Release Notes for Cisco ONS 15454 Release 4.0.4

advertisement
Release Notes for Cisco ONS 15454
Release 4.0.4
Note
The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms
do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring configuration.
Rather, these terms, as well as "Path Protected Mesh Network" and "PPMN," refer generally to Cisco's
path protection feature, which may be used in any topological network configuration. Cisco does not
recommend using its path protection feature in any particular topological network configuration.
August 2007
Release notes address closed (maintenance) issues, caveats, and new features for the Cisco ONS 15454
SONET multiplexer. For detailed information regarding features, capabilities, hardware, and software
introduced with this release, refer to Cisco ONS 15454 Procedure Guide, Release 4.0; Cisco ONS 15454
Reference Guide, Release.4.0; Cisco ONS 15454 Troubleshooting Guide, Release 4.0; and Cisco ONS 15454
and Cisco ONS 15327 TL1 Command Guide, Release 4.0. For the most current version of the Release Notes
for Cisco ONS 15454 Release 4.0.4, visit the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/ong/15400/454relnt/index.htm
Cisco also provides Bug Toolkit, a web resource for tracking defects. To access Bug Toolkit, visit the
following URL:
http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl
Contents
Changes to the Release Notes, page 3
Caveats, page 3
Resolved Software Caveats for Release 4.0.4, page 22
New Features and Functionality, page 35
Related Documentation, page 64
Obtaining Documentation, page 64
Corporate Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Copyright © 2007 Cisco Systems, Inc. All rights reserved.
Contents
Documentation Feedback, page 65
Cisco Product Security Overview, page 65
Obtaining Technical Assistance, page 66
Obtaining Additional Publications and Information, page 68
Release Notes for Cisco ONS 15454 Release 4.0.4
2
OL-7776-01
Changes to the Release Notes
Changes to the Release Notes
This section documents supplemental changes that have been added to the Release Notes for Cisco ONS
15454 Release 4.0.4 since the production of the Cisco ONS 15454 System Software CD for Release
4.0.4.
The following changes have been added to the release notes for Release 4.0.4
Changes to Caveats
The following caveat has been added to the release notes.
DDTS # CSCsh41324, page 21
Caveats
Review the notes listed below before deploying the ONS 15454. Caveats with DDTS tracking numbers
are known system limitations that are scheduled to be addressed in a subsequent release. Caveats without
DDTS tracking numbers are provided to point out procedural or situational considerations when
deploying the product.
Hardware
DDTS # CSCdv05723 and DDTS # CSCdw37046
DS-3 traffic hits can occur during synchronization changes (frequency offsets applied) on the node's
timing.
A specific scenario under which this has been seen involves configurations with multiple nodes
line-timed off each other in series. If a network configuration has a DS-3 circuit routed over a chain of
nodes that are line-timed off each other in sequence (more than 1 line-timed “hop”), the DS-3 traffic
might exhibit errors on timing disturbances applied on the source node.
The other scenario involves an abrupt change in reference frequency between two nodes. This can result
in test set errors.
This issue is resolved in Release 4.1.
DDTS # CSCdw57215
In a configuration with OC-48 Any Slot cards and an STS-24c circuit, provisioned between G1000-4
cards with traffic going over the OC-48 span, extracting the G1000-4 card at one end of the STS-24c
circuit before deleting the circuit will result in a traffic hit on all existing SONET circuits defined over
that same span. This only occurs when the STS-24c is provisioned on timeslot 25.
In the Cisco ONS 15454 Procedure Guide, Release 3.4.1, refer to the “NTP-77 Delete Circuits”
procedure to delete the 24c circuit before removing the card. Once you have deleted the circuit, refer to
the “DLP-191 Delete a Card from CTC” task (also in the procedure guide) to delete the G1000-4 card.
This issue will be resolved in a future release.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
3
Caveats
Line Cards
DDTS # CSCdz44369
Rarely, when the active TCC2 is removed, small traffic errors of 2 to 30 ms can sometimes occur,
especially on boards with OCN ASIC. To avoid this issue, switch to the protect TCC2 before removing
the working TCC2. This issue is resolved in Release 4.6.
DDTS # CSCdz49928
When using KLM type fuses with specific types of fuse and alarm panels, the PWR-REDUN alarm may
not be displayed once the fuse is blown. A KLM fuse does not have a blown fuse indicator build into it.
As a result, the blown fuse detection circuitry on the FAP may continue to provide voltage on its output
despite a blown fuse.
Ethernet Polarity Detection
The TCC2 does not support polarity detection & correction on the LAN Ethernet port. This is a change
from prior common control cards, such as the TCC+. If your LAN Ethernet connection has the wrong
polarity (due to incorrect wiring on the backplane wire-wrap pins), the connection will work when using
a TCC+, but not with a TCC2. To avoid possible problems, ensure that your Ethernet cable has the
correct mapping of the backplane wire-wrap pins. For Ethernet pin mappings, consult the “DLP-A 21
Install LAN Wires on the Backplane” procedure in the user documentation.
If you are using a TCC+, the Release 4.0.x or 4.1 software will report the polarity issue (previous
releases do not), by raising the standing condition: LAN Connection Polarity Reverse Detected
(COND-LAN-POL-REV). Also, notification will appear on the fan tray LCD, which will display “BP
LAN POL. NEG.” The issue will typically be reported during the software upgrade process, but can also
be raised during a new installation when using TCC+ and Release 4.0.x or 4.1.
If this is a new installation with a TCC2 and you have the Ethernet polarity reversed, the TCC2 will not
communicate over the LAN Ethernet interface (no polarity correction will occur), and no condition will
be reported, nor will the fan tray LCD indicate an issue.
SONET and SDH Card Compatibility
Tables 1, 2, and 3 list the cards that are compatible for the ONS 15454 SONET and ONS 15454 SDH
platforms. All other cards are platform specific.
Table 1
SDH Data Cards that are SONET Compatible
Product Name
Description
15454E-G1000-4
4 port Gigabit Ethernet Module - need GBICs
15454E-E100T-12
12 port 10/100BT Ethernet Module
15454E-E1000-2
2 port Gigabit Ethernet Module - need GBICs
Release Notes for Cisco ONS 15454 Release 4.0.4
4
OL-7776-01
Caveats
Table 2
SONET Data Cards that are SDH Compatible
Product Name
Description
15454-G1000-4
4 Port Gigabit Ethernet
15454-E100T-G
10/100BT, 12 circuit, compatible w/ XC, XCVT
and XC10G
15454-E1000-2-G
Gigabit Ethernet, 2 circuit, GBIC - G
Table 3
Miscellaneous Compatible Products
Product Name
Description
15454-BLANK
Empty slot Filler Panel
15454-GBIC-LX
1000Base-LX, SM or MM, standardized for
15454/327
15454-GBIC-SX
1000Base-SX, MM, standardized for 15454/327
15454-FIBER-BOOT=
Bag of 15 90 degree fiber retention boots
DDTS # CSCdv40700
In either a DS1 or DS3 1:N protection group, deleting a standby working card from the provisioned
protection group can cause a traffic hit of greater than 60 ms. Do not delete any working cards from the
protection group when the protect card is active. Instead, switch traffic away from the protect card, then
delete the working card from the protection group. This issue will not be resolved.
DDTS # CSCdw27380
Performing cross connect card switches repeatedly might cause a signal degrade condition on the lines
or paths that can trigger switching on these lines or paths. If you must perform repeated cross connect
card switches, lock out the corresponding span (path protection configuration, BLSR, or 1+1) first, or,
wait 60 seconds between cross connect switches to avoid causing signal degrade crossings for bit error
rate thresholds up to 10E-9.
LOS Behavior
When an OC-N card is seeing LOS and the problem is resolved (for example, the pulled fiber is
reinserted) the LOS will normally clear quickly, and any other errors seen on the signal will be raised.
However, in the special case where the restored signal is unframed, the LOS will remain raised (that is,
the LOS will not be replaced by an LOF). This is standard SONET behavior per Telcordia GR-253
R6-57, Method 1, where to clear LOS the signal must also contain valid framing alignment patterns.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
5
Caveats
DDTS # CSCdx26701
Older revisions of the DS-3 card (which are no longer manufactured) may be subject to protection switch
times on the order of 100 ms. The older DS-3 cards can be identified by the single color Active LED on
the front panel. This issue will not be resolved on these older cards. Newer DS-3 cards and the DS3E
card have a bicolored Active/Standby LED. The newer DS-3 cards do not have this issue with switch
times.
DDTS # CSCdw66444
When an SDH signal is sent into an ONS 15454 OC-12/STM-4 (IR, 1310 LR and 1550 LR) or an
OC-48/STM-16 high-speed (IR and LR) port which has been configured to support SDH, an SD-P
(Signal Degrade) alarm will appear as soon as the circuit is created. This alarm will continue to exist
until the circuit is deleted.
To avoid this problem, when provisioning an OC-12/STM-4 (IR, 1310 LR and 1550 LR) or an
OC-48/STM-16 high-speed (IR and LR) port to support SDH, disable the signal degrade alarm at the
path level (SD-P) on the port.
Also, PM data at the path level will not be reliable. You must set associated threshold values to 0 in order
to avoid threshold crossing alerts (TCA) on that port. The path threshold values to set to zero are CV-P,
ES-P, SES-P, and UAS-P.
These issues are the result of a hardware limitation, and there are no current plans to resolve them.
XC10G Boot Process
If you install a new XC10G card to the node and it fails to boot, remove the card and reinsert it. If the
card still fails to boot, return it using the RMA procedure. This issue will be resolved in future hardware.
DDTS # CSCdw09604
If you are using an XC10G with OC-48, you must use either OC-48AS or OC-48 cards with a revision
number higher than 005D.
Jitter Performance with XC10G
During testing with the XC10G, jitter generation above 0.10 UI p-p related to temperature gradient
testing has been observed. This effect is not expected to be seen under standard operating conditions.
Changes are being investigated to improve jitter performance in a future release. DDTS numbers related
to this issue include CSCdv50357, CSCdv63567, CSCdv68418, CSCdv68441, CSCdv68389,
CSCdv59621, and CSCdv73402.
Active Cross Connect or TCC+/TCC2 Card Removal
You must perform a lockout in BLSR, path protection configuration, and 1+1 before physically removing
an active cross connect or TCC+/TCC2 card. The following rules apply.
Active cross connect cards should not generally be physically removed. If the active cross connect or
TCC+/TCC2 card must be removed, you can first perform an XC/XCVT side switch and then remove
the card once it is in standby, or you can perform a lockout on all circuits that originate from the node
Release Notes for Cisco ONS 15454 Release 4.0.4
6
OL-7776-01
Caveats
whose active cross connect or active TCC+/TCC2 will be removed (performing a lockout on all spans
will also accomplish the same goal). No lockout is necessary for switches initiated through CTC or
through TL1.
DDTS # CSCdv62565, CSCdv62573
In a 1:N protection group, traffic loss could occur if a DS-N card is preprovisioned and then added to the
group while another working card in the group is removed from its slot. To avoid this, before adding slots
to a protection group ensure that:
•
The protect card is not actively carrying traffic (that is, the card is in standby)
•
Any working slot you add to the group actually contains a working card at the time you add it
This issue will be resolved in a future release.
DDTS # CSCdu71847: DS3 Equipment Protection
DS3N-12E and DS3N-12 cards can be provisioned in the same 1:1 or 1:N protection group only if a
DS3N-12E card is the protect member. If a DS3N-12 card is chosen as the protect member, only the
DS3-12 cards will be available to be the working members of that protection group. This applies to both
the 1:1 and 1:N protection schemes. This functionality is as designed.
E Series and G Series Cards
Note
When using ONS 15327s as passthrough nodes with Release 3.2, you cannot create 9c or 24c gigabit
Ethernet circuits through any 15327.
DDTS # CSCdy37198
On Cisco ONS 15454s equipped with XC or XCVT cross-connect cards, neither the E100T-12 nor the
E1000-2 cards raise an alarm or condition in CTC when Ethernet traffic is predictably lost due to the
following circumstances:
Circuits exist between Ethernet cards (E100T-12 and/or E1000-2) built over Protection Channel Access
(PCA) bandwidth on BLSR spans. When BLSR issues a switch, the PCA bandwidth is preempted. Since
there is no longer a connection between the ends of the Ethernet circuit, traffic is lost.
Note
In nodes equipped with XC10G, these Ethernet cards will raise an AIS-P condition.
This issue will be resolved in a future release.
DDTS # CSCdr94172
Multicast traffic can cause minimal packet loss on the E1000-2, E100-12, and E100-4 cards. Packet loss
due to normal multicast control traffic should be less than 1%. This issue was resolved in Release 2.2.1
for broadcast, and in Release 2.2.2 for OSPF, and some multicast frames. As of Release 3.0.3, the ONS
15454 supports HSRP, CDP, IGMP, PVST, and EIGRP, along with the previously supported broadcast
and OSPF.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
7
Caveats
Note
If multicast is used for such applications as video distribution, significant loss of unicast
and multicast traffic will result. These cards were not designed for, and therefore should
not be used for, such applications.
Note
If the multicast and flood traffic is very rare and low-rate, as occurs in most networks due
to certain control protocols and occasional learning of new MAC addresses, the loss of
unicast frames will be rare and likely unnoticeable.
Note
A workaround for this issue is to use the port-mapped mode of the E-series cards.
Multicast MAC addresses used by the following control protocols have been added to the static MAC
address table to guarantee no loss of unicast traffic during normal usage of these MAC addresses:
Table 0-1
Protocols Added to the MAC Address Table
Protocol
Release Protocol Introduced In
Broadcast MAC (used by many
protocols)
2.2.1
Open Shortest Path First (OSPF) 2.2.2
Cisco Discovery Protocol (CDP) 2.2.2
Per-VLAN Spanning Tree
(PVST)
2.2.2
Enhanced Interior Gateway
Routing Protocol (EIGRP)
2.2.2
Internet Group Management
Protocol (IGMP)
2.2.2
Hot Standby Routing Protocol
(HSRP)
3.0.3
E1000-2/E100T
Do not use the repair circuit option with provisioned stitched Ethernet circuits.This issue is under
investigation.
Single-card EtherSwitch
Starting with Release 2.2.0, each E100/E1000 card can be configured as a single-card EtherSwitch
configuration to allow STS-12c of bandwidth to be dropped at each card. The following scenarios for
provisioning are available:
1.
12c
2.
6c, 6c
3.
6c, 3c, 3c
Release Notes for Cisco ONS 15454 Release 4.0.4
8
OL-7776-01
Caveats
4.
6c, six STS-1s
5.
3c, 3c, 3c, 3c
6.
3c, 3c, six STS-1s
7.
Twelve STS-1s
When configuring scenario 3, the STS-6c must be provisioned before either of the STS-3c circuits.
Multicard EtherSwitch
When deleting and recreating Ethernet circuits that have different sizes, you must delete all STS circuits
provisioned to the EtherSwitch before you create the new circuit scenario. (See the preceding
“Single-card EtherSwitch” section on page 8 for details on the proper order of circuit creation.) Enable
front ports so that the VLANs for the ports are carried by the largest circuit first. A safe approach is to
enable the front port before you create any circuits and then retain the front port VLAN assignment
afterwards. If you break the rules when creating a circuit, or if you have to delete circuits and recreate
them again, delete all circuits and start over with the largest first.
DDTS # CSCds02031 E1000-2/E100
Whenever you drop two 3c multicard EtherSwitch circuits onto an Ethernet card and delete only the first
circuit, you should not provision STS-1 circuits to the card without first deleting the remaining STS-3c
circuit. If you attempt to create an STS-1 circuit after deleting the first STS-3c circuit, the STS-1 circuit
will not work and no alarms will indicate this condition. To avoid a failed STS-1 circuit, delete the
second STS-3c prior to creating any STS-1 circuit.
ML-Series
DDTS # CSCdy31775
Packets discarded due to output queue congestion are not included in any discard count. This occurs
under either of the following conditions:
•
Traffic on ML-series cards between Ethernet and SONET ports, with oversubscription of available
circuit bandwidth configured, leading to output queue congestion.
•
Traffic from SONET to Ethernet, with oversubscription of the available Ethernet bandwidth.
This issue is resolved in Release 4.6.
DDTS # CSCdz49700
ML-series cards do not appear in the Cisco Discovery Protocol (CDP) adjacencies and do not participate
in the Spanning-Tree Protocol. All packets are counted as multicast.
