element Defaults
Network Element Defaults
This appendix describes the factory-configured (default) network element (NE) settings for the Cisco ONS 15600 SDH. It includes descriptions of card default settings and node default settings. For procedures for importing, exporting and editing the settings, refer to the "Maintain the Node" chapter of the Cisco ONS 15600 SDH Procedure Guide. Cards supported by this platform that are not listed in this appendix are not supported by user-configurable NE defaults settings.
To change card settings individually (that is, without directly changing the NE defaults), refer to the "Change Card Settings" chapter of the Cisco ONS 15600 SDH Procedure Guide. To change node settings, refer to the "Change Node Settings" chapter of the Cisco ONS 15600 SDH Procedure Guide.
This appendix includes the following sections:
•Network Element Defaults Description
C.1 Network Element Defaults Description
The NE defaults are preinstalled on each Cisco ONS 15600 SDH TSC card. Cisco also ships a file named 15600SDH-defaults.txt on the Cisco Transport Controller (CTC) software CD in case you want to import the defaults onto existing TSC cards. The NE defaults include card-level, CTC, and node-level defaults.
Changes to card provisioning that are made manually using the procedures in the "Change Card Settings" chapter in the Cisco ONS 15600 SDH Procedure Guide override default settings. If you use the CTC Defaults editor (on the node view Provisioning > Defaults tab) or import a new defaults file, any changes to card or port settings that result only affect cards that are installed or preprovisioned after the defaults have changed.
Changes that are made manually to most node-level default settings override the current settings, whether default or provisioned. If you change node-level default settings, either by using the Defaults editor or by importing a new defaults file, the new defaults reprovision the node immediately for all settings except those relating to protection (1+1 bidirectional switching, 1+1 reversion time, 1+1 revertive switching, multiplex section-shared protection ring [MS-SPRing] ring reversion time, MS-SPRing ring revertive switching, MS-SPRing span reversion time, and MS-SPRing span revertive switching). Settings relating to protection apply to subsequent provisioning.
Note Changing some node-level provisioning through NE defaults can cause CTC disconnection or a reboot of the node in order for the provisioning to take effect. Before you change a default, check in the Side Effects column of the Defaults editor (right-click a column header and select Show Column > Side Effects) and be prepared for the occurrence of any side effects listed for that default.
C.2 Card Default Settings
The tables in this section list the default settings for each SDH card. Cisco provides several types of user-configurable defaults for Cisco ONS 15600 SDH optical, electrical, storage access networking, and Ethernet (or data) cards. Types of card defaults can be broadly grouped by function, as outlined in the following subsections. For information about individual card settings, refer to the "Change Card Settings" chapter of the Cisco ONS 15600 SDH Procedure Guide.
Note When the card level defaults are changed, the new provisioning done after the defaults have changed is affected. Existing provisioning remains unaffected.
The following types of defaults are defined for SDH cards.
C.2.1 Configuration Defaults
Card-level and port-level configuration defaults correspond to settings found in the CTC card-level Provisioning tabs.
Configuration defaults that correspond to settings that are reachable from the CTC card-level Provisioning tabs include the following types of options (arranged by CTC subtab):
•Line—(STM-N and STM64-4-DWDM cards) Line-level configuration settings.
•VC4—(STM-N and STM64-4-DWDM cards) VC4 configuration settings.
•VC3—(STM-N cards) VC3 configuration settings.
•Pluggable Port Modules—(ASAP cards only) PPM (SFP) slot and port rate configuration settings.
•Optical—(ASAP cards only) STM-N rate port-level line configuration, VC3, VC4, Optics threshold, and SDH threshold settings.
•Ethernet—(ASAP cards only) Ethernet port-level line configuration settings.
Note Ethernet line configuration defaults apply to both Ethernet port and packet-over-SDH (POS) port settings where the same setting exists for both.
Note For further information about supported features of each individual card, see Chapter 2, "Card Reference."
C.2.2 Threshold Defaults
Threshold default settings define the default cumulative values (thresholds) beyond which a threshold crossing alert (TCA) will be raised, making it possible to monitor the network and detect errors early.