The ML-series cards always forward Dynamic Trunking protocol (DTP) packets between connected
devices. If DTP is enabled on connected devices (which might be the default), DTP might negotiate
parameters, such as ISL, that are not supported by the ML-series cards. All packets on a link negotiated
to use ISL are always counted as multicast packets by the ML-series card, and STP and CDP packets are
bridged between connected devices using ISL without being processed. To avoid this issue, disable DTP
and ISL on connected devices. This functionality is as designed.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
9
Caveats
DDTS # CSCdz68649
Under certain conditions, the flow-control status may indicate that flow control is functioning, when it
is not. Flow-control on the ML-series cards only functions when a port-level policer is configured. A
port-level policer is a policer on the default and only class of an input policy-map. Flow-control also only
functions to limit the source rate to the configured policer discard rate, it does not prevent packet
discards due to output queue congestion.
Therefore, if a port-level policer is not configured, or if output queue congestion is occurring, policing
does not function. However, it might still mistakenly display as enabled under these conditions. To avoid
this issue, configure a port-level policer and prevent output queue congestion. This issue will not be
resolved.
DDTS # CSCdz69700
Issuing a shutdown/no shutdown command sequence on an ML1000 port clears the counters. This is a
normal part of the startup process and there are no plans to change this functionality.
DDTS # CSCea01675
Packets without an 802.1q VLAN tag are classified as COS 0. This issue will not be resolved.
DDTS # CSCea11742
When a circuit between two ML POS ports is provisioned OOS, one of the ports might erroneously
report TPTFAIL. This issue exists for both ML100T-12 and ML1000-2 cards. If this occurs, open a
console window to each ML card and configure the POS port to shutdown. This issue is resolved in
Release 4.6.
DDTS # CSCea18623
To avoid possible ML-series card resets when adding interfaces to a bridge group, always configure the
Spanning-Tree Protocol for the bridge group (using the bridge number protocol command) before
performing any other configuration on the bridge group.
If you want to use a bridge group that does not run the Spanning-Tree Protocol, you must first configure
the bridge group with the Spanning-Tree Protocol, and then disable the Spanning-Tree Protocol for that
bridge group on every interface where it is used (using the bridge-group number spanning-disabled
interface configuration command). This issue is resolved in Release 4.1.
DDTS # CSCea20962
No warning is displayed when applying OOS to ML drop ports on the circuit provisioning window. This
issue will be resolved in Release 5.0.
DDTS # CSCea23629
During an upgrade, all ML-series cards are reset at the same time. This can result in a lengthy disruption
to local traffic. This issue will be resolved in a future release, in which the upgrade will be altered to
reset ML cards one at a time, so that L2/L3 protection can be used to minimize loss of local add/drop
traffic during node upgrade.
Release Notes for Cisco ONS 15454 Release 4.0.4
10
OL-7776-01
Caveats
DDTS # CSCin25238
If you configure Fast EtherChannel and POS-channel in the same bridge group, during system boot, the
Fast EtherChannel or POS-channel configuration may be lost and following error message displayed:
Interface FastEthernet1 is attempting to join Port-channel1. But Port-channel1
belongs to bridge-group 1 which has another FE(C) member in it. FEC + FE(C) is not
allowed in the same bridge group. Please change your configuration and retry.
This issue is resolved in Release 4.1.
DDTS # CSCea26847
An unexpected card reload can occur when a card is configured to route IP-Multicast traffic and
subsequently sends IP-Multicast frames larger than 1649 bytes. To prevent this, avoid routing
IP-Multicast frames larger than 1649 bytes. This issue is not reproducible in Release 4.6.
DDTS # CSCin29274
When configuring the same static route over two or more interfaces, use the following command:
ip route a-prefix a-networkmask a.b.c.d
Where a.b.c.d is the address of the outgoing gateway, or, similarly, use the command:
ip route vrf vrf-name
Do not try to configure this type of static route using only the interface instead of the address of the
outgoing gateway in Release 4.0.x. This issue will be resolved in a future release.
DDTS # CSCin32057
If no BGP session comes up when VRF is configured and all interfaces have VRF enabled ensure that at
least one IP interface (without VRF) is configured and add an IP loopback interface on each node. This
issue will not be resolved.
DDTS # CSCin35960
POS ingress classification based on IP precedence does not match the packets when inbound policy map
classifying based on IP precedence is applied to the POS interface, which is configured for HDLC or
PPP encapsulation. To avoid this issue, use LEX encapsulation (default) or, at the Ethernet ingress point,
mark the COS based on an IP precedence classification, then classify based on the COS during POS
ingress. This issue is resolved in Release 4.6.
DDTS # CSCdy47284
ML-100 FastEthernet MTU is not enforced. However, frames larger than 9050 bytes may be discarded
and cause Rx and Tx errors.
DDTS # CSCdz74432
Issuing a “clear IP route *” command can result in high CPU utilization, causing other processes to be
delayed in their execution. To avoid this issue do not clear a large number of route table entries at once,
or, if you must use the “clear IP route *” command, do not install more than 5000 EIGRP network routes.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
11
Caveats
Maintenance and Administration
Caution
VxWorks is intended for qualified Cisco personnel only. Customer use of VxWorks is not recommended,
nor is it supported by Cisco's Technical Assistance Center. Inappropriate use of VxWorks commands can
have a negative and service affecting impact on your network. Please consult the troubleshooting guide
for your release and platform for appropriate troubleshooting procedures. To exit without logging in,
enter a Control-D (hold down the Control and D keys at the same time) at the Username prompt. To exit
after logging in, type “logout” at the VxWorks shell prompt.
JRE Updates
Cisco ONS platforms ship with a Java Runtime Environment (JRE) from Sun Microsystems.
Occasionally Sun releases maintenance releases to the JRE. The Sun Microsystems website lists JRE
maintenance releases and the issues resolved for each. Cisco recommends that you review these listings
to determine if the issues resolved in any given JRE maintenance release warrant a JRE upgrade for your
particular network. Cisco tests only with the specific JRE actually shipped with the ONS software CD.
DDTS # CSCea84427
CTC or Cisco Transport Manager (CTM) communication to a node might be lost while the node is still
able to respond to a ping. The CORBA interface on the node can be locked by sending invalid
(non-Corba) data to the TCC IIOP listener port. When the CORBA interface is locked, legitimate
CORBA communications are lost. To prevent this from occurring, the ONS 15454 should be placed on
a secure network or behind a firewall. In the event that this issue arises, CTC/CTM management can be
regained by performing a Manual TCC reset using TL1. This issue is resolved in Release 4.6.
Transmission Control Protocol Specification
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered
by an external researcher. The successful exploitation enables an adversary to reset any established TCP
connection in a much shorter time than was previously discussed publicly. Depending on the application,
the connection might be automatically reestablished. In other cases, a user must repeat the action (for
example, open a new Telnet or SSH session). Depending on the attacked protocol, a successful attack
might have consequences beyond terminated connection that also must be considered. This attack vector
is only applicable to those sessions that terminate on a device (such as a router, switch, or computer) and
not to those sessions that only pass through the device (for example, transit traffic that is being routed
by a router). Also, this attack vector does not directly compromise data integrity or confidentiality.
All Cisco products that contain TCP stack are susceptible to this vulnerability.
This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml,
and describes the vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes the vulnerability for products that do not run Cisco IOS software
is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.
This issue is resolved in Releases 2.3.5, 4.1.4 and 4.6.2.
Release Notes for Cisco ONS 15454 Release 4.0.4
12
OL-7776-01
Caveats
DDTS # CSCdx35561
CTC is unable to communicate with an ONS 15454 that is connected via an Ethernet craft port. CTC
does, however, communicate over an SDCC link with an ONS 15454 that is Ethernet connected, yielding
a slow connection. This situation occurs when multiple ONS 15454s are on a single Ethernet segment
and the nodes have different values for any of the following features:
•
Enable OSPF on the LAN
•
Enable Firewall
•
Craft Access Only
When any of these features are enabled, the proxy ARP service on the node is also disabled. The ONS
15454 proxy ARP service assumes that all nodes are participating in the service.
This situation can also occur immediately after the aforementioned features are enabled. Other hosts on
the Ethernet segment (for example, the subnet router) may retain incorrect ARP settings for the ONS
15454s.
To avoid this issue, all nodes on the same Ethernet segment must have the same values for Enable OSPF
on the LAN, Enable Firewall, and Craft Access Only. If any of these values have changed recently, it
may be necessary to allow connected hosts (such as the subnet router) to expire their ARP entries.
You can avoid waiting for the ARP entries to expire on their own by removing the SDCC links from the
affected ONS 15454 nodes. This will disconnect them for the purposes of the proxy ARP service and
the nodes should become directly accessible over the Ethernet. Network settings on the nodes can then
be provisioned as desired, after which the SDCC can be restored.
This issue will not be resolved.
DDTS # CSCdz84149
If a user is logged into CTC as a superuser (or other higher level security type), and then another
superuser changes the first user's security level to “retrieve” (or another lower level security type)
without first logging the user out, the lower level user is then still able to perform some actions
authorized only for the original login security level. For example, a “provisioning” level user demoted
to “retrieve” level in this manner can still provision and edit MS-SPRings (BLSRs) while logged into the
current session, though the same user may no longer provision DCCs. To ensure that a user's level is
changed completely, the superuser must log the user out prior to changing the security level. This issue
is resolved in Release 4.6.
DDTS # CSCdz90753
In the Maintenance > Cross Connect Resource Pane, the VT matrix port detail is inconsistent with the
general VT matrix data. This can occur when a 1+1 protection scheme is in place. To avoid confusion,
note that the VT matrix data counts the VTs for both the working and protect card, while the detail data
counts the VTs only for the working card. This issue is resolved in Release 4.6.
DDTS # CSCdz35479
Rarely, CTC Network view can freeze following the deletion or addition of a node from or to a
BLSR/MS-SPRing. This can result in the CTC Network view no longer updating correctly. If this occurs,
restart CTC. This issue is resolved in Release 4.6.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
13
Caveats
DDTS # CSCea06007
CTC does not support adding/creating more than 5 circuits in auto-ranged provisioning. This is as
designed.
DDTS # CSCdy27484
The UCP ND-FAIL alarm is not functional. This issue will be resolved in a future release.
DDTS # CSCdy57891
An LOP-P alarm can be inadvertently cleared by an LOS that is raised and cleared. On OC48AS, OC192,
and OC12-4 cards, when an LOP condition and an LOS condition are both present on the input, an LOS
will be raised as per Telcordia GR 253 alarm hierarchy. However, upon clearing the LOS with the LOP
still present, the LOP alarm, which should then be raised, is not. An AIS-P condition will be visible. This
issue will be resolved in Release 6.0.
DDTS # CSCdy56693
Microsoft Windows XP uses more memory than previous Microsoft operating systems, and this may
result in reduced CTC performance. To avoid reduced performance, you can:
•
Limit the number of nodes you log into
•
Avoid or limit bulk operations
•
Avoid bulk circuit deletion
•
Prevent CTC’s discovery of DCC connected nodes by using the login “Disable Network Discovery”
feature
•
Prevent CTC’s discovery of circuits unless needed by using the login “Disable Circuit Management”
DDTS # CSCdy62092
When a node connected via SDCC has no Ethernet LAN connectivity, display of SDCC termination
alarms is delayed if the fiber connecting a DCC connected node is removed. This issue cannot be
resolved.
DDTS # CSCdy61275
Far end path FC-P is not counted on EC1 or OC3 cards. When a path defect is transmitted to the far end,
it reports RDI-P. However, the condition is not examined and reported as a PM count. This issue will be
resolved in a future release.
DDTS # CSCdy10030
CVs are not positively adjusted after exiting a UAS state. When a transition has been made from counting
UAS, at least 10 seconds of non-SES must be counted to exit UAS. When this event occurs, Telcordia
GR-253 specifies that CVs that occurred during this time be counted, but they are not. There are no plans
to resolve this issue at this time.
Release Notes for Cisco ONS 15454 Release 4.0.4
14
OL-7776-01
Caveats
DDTS # CSCdy55556
In a 1:N protection group, where a protect card is protecting a failed card and another working card,
which is missing, has a lockon condition, upon removing the lockon condition from the missing working
card, the protect card may switch from the card it had been protecting to carry the traffic of the missing
working card that just had the lockon removed. To avoid this issue, replace the failed working card before
removing the lockon. This issue will be resolved in a future release.
DDTS # CSCdy38603
VT Cross-connects downstream from a DS1 can automatically transition from the OOS-AINS state to
the IS state even though the DS1 signal is not clean (for example, when there is an LOS present). This
can occur when you have created a VT circuit across multiple nodes with DS1s at each end, and you have
not yet applied a signal to the DS1 ports, and then you place the DS1 ports in OOS-AINS, OOS-MT, or
IS. When you then place the circuit in OOS-AINS, the circuit state changes to IS (within one minute).
This issue is resolved in Release 4.1.
DDTS # CSCdy11012
When the topology host is connected to multiple OSPF areas, but CTC is launched on a node that is
connected to fewer areas, the topology host appears in CTC, and all nodes appear in the network view,
but some nodes remain disconnected. This can occur when the CTC host does not have routing
information to connect to the disconnected nodes. (This can happen, for example, if automatic host
detection was used to connect the CTC workstation to the initial node.)
CTC will be able to contact the topology host to learn about all the nodes in all the OSPF areas, but will
be unable to contact any nodes that are not in the OSPF areas used by the launch node. Therefore, some
nodes will remain disconnected in the CTC network view.
To work around this issue, if no firewall enabled, then the network configuration of the CTC host can be
changed to allow CTC to see all nodes in the network. The launch node must be on its own subnet to
prevent network partitioning, and craft access must not be enabled. The CTC host must be provisioned
with an address on the same subnet as the initial node (but this address must not conflict with any other
node in the network), and with the default gateway of the initial node. CTC will now be able to contact
all nodes in the network.
If a firewall is enabled on any node in the network, then CTC will be unable to contact nodes outside of
the initial OSPF areas.
NE Defaults
The following caveats apply for NE defaults.
•
OC12-4 allows provisioning of PJStsMon from 0 to 48. The workaround is to limit provisioning to
between Off and 1 to 12 only.
•
CTC displays “PJStsMon=off” in the standard provisioning pane when provisioning PJStsMon off;
however, TL1 and the NE Defaults editor both display 0 for this same condition.
•
If you only make changes to a single default in the NE defaults editor, you must click on another
default or column before the Apply button becomes functional.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
15
Caveats
DDTS # CSCdy35514
The terminology used for provisioning overhead circuits has changed as of Release 3.4 as follows.
Overhead Circuit Types
•
LDCC_TUNNEL has changed to DCC Tunnel D4-D12
•
SDCC_TUNNEL has changed to DCC Tunnel D1-D3
Overhead Channel Types
Note
•
SDCC has changed to DCC1(D1-D3)
•
LDCC_TUNNEL1 has changed to DCC2(D4-D6)
•
LDCC_TUNNEL2 has changed to DCC3(D7-D9)
•
LDCC_TUNNEL3 has changed to DCC4(D10-D12)
•
LDCC has changed to DCC(D4-D12)
These circuits are now provisioned at the network level, rather than on a node-by-node basis.
DDTS # CSCdy48478
When you generate a lamp test, the lamps on the fan tray may fail to cycle. This issue is resolved in
Release 4.1.
DDTS # CSCds88976
When a new circuit is created around a ring (path protection configuration or BLSR), the SD BER or SF
BER alarm can be raised depending on the order in which the spans are provisioned. The alarms will
eventually clear by themselves. Traffic is not affected. This issue will be resolved in a future release.
DDTS # CSCdx40462, CSCdx47176, CSCdw22170
While upgrading nodes from releases prior to 3.2, CTC might lose connection to the far end nodes. When
this occurs, you will not be able to ping the grayed-out nodes; however, if you continue the upgrade, this
problem resolves itself. This issue is resolved in Release 3.2, but can still occur when upgrading from
nodes with earlier software releases.
DDTS # CSCdw66895
XCVTs (both active and standby) reboot continuously when the K3 byte is mapped to the E2 byte on one
side of a WTR span. The rebooting occurs after the WTR timer expires. This has been seen on a two fiber
BLSR with OC-48AS. To avoid this issue, if possible, change the K3 mapping on both ends of the span
before creating the ring; or, alternatively, you can prevent the ring from reverting during the K3 mapping
by setting the Ring Reversion time to “never.” Once you have completed the mapping of the K3 byte to
the E2 byte on both sides, return the Ring Reversion to its normal value. This issue is resolved in Release
4.6.
Release Notes for Cisco ONS 15454 Release 4.0.4
16
OL-7776-01
Caveats
ONS 15454 Conducted Emissions Kit
If you are deploying the Cisco ONS 15454 within a European Union country that requires compliance
with the EN300-386-TC requirements for Conducted Emissions, you must obtain and install the Cisco
ONS 15454 Conducted Emissions kit (15454-EMEA-KIT) in order to comply with this standard.
Upgrading to Use the G1000-4 Ethernet Card
Before installing or seating the G1000-4 Ethernet card on node running Release 3.1 or prior, you must
upgrade the software on that node to Release 3.2 or later. This is as designed.
DDTS # CSCdv10824: Netscape Plugins Directory
If you use CTC, JRE, and the Netscape browser with a Microsoft Windows platform, you must ensure
that any new installation of Netscape uses the same Netscape directory as the previous installation did,
if such an installation existed. If you install Netscape using a different path for the plugins directory, you
will need to reinstall JRE so that it can detect the new directory.
DDTS # CSCdu82934
When you auto-route a VT circuit on an ONS 15454 node, a path is computed based on the availability
of STSs on the nodes involved. This selection process, when combined with a lack of VT matrix (or
STS-VT connections) on an auto-route selected node, can result in the VT circuit creation failing with
the message “unable to create connection object at node.” To correct this situation, manually route VT
circuits in cases when auto-routing fails. The error message will indicate which node is at issue.
“Are you sure” Prompts
Whenever a proposed change occurs, the “Are you sure” dialog box appears to warn the user that the
action can change existing provisioning states or can cause traffic disruptions.
Interoperability
DDTS # CSCds13769: Fujitsu FLM-150 and Nortel OC-3 Express
You cannot provision the FLM-150 and OC-3 Express in 1+1 revertive switching mode. The problem
occurs when the ONS 15454 issues a user request in revertive mode to the protect channel. When the
user request is cleared, the ONS 15454 issues a No Request. However, the FLM-150 and OC-3 Express
issues a Do Not Revert, which causes traffic to remain on the protection channel. Based on GR-253,
section 5.3.5.5, the FLM-150 and the OC-3 Express should respond with a No Request.
BLSR Functionality
DDTS # CSCdy58058
Clearing a signal degrade on the working span with an existing signal degrade on the protect span in both
directions may fail to cause a ring switch to drop.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
17
Caveats
For example, in a four-fiber BLSR, say the east side of Node 1 is connected to the west side of Node 2.
Step 1
Inject SD into the east protect span of Node 1.
Step 2
Inject SD into the west protect span of Node 2.
Step 3
Inject SD into the east working span of Node 1. A Ring switch occurs.
Step 4
Clear the SD on the east working span of Node 1. The ring switch does not drop, even after the WTR
timer expires.
To recover from this situation, issue a lockout span to return traffic to the working span. This issue will
be resolved in a future release.
DDTS # CSCdy68207
Failing the working and protect spans on a four-fiber BLSR while an extra traffic (PCA) circuit runs over
the span and a lockout is on the span can cause the ET to permanently fail, with no AIS.
The failure scenario is only reproducible by failing and restoring fibers in the following sequence.
Step 1
Create a four-fiber BLSR.
Step 2
Create extra traffic circuits (one or more) over one of the spans, say, from Node A east to Node B west.
At Node A, issue a lockout span east. This causes the BLSR to not switch in the event of a span failure.
Step 3
At node A, remove the working transmit fiber east, then remove the protect transmit fiber east. Both
protected traffic and extra traffic are down, as expected.
Step 4
Reinsert the protect transmit fiber east, then reinsert the working transmit fiber east. Protected traffic is
restored, but extra traffic is not restored.
If this issue occurs, clear the lockout span. All extra traffic is immediately restored. You may then reissue
the lockout span. This issue will be resolved in Release 5.0.
DDTS # CSCdy56668
Ethernet circuits may appear in the CTC circuit table with an INCOMPLETE status after a BLSR/MSSP
span is upgraded. The circuits, when this occurs, are not truly incomplete. They are unaffected and
continue to carry traffic. To see the circuit status correctly, restart CTC. This issue is resolved in Release
4.6.
DDTS # CSCdy65890
If you have PCA circuits over two-fiber or four-fiber BLSR protect channels, an incorrect auto-inservice
transition occurs after traffic preemption. You may place the circuit back into the OOS-AINS state after
the BLSR has returned to the unswitched mode, using the Circuit Editing pane of the CTC. This issue is
resolved in Release 4.6.
Release Notes for Cisco ONS 15454 Release 4.0.4
18
OL-7776-01
Caveats
DDTS # CSCdy48872
Issuing an LK-S in one direction while a ring switch (SF-R) is active on the other direction may result
in a failure to restore PCA circuits on the ring.
To see this issue, on a node participating in a two fiber BLSR with PCA circuits terminating at the node
over the two fiber BLSR, cause an SF-R by failing the receive fiber in one direction (say, west). Then,
issue an LK-S in the other direction (in our example, east). Since the LK-S has higher priority than the
SF-R, the ring switch should clear and PCA traffic should be restored on spans without a fiber fault. The
ring switch does clear, but PCA traffic does not restore. To correct this issue, clear the fiber fault. All
traffic restores properly. This issue will be resolved in Release 5.0.
DDTS # CSCdy37654
Nodes may appear in CTC as gray and auto-ranged circuit creation may fail when CTC is connected to
a large BLSR. This usually only occurs when most of the nodes in the ring are not connected to the LAN,
and so, management traffic is flowing through the DCC channels.
Avoid creation of a large number of auto-ranged circuits for large BLSRs. Also try to connect more
nodes to the LAN and try running OSPF on the LAN to avoid this issue. This issue will be resolved in
Release 5.0.
DDTS # CSCdy45902
Traffic that should be dropped remains unaffected when a BLSR Protection Channel Access (PCA) VT
tunnel is placed OOS. You must place all circuits in the tunnel OOS before the traffic will be dropped.
This issue will be resolved in Release 5.0.
DDTS # CSCdw32540
The two protect OC48AS cards at the ends of a four fiber BLSR span must both be configured as either
K3 or Z2 (not a mixture). If both ends are not the same, the BLSR may fail to switch correctly. In Release
3.4 the BLSR wizard ensures that both ends are configured correctly; however, you must still avoid
manually changing the value on one side only (and hence, causing a mismatch) at the card level. If you
do mismatch bytes at the card level, you can discover this by going to the BLSR edit map tied in with
the BLSR wizard. The mismatched span will be red, and right-clicking on the span will allow you to
correct the problem.
DDTS # CSCdw58950
You must lock out protection BLSR, 1+1, and path protection configuration traffic to avoid long, or
double traffic hits before removing an active XC, XCVT, or XC10G card. You should also make the
active cross connect card standby before removing it.
DDTS # CSCdv70175
When configuring a node with one 4 Fiber BLSR and one 2 Fiber BLSR, or with two 2 fiber BLSRs, an
issue exists related to the version of XC deployed. Revision 004H and earlier revisions of the XC do not
support these configurations. All later revisions of the XC and all versions of the XCVT and XC10G
cross connects support all permutations of two BLSRs per node.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
19
Caveats
DDTS # CSCdv53427
In a two ring, two fiber BLSR configuration (or a two ring BLSR configuration with one two fiber and
one four fiber ring) it is possible to provision a circuit that begins on one ring, crosses to a second ring,
and returns to the original ring. Such a circuit can have protection vulnerabilities if one of the common
nodes is isolated, or if a ring is segmented in such a way that two non-contiguous segments of the circuit
on the same ring are each broken. This issue will be resolved in a future release.
DDTS # CSCct03919
VT1.5 BLSR squelching in BLSRs is not supported.
Database Restore on a BLSR
When restoring the database on a BLSR, follow these steps:
Step 1
To isolate the failed node, issue a force switch toward the failure node from the adjacent east and west
nodes.
Step 2
If more than one node has failed, restore the database one node at a time.
Step 3
After the TCC+/TCC2 has reset and booted up, release the force switch from each node.
Path Protection Configuration Functionality
DDTS # CSCea23862
After you perform a force switch on one of the spans of a DRI or IDRI topology with Path Protection
Configuration-DRI circuits present, if you then apply a clear on the same span, the state will not show
up immediately in CTC. This issue is resolved in Release 4.1.
DDTS # CSCdv42151
When a path protection configuration circuit is created end-to-end, CTC might not create the
cross-connection on all the nodes along the path at the same time. This might cause an SD-P condition
along the path. When the circuit is fully provisioned on all nodes, the SD-P will clear automatically.
Other conditions that can be expected while the circuit is being created are LOP-P and UNEQ-P. This
issue is resolved in Release 4.6.
Active Cross Connect or TCC+/TCC2 Card Removal
As in BLSR and 1+1, you must perform a lockout on path protection configuration before removing an
active cross connect or TCC+/TCC2 card. The following rules apply to path protection configuration.
Release Notes for Cisco ONS 15454 Release 4.0.4
20
OL-7776-01
Caveats
Active cross connect cards should not generally be removed. If the active cross connect or TCC+/TCC2
card must be removed, you can first perform an XC/XCVT side switch and then remove the card once it
is in standby, or you can perform a lockout on all circuits that originate from the node whose active cross
connect or active TCC+/TCC2 will be removed (performing a lockout on all spans will also accomplish
the same goal). No lockout is necessary for switches initiated through CTC or through TL1.
Documentation
Transponder (TXP_MR_10G) and Muxponder (MXP_2.5G_10G) Documentation
The documentation set for the Cisco ONS 15454 contains references to new transponder
(TXP_MR_10G) and muxponder (MXP_2.5G_10G) cards. These portions of the documentation are
meant to refer to cards that will become available with a future release. The nXP cards are not available
with Release 4.0.x. Cisco apologizes for any confusion this may cause.
TL1
Note
To be compatible with TL1 and DNS, all nodes must have valid names. Node names should contain
alphanumeric characters or hyphens, but no special characters or spaces.
DDTS # CSCsh41324
When running release 4.1.4, if a circuit is created within CTC and if that circuit is retrieved
via TL1, all looks as expected. However, after the software is upgraded to release 6 and
latter, the circuit retrive does not show the same value as was before. For example FAC-4-1
changes to FAC-4-0. Workaround is to delete and recreate the circuit within CTC.
DDTS # CSCdz86121
In one rare case, the ONS 15454/15327 times out a user session without communicating the timeout to
TL1. If this happens, the TL1 user remains logged in, although the session is actually timed out. This
can occur when you log into the node with a timeout of X minutes. If the user session sits idle for all but
5 seconds of the X minutes, then you have only 5 seconds to type in a command to notify the node that
the session is active. If you try this, you will likely miss the five second window, in which case the node
will respond as though the session is inactive and deny access. However, because you have typed a key,
irrespective of the five second window, TL1 responds as though the session is active and does not log
you out (time out). You will not have access to the node and will receive a “DENY” response to TL1
commands. The error message may vary depending on commands issued. To recover from this situation,
log out and log back in to TL1. This issue will be resolved in Release 5.0.
DDTS # CSCdz26071
The TL1 COPY-RFILE command, used for SW download, database backup, and database restore,
currently does not allow a user-selected port parameter to make connections to the host. The command
expects the default parameter of Port 21 and will only allow that number. This issue will be resolved in
Release 5.0
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
21
Resolved Software Caveats for Release 4.0.4
DDTS # CSCea03186
The TL1 command, INH-USER-SECU, does not disable the userid appropriately. The command should
disable the userid until the corresponding ALW-USER-SECU command is issued; however, the userid is
automatically re-enabled after the user lock-out period expires. The user lockout period is set from the
CTC. This issue will be alleviated in Release 4.1 by removal of the ALW-USER-SECU and
INH-USER-SECU commands. The commands are reinstated correctly in Release 4.6.
DDTS # CSCdz79471
The default state, when no PST or SST inputs are given for The TL1 command, RMV-<MOD2_IO>, is
OOS instead of OOS-MT. Thus, if you issue a RMV statement, followed by maintenance-state-only
commands, such as OPR-LPBK, the maintenance state commands will not work, since the port will be
in the out-of-service state (OOS), instead of the out-of-service maintenance state (OOS-MT). To work
around this issue, place ports in the OOS-MT state, by specifying the primary state as OOS and a
secondary state of MT in either the RMV-<MOD2_IO> command or the ED-<MOD2_IO> command.
Scripts that depend on the RMV-<MOD2_IO> command defaulting to OOS-MT without specifying the
primary and secondary states should be updated to force the primary and secondary state inputs to be
populated. This issue will be resolved in Release 5.0.
DDTS # CSCdu53509
When a TL1 session to a remote node (ENE) is established via a gateway node (GNE) and you have
changed the node name of the ENE via either TL1, CTC or SNMP, then you must wait for about 30
seconds to issue a TL1 command via the GNE. This delay is to permit the updates to propagate to all
nodes in the network. During this transition, neither the old node name nor the new node name can be
used in the TL1 session to access the ENE. This 30 second window may be reduced in a future release
DDTS # CSCsh41324
When running release 4.1.4, if a circuit is created within CTC and if that circuit is retrieved
via TL1, all looks as expected. However, after the software is upgraded to release 6 and
latter, the circuit retrive does not show the same value as was before. For example FAC-4-1
changes to FAC-4-0. Workaround is to delete and recreate the circuit within CTC..
Resolved Software Caveats for Release 4.0.4
The following items are resolved in Release 4.0.4.
Hardware
DDTS # CSCdy15615
In some instances, the AIC-i card could reboot as a result of a 500 V DC line power surge, as defined by
CISPR24/EN55024 and EN61000-6-1. This issue was determined to have been local to a single system.
Release Notes for Cisco ONS 15454 Release 4.0.4
22
OL-7776-01
Resolved Software Caveats for Release 4.0.4
Line Cards
DDTS # CSCei01183
A node in CTC might go gray, followed by a TCC+ or XTC reset. This only applies to the TCC+ and
XTC (ONS 15327) cards. If near line rate traffic is addressed at a TCC+ or XTC shelf controller, so much
CPU will be devoted to reading packets off the line that the card will intentionally reset itself. The time
to reset will vary from minutes to hours depending on the Ethernet bus traffic load. This failure has been
reproduced in the lab connecting an Ethernet switch to the working and protect shelf controllers and
turning spanning tree off on the switch. Any broadcast traffic received in this configuration will loop
infinitely. This issue is resolved in maintenance Releases 4.0.4, 5.0.4 and later.
DDTS # CSCeh38563
Rarely, a TCC might reset due to insufficient memory. This issue is triggered in the process of printing
an error message. This is strictly an issue in internal error handling. When triggered by the error handling
issue, however, TCC loss of memory can occur, though this has only been seen once. This issue is
resolved in Releases 4.0.3, 4.1.8, 5.0.5, and 6.0.
DDTS # CSCeb35237
Incorrect SEF-S count and Loss of Frame (LOF) might not be detected on OCn cards. When an OCn line
has severely errored frames with an unstable pattern for A1/A2, sometimes a loss of frame will not be
detected. The detection times for SEF and LOF are also longer than the times specified by the standard
in Telcordia GR-253. This issue is resolved in Releases 4.0.4 and 4.1.
DDTS # CSCed06531
Malformed IP packets can potentially cause the XTC, TCC/TCC+/TCC2 and TCCi/TCC2 control cards
to reset. Repeated transmission of these malformed packets could cause both the control cards to reset
at the same time. This issue is resolved in Release 5.0, and maintenance Releases 4.1.4, 2.3.5, 4.0.3, and
4.6.2.
DDTS # CSCed86946
Malformed ICMP packets can potentially cause the XTC, TCC/TCC+/TCC2 and TCCi/TCC2 control
cards to reset. Repeated transmission of these malformed packets could cause both the control cards to
reset at the same time. This issue is resolved in Release 5.0, and maintenance Releases 4.1.4, 2.3.5, 4.0.3,
and 4.6.2.
DDTS # CSCec88426, CSCec88508, CSCed85088
Malformed TCP packets can potentially cause the XTC, TCC/TCC+/TCC2, and TCCi/TCC2 control
cards to reset. Repeated transmission of these malformed packets could cause both the control cards to
reset at the same time. This issue is resolved in Release 5.0, and maintenance Releases 4.1.4, 2.3.5, 4.0.3,
and 4.6.2.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
23
Resolved Software Caveats for Release 4.0.4
DDTS # CSCec59739, CSCed02439, CSCed22547
The XTC, TCC/TCC+/TCC2 and TCCi/TCC2 control cards are susceptible to a TCP-ACK Denial of
Service (DoS) attack on open TCP ports. The controller card on the optical device will reset under such
an attack.
A TCP-ACK DoS attack is conducted by withholding the required final ACK (acknowledgement) for a
3-way TCP handshake to complete, and instead sending an invalid response to move the connection to
an invalid TCP state. This issue is resolved in maintenance Releases 4.1.4, 2.3.5, 4.0.3, and 4.6.2.