Card threshold default settings are provided as follows:
•PM thresholds—(STM-N, STM64-4-DWDM, and ASAP cards) Can be expressed in counts or seconds; includes line and SDH thresholds.
•Physical Layer thresholds—(STM-N, STM64-4-DWDM, and ASAP cards) Expressed in percentages; includes optics thresholds.
Threshold defaults are defined for near end and/or far end, at 15-minute and one-day intervals. Thresholds are further broken down by type, such as Multiplex Section, Regeneration Section, VC3, or VC4 for performance monitoring (PM) thresholds, and TCA (warning) or Alarm for physical thresholds. PM threshold types define the layer to which the threshold applies. Physical threshold types define the level of response expected when the threshold is crossed.
Note For full descriptions of the thresholds you can set for each card, see Chapter 12, "Performance Monitoring."
Note For additional information regarding PM parameter threshold defaults as defined by Telcordia specifications, refer to Telcordia GR-820-CORE and GR-253-CORE.
C.2.3 Defaults by Card
In the tables that follow, card defaults are defined by the default name, its factory-configured value, and the domain of allowable values that you can assign to it.
Note Some default values, such as certain thresholds, are interdependent. Before changing a value, review the domain for that default and any other related defaults for potential dependencies.
C.2.3.1 STM64-4 Card Default Settings
Table C-1 lists the OC192/STM64 SR/SH 4 Port 1310 and OC192/STM64 LR/LH 4 Port 1550 card default settings.
C.2.3.2 STM64-4-DWDM Card Default Settings
Table C-2 lists the STM64-4-DWDM (OC192/STM64 4 Port ITU C-Band) card default settings.
C.2.3.3 STM16-16 Card Default Settings
Table C-3 lists the OC48/STM16 SR/SH 16 Port 1310 and OC48/STM16 LR/LH 16 Port 1550 card default settings.
C.2.3.4 ASAP Card Default Settings
Table C-4 lists the ASAP card default settings.
C.3 Node Default Settings
Table C-5 lists the node-level default settings for the Cisco ONS 15600 SDH. Cisco provides the following user-configurable defaults for each Cisco ONS 15600 SDH node:
•Circuit settings—Set the administrative state and subnetwork connection protection (SNCP) circuit defaults.
•General settings—Set general node management defaults, including whether to use Daylight Savings Time (DST), the IP address of the Network Time Protocol/Simple Network Time Protocol (NTP/SNTP) server to be used, the time zone where the node is located, the signal degrade (SD) path bit error rate (BER) value, the defaults description, whether automatic autonomous Transcation Language One (TL1) reporting of PM data is enabled for cross-connect paths on the node, whether or not to allow ports to be disabled when they are providing services (when the default is set to FALSE users must remove or disable the services first, then put the ports out of service), and whether to report loopback conditions on ports in the Locked,maintenance state.
•Network settings—Set default gateway node type, and whether to raise an alarm when the backplane LAN cable is disconnected.
•OSI settings—Set the Open System Interconnection (OSI) main setup, generic routing encapsulation (GRE) tunnel default, the link access protocol on the D channel (LAP-D), the router subnet, and the TID address resolution protocol (TARP) settings.
•1+1 protection settings—Set whether or not protected circuits have bidirectional switching, are revertive, and what the reversion time is.
•MS-SPRing protection settings—Set whether MS-SPRing-protected circuits are revertive, and what the reversion time is, at both the ring and span levels.
•Legal Disclaimer—Set the legal disclaimer that warns users at the login screen about the possible legal or contractual ramifications of accessing equipment, systems, or networks without authorization.
•Power Monitor—Set the power monitoring settings for the node.
•Security Grant Permissions—Set default user security levels for activating/reverting software, PM data clearing, database restoring, and retrieving audit logs.
•Security Access settings—Set default security settings for LAN access, shell access, serial craft access, element management system (EMS) access (including Internet Inter-Object Request Broker Protocol [IIOP] listener port number), TL1 access, and Simple Network Management Protocol (SNMP) access.
•Security RADIUS settings—Set default RADIUS server settings for the accounting port number and the authentication port number, and whether to enable the node as a final authenticator.
•Security Policy settings—Set the allowable failed logins before lockout, idle user timeout for each user level, optional lockout duration or manual unlock enabled, password reuse and change frequency policies, number of characters difference that is required between the old and new password, password aging by security level, enforced single concurrent session per user, and option to disable inactive user after a set inactivity period.
•Security Password settings—Set when passwords can be changed, how many characters they must differ by, whether or not password reuse is allowed, and whether a password change is required on first login to a new account; set password aging enforcement and user-level specific aging and warning periods; set how many consecutive identical characters are allowed in a password, maximum password length, minimum password length, minimum number and combination of nonalphabetical characters required, and whether or not to allow a password that is a reversal of the login ID associated with the password.
•BITS Timing settings—Set the coding, framing, state, Admin synchronization status messaging (SSM), AISThreshold, CableType, FacilityType, line build out, and Sa bit settings for building integrated timing supply 1 (BITS-1) and BITS2 timing.
•General Timing settings—Set the mode (External, Line, or Mixed), quality of reserved (RES) timing (the rule that defines the order of clock quality from lowest to highest), revertive, reversion time, and SSM message set for node timing.
Note Any node level defaults changed using the Provisioning > Defaults tab, changes existing node level provisioning. Although this is service affecting, it depends on the type of defaults changed, for example, general, and all timing and security attributes. The "Changing default values for some node level attributes overrides the current provisioning." message is displayed. The Side Effects column of the Defaults editor (right-click a column header and select Show Column > Side Effects) explains the effect of changing the default values. However, when the card level defaults are changed using the Provisioning > Defaults tab, existing card provisioning remains unaffected.
Note For more information about each individual node setting, refer to the "Change Node Settings" chapter of the Cisco ONS 15600 SDH Procedure Guide.
|
|
|
---|---|---|
NODE.circuits.State |
unlocked, automaticInService |
unlocked, locked, disabled, locked, maintenance, unlocked, automaticInService |
NODE.circuits.sncp.HO_SDBER |
1E-6 |
1E-5, 1E-6, 1E-7, 1E-8, 1E-9 |
NODE.circuits.sncp.HO_SFBER |
1E-4 |
1E-3, 1E-4, 1E-5 |
NODE.circuits.sncp.ReversionTime |
5.0 (minutes) |
0.5, 1.0, 1.5 .. 12.0 |
NODE.circuits.sncp.Revertive |
FALSE |
TRUE, FALSE |
NODE.general.AllowServiceAffectingPortChangeToDisabled |
TRUE |
FALSE, TRUE |
NODE.general.AutoPM |
FALSE |
FALSE, TRUE |
NODE.general.DefaultsDescription |
Factory Defaults |