DDTS # CSCec88402, CSCed31918, CSCed83309, CSCec85982
Malformed UDP packets can potentially cause the XTC, TCC/TCC+/TCC2, and TCCi/TCC2 control
cards to reset. Repeated transmission of these malformed packets could cause both the control cards to
reset at the same time. This issue is resolved in Release 5.0, and maintenance Releases 4.1.4, 2.3.5, 4.0.3,
and 4.6.2.
DDTS # CSCea16455, CSCea37089, CSCea37185
Malformed SNMP packets can potentially cause the XTC, TCC/TCC+/TCC2 and TCCi/TCC2 control
cards to reset. Repeated transmission of these malformed packets could cause both the control cards to
reset at the same time. This issue is resolved in Release 4.6, and maintenance Releases 4.0.1, 4.0.3, and
4.1.3.
DDTS # CSCee67813
Rarely, a failed OC-48 card does not report alarms after an upgrade to Release 4.0.2. If, during the
upgrade, the card fails and does not communicate with the active TCC, no alarms (such as TCC to Shelf
Slot Communication failure) will be reported against the card. To recover from this issue, hard reset the
card. This issue is resolved in Release 4.0.3.
DDTS # CSCed29187
A DS3XM-6 card in an ONS 15454 can reset after running for approximately 5 months. This can occur
with nodes running any software release from Release 3.2.x to Release 4.1.2, or Release 4.5. This issue
is resolved in Release 4.6 and maintenance Releases 4.0.2 and 4.1.3.
DDTS # CSCed05846
In Releases 4.0, 4.0.1, and 4.1 the standby TCC+, TCC2, or XTC card might reset automatically. This
can occur at any time, but only rarely. This issue is resolved in Release 4.6, and maintenance Releases
4.0.2, 4.1.1, and 4.1.3.
DDTS # CSCeb25250
In an EC1 protection group, the protect EC1 may reboot a few seconds after a switch. This issue is
resolved in Release 4.0.1.
Release Notes for Cisco ONS 15454 Release 4.0.4
24
OL-7776-01
Resolved Software Caveats for Release 4.0.4
DDTS # CSCea78368
Release 4.0 ONS 15454 and 15327 nodes may encounter spontaneous DS-1, DS-1N, or XTC card resets
following a loss of frame on a DS1 port. To observe this issue, when a DS1 port is provisioned for ESF
framing, inject LOF (loss of frame) into the port (in other words, use D4 framing on the test set or
external equipment). The active DS1 card reboots (or on the ONS 15327, the active XTC reboots) when
frame returns. If the DS1 card (or XTC) is part of a protection group, the protect card will become active
and may also reboot due to a second LOF. Outage can occur for the time that both cards are in reset.
This behavior is not configuration dependent. It occurs on any DS-1 or DS-1N card present in any slot
and for any port, provided it is provisioned for ESF framing and is active. If all ports on the active DS1
card are provisioned for D4 framing, this behavior is not observed.
To avoid this issue, provision all ports and external DS-1 equipment for D4 framing. This applies to both
ONS 15454 and 15327.
Another workaround is to provision the circuit from the affected DS1 port to another unused port on
which line framing is stable. If the DS1 card autoresets due to LOF (as discussed above), the traffic on
adjacent ports will not be affected if protection is not enabled. Disabling the protection group is not an
option for the ONS 15327, so, if an XTC switch occurs when the working XTC resets (due to LOF on
one of the DS1 port), the protect XTC will become active. This issue is resolved in Release 4.0.1.
DDTS # CSCdv81011, CSCdu15203
When performing an XC/XCVT to XC10G upgrade on a two fiber BLSR configuration, E-series traffic
disruptions can exceed seven minutes. This issue is not reproducible in Release 4.0.x.
DDTS # CSCdy48966
Rarely, a user requested switch on a DS3 1:1 protection group with an STS circuit going through OC-48
may undergo unexpected traffic hits. This issue is resolved in Release 4.0.
DDTS # CSCdy59228
OC-3 1+1 protection switch time may exceed 60 ms following a fiber pull. This issue is resolved in
Release 4.0.
DDTS # CSCdy60775
For DS1, DS3, or DS3XM cards, when the working card is removed, traffic switches to the protect card.
However, upon inserting a working card, the power on diagnostics test will be run on the card, and, if
the card fails, the red FAIL LED on the front panel will remain lit, but, the protect card will start the
restore timer and will switch traffic back to the working card after the timer has expired. To avoid losing
traffic, remove the working card that failed the diagnostics before the protect card's restore time has
expired. This issue is resolved in Release 4.0.
DDTS # CSCdy63760
If you place a DS3E, OC-12, STS-1 circuit in the OOS state, while the port is still IS, traffic remains. To
stop the traffic, delete the circuit. This issue is resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
25
Resolved Software Caveats for Release 4.0.4
DDTS # CSCdy47148
Traffic loss can occur when a working DS1 card is reset while the protect card is in a wait to restore state.
This occurs with DS1 cards in a 1:N protection group, where traffic is running on the protect card and
the protect card is in the wait to restore state. Under these conditions, resetting another active working
card will result in a traffic loss while the working card is resetting. To avoid this issue, switch the traffic
from the protect card to the standby working card before resetting the other working card. This issue is
resolved in Release 4.0.
E Series and G Series Cards
DDTS # CSCdy69624
If alarms are suppressed at the port level from CTC, an incorrect CARLOSS may be reported on a E100
or E1000 card. The Incorrect CARLOSS alarm can be ignored.This issue is resolved in Release 4.0.
DDTS # CSCdy24967 and CSCdy21173
A G1000-4 card cannot auto-negotiate with a Catalyst 6500, CatOS Version 7.1.2, using the
supervisor-1A module (8-port gig-e module). To avoid this issue, use previous version of CatOS, or use
an IOS native image, or do not use flow control. This issue is resolved in Release 4.0.
Maintenance and Administration
DDTS # CSCee49603
After upgrade and activation to Release 4.0.2, the newly active TCC shows OOS-AINS from the TL1
management interface until a subsequent TCC reset occurs. This only affects the newly active TCC and
does not affect the newly standby TCC. If you apply one subsequent active TCC reset, the standby TCC
(without the defect) transitions to active without this issue. This issue is resolved in Release 4.0.3.
Transmission Control Protocol Specification
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered
by an external researcher. The successful exploitation enables an adversary to reset any established TCP
connection in a much shorter time than was previously discussed publicly. Depending on the application,
the connection might be automatically reestablished. In other cases, a user must repeat the action (for
example, open a new Telnet or SSH session). Depending on the attacked protocol, a successful attack
might have consequences beyond terminated connection that also must be considered. This attack vector
is only applicable to those sessions that terminate on a device (such as a router, switch, or computer) and
not to those sessions that only pass through the device (for example, transit traffic that is being routed
by a router). Also, this attack vector does not directly compromise data integrity or confidentiality.
All Cisco products that contain TCP stack are susceptible to this vulnerability.
This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml,
and describes the vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes the vulnerability for products that do not run Cisco IOS software
is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.
Release Notes for Cisco ONS 15454 Release 4.0.4
26
OL-7776-01
Resolved Software Caveats for Release 4.0.4
This issue is resolved in Releases 2.3.5, 4.0.3, 4.1.4, and 4.6.2.
DDTS # CSCec17308, CSCec17406, CSCec66884
Multiple vulnerabilities exist in the Cisco ONS 15327 Edge Optical Transport Platform, the Cisco ONS
15454 Optical Transport Platform, the Cisco ONS 15454 SDH Multiplexer Platform, and the Cisco ONS
15600 Multiservice Switching Platform.
These vulnerabilities are documented as Cisco bug ID CSCec17308/CSCec19124(tftp),
CSCec17406(port 1080) and CSCec66884/CSCec71157(SU access). There are workarounds available
to mitigate the effects of these vulnerabilities.
The advisory for these issues, including workarounds, is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20040219-ONS.shtml
These issues, as they apply for the ONS 15454 platform, are resolved in Release 4.0.3.
DDTS # CSCdy01598
Rarely, there is a delay in CTC before the correct card status is displayed after a protection switch. When
a manual or forced switch is made to a protection type, the protection switch occurs immediately, but the
card status might take a while approximately 2 minutes to show up under rare circumstances. If a switch
is not reflected right away, wait for the status change to occur. This issue is resolved in Release 4.0.
DDTS # CSCec20521
After adding or deleting a static route with a destination address that is included in the 192.168.190.x
range, cards in the node reboot. This issue is resolved in Releases 4.0.2, 4.1.1, and 4.6.
DDTS # CSCdy52361
While provisioning an STS-x UCP circuit, the STS pulldown menu allows more STSs than are defined
in CTC's circuit provisioning specification, or in Telcordia GR253. Do not use these extra STSs. If you
do try to use one of these extra, invalid STSs, the node will reject it with an appropriate exception. This
issue is resolved in Release 4.0.
DDTS # CSCdy65599
DS1 VT alarms report as occurring only on port 1 regardless of which port they actually occurred on.
After testing, use CTC or TL1 to change the state from OOS-MT. This issue is resolved in Release 4.0.
DDTS # CSCdz05847
After launching CTC from an ONS 15xxx running Release 3.3 or 3.4, you cannot launch CTC (on that
computer) from an ONS 15454 running Release 3.1-3.2.x. Further, no error message is displayed
indicating the issue. To recover from this situation, one of the following recovery procedures may be
necessary.
•
Delete the CTC cache (using the button in the browser applet window) before launching from the
Release 3.1 or 3.2.x node.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
27
Resolved Software Caveats for Release 4.0.4
•
Continue to launch from the Release 3.3 or 3.4 node but access the Release 3.1 or 3.2.x node (if
necessary) using a login group (defined in the Edit:Preferences dialog).
This issue is resolved in Release 4.0.
Performance Monitoring Using Cisco Transport Manager
In Release 3.4, Cisco Transport Manager users that performed PM retrievals might have encountered any
or all of the following issues:
•
G1000 statistics appearing unpredictably in the wrong fields
•
Missing PM data
•
Correct PMs falsely marked as invalid
•
Incorrect PMs not marked as invalid
These issues were most likely to occur with SONET path data. SDH path data was unaffected. All of
these issues have been resolved in Release 3.4.1 and Release 4.0.
DDTS # CSCdz00573
The OC3 and EC1 are the only cards for which near end STS path PM is available to CTM . To retrieve
near end path PM for other cards, use TL1, SNMP, or CTC. Note that far end STS path PM is available
for all electrical cards and the OC3. This issue is resolved in Release 4.0.
DDTS # CSCdy55161
A hard reset of the TCC card can cause a 1+1 circuit not carrying traffic to prematurely transition from
the OOS-AINS state to the IS state. To recover from this situation, place the circuit back in the
OOS-AINS state. This issue is resolved in Release 4.0.
DDTS # CSCdy64663
If there is PCA traffic on a protection span and an orderwire connection passes through the working span,
the orderwire connection may be lost after a protection switch. If this occurs, delete the affected
orderwire circuit and recreate it after the protection switch. This issue is resolved in Release 4.0.
DDTS # CSCdy63102
ONS 15454s reject send code requests on DS3XM ports (DS3 level). If you attempt a send code
maintenance operation, CTC passes the send code operation to the NE but the NE improperly rejects it.
Further, the message returned improperly indicates that the port is in an invalid state, even though it is
in OOS-MT state. To work around this issue, establish the loopback directly on the remote equipment.
This issue is resolved in Release 4.0.
DDTS # CSCdy73904
Because test access systems do not have the ability to automatically change the state of a connection,
testing using intrusive modes of test access (SPLT) will fail if the circuit or connection is not already in
the OOS-MT state. To avoid this issue, prior to testing the circuit or connection, ensure that its state is
set to OOS-MT by changing the state using CTC or TL1. This issue is resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
28
OL-7776-01
Resolved Software Caveats for Release 4.0.4
DDTS # CSCdy56366 and CSCdy12392
With a 1+1 protection group and OC-3 or OC-12 cards, when a protection switch occurs, the PSC and
PSD fields on the performance pane do not increment. This issue is resolved in Release 4.0.
DDTS # CSCdu62591
After deleting a node from a ring, any circuits that had passed through that node show INCOMPLETE
status in CTC. The deleted node is still visible to CTC, along with the reduced ring. CTC sees the
cross-connects on the deleted node as being part of the pass-through circuits, but cannot connect the
now-disjoint pieces of the circuit.
To correct this issue if it occurs, restart CTC so that it sees only the reduced ring nodes. Make sure the
deleted node is not still visible due to other DCC links. The pass-through circuits will now have
ACTIVE status.
If you need to remove the pass-through cross-connects from the deleted node, start CTC from that node
with network discovery disabled. From the Circuits tab of either former trunk card, delete all
INCOMPLETE circuits.
Note
It is imperative that you do this from a CTC session managing only the deleted node, otherwise the
circuits on the reduced ring might be deleted.
This issue is resolved in Release 4.0.
DDTS # CSCdx89312 and CSCdy52392
A sub-millisecond traffic hit can occur on DS3, DS1, E1 and E3 cards upon activation to the Release 3.4
software during an upgrade. This issue is resolved in Release 4.0.
DDTS # CSCdy36936
An existing database file could be deleted if a database backup fails. This only occurs when you choose
to name the database file the same name as the existing file. In this case, CTC warns you in advance that
the existing file will be overwritten. If the database backup then fails, the existing file is deleted. To
prevent this issue from occurring, use a new file name for each consecutive database backup. This issue
is resolved in Release 4.0.
DDTS # CSCdy47562
Orderwire may fail after a direct OC-12 to OC-192 upgrade. To correct this, delete the Orderwire and
then add it again. This issue is resolved in Release 4.0.
DDTS # CSCdy48494
A Maintenance Security user can provision an EXT AEP on an AIC-I card, although this user level is
not expected to have this capability. This issue is resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
29
Resolved Software Caveats for Release 4.0.4
DDTS # CSCdy47232
F1 UDC circuits can not be terminated from an optical card in a 1+1 protection group. The circuit will
be created, but it will not function. This is true regardless of whether the circuit is created first or the
protection group is created first. There is no workaround; however, D4-D12 UDC circuits (over LDCC)
will work correctly with 1+1 protection groups and can be used in place of F1 UDC circuits. This issue
is resolved in Release 4.0.
DDTS # CSCdy43742
When a UDC circuit is created with no UDC traffic running yet, there is normally an LOS alarm raised
to indicate the lack of UDC traffic. However, when such a circuit with no traffic running on it is present
and the AIC-I card is removed and reinserted, no UDC LOS alarm is reported once the card is reinserted.
To work around this issue, after reinserting the AIC-I card, delete and then recreate any UDC circuits.
This issue is resolved in Release 4.0.
DDTS # CSCdw47506
A CTC communications failure on the network during circuit creation can cause a “Circuit Provisioning
Error” exception. An attempt to continue with the errored circuit creation results in other exceptions
that occur repeatedly on each attempt to continue. This issue has been seen infrequently, and only on
extremely large networks. To correct the problem, abandon the attempted circuit creation and start over.
This issue is resolved in Release 4.0.
BLSR Functionality
DDTS # CSCeb51108
Rarely, on a BLSR with one GNE node (on the LAN) and the other nodes as ENE (connected via SDCC
connections), repeatedly deleting and recreating the SDCCs on the GNE node might eventually lead to
CTC losing visibility to one or more of the ENE nodes. This can occur even when all SDCC connections
have been restored. The grayed-out node should regain visibility on its own after several hours;
otherwise, resetting the active TCC, or a TCC side switch will restore visibility to the grayed-out ENE
node. This requires physical access to the node. This issue is resolved in Release 4.0.3.
DDTS # CSCdy59242
A fail-to-switch alarm is raised when introducing SF-R with an existing lockout span command. The
alarm can become stuck after the SF-R and lockout span are cleared.
For example, in a two-fiber BLSR, say the east side of Node 1 is connected to the west side of Node 2.
Step 1
Perform a lockout span on the east side on Node 1
Step 2
Remove the transmit fiber on the east span of Node 1. Node 2 detects signal failure on its west side.
Traffic is lost as expected due to the lockout span existing on the ring. A fail-to-Switch alarm is raised.
Step 3
Reinsert the transmit fiber. Traffic returns, but the fail-to-switch alarm is still reported.
Release Notes for Cisco ONS 15454 Release 4.0.4
30
OL-7776-01
Resolved Software Caveats for Release 4.0.4
Step 4
Clear the lockout span. The fail-to-Switch alarm becomes stuck.
To clear the alarm, ensure that the ring is in the idle state, then issue an exercise ring command on the
span that reports the fail-to-Switch. This issue is resolved in Release 4.0.
DDTS # CSCdy48538
After a 2 fiber BLSR is deleted, in some cases the PCA links remain in the Manual Routing and Circuit
Edit pane. This usually occurs when there is a loss of connection between CTC and one of the BLSR
nodes during deletion of the BLSR. To clear the pane, restart CTC. This issue is resolved in Release 4.0.
DDTS # CSCdy19310
Rarely, in a four-node, OC-192, four fiber BLSR, traffic can remain lost after an LOS recovery on an
adjacent node when the local node has an SF-R raised. To correct this problem if it occurs, issue a force
ring on the side of the SF-R affected node that the SF-R is raised on. This issue is resolved in Release 4.0.
DDTS # CSCdy37939
In OC-12 BLSR configurations, a WKSWPR alarm that occurs can take several seconds before it
appears. The workaround is to simply wait for the alarm, which should appear after a brief delay. This
issue is resolved in Release 4.0.
DDTS # CSCdy30125
In a two by two BLSR configuration, with PCA circuits passing through the common node, if one of the
rings is a two fiber BLSR and you upgrade it, a PCA connection will be promoted to become protected
on the upgraded ring side. In this scenario, you can end up with a circuit that is PCA on one ring and
protected on the other ring.
This can occur with any colliding STSs; in other words, any situation where the STS from the working
side is going to overlay the STS from the protection side when a ring or span switch occurs. On a span
switch in a four fiber BLSR this would be STS #1 on the working and STS #1 on the protect on the same
side (i.e. east or west). For a ring switch on a four fiber BLSR it would be STS #1 on the working and
STS #1 on the protect on the opposite side of the ring. In a two fiber BSLR there is only a ring switch,
so the colliding STSs would be STS #1 on one side of the ring and STS #7 on the opposite side (for an
OC-12 ring, for example). Symptoms of a failure will be protected traffic that is dropped or that has a
stuck AIS-P.
When you perform a two fiber BLSR upgrade in a two by two configuration, ensure that no PCA circuits
cross through the common node before you start the upgrade. Note that the PCA circuits that are added
and dropped on the same ring are safe, as they will be promoted to become fully protected. All PCA
circuits that cross the common node to go to another ring must be deleted before the upgrade, then
recreated once the upgrade is successfully finished. This issue is resolved in Release 4.0.
DDTS # CSCdy69580
An oscillating SF-P can prevent the WTR-R timer from expiring indefinitely. If this occurs, issue a
lockout span to normalize the ring. This issue is resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
31
Resolved Software Caveats for Release 4.0.4
DDTS # CSCdy68414
If you issue a lockout on the protection span of a BLSR where an SD preexists, traffic may remain on
the SD span, even though it should switch. To recover from this situation, issue a force span on the
SD-affected span, then clear the command once the switch occurs. This issue is resolved in Release 4.0.
DDTS # CSCdz31562
Rarely, after all spans are upgraded for a BLSR, you cannot create circuits on higher STSs. To recover
from this situation, delete the ring and then recreate it. This issue is resolved in Release 4.0.
DDTS # CSCdy64543
After you issue a BLSR protection switch command with a switch type other than ring or span, TL1
cannot query any BLSR ring info.
For example, say the entered switch type is “frcdwkswbk,” so you entered:
opr-protnsw-oc192::fac-6-1:ff::frcd,frcdwkswbk;
This results in subsequent failures to query BLRS information in TL1 or CTC. CTC is unable to retrieve
any BLSR information from the node, and other possible issues may arise. If at this point you close CTC,
it may not launch again.
To recover from this issue, call the TAC and tell them which side you entered the incorrect command for.
This issue is resolved in Release 4.0.
DDTS # CSCdy54882
After a software upgrade from Release 3.3 to 3.4, where a Lockout Protect Span is issued on all nodes
before activation (as it should be), the lockout conditions may persist even after clearing them in CTC.
To correct this situation, reissue each lockout and then clear it again. This issue is resolved in Release
4.0.
DDTS # CSCdy10805
If you upgrade one of the rings in a two by two BLSR configuration, an EXTRA-TRAF-PREEMPT
alarm may be raised and subsequently fail to clear on one of the rings. If the ring that has the stuck alarm
already has some PCA circuits on it, you can issue and then clear a Force Ring. This should clear the
stuck alarm. If no PCA circuits exist on the ring, then create one temporarily, and follow the above
procedure to clear the alarm. After the alarm clears, you can remove the Force Ring, then delete the PCA
circuit. This issue is resolved in Release 4.0.
DDTS # CSCdv89939 and CSCdy46597
After a BLSR span or ring switch, traffic is switched to a different set of nodes and a protection STS is
used. At this point, any ongoing J1 monitoring does not follow the switch. As a result, there is no J1
monitoring on the protection path. If there is a mismatch of the J1 string on the protection path, the
TIM_P alarm will not be raised. Also, you can retrieve the actual captured J1 string on the working path,
but if BLSR switched from working to protect, you cannot retrieve the J1 string on the protect path. This
issue is resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
32
OL-7776-01
Resolved Software Caveats for Release 4.0.4
DDTS # CSCdy22745
In a 2 fiber BLSR, if there is a ring or span Wait to Restore (WTR), the Clear button in CTC will clear
the WTR state and revert traffic to Working right away, while the TL1 RLS-PROTNSW command does
not behave in this same manner. To get the WTR to clear immediately, you must use the CTC Clear
button. This issue is resolved in Release 4.0.
DDTS # CSCdy35901
In a four-node, OC-192, four fiber BLSR, traffic remains lost after a lockout is cleared on an adjacent
node when the local node has an SF-R raised. To correct this problem if it occurs, issue a force ring on
the side of the SF-R affected node that the SF-R is raised on. This issue is resolved in Release 4.0.
DDTS # CSCdy48209
Under some conditions, a lockout-of-protect span condition might be raised (or fail to clear) upon
creating a BLSR. If this occurs, issue a manual switch ring command, then check to see that the ring
switched properly. Afterwards, clear the command. This issue is resolved in Release 4.0.
DDTS # CSCdy48690
On a four-node, OC-192, four fiber BLSR, switching will not occur when an SD-R is present after
clearing an SD-P. After clearing the SD-P, issue a force ring on the side of the SD-R affected node that
the SD-R is reported against. This issue is resolved in Release 4.0.
Path Protection Configuration Functionality
DDTS # CSCdy62713
If you change non-revertive path protection configuration VT circuits for IS to OOS and then back to IS,
then fail an active fiber span carrying the circuit, the circuit will fail to switch, resulting in traffic outage.
To avoid this issue, make sure the circuit is revertive before placing it in the OOS (out of service) state,
and wait at least 30 seconds before changing the VT path protection configuration selector from one state
to another. This issue is resolved in Release 4.0.
DDTS # CSCdx58989
Occasionally, the path protection configuration span upgrade wizard may fail to release a force switch
on a path protection configuration span. It is not clear what prompts this response. If this occurs, from
the Network Map, right-click on the span and invoke the “Circuits on Span” dialog box. Select Clear
from “Perform UPSR span switching” combo box, then click the Apply button. This will switch all
circuits back onto this span. This issue is resolved in Release 4.0.
DDTS # CSCdw66071
After a switch to protect is cleared for a revertive path protection configuration circuit, the WTR alarm
is not raised, although the wait period is observed and the circuit reverts back to working. This issue is
resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
33
Resolved Software Caveats for Release 4.0.4
TL1
DDTS # CSCef97420
If a client opens a TL1 ENE/GNE session with a GNE Node A, and then from within that session opens
another session with an ENE Node B, but then the initial client stops responding to TL1 updates (but
fails to close the connection), the common control card of the GNE Node A might reset autonomously.
This issue is resolved in Releases 4.0.4, 4.6.5, and 5.0.
DDTS # CSCef18213
If you issue several TL1 commands over TCP/IP, then disconnect the source that generated the
commands, the TL1 agent tasks will become stuck in an attempt to write/read data. This issue can take
a long time to recover from. This issue is resolved in Releases 4.0.4, 4.6.5, and 5.0.
DDTS # CSCed10618
If the TL1 craft port is disconnected while a retrieve level user (or a user with no timeout) is logged in,
and there is a currently active CTC session, the active TCC will reset. To avoid this issue, log craft access
user out before disconnecting the TL1 craft port. This issue is resolved in Release 4.6 and maintenance
Release 4.0.3.
DDTS # CSCec87770
If you do not log in to a GNE node, the TCC might reset and some lower priority tasks might be “CPU
starved,” resulting in one or all of the following consequences:
•
TL1 Autonomous messages (alarms, events, and report database changes) not generated or
processed
•
LCD display not updated
This issue is resolved in Releases 4.0.2, 4.1.1, 4.1.4, and 4.6. It is not resolved in Releases 4.1.2 or 4.1.3.
DDTS # CSCdy68877
If you create STS1 and STS3C circuits through TL1 and then put the pass through cross connect in the
OOS state, traffic remains, when it should stop. To work around this issue, either use CTC to place the
circuit in the OOS state, or place the end cross connects in the OOS state in TL1, instead of pass through
cross connect. This issue is resolved in Release 4.0.
DDTS # CSCdy71894
The TL1 ED-BLSR command changes the ring-id even though the command is denied because of a
duplicate node-id. The following example illustrates.
Set up a BLSR (with a Ring ID of 1) with node IDs 1 and 2 (for a 2 node BLSR). On Node 1, use the
ED-BLSR command to try to change the Ring ID to 2 and the Node ID to 2. Since, the Node ID is a
duplicate, the command is denied. However, the Ring ID is still changed to 2. To avoid this issue, use 2
separate ED-BLSR commands to change the Node ID and Ring ID. This issue is resolved in Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
34
OL-7776-01
New Features and Functionality
New Features and Functionality
This section highlights new features and functionality for Release 4.0.x. For detailed documentation of
each of these features, consult the user documentation.
New Hardware
G1K-4 Card
The G1K-4 card provides four ports of IEEE-compliant, 1000-Mbps interfaces. Each interface supports
full-duplex operation for a maximum bandwidth of 1 Gbps or 2 Gbps bidirectional per port, and 2.5 Gbps
or 5 Gbps bidirectional per card. Each port autonegotiates for full duplex and 802.3x flow control. The
G1K-4 card uses GBIC modular receptacles for the optical interfaces.
The G1K-4 card is an enhancement to the G1000-4 card, enabling compatibility with all cross-connect
types. In XC-10G equipped systems, the card can be installed in any of the 12 multiservice interface
slots. In XC/XCVT equipped systems, the card can be installed in the 4 high-speed slots.
Cisco offers three GBIC modules as separate orderable products for maximum flexibility:
•
IEEE 1000Base-SX compliant, 850-nm, optical module
•
IEEE 1000Base-LX compliant, 1300-nm, optical module
•
IEEE 1000Base-ZX compliant, 1550-nm, optical module
The 850-nm SX optics are designed for multimode fiber and distances of up to 220 meters on 62.5
micron fiber and up to 550 meters on 50 micron fiber. The 1300-nm LX optics are designed for
single-mode fiber and distances of up to ten kilometers. The 1550-nm ZX optics are designed for
single-mode fiber and distances of up to eighty kilometers.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
OC3IR/STM1SH 1310-8 Card
The OC3 IR/STM1 SH 1310-8 card provides eight intermediate or short range SONET/SDH OC-3 ports
compliant with standards prescribed by International Telecommunication Union (ITU) G.707 and G.957,
and by Telcordia GR-253. Each port operates at 155.52 Mbps over a single-mode fiber span. The card
supports VT and non-concatenated or concatenated payloads at the STS-1 or STS-3c signal levels.
You can install the OC3 IR/STM1 SH 1310-8 card in any multispeed slot. The card can be provisioned
as part of a path protection configuration or in a linear add-drop multiplexer (ADM) configuration. Each
port features a 1310 nm laser and contains a transmit and receive connector (labeled) on the card
faceplate. The card uses LC connectors.
The OC3 IR/STM1 SH 1310-8 card supports 1+1 unidirectional or bidirectional protection switching.
You can provision protection on a per port basis.
The OC3 IR/STM1 SH 1310-8 detects LOS, LOF, Loss of Pointer (LOP), line Alarm Indication Signal
(AIS-L), and line Remote Defect Indication (RDI-L) conditions. See the “ONS 15454 Troubleshooting
Guide,” Release 4.0, for a description of these conditions. The card also counts section and line bit
interleaved parity (BIP) errors.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
35
New Features and Functionality
OC192 LR/STM64 LH ITU 15xx.xx Card
Eight distinct STM-64 ITU 100 GHz DWDM cards comprise the ONS 15454 DWDM channel plan. The
OC192 LR/STM64 LH ITU 15xx.xx card provides one long-range, ITU-T G.707- and G.957-compliant
and Telcordia GR-1377 and GR-253 compliant STM-64/OC-192 port per card. The port operates at
9.95328 Gbps over unamplified distances up to 60 km with different types of fiber such as C-SMF or
dispersion compensated fiber limited by loss and/or dispersion. The card supports VT and
non-concatenated or concatenated payloads.
Four of the cards operate in the blue band with a spacing of 100 GHz in the ITU grid (1534.25 nm,
1535.04 nm, 1535.82 nm, and 1536.61 nm). The other four cards operate in the red band with a spacing
of 100 GHz in the ITU grid (1550.12 nm, 1550.92 nm, 1551.72 nm, and 1552.52 nm). You can install
OC192 LR/STM64 LH ITU 15xx.xx cards in any high-speed slot, slot 5, 6, 12, or 13, on the ONS 15454.
You can provision this card as part of a BLSR, path protection configuration, or linear configuration or
also as a regenerator for longer span reaches.
The OC192 LR/STM64 LH ITU 15xx.xx port features a laser on an ITU compliant, 100GHz spaced
wavelength in the 1550-nm range (order this card by specifying the desired wavelength) and contains a
transmit and receive connector (labeled) on the card faceplate. The card uses a dual SC connector for
optical cable termination. The card supports multiple protection formats including 1+1 unidirectional
and bidirectional facility protection, path protection configuration, two-fiber and four-fiber bidirectional
line switched rings (BLSR), and unprotected.
The OC192 LR/STM64 LH ITU 15xx.xx card detects SF, LOS, or LOF conditions on the optical facility.
Refer to the “Cisco ONS 15454 Troubleshooting Guide,” Release 4.0, for a description of these
conditions. The card also counts section and line BIP errors from B1 and B2 byte registers in the section
and line overhead.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
OC192 IR/STM64 SH 1550 Card
The OC192 IR/STM64 SH 1550 card provides one short-range SONET/SDH OC-192 port in the 1550
nm wavelength range, compliant with standards prescribed by ITU G.707, G.957, and by Telcordia
GR-1377 and GR-253. The port operates at 9.95328 Gbps over unamplified distances up to 40 km with
SMF-28 fiber limited by loss and/or dispersion. The card supports VT and non-concatenated or
concatenated payloads.
You can install OC192 IR/STM64 SH 1550 cards in any high-speed slot, slot 5, 6, 12, or 13, on the ONS
15454. You can provision this card as part of an BLSR, path protection configuration, or linear
configuration, or also as a regenerator for longer span reaches.
The OC192 IR/STM64 SH 1550 port features a 1550-nm laser and contains a transmit and receive
connector (labeled) on the card faceplate. The card uses a dual SC connector for optical cable
termination. The card supports 1+1 unidirectional and bidirectional facility protection. It also supports
1:1 protection in four-fiber bidirectional line switched ring applications where both span switching and
ring switching might occur.
The OC192 IR/STM64 SH 1550 card detects SF, LOS, or LOF conditions on the optical facility. Refer
to the Cisco ONS 15454 Troubleshooting Guide for a description of these conditions. The card also
counts section and line BIP errors from B1 and B2 byte registers in the section and line overhead.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
36
OL-7776-01
New Features and Functionality
OC192 SR/STM64 IO 1310 Card
The OC192 SR/STM64 IO 1310 card provides one intra-office haul SONET/SDH OC-192 port in the
1310 nm wavelength range, compliant with the International Telecommunication Union's G.707, G.957,
and Telcordia's GR-1377 and GR-253. The port operates at 9.95328 Gbps over unamplified distances up
to 2 km. The card supports VT and non-concatenated or concatenated payloads. You can install OC192
SR/STM64 IO 1310 cards in any high-speed slot, slot 5, 6, 12, or 13, on the ONS 15454 SDH. You can
provision this card as part of an BLSR, a path protection configuration, a linear configuration, or as a
regenerator for longer span reaches.