Free form field |
NODE.general.NtpSntpServer |
0.0.0.0 |
IP Address |
NODE.general.ReportLoopbackConditionsOnOOS-MTPorts |
FALSE |
FALSE, TRUE |
NODE.general.TimeZone |
(GMT-06:00) Central Time (US & Canada) |
(For applicable time zones, see Table C-6.) |
NODE.general.UseDST |
TRUE |
TRUE, FALSE |
NODE.network.general.AlarmMissingBackplaneLAN |
FALSE |
TRUE, FALSE |
NODE.network.general.GatewaySettings |
None |
LeaveAsIs, None, ENE, GNE, ProxyOnlyNode |
NODE.osi.greTunnel.OspfCost |
110 |
110, 111, 112 .. 65535 |
NODE.osi.greTunnel.SubnetMask |
24 (bits) |
8, 9, 10 .. 32 |
NODE.osi.lapd.MTU |
512 |
512, 513, 514 .. 1500 |
NODE.osi.lapd.Mode |
AITS |
AITS, UITS |
NODE.osi.lapd.Role |
Network |
Network, User |
NODE.osi.lapd.T200 |
200 (ms) |
200, 300, 400 .. 20000 |
NODE.osi.lapd.T203 |
10000 (ms) |
4000, 4100, 4200 .. 120000 |
NODE.osi.mainSetup.L1L2LSPBufferSize |
512 (bytes) |
512 - 1500 |
NODE.osi.mainSetup.L1LSPBufferSize |
512 (bytes) |
512 - 1500 |
NODE.osi.mainSetup.NodeRoutingMode |
Intermediate System Level 1/Level 2 |
Intermediate System Level 1, Intermediate System Level 1/Level 2 |
NODE.osi.subnet.DISPriority |
63 |
1, 2, 3 .. 127 |
NODE.osi.subnet.ESH |
10 (sec) |
10, 20, 30 .. 1000 |
NODE.osi.subnet.IIH |
3 (sec) |
1, 2, 3 .. 600 |
NODE.osi.subnet.ISH |
10 (sec) |
10, 20, 30 .. 1000 |
NODE.osi.subnet.LANISISCost |
20 |
1, 2, 3 .. 63 |
NODE.osi.subnet.LDCCISISCost |
40 |
1, 2, 3 .. 63 |
NODE.osi.subnet.SDCCISISCost |
60 |
1, 2, 3 .. 63 |
NODE.osi.tarp.L1DataCache |
TRUE |
FALSE, TRUE |
NODE.osi.tarp.L2DataCache |
FALSE |
FALSE, TRUE |
NODE.osi.tarp.LANStormSuppression |
TRUE |
FALSE, TRUE |
NODE.osi.tarp.LDB |
TRUE |
FALSE, TRUE |
NODE.osi.tarp.LDBEntry |
5 (min) |
1 - 10 |
NODE.osi.tarp.LDBFlush |
5 (min) |
0 - 1440 |
NODE.osi.tarp.PDUsL1Propagation |
TRUE |
FALSE, TRUE |
NODE.osi.tarp.PDUsL2Propagation |
TRUE |
FALSE, TRUE |
NODE.osi.tarp.PDUsOrigination |
TRUE |
FALSE, TRUE |
NODE.osi.tarp.T1Timer |
15 (sec) |
0 - 3600 |
NODE.osi.tarp.T2Timer |
25 (sec) |
0 - 3600 |
NODE.osi.tarp.T3Timer |
40 (sec) |
0 - 3600 |
NODE.osi.tarp.T4Timer |
20 (sec) |
0 - 3600 |
NODE.osi.tarp.Type4PDUDelay |
0 (sec) |
0 - 255 |
NODE.powerMonitor.EHIBATVG |
-72.0 (Vdc) |
-40.5, -41.0, -41.5 .. -72.0 |
NODE.powerMonitor.ELWBATVG |
-40.5 (Vdc) |
-40.5, -41.0, -41.5 .. -72.0 |
NODE.protection.1+1.BidirectionalSwitching |
FALSE |
TRUE, FALSE |
NODE.protection.1+1.ReversionTime |
5.0 (minutes) |
0.5, 1.0, 1.5 .. 12.0 |
NODE.protection.1+1.Revertive |
FALSE |
TRUE, FALSE |
NODE.protection.msspr.RingReversionTime |
5.0 (minutes) |
0.5, 1.0, 1.5 .. 12.0 |
NODE.protection.msspr.RingRevertive |
TRUE |
TRUE, FALSE |
NODE.security.emsAccess.AccessState |
NonSecure |
NonSecure, Secure |
NODE.security.emsAccess.IIOPListenerPort (May reboot node) |
57790 (port #) |
0 - 65535 |
NODE.security.grantPermission.ActivateRevertSoftware |
Superuser |
Provisioning, Superuser |
NODE.security.grantPermission.PMClearingPrivilege |
Provisioning |
Provisioning, Superuser |
NODE.security.grantPermission.RestoreDB |
Superuser |
Provisioning, Superuser |
NODE.security.grantPermission.RetrieveAuditLog |