The OC192 SR/STM64 IO 1310 port features a 1310-nm laser and contains a transmit and receive
connector (labeled) on the card faceplate. The card uses a dual SC connector for optical cable
termination. The card supports 1+1 unidirectional and bidirectional facility protection. It also supports
1:1 protection in four-fiber bidirectional line switched ring applications where both span switching and
ring switching might occur.
The OC192 SR/STM64 IO 1310 card detects SF, LOS, or LOF conditions on the optical facility. Refer
to the “Cisco ONS 15454 Troubleshooting Guide” for a description of these conditions. The card also
counts section and line BIP errors from B1 and B2 byte registers in the section and line overhead.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
ML-series Cards
The ML-Series 10/100/Gigabit Ethernet cards provide high throughput, low latency packet transport of
Ethernet traffic (L2, IP and other L3 protocols), and a port based STS-48 backend for your SDH/SONET
network. With ML-Series cards, efficient Ethernet transport and TDM can coexist on same card, thus
enabling low cost interconnectivity for hubs and routers. The ML-Series works with Cisco IOS and takes
advantage of IOS’s IP rich features and reliability. The ML-Series functions as a Fast-Ethernet or
Gigabit-Ethernet extension, or, in an aggregation application, such as high-capacity customer LAN
traffic, Internet traffic, or VPN, with 1 Mbps and above bandwidth guaranteed traffic grooming. The
following summaries highlight ML-Series card features.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
ML1000-2 Card
The ML1000-2 card provides two ports of IEEE-compliant, 1000-Mbps interfaces. Each interface
supports full-duplex operation for a maximum bandwidth of 2 Gbps per port and 4 Gbps per card. Each
port autoconfigures for full duplex and IEEE 802.3x flow control.
The ML1000-2 card works in any of the slots from 1 to 6 or 12 to 17 if you use the XC10G cross-connect
card.
Two SFP modules are offered as separate orderable products for maximum customer flexibility: an IEEE
1000Base-SX compliant, 850-nm optical module and an IEEE 1000Base-LX-compliant, 1300-nm
optical module. The 850-nm SX optics are designed for multimode fiber and distances of up to 220
meters on 62.5 micron fiber and up to 550 meters on 50 micron fiber. The 1300-nm LX optics are
designed for single-mode fiber and distances of up to five kilometers. Other SFP modules for long-reach
1550-nm and twisted-pair copper will be offered for use with the E1000 card in a future release.
The ML1000-2 Gigabit Ethernet card provides high-throughput, low-latency packet switching of
Ethernet encapsulated traffic (IP and other Layer 3 protocols) across an SONET network while providing
a greater degree of reliability through SONET “self-healing” protection services. This enables network
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
37
New Features and Functionality
operators to provide multiple 1000 Mbps access drops for high-capacity customer LAN interconnects,
Internet traffic, and cable modem traffic aggregation. Efficient transport and co-existence of traditional
TDM traffic with packet-switched data traffic is provided.
The ML1000-2 card eliminates the need for external aggregation equipment such as Ethernet or ATM
switches at the customer site, remote headends, or distributed POPs.
Each ML1000-2 card supports standards-based, Layer 2 Ethernet switching between its Ethernet ports
and any other Ethernet or SONET trunk interfaces on the ONS 15454. The IEEE 802.1Q tag and
port-based VLANS logically isolate traffic (typically subscribers). Priority queuing is also supported to
provide multiple classes of service. Two queues are provided on card. Queue level is settable from 0 to
7; 0 to 3 map, and 4 to 7 map.
You can install the ML1000-2 card into any multispeed slot for a total shelf capacity of 20 Gigabit
Ethernet ports. Multiple Ethernet cards installed in an ONS 15454 can act as either a single switching
entity or as a single switch supporting a variety of SONET port configurations.
You can create logical SONET ports by provisioning VC channels to the packet switch entity within an
ADM. Logical ports can be created with a bandwidth granularity of VC-4. In a single or multicard
configuration, the ONS 15454 can support 2 virtual ports. The virtual port’s supported circuit sizes are
STS-1, -3c, -6c, -9c, -12c, and -24c.
ML100T-12 Card
The ML100T-12 card provides 12 ports of IEEE 802.3-compliant, 10/100 interfaces. Each interface
supports full-duplex operation for a maximum bandwidth of 200 Mbps per port and 2.488 Gbps per card.
Each port independently detects the speed of an attached device (autosenses) and automatically connects
at the appropriate speed. The ports autoconfigure to operate at either half or full duplex and can
determine whether to enable or disable flow control. The ML100T-12 card works in any slot from1 to 6
or 12 to 17 if you use the XC10G cross-connect card.
The ML100T-12 Ethernet card provides high-throughput, low-latency packet switching of Ethernet
traffic across an SONET network while providing a greater degree of reliability through SONET
“self-healing” protection services. This Ethernet capability enables network operators to provide
multiple 10/100-Mbps access drops for high-capacity customer LAN interconnects, Internet traffic, and
cable modem traffic aggregation. Efficient transport and co-existence of traditional TDM traffic with
packet-switched data traffic are provided.
The ML100T-12 eliminates the need for external aggregation equipment such as Ethernet switches,
remote headends, or distributed POPs.
Each ML100T-12 card supports standards-based, wire-speed, Layer 2 Ethernet switching between its
Ethernet ports. The 802.1Q tag and port-based VLANs logically isolate traffic (typically subscribers).
Priority queuing is also supported to provide multiple classes of service.
You can install the ML100T-12 card in any multispeed slot. Multiple Ethernet cards installed in an ONS
15454 act as a single switch supporting a variety of SONET port configurations. You can create logical
SONET ports by provisioning a number of VC-4 channels to the packet switch entity within the ADM.
Logical ports can be created with a bandwidth granularity of VC-4. In a single or multicard
configuration, the ONS 15454 can support 2 virtual ports. The virtual port’s supported circuit sizes are
STS-1, -3c, -6c, -9c, -12c, and -24c.
TCC2 System Processor Card
The Advanced Timing Communications and Control (TCC2) card performs system initialization,
provisioning, alarm reporting, maintenance, diagnostics, IP address detection/resolution, SONET
section overhead (SOH) data communication channel/generic communication channel (DCC/GCC)
Release Notes for Cisco ONS 15454 Release 4.0.4
38
OL-7776-01
New Features and Functionality
termination, and system fault detection for the ONS 15454. The TCC2 also ensures that the system
maintains Stratum 3 (Telcordia GR-253-CORE) timing requirements. It monitors the supply voltage of
the system.
Note
The TCC2 card requires the XC, XCVT and XC-10G cross-connect cards and Release 4.0 or
higher.
Note
The LAN interfaces of the TCC2 card meet the standard Ethernet specifications by supporting a
cable length of 100 meters at temperatures from 0 degrees C to 65 degrees C (32 degrees F to
149 degrees F). The interfaces can operate with a cable length of 10 meters maximum at
temperatures from -40 degrees C to 0 degrees C (-40 degrees F to 32 degrees F).
For TCC2 card functionality and details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
New Software Features and Functionality
Cross-connect Loopback
A cross-connect loopback tests a circuit path as it passes through the cross-connect card and loops back
to the port being tested. Testing and verifying circuit integrity often involves taking down the whole line;
however, with Release the 4.0.x cross-connect loopback, you can create a loopback on any embedded
channel at supported payloads at the STS-1 granularity and higher. For example, you can loop back a
single STS-1, STS-3c, STS-6c, etc., on an optical facility without interrupting the other STS circuits.
Cross-connect loopbacks are supported for optical cards.
A cross-connect loopback is allowed only if the connection state of the circuit is OOS-AINS or
OOS-MT. The cross-connect loopback option is available on all optical paths in the system that are
cross-connected. When a cross-connect loopback is selected, if the near end is involved in a
cross-connect loopback, an AIS (Alarm Indication Signal) is transmitted from the far end of the existing
cross-connect. If the line supporting the path involved with a cross-connect loopback is involved in a 1+1
protection scheme, both the Active and Working paths are looped back in the cross connect matrix. Paths
that are in a cross-connect loopback are not permitted to be used for test access. Only one type of
loopback is allowed on a supporting line and path. If a facility loopback exists on an OC-48 line, you
may not perform a cross-connect loopback on any paths in that line, and vice-versa. Addition and
deletion of cross connects is permitted while the port is in an active loopback. However, if a
cross-connect is deleted while the path is in a cross-connect loopback, the loopback is automatically
removed by the system.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
LCD Enhancements
As of Release 4.0.x, the information displayed on the LCD, located on the fan tray assembly, can be
controlled via software.
Release 4.0.x allows you to modify parameters and control the following displayed information:
•
Suppression of LCD IP display
•
Display of the NE defaults name
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
39
New Features and Functionality
•
Alarm output one-button toggle (alarm counts and alarm summary in the LCD are displayed
alternately)
You can also modify display parameters to prohibit configuration changes via the LCD display touchpad.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Path Protection Configuration Dual Ring Interconnect
The path protection configuration dual ring interconnect topology (Path Protection Configuration DRI)
provides an extra level of path protection between interconnected path protection configurations. In
DRIs traffic is dropped and continued at the interconnecting nodes to eliminate single points of failure.
Two DRI topologies can be implemented on the ONS 15454. The traditional DRI uses four ONS 15454s
at the interconnect nodes, while the integrated DRI uses two nodes.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Audit Trail Enhancements
In Release 4.0.x, the Audit Trail feature has been improved. To use the Audit Trail features, you must be
logged on with either Provisioning or Superuser privileges.
You can now save Audit Trail records created since the last archive operation to a local file. Multiple
archive files, when put together, provide a view of the node’s audit travel over time with no omissions
or overlap.
Two new alarms indicate when an archive of the Audit Trail is needed:
•
AUD-LOG-LOW is raised when the audit trail is 80% full.
•
AUD-LOG-LOSS is raised when the audit trail begins to overwrite records that have not yet been
archived.
Both of the new alarms clear automatically when you perform an archive via CTC.
CTC Logical Network View
In the Network view, the graphic area displays a background image with colored ONS 15454 icons. With
Release 4.0.x, a superuser can set up the new logical network view feature to enable each user to see the
same network view.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Port Based Numbering of Alarms
With Release 4.0.x, all alarms and conditions are announced against the associated externally visible
port (numbered to match the ingress port of the signal). No alarms or conditions are announced against
internal ports.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
40
OL-7776-01
New Features and Functionality
E-series Linear Mapper
The Linear Mapper is a new operation mode added to the current line of E-Series cards available on the
ONS 15454 SONET, ONS 15454 SDH and the ONS 15327. This new mode accompanies the Multi-card
EtherSwitch Group (Multi-card) mode and the Single-card (Single-card) EtherSwitch mode on each
version of E-Series card starting with Release 4.0.x.
The Linear Mapper is a software feature and does not require you to purchase additional hardware if you
have already deployed the E-Series cards. The Linear Mapper feature will become available to you in
the form of a “Port-mapped” mode after you activate Release 4.0 or higher on the ONS platform.
The benefit of the Linear Mapper, which can also be referred to as Port-mapped mode, is that it allows
Ethernet traffic to be mapped directly onto the SONET/SDH circuit without passing through a layer 2
(L2) switching engine. Although the L2 switching capabilities of E-Series cards provide a much wider
range of functionality than a simple L1 Ethernet-to-SONET/SDH mapping scheme, there are several
characteristics unique to the E-Series card’s L2 switching engine that may present limitations in some
applications. Such limitations of the L2 switching engine on the E-Series card include:
•
Broadcast and Multicast rate limitation: Unicast packet loss can occur when Broadcast or Multicast
traffic is present in the Ethernet circuit (for reference see Field Notice 13171).
•
Excessive Ethernet circuit down time when a protection switch, TCC switch, or XC switch occurs.
This is due to the fact that each circuit must wait for Spanning Tree Protocol (STP) reconvergence,
which can take several minutes.
•
Each card is limited to eight Spanning Tree instances, limiting the number of VLANs that can be
provisioned from one card without implementing provisioning workarounds.
When you place the E-Series card in port-mapped mode, you can realize the following benefits:
•
No Unicast packet loss due to Multicast or Broadcast traffic
•
No Multicast limitations
•
No Excessive Ethernet circuit downtime since, there is no STP or need for STP reconvergence
•
No limitation on the number of STP instances
Note
Whether port-mapped mode is beneficial to your network or not depends on the particular application.
Several applications may benefit more from the L2 features provided by Multi-card EtherSwitch Group
mode and/or Single-card EtherSwitch mode. Use the guidelines above in combination with the user
documentation to analyze your particular network and determine if port-mapped mode will improve
performance.
Note
Cisco offers other Ethernet data cards for the ONS 15454 and ONS 15327. These include the L1
Ethernet-to-SONET/SDH G-Series card and the L2/L3 switching ML-Series card (ONS 15454 only).
When choosing a data solution, each card family should be considered to ensure that you have achieved
the most appropriate solution.
Graphical Display of Lockout
Release 4.0.x offers a new, detailed graphical display of lockout conditions on a span. Prior to Release
4.0.x, there is no clear indication when a span that is locked out has been manually switched. In previous
releases, these events are reported in the Conditions tab or as a non-reporting event in the alarm tab.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
41
New Features and Functionality
Graphical indications of a Lockout, Force, or Manual switch condition are displayed for the following
schemes:
•
1 + 1 configuration
•
2 Fiber BLSR
•
4 Fiber BLSR
The graphical display of a condition can be viewed from the Network, Circuit and Detailed Circuit maps
when a protection switch is applied.
Possible displayed values are:
•
E—Exercise
•
M—Manual
•
F—Force
•
L—Lockout
Database Downgrade Protection
With Release 4.0.x, CTC prevents restoration of a database written by a software version newer than
what the TCC, TCC+, or TCC2 is running. CTC issues a warning, but allows you to proceed, when
reverting to an older software version.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Proxy Server Port Reduction
In previous releases, CTC was able to manage nodes behind routers that performed network address
translation (NAT) but required that intermediate routers allow connections on many ports. Additionally,
these intermediate routers needed to be configured to allow connections to be initiated from both CTC
and the GNE. With Release 4.0.x, CTC can now manage nodes behind routers that perform NAT or port
address translation (PAT). Intermediate routers need only be configured to allow connections from CTC
to the GNE on ports 80 (HTTP) and 1080 (SOCKS) and packets for established connections from the
GNE to CTC. The superuser can enable this functionality on the node level Provisioning > Network tab.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Ethernet Tx and Rx Utilization
The node view port utilization values for Release 4.0.x now separate transmit values from receive values.
This affords you a clearer picture of actual utilization levels in this view, even when levels are very small.
DCC Expansion
An important benefit of the TCC2 card offered with Release 4.0.x is that each node in which TCC2s are
installed can terminate up to 32 section DCCs. Routing abilities of the system are also enhanced to
ensure that the TCC2 can effectively manage the increased amount of DCC traffic resulting from the
change in the number of possible DCC terminations. This gives your network greater capacity for
creating and administering path protection configurations.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
Release Notes for Cisco ONS 15454 Release 4.0.4
42
OL-7776-01
New Features and Functionality
BLSR J1 CTC
In Release 4.0.x, several enhancements have been made to improve support for C2 and unmatched J1
path trace with BLSR protection switching. In summary, the following have been addressed.
In Release 4.0.x, CTC displays all unmatched J1 Path Trace detected and C2 byte, including:
•
STS Number
•
Slot
•
Port
•
Expected J1 Byte
•
Received J1 Byte
•
Received C2 Byte
This allows you to locate Path Trace Mismatch even for a switched BLSR circuit.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
CTC Path Trace Alarm Support
In Release 4.0.x, after traffic has switched to a protection span, standard TIM-P alarms will be raised
when there is a J1 mismatch detected on the switched STSs.
CTC NCP Display Enhancement
In Release 4.0.x, NCP is enhanced to support the display of a switched BLSR path, in addition to the
working path. NCP is also enhanced to display alarms on the STSs where the switched BLSR path is,
and allows you to monitor path trace on the switched BLSR path such that:
•
CTC provides visibility of the ASCII contents of the monitored J1 byte for each STS path even when
Active traffic has switched to protection span of an BLSR.
•
CTC provides visibility to the Expected J1 value for each STS path even when active traffic has
switched to protection span of an BLSR.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
CTC PM Support
In Release 4.0.x, when traffic is switched from the working to the protection span, standard SONET and
SDH Near End Path PM values are available over the protection span in the 2-fiber and 4-fiber BLSR.
For more specific details, consult the “Cisco ONS 15454 Reference Manual,” Release 4.0.
New TL1 Features
FTP Database Backup and Restore Support
The new FTP database backup/restore support feature allows you to back up and restore your database
via FTP using the TL1 interface. The following commands support the FTP download functionality.
•
COPY-RFILE
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
43
New Features and Functionality
•
REPT^EVT^FXFR
Additional Port Information
Port Information has been added for STS/VTAIDs over the Optical cards (OCn) and EC1.
New Commands Supporting the ML-Series Cards
The following new commands have been added to support the ML-Series cards.
•
COPY-IOSCFG
•
REPT EVT IOSCFG
•
RTRV-ALM-FSTE
•
RTRV-ALM-GIGE
•
RTRV-FSTE
•
RTRV-GIGE
•
RTRV-POS
•
RTRV-ALM-FSTE, RTRV-ALM-GIGE, RTRV-ALM-POS
•
RTRV-COND-FSTE, RTRV-COND-GIGE, RTRV-COND-POS
•
REPT^ALM^FSTE, REPT^ALM^GIGE, REPT^ALM^POS
•
REPT^EVT^FSTE, REPT^EVT^GIGE, REPT^EVT^POS
•
Added ML1000-2, ML100T-12, ML1000-1, ML100T-8 for ML-Series cards.
•
Added VFAC AID to support the following cross connection commands of the ML-Series cards:
•
ENT-CRS-<STS_PATH>
•
ED-CRS-<STS_PATH>
•
DLT-CRS-<STS_PATH>
•
RTRV-CRS-<STS_PATH>
Security Enhancements
The following new commands have been added to enhance security.
•
ALW-MSG-SECU
•
ALW-USER-SECU
•
INH-MSG-SECU
•
INH-USER-SECU
•
REPT^EVT^SESSION
The following additional features support security.
Release Notes for Cisco ONS 15454 Release 4.0.4
44
OL-7776-01
New Features and Functionality
Configurable User Access Features
Provisionable User Security Timeouts are now configurable via CTC. CTC allows timeout values
ranging from 0 to 16 hours and 39 minutes (999 minutes). A value of 0 means the timeout is to be treated
as infinite (no timeout). The timeout configuration via CTC only applies to users who are not currently
logged in. Users logged in when the timeout is changed continue to use the timeout that was in effect
when they logged in until they logout.
Provisionable One User per UserID
One session per user is now supported and is configurable via CTC. This means that a login will fail for
a valid username/password combination if someone has already logged into the system using that
combination. This restriction applies to both CTC and TL1. For instance, if a user is logged in using
CTC, the TL1 ACT-USER command will be denied.
Failed User Attempt Lockout
If you fail to log in to a node because of a correct userid and an incorrect password, that userid will be
locked out after X tries, where X is configurable. You may remain locked out or may be re-admitted
after a period of N seconds, where N is configurable. The default settings are X = 5 and N = 30, causing
a short 30 second lockout after 5 failed attempts. During the lockout period, attempts to login with a
valid username/password combination will be denied.
Configurable Password Features
Also configurable via CTC, but enforceable in TL1 are the following password enhancements.
Number of unusable password days and number of distinct passwords: When you change your
password, the new password must differ from the previous X passwords that have been used in the last
Y days. The defaults are X = 1 and Y = 20, which means that the new password cannot be the same as
the current password. In this case, the Y days is unused because the current password is always in use.
A setting of X = 2 and Y = 20 would mean that the new password cannot be the same as the current
password and cannot be the same as the previous password unless the previous password has not been
used for 20 days. A setting of X = 5 and Y = 30 would mean that the new password cannot be the same
as the current password and cannot be the same as the other previous 4 passwords unless the other
previous 4 passwords have not been used for 30 days.
Forcible logout: An administrator now has the capability to forcibly log out a user. The interface is via
CTC only, but a TL1 user can be logged out too. If a TL1 user is logged out, the REPT^EVT^SESSION
message will appear indicating the forced logout.
Cross-Connect Loopback
The following new commands support cross-connect loopbacks.
•
OPR-LPBK-<STS_PATH>
•
RLS-LPBK-<STS_PATH>
Active Path Determination
The RTRV-<STS_PATH> command has added UPSRPTHSTATE in its output to indicate the path state
in cases where the STS path is the path of path protection configuration.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
45
New Features and Functionality
Dual Ring Interconnect
The ENT-CRS-<STS_PATH> and ENT-CRS-VT1 commands now support the 2WAYDC connection
type.
The ED-<STS_PATH>, RTRV-<STS_PATH>, and ED-VT1, RTRV-VT1 commands have added a new
field, HOLDOFFTIMER.
Eight Port OC-3
A new equipment type, OC3-8, has been added for the ENT-EQPT command. OC3IR-STM1SH-1310-8
has been added to the “EQPT_TYPE” enum table. The LASEREOL (“Laser Approaching End Of Life”)
alarm has also been added. All TL1 commands supported for 4 port OC3 also apply to the eight port
OC-3.
Prompting Feature
A TL1 Prompting tool has been added. This feature is primarily for prompting options for command
(VMM) and payload prompting. Other fields are mostly mandatory and user input is required for them.
Prompting can be invoked by entering “Ctrl-P.”
Note
The CTC-TL1 window does not support this feature.
If the prompting tool requires user input, a message “User Input Required” will be displayed. If the
prompting tool is asked for fields that are not supported, a message “Field Not Supported” will be
displayed.
Pattern Matching enables you to enter only the first few characters of a command, or only as many as is
necessary to distinguish the command from others. The prompting tool will return a list of possible
named parameters.
Prompting can be invoked for Named or Positional parameter blocks.
In a GNE to ENE scenario, the GNE prompts the user on behalf of the ENE.
Add or Drop a Cross Connect
The following new commands support adding or dropping a cross connect over a cross connection or a
circuit via TL1.
•
ED-CRS-<STS_PATH>
•
ED-CRS-VT1
J1 and C2 Support
As of Release 4.0.x, the C2 byte can be retrieved using the following commands. Also, J1 STS path trace
can be provisioned on the protect STS path of a switched BLSR.
•
ED-<STS_PATH>, RTRV-<STS_PATH>
•
RTRV-PTHTRC-<STS_PATH>
•
RTRV-ALM-<STS_PATH>, RTRV-COND-<STS_PATH>
Release Notes for Cisco ONS 15454 Release 4.0.4
46
OL-7776-01
New Features and Functionality
•
RTRV-PM-<STS_PATH>, RTRV-TH-<STS_PATH>
The RTRV-TRC-<BLSR_OCN> command is introduced with this feature to retrieve all J1 for each
SONET port that has a BLSR and supports the J1 path trace. (In other words, this command can be
applied for the OC-48AS and OC-192 cards only.)
The RTRV-<STS_PATH> command adds a new input field, BLSRPTHTYPE, allowing you to retrieve
the STS J1 path trace information on either the STS path of PCA circuits or the STS path of NON-PCA
circuits.
The RTRV-<STS_PATH> command also adds a new output field, BLSRPTHSTATE.
Test Access
As of Release 4.0.x, PCA test access is supported. Creation of an STS (or VT) Test Access point on a
protect channel of a two-fiber, or four-fiber BLSR is supported. Connecting to an STS or VT PCA circuit
is also now supported.
Note
Test access on a PCA will be preempted when a BLSR switch takes place.
Test Access Intrusive modes (splta, spltb, loope, loopf, splte, spltf, spltef) are allowed on circuits that
are IS. The circuit state will be internally changed to OOS_MT during the period the connection is
maintained. Test Access will then remember and restore the original circuit state once the connection is
disabled via the DISC-TACC command or a session timeout.
Other New Commands Added
The following new command has been added for Release 4.0.x.
•
INIT-REG-G1000
Changes in TL1 Functionality Since Release 3.4
AID Formats
The STS/VT path AID formats for optical cards (OCn, EC1) have been changed to add the port number
between the slot number and the STS number. Format differences are as follows.
For STS AID formats:
•
Prior to Release 4.0.x, the optical card STS AID format is:
STS-SlotNumber-RealStsNumber
•
As of Release 4.0.x, the new format is:
STS-SlotNumber-PortNumber-RelativeStsNumber
For VT AID formats:
•
Prior to Release 4.0.x, the optical card VT AID format is:
VT1-SlotNumber-RealStsNumber-VtGroupNumber-RelativeVtNumber
•
As of Release 4.0.x, the new format is:
VT1-SlotNumber-PortNumber-RelativeStsNumber-VtGroupNumber-Relative
VtNumber
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
47
New Features and Functionality
Security Enhancements
Additional autonomous messages are reported via the REPT^EVT^SECU message in Release 4.0.x.
The new messages, available to Superusers only, are:
•
COND_SEC_ADMIN_LOCKOUT—an administrator has locked a userid (the userid cannot log
into the system, but has not been deleted)
•
COND_SEC_ADMIN_LOCKOUT_CLR—an administrator has unlocked a userid
•
COND_SEC_ADMINLOGOUT—an administrator has forcibly logged a user off
•
COND_SEC_LOGIN—a user has logged into the NE
•
COND_SEC_LOGINFAIL_LOCKOUT—a user has failed to log in because the userid is currently
locked out.
•
COND_SEC_LOGINFAIL_LOGGEDIN—a user has attempted to log in when the userid is already
logged in (available when the single user login option is turned on)
•
COND_SEC_LOGINFAIL_PSWD—a user login has failed because the provided password is
invalid
•
COND_SEC_LOGINFAIL_USER—a user login has failed because the provided userid is invalid
•
COND_SEC_LOGOUT—a user has logged out
•
COND_SEC_USER_LOCKOUT—a user has been locked out because of too many invalid login
attempts
Changes to Change Reporting
Change reporting in Release 4.0.x adds the following new support:
•
ED-SYNCN DB change report
•
Report Dbchg for ALW-USER-SECU
•
Report Dbchg for INH-USER-SECU
•
Report Dbchg for the provisioning commands supported in ML-Series and 8 port OC-3
New Conditions
The following new conditions have been added as of Release 4.0.x.
•
DATA-FAILURE, NO-CONFIG, ERROR-CONFIG for ML-Series cards
•
LPBKCRS
•
PWR-REDUN (TCC2)
•
LASEREOL (OC3-8)
•
AUD-LOG-LOW, AUD-LOG-LOSS (Audit Log event reported by “Rept Evt Com” command)
•
DBOSYNC, PWR-REDUN, RUNCFG-SAVENEED, TIM, WTR, FRNGSYNC, LOS, LOF,
RXLOCK, TXLOCK, AUTOLSROFF, SQUELCHED, CARLOSS, LOM, PTIM, MISSING,
MISMATCH, PORT-COMM-FAIL, and SECURITCODE
Minor Changes
The following minor changes have been made to TL1 commands for Release 4.0.x.
Release Notes for Cisco ONS 15454 Release 4.0.4
48
OL-7776-01
New Features and Functionality
•
ED-G1000—change FLOW to ON_OFF enum
•
OPR-SYNCNSW—change the parameter name from <syncsw> to <switchto>
•
OPR-PROTNSW ()
UCP Command Changes:
•
NBR (nbr-#) and CC (cc-#)—AID maximum value is changed from 23 to 16
•
ED-UCP-NBR—NUMRXTS has been removed from the input/output
•
ENT-UCP-NBR—the NAME field is now mandatory
•
ED/ENT-UCP-CC—the MTU valid data range of [0-65535] is now an enforced limit
•
ENT/ED/RTRV-UCP-IF—ADMSTATE has been removed from the command input/output
•
RTRV-<OCN_TYPE>—NBRIX output format is changed from [NBRIX=<tap>] to
[NBRIX=<nbrix>]
TL1 Syntax Changes Since Release 3.4
Command Syntax Changes
In the following section the Release 3.4 command is listed first, followed by the new Release 4.0.x
command.
ED-CRS-<STS_PATH> syntax changed:
ED-CRS-<STS_PATH>[:<TID>]:<src>,<dst>:<CTAG>::::<pst>,[<sst>];
ED-CRS-<STS_PATH>[:<TID>]:<src>,<dst>:<CTAG>[:::<dmode>=<drop>]:<pst>,[<sst>];
ED-CRS-VT1 syntax changed:
ED-CRS-VT1[:<TID>]:<src>,<dst>:<CTAG>::::<pst>,[<sst>];
ED-CRS-VT1[:<TID>]:<src>,<dst>:<CTAG>[:::<dmode>=<drop>]:<pst>,[<sst>];
ED-G1000 syntax changed:
ED-G1000[:<TID>]:<aid>:<CTAG>[:::MFS=<mfs>,][FLOW=<flow>,][SOAK=<soak>][:<pst>,][
<sst>];
ED-G1000[:<TID>]:<aid>:<CTAG>[:::MFS=<mfs>,][FLOW=<flow>][:<pst>,][<sst>];
ED-<STS_PATH> syntax changed:
ED-<STS_PATH>[:<TID>]:<aid>:<CTAG>[:::SFBER=<sfber>,][SDBER=<sdber>,][RVRTV=<rv
rtv>,][RVTM=<rvtm>,][SWPDIP=<swpdip>,][EXPTRC=<exptrc>,][TRC=<trc>,][TRCMODE=<
trcmode>,][TACC=<tacc>][:<pst>,][<sst>];
ED-<STS_PATH>[:<TID>]:<aid>:<CTAG>[:::SFBER=<sfber>,][SDBER=<sdber>,][RVRTV=<rv
rtv>,][RVTM=<rvtm>,][SWPDIP=<swpdip>,][HOLDOFFTIMER=<holdofftimer>,][EXPTRC=<e
xptrc>,][TRC=<trc>,][TRCMODE=<trcmode>,][TACC=<tacc>][:<pst>,][<sst>];
ED-VT1 syntax changed:
ED-VT1[:<TID>]:<aid>:<CTAG>[:::RVRTV=<rvrtv>,][RVTM=<rvtm>,][TACC=<tacc>][:<pst>,
][<sst>];
ED-VT1[:<TID>]:<aid>:<CTAG>[:::RVRTV=<rvrtv>,][RVTM=<rvtm>,][HOLDOFFTIMER=<h
oldofftimer>,][TACC=<tacc>][:<pst>,][<sst>];
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
49
New Features and Functionality
Response Changes of TL1 Commands
In the following section the Release 3.4 response is listed first and the new Release 4.0.x response is
listed second:
RTRV-ALM-ALL response changes:
[<aid>],[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,,,,:[<desc>],[<aiddet>]
[<aid>],[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,<ocrdat>,<ocrtm>,,:[<desc>],[<aiddet>]