Superuser |
Provisioning, Superuser |
NODE.security.idleUserTimeout.Maintenance |
01:00 (hours:mins) |
00:00, 00:01, 00:02 .. 16:39 |
NODE.security.idleUserTimeout.Provisioning |
00:30 (hours:mins) |
00:00, 00:01, 00:02 .. 16:39 |
NODE.security.idleUserTimeout.Retrieve |
00:00 (hours:mins) |
00:00, 00:01, 00:02 .. 16:39 |
NODE.security.idleUserTimeout.Superuser |
00:15 (hours:mins) |
00:00, 00:01, 00:02 .. 16:39 |
NODE.security.lanAccess.LANAccess (May disconnect CTC from node) |
Front & Backplane |
No LAN Access, Front Only, Backplane Only, Front & Backplane |
NODE.security.lanAccess.RestoreTimeout |
5 (minutes) |
0 - 60 |
NODE.security.legalDisclaimer.LoginWarningMessage |
<html><center><b>WARNING</b></center>This system is restricted to authorized users for business purposes. Unauthorized<p>access is a violation of the law. This service may be monitored for administrative<p>and security reasons. By proceeding, you consent to this monitoring. |
Free form field |
NODE.security.other.DisableInactiveUser |
FALSE |
FALSE, TRUE |
NODE.security.other.InactiveDuration |
45 (days) |
1, 2, 3 .. 99 when nothing TRUE; 45 when nothing FALSE |
NODE.security.other.SingleSessionPerUser |
FALSE |
TRUE, FALSE |
NODE.security.passwordAging.EnforcePasswordAging |
FALSE |
TRUE, FALSE |
NODE.security.passwordAging.maintenance.AgingPeriod |
45 (days) |
20 - 90 |
NODE.security.passwordAging.maintenance.WarningPeriod |
5 (days) |
2 - 20 |
NODE.security.passwordAging.provisioning.AgingPeriod |
45 (days) |
20 - 90 |
NODE.security.passwordAging.provisioning.WarningPeriod |
5 (days) |
2 - 20 |
NODE.security.passwordAging.retrieve.AgingPeriod |
45 (days) |
20 - 90 |
NODE.security.passwordAging.retrieve.WarningPeriod |
5 (days) |
2 - 20 |
NODE.security.passwordAging.superuser.AgingPeriod |
45 (days) |
20 - 90 |
NODE.security.passwordAging.superuser.WarningPeriod |
5 (days) |
2 - 20 |
NODE.security.passwordChange.CannotChangeNewPassword |
FALSE |
TRUE, FALSE |
NODE.security.passwordChange.CannotChangeNewPasswordForNDays |
20 (days) |
20 - 95 |
NODE.security.passwordChange.NewPasswordMustDifferFromOldByNCharacters |
1 (characters) |
1 - 20 |
NODE.security.passwordChange.PreventReusingLastNPasswords |
1 (times) |
1 - 10 |
NODE.security.passwordChange.RequirePasswordChangeOnFirstLoginToNewAccount |
FALSE |
TRUE, FALSE |
NODE.security.passwordComplexity.IdenticalConsecutiveCharactersAllowed |
3 or more |
0-2, 3 or more |
NODE.security.passwordComplexity.MaximumLength |
20 |
20, 80 |
NODE.security.passwordComplexity.MinimumLength |
6 |
6, 8, 10, 12 |
NODE.security.passwordComplexity.MinimumRequiredCharacters |
1 num, 1 letter & 1 TL1 special |
1 num, 1 letter & 1 TL1 special, 1 num, 1 letter & 1 special, 2 each of any 2 of num, upper, lower & TL1 special, 2 each of any 2 of num, upper, lower & special |
NODE.security.passwordComplexity.ReverseUserIdAllowed |
TRUE |
TRUE, FALSE |
NODE.security.radiusServer.AccountingPort |
1813 (port) |
0 - 32767 |
NODE.security.radiusServer.AuthenticationPort |
1812 (port) |
0 - 32767 |
NODE.security.radiusServer.EnableNodeAsFinalAuthenticator |
TRUE |
FALSE, TRUE |
NODE.security.serialCraftAccess.EnableCraftPortA |
TRUE |
TRUE, FALSE |
NODE.security.serialCraftAccess.EnableCraftPortB |
TRUE |
TRUE, FALSE |
NODE.security.shellAccess.AccessState |
NonSecure |
Disabled, NonSecure, Secure |
NODE.security.shellAccess.EnableShellPassword |
FALSE |
TRUE, FALSE |
NODE.security.shellAccess.TelnetPort |
23 |
23 - 9999 |
NODE.security.snmpAccess.AccessState |
NonSecure |
Disabled, NonSecure |
NODE.security.tl1Access.AccessState |
NonSecure |
Disabled, NonSecure, Secure |
NODE.security.userLockout.FailedLoginsAllowedBeforeLockout |
5 (times) |
0 - 10 |
NODE.security.userLockout.LockoutDuration |
00:30 (mins:secs) |
00:00, 00:05, 00:10 .. 10:00 |
NODE.security.userLockout.ManualUnlockBySuperuser |
FALSE |
TRUE, FALSE |
NODE.timing.bits-1.AISThreshold |
G812L |
G811, STU, G812T, G812L, SETS, DUS |
NODE.timing.bits-1.AdminSSMIn |
STU |
G811, STU, G812T, G812L, SETS, DUS |
NODE.timing.bits-1.CableType |
120 ohm |
75 ohm, 120 ohm when nothing E1; 100 ohm when nothing DS1; 75 ohm, 120 ohm when nothing 2MHz; 120 ohm when nothing 64kHz+8kHz |
NODE.timing.bits-1.Coding |
HDB3 |
B8ZS, AMI when FacilityType DS1; HDB3, AMI when FacilityType E1; N/A when FacilityType 2MHz; AMI when FacilityType 64kHz+8kHz |
NODE.timing.bits-1.CodingOut |
HDB3 |
B8ZS, AMI when FacilityTypeOut DS1; HDB3, AMI when FacilityTypeOut E1; N/A when FacilityTypeOut 2MHz; AMI when FacilityTypeOut 64kHz+8kHz |
NODE.timing.bits-1.FacilityType |
E1 |
DS1, E1, 64kHz+8kHz, 2MHz |
NODE.timing.bits-1.FacilityTypeOut |
E1 |
DS1, E1, 64kHz+8kHz, 2MHz |
NODE.timing.bits-1.Framing |
FAS+CAS+CRC |
ESF, D4 when FacilityType DS1; FAS+CRC, FAS+CAS, FAS+CAS+CRC, FAS, Unframed when FacilityType E1; N/A when FacilityType 2MHz; N/A when FacilityType 64kHz+8kHz |
NODE.timing.bits-1.FramingOut |
FAS+CAS+CRC |
ESF, D4 when FacilityTypeOut DS1; FAS+CRC, FAS+CAS, FAS+CAS+CRC, FAS, Unframed when FacilityTypeOut E1; N/A when FacilityTypeOut 2MHz; N/A when FacilityTypeOut 64kHz+8kHz |
NODE.timing.bits-1.LBO |
0-133 |
0-133, 134-266, 267-399, 400-533, 534-655 |
NODE.timing.bits-1.Sa bit |
4 |
4, 5, 6, 7, 8 when FacilityType E1; N/A when FacilityType DS1; N/A when FacilityType 2MHz; N/A when FacilityType 64kHz+8kHz |
NODE.timing.bits-1.State |
unlocked |
unlocked, locked, disabled |
NODE.timing.bits-1.StateOut |
unlocked |
locked, disabled when FacilityTypeOut DS1; unlocked, locked, disabled when FacilityTypeOut E1; unlocked, locked, disabled when FacilityTypeOut 2MHz; unlocked, locked, disabled when FacilityTypeOut 64kHz+8kHz |
NODE.timing.bits-2.AISThreshold |
G812L |
G811, STU, G812T, G812L, SETS, DUS |
NODE.timing.bits-2.AdminSSMIn |
STU |
G811, STU, G812T, G812L, SETS, DUS |
NODE.timing.bits-2.CableType |
120 ohm |
75 ohm, 120 ohm when nothing E1; 100 ohm when nothing DS1; 75 ohm, 120 ohm when nothing 2MHz; 120 ohm when nothing 64kHz+8kHz |
NODE.timing.bits-2.Coding |
HDB3 |
B8ZS, AMI when FacilityType DS1; HDB3, AMI when FacilityType E1; N/A when FacilityType 2MHz; AMI when FacilityType 64kHz+8kHz |
NODE.timing.bits-2.CodingOut |
HDB3 |
B8ZS, AMI when FacilityTypeOut DS1; HDB3, AMI when FacilityTypeOut E1; N/A when FacilityTypeOut 2MHz; AMI when FacilityTypeOut 64kHz+8kHz |
NODE.timing.bits-2.FacilityType |
E1 |
DS1, E1, 64kHz+8kHz, 2MHz |
NODE.timing.bits-2.FacilityTypeOut |
E1 |
DS1, E1, 64kHz+8kHz, 2MHz |
NODE.timing.bits-2.Framing |
FAS+CAS+CRC |
ESF, D4 when FacilityType DS1; FAS+CRC, FAS+CAS, FAS+CAS+CRC, FAS, Unframed when FacilityType E1; N/A when FacilityType 2MHz; N/A when FacilityType 64kHz+8kHz |
NODE.timing.bits-2.FramingOut |
FAS+CAS+CRC |
ESF, D4 when FacilityTypeOut DS1; FAS+CRC, FAS+CAS, FAS+CAS+CRC, FAS, Unframed when FacilityTypeOut E1; N/A when FacilityTypeOut 2MHz; N/A when FacilityTypeOut 64kHz+8kHz |
NODE.timing.bits-2.LBO |
0-133 |
0-133, 134-266, 267-399, 400-533, 534-655 |
NODE.timing.bits-2.Sa bit |
4 |
4, 5, 6, 7, 8 when FacilityType E1; N/A when FacilityType DS1; N/A when FacilityType 2MHz; N/A when FacilityType 64kHz+8kHz |
NODE.timing.bits-2.State |
unlocked |
unlocked, locked, disabled |
NODE.timing.bits-2.StateOut |
unlocked |
locked, disabled when FacilityTypeOut DS1; unlocked, locked, disabled when FacilityTypeOut E1; unlocked, locked, disabled when FacilityTypeOut 2MHz; unlocked, locked, disabled when FacilityTypeOut 64kHz+8kHz |
NODE.timing.general.Mode |
External |
External, Line, Mixed |
NODE.timing.general.ReversionTime |
5.0 (minutes) |
0.0, 0.5, 1.0 .. 12.0 |
NODE.timing.general.Revertive |
FALSE |
TRUE, FALSE |
NODE.timing.general.SSMMessageSet |
Generation 2 |
Generation 1, Generation 2 |
C.3.1 Time Zones
Table C-6 lists the time zones that apply for node time zone defaults. Time zones in the table are ordered by their relative relationships to Greenwich Mean Time (GMT), and the default values are displayed in the correct format for valid default input.
C.4 CTC Default Settings
Table C-7 lists the CTC-level default settings for the Cisco ONS 15600 SDH. Cisco provides the following user-configurable defaults for CTC:
•Automatic Routing—Set circuit creation with the Route Automatically check box selected by default.
•Network Circuit Automatic Routing Overridable—Set by default whether or not a user creating circuits can change (override) the Automatic Circuit Routing setting (also provisionable as a default). When this default is set to TRUE it enables users to change whether or not Route Automatically is selected in the check box. When this default is set to FALSE it ensures that users cannot change the Route Automatically setting while creating circuits in CTC.
Note When the Route Automatically check box is not selectable (and is not checked) during circuit creation, the Using Required Nodes/Spans and Review Route Before Creation check boxes are also unavailable.
•Create TL1-like—Set whether to create only TL1-like circuits; that is, instruct the node to create only cross-connects, allowing the resulting circuits to be in an upgradable state.
•Local domain creation and viewing—Set whether domains that users create and view persist globally (all CTC sessions), or only locally (within the current CTC session).
•Network Map—Set the default network map (which country's map is displayed in CTC network view).