RTRV-ALM-BITS response changes:
<aid>,[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,,,,:[<desc>],
<aid>,[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,[<ocrdat>],[<ocrtm>],,:[<desc>],
RTRV-ALM-ENV response changes:
<aid>:<ntfcncde>,<almtype>,,,[<desc>]
<aid>:<ntfcncde>,<almtype>,[<ocrdat>],[<ocrtm>],[<desc>]
RTRV-ALM-EQPT response changes:
[<aid>],[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,[<stringValue>],[<stringValue1>],,:[<desc>
],
[<aid>],[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,[<ocrdat>],[<ocrtm>],[<stringValue>],:[<de
sc>],
RTRV-ALM-RING response changes:
<aid>:<ntfcncde>,<condtype>,<srveff>,,,,:[<desc>],
<aid>:<ntfcncde>,<condtype>,<srveff>,[<ocrdat>],[<ocrtm>],,:[<desc>],
RTRV-ALM-SYNCN response changes:
<aid>,[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,,,,:[<desc>],
<aid>,[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,[<ocrdat>],[<ocrtm>],,:[<desc>],
RTRV-ALM-UCP response changes:
<aid>:<ntfcncde>,<condtype>,<srveff>,,,,:[<desc>],
<aid>:<ntfcncde>,<condtype>,<srveff>,[<ocrdat>],[<ocrtm>],,:[<desc>],
RTRV-ALM-VT1 response changes
<aid>,[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,[<stringValue>],[<stringValue1>],[<stringVal
ue2>],[<stringValue3>]:[<desc>],
<aid>,[<aidtype>]:<ntfcncde>,<condtype>,<srveff>,[<ocrdat>],[<ocrtm>],[<stringValue>],[<strin
gValue1>]:[<desc>],
RTRV-COND-ALL response changes:
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>]
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>]
RTRV-COND-BITS response changes:
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>]
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>]
RTRV-COND-ENV response changes:
<aid>:<ntfcncde>,<almtype>,,,,,,[<desc>]
Release Notes for Cisco ONS 15454 Release 4.0.4
50
OL-7776-01
New Features and Functionality
<aid>:<ntfcncde>,<almtype>,[<ocrdat>],[<ocrtm>],,,,[<desc>]
RTRV-COND-EQPT response changes:
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>]
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>]
RTRV-COND-RING response changes:
<aid>:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>],
<aid>:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>],
RTRV-COND-SYNCN response changes:
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>]
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>]
RTRV-COND-UCP response changes:
<aid>:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>],
<aid>:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>],
RTRV-COND-VT1 response changes:
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],,,,,[<desc>]
<aid>,[<aidtype>]:[<ntfcncde>],<typerep>,[<srveff>],[<ocrdat>],[<ocrtm>],,,[<desc>]
RTRV-EQPT response changes:
<aid>:<aidtype>,<equip>,[<role>],[<status>]:[<protid>],[<prtype>],[<rvrtv>],[<rvtm>],[<cardna
me>]:[<pst>],[<sst>]
<aid>:<aidtype>,<equip>,[<role>],[<status>]:[<protid>],[<prtype>],[<rvrtv>],[<rvtm>],[<cardna
me>],[<ioscfg>]:[<pst>],[<sst>]
RTRV-INV response changes:
<aid>,<aidtype>::[<pn>],[<hwrev>],[<fwrev>],[<sn>],[<clei>]
<aid>,<aidtype>::[<pn>],[<hwrev>],[<fwrev>],[<sn>],[<clei>],[<dwl=nwl in code>],[<twl1= wl1
in code>],[<twl2=wl2 in code>],[<twl3=wl3 in code>]
RTRV-NE-GEN response changes:
[<ipaddr>],[<ipmask>],[<defrtr>],[<iiopport>],[<ntp>],[<name>],[<swver>],[<load>],[<protswve
r>],[<protload>],[<defdesc>]
[<ipaddr>],[<ipmask>],[<defrtr>],[<iiopport>],[<ntp>],[<name>],[<swver>],[<load>],[<protswve
r>],[<protload>],[<defdesc>],[<platform>]
RTRV-PMSCHED-ALL response changes:
<aid>,[<aidtype>]:<reptinvl>,<reptdat>,<repttm>,[<numinvl>],[<montype>],[<monlev>],<locn>,[
<dirn>],[<tmper>],[<inhmode>]
<aid>,[<aidtype>]:<reptinvl>,<reptdat>,<repttm>,[<numinvl>],[<montype>],[<monlev>],<locn>,[
<dirn>],[<tmper>],<tmofst>,[<inhmode>]
RTRV-PMSCHED-<MOD2> response changes:
<aid>,[<aidtype>]:<reptinvl>,<reptdat>,<repttm>,[<numinvl>],[<montype>],[<monlev>],<locn>,[
<dirn>],[<tmper>],[<inhmode>]
<aid>,[<aidtype>]:<reptinvl>,<reptdat>,<repttm>,[<numinvl>],[<montype>],[<monlev>],<locn>,[
<dirn>],[<tmper>],<tmofst>,[<inhmode>]
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
51
New Features and Functionality
RTRV-<STS_PATH> syntax changed:
RTRV-<STS_PATH>[:<TID>]:<aid>:<CTAG>[::::];
RTRV-<STS_PATH>[:<TID>]:<aid>:<CTAG>[:::BLSRPTHTYPE=<blsrpthtype>][:];
RTRV-<STS_PATH> response changes:
<aid>::[<level>],[<sfber>],[<sdber>],[<rvrtv>],[<rvtm>],[<swpdip>],[<exptrc>],[<trc>],[<inctrc>
],[<trcmode>],[<tacc>]:[<pst>],[<sst>]
<aid>::[<level>],[<sfber>],[<sdber>],[<rvrtv>],[<rvtm>],[<swpdip>],[<holdofftimer>],[<exptrc>]
,[<trc>],[<inctrc>],[<trcmode>],[<tacc>],[<upsrpthstate>],[<c2>],[<blsrpthstate>]:[<pst>],[<sst>]
RTRV-VT1 response changes:
<aid>::[<rvrtv>],[<rvtm>],[<tacc>]:[<pst>],[<sst>]
<aid>::[<rvrtv>],[<rvtm>],[<holdofftimer>],[<tacc>],[<upsrpthstate>]:[<pst>],[<sst>]
SCHED-PMREPT-<MOD2> syntax changed:
SCHED-PMREPT-DS1[:<TID>]:<aid>:<CTAG>[::<reptinvl>,][<reptstatm>,][<numrept>],,[<mon
lev>,][<locn>],,[<tmper>][,];
SCHED-PMREPT-DS1[:<TID>]:<aid>:<CTAG>[::<reptinvl>,][<reptstatm>,][<numrept>],,[<mon
lev>,][<locn>],,[<tmper>,][<tmofst>];
ENUM Changes to TL1 Since Release 3.4
ENUM Value Changes for Existing Commands
ENUM Value Changes for ENT-CRS-<STS_PATH>, ENT-CRS-VT1, RTRV-CRS, RTRV-CRS-<STS_PATH>, and RTV-CRS-VT1
The CCT enum has added the following item in Release 4.0.x:
•
2WAYDC
ENUM Value Changes for RTRV-CRS
The CRS_TYPE enum has added the following 8 items in Release 4.0.x:
•
STS1
•
STS3C
•
STS6C
•
STS9C
•
STS12C
•
STS24C
•
STS48C
•
STS192C
ENUM Value Changes for ED-T3 and RTRV-T3
The DS_LINE_TYPE enum has changed the following 2 items for Release 4.0.x:
M23— has been dropped from this enum table
Release Notes for Cisco ONS 15454 Release 4.0.4
52
OL-7776-01
New Features and Functionality
M13—has been added to this enum table
ENUM Value Changes for RTRV-PM-<MOD2>, RTRV-PM-VT1, RTRV-TH-<MOD2>, RTRV-TH-VT1, and SET-TH-<MOD2>
ALL_MONTYPE enums have added the following 83 items in Release 4.0.x:
•
BBEHP
•
BBELP
•
BBELR
•
BBEM
•
BBEP
•
BBEPR
•
BBER
•
BBESR
•
BBEV
•
BBER-PM
•
BBER-SM
•
BBER-TCM1
•
BBER-TCM2
•
BBE-PM
•
BBE-SM
•
BBE-TCM1
•
BBE-TCM2
•
BIEC
•
BPC
•
BYEC
•
CSS
•
CSSP
•
CSS-P-FE
•
DCG
•
EBL
•
EBP
•
ESAP
•
ESBP
•
ESLR
•
ESR-PM
•
ESR-SM
•
ESR-TCM1
•
ESR-TCM2
•
ES-PM
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
53
New Features and Functionality
•
ES-SM
•
ES-TCM1
•
ES-TCM2
•
FC-PM
•
FC-SM
•
FC-TCM1
•
FC-TCM2
•
GAIN-AVG
•
GAIN-MAX
•
GAIN-MIN
•
GPC
•
IOS
•
LAT-AVG
•
LAT-HIGH
•
LAT-LOW
•
LAT-MAX
•
LAT-MIN
•
LBCL-AVG
•
LBCL-HIGH
•
LBCL-LOW
•
LBCL-MAX
•
LBCL-MIN
•
NIOS
•
OBED
•
OPR-AVG
•
OPR-HIGH
•
OPR-LOW
•
OPR-MAX
•
OPR-MIN
•
OPT-AVG
•
OPT-HIGH
•
OPT-LOW
•
OPT-MAX
•
OPT-MIN
•
PJ-DET
•
PJ-DIF
•
PJ-GEN
•
PSC-R
Release Notes for Cisco ONS 15454 Release 4.0.4
54
OL-7776-01
New Features and Functionality
•
PSC-S
•
PSC-W
•
PSD-R
•
PSC-S
•
PSC-W
•
PWR-AVG
•
PWR-MAX
•
PWR-MIN
•
RX-TEMP-MAX
•
SEFSP
•
SESL
•
SESR
•
SESR-PM
•
SESR-SM
•
SESR-TCM1
•
SESR-TCM2
•
SES-PM
•
SES-SM
•
SES-TCM1
•
SES-TCM2
•
UAS-PM
•
UAS-SM
•
UAS-TCM1
•
UAS-TCM2
•
UCW
•
VOA-MAX
•
VOA-MIN
•
XCVR-AVG
•
XCVR-HIGH
•
XCVR-LOW
•
XCVR-MAX
•
XCVR-MIN
•
ZBED
ENUM Value Changes for REPT^EVT
The ALL_THR enum has added the following 46 items in Release 4.0.x:
•
T-BBEL
•
T-BBER
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
55
New Features and Functionality
•
T-BBE-PM
•
T-BBE-SM
•
T-BBE-TCM1
•
T-BBE-TCM2
•
T-BEEP
•
T-BIEC
•
T-BPC
•
T-BYEC
•
T-CSSP
•
T-DCG
•
T-ESAP
•
T-ESBP
•
T-ESLR
•
T-ES-PM
•
T-ESR
•
T-ES-SM
•
T-ES-TCM1
•
T-ES-TCM2
•
T-FC-PM
•
T-FC-SM
•
T-FC-TCM1
•
T-FC-TCM2
•
T-GPC
•
T-IOS
•
T-NIOS
•
T-OBED
•
T-SEFSP
•
T-SES-PM
•
T-SESR
•
T-SES-SM
•
T-SES-TCM1
•
T-SES-TCM2
•
T-LAT-HWT
•
T-LAT-LWT
•
T-LBCL-HWT
•
T-LBCL-LWT
•
T-OPR-HWT
•
T-OPR-LWT
Release Notes for Cisco ONS 15454 Release 4.0.4
56
OL-7776-01
New Features and Functionality
•
T-OPT-HWT
•
T-OPT-LWT
•
T-XCVRV-HWT
•
T-XCVRV-LWT
•
T-UAS-PM
•
T-UAS-SM
•
T-UAS-TCM1
•
T-UAS-TCM2
•
T-UCW
•
T-ZBED
The ALM_THR enum has added the following 9 items in Release 4.0.x:
•
LAT-HIGH
•
LAT-LOW
•
LBCL-HIGH
•
LBCL-LOW
•
OPR-HIGH
•
OPR-LOW
•
OPT-HIGH
•
XCVR-HIGH
•
XCVR-LOW
ENUM Value Changes for ENT-EQPT
The EQUIPMENT_TYPE enum has added the following 22 items in Release 4.0.x:
•
DS3I
•
DS3IN
•
E1
•
E1N
•
E1-42
•
E1N-42
•
E3
•
ML1000-1
•
ML1000-2
•
ML100T-8
•
ML100T-12
•
MUX-32
•
OC3-8
•
OPT-BST
•
OPT-PRE
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
57
New Features and Functionality
•
OSCM
•
OSC-CSM
•
XCVXL
•
XCVXL25G
ENUM Value Changes for RTRV-G1000
Note
These changes also apply to RTRV-FSTE, and RTRV-GIGE, both new commands.
The FLOW enum has added the following 2 items in Release 4.0.x:
•
ASYMMETRIC_LOCAL
•
SYMMETRIC
ENUM Value Changes for OPR-LPBK-<MOD2> and RLS-LPBK-<MOD2>
Note
The CLNT, OCH, OMS, OTS are new modifiers in Release 4.0.x.
The LPBK_TYPE enum has added the following item in Release 4.0.x:
•
CRS
ENUM Value Changes for OPR-LPBK-<MOD2>, RLS-LPBK-<MOD2>, RTRV-PM-<MOD2>, RTRV-PMSCHED-ALL,
RTRV-PMSCHED-<MOD2>, RTRV-TH-<MOD2>, and SET-TH-<MOD2>
The MOD2 enum has added the following 4 items in Release 4.0.x:
•
CLNT
•
OCH
•
OMS
•
OTS
ENUM Value Changes for RTRV-ALM-<MOD2ALM> and RTRV-COND-<MOD2ALM>
The MOD2ALM enum has added the following 7 items in Release 4.0.x:
•
CLNT
•
FSTE
•
GIGE
•
OCH
•
OMS
•
OTS
•
POS
ENUM Value Changes for ED-BITS, RTRV-BITS and RTRV-SYNCN
The SYNC_CLOCK_REG_QUALITY_LEVEL enum has added the following 7 items in Release 4.0.x:
Release Notes for Cisco ONS 15454 Release 4.0.4
58
OL-7776-01
New Features and Functionality
•
G811
•
G812L
•
G812T
•
SETS
ENUM Value Changes for ED-NE-SYNCN and RTRV-NE-SYNCN
The SYNC_CLOCK_LEVEL enum has added the following 7 items in Release 4.0.x:
ABOVE-G811
ABOVE-G12L
ABOVE-G12T
ABOVE-SETS
BELOW-SETS
Enum Table Changes for Existing TL1 Commands Since Release 3.4
ENUM Value Changes for RTRV-<STS_PATH>
The BLSR_PTH_STATE enum type has been added into the RTRV-<STS_PATH> command output
format with the following 5 items in Release 4.0.x:
•
PCAPTHACT
•
PCAPTHSTB
•
PROTPTHACT
•
WKGPTHACT
•
WKGPTHSTB
ENUM Value Changes for RTRV-<STS_PATH>
The BLSR_PTH_TYPE enum has been added into the RTRV-<STS_PATH> command input syntax with
the following 2 items in Release 4.0.x:
•
NON-PCA
•
PCA
The DIRN enum has been dropped in Release 4.0.x. DIRN is UNUSED in any command.
The DS3_FMT enum has been dropped in Release 4.0.x. DS3_FMT is UNUSED in any command.
The ENV_CRTL_MODE enum has been dropped in Release 4.0.x. ENV_CRTL_MODE is UNUSED in
any command.
The EXT_RING enum has been dropped in Release 4.0.x. EXT_RING is UNUSED in any command.
The MODIFIER enum has been dropped in Release 4.0.x. MODIFIER is UNUSED in any command.
ENUM Value Changes for REPT^RMV^<MOD_IO> and REPT^RST^<MOD_IO>
The MOD2_IO enum has added the following 4 items in Release 4.0.x:
•
CLNT
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
59
New Features and Functionality
•
OCH
•
OMS
•
OTS
The STM_TYPE enum has been dropped in Release 4.0.x. STM_TYPE is UNUSED in any command.
The TMG_REF enum has been dropped in Release 4.0.x. TMG_REG is UNUSED in any command.
The USE_DST enum has been dropped in Release 4.0.x. USE_DST is UNUSED in any command.
Enum Changes For New Commands in Release 4.0.x
ENUM Value Changes for ED-CLNT, ED-OCH, RTRV-CLNT, and RTRV-OCH
The ALS_MODE enum type has added the following 4 items in Release 4.0.x:
•
AUTO
•
DISABLED
•
MAN
•
MAN-RESTART
ENUM Value Changes for ED-CLNT, ED-OCH, RTRV-CLNT, and RTRV-OCH
The COMM_TYPE enum has added the following 3 items in Release 4.0.x:
•
DCC
•
GCC
•
NONE
ENUM Value Changes for INIT-REG-OTS and INIT-REG-VT1
The EQPT_TYPE enum has added the following 38 items in Release 4.0.x:
•
CRFT-TMG
•
DS3I
•
DS3IN
•
E1
•
E1N
•
E1-42
•
E1N-42
•
E3
•
FMEC-SMZ-E1
•
FMEC-SMZ-E3
•
ML1000-1
•
ML1000-2
•
ML100T-8
•
ML100T-12
Release Notes for Cisco ONS 15454 Release 4.0.4
60
OL-7776-01
New Features and Functionality
•
MUX-32
•
OC192-SR-1
•
OC3-8
•
XCVXL
•
XCVXL25G
ENUM Value Changes for RTRV-FSTE and RTRV-GIGE
The ETHER_DUPLEX enum has added the following 3 items in Release 4.0.x:
•
AUTO
•
FULL
•
HALF
ENUM Value Changes for RTRV-FSTE and RTRV-GIGE
The ETHER_SPEED enum has added the following 5 items in Release 4.0.x:
•
10_MBPS
•
100_MBPS
•
1_GBPS
•
10_GBPS
•
AUTO
ENUM Value Changes for RTRV-FSTE, RTRV-G1000, and RTRV-GIGE
The FLOW enum has added the following 4 items in Release 4.0.x:
•
ASYMMETRIC
•
ASYMMETRIC_LOCAL
•
NONE
•
SYMMETRIC
ENUM Value Changes for ED-OCH and RTRV-OCH
The GCCRATE enum has been added the following 2 items in Release 4.0.x:
•
192K
•
576K
ENUM Value Changes for ED-DWDM, ED-OCH, RTRV-DWDM, and RTRV-OCH
The OPTICAL_WLEN enum has been added the following 33 items in Release 4.0.x:
•
1530.33
•
1531.12
•
1531.90
•
1532.68
•
1534.25
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
61
New Features and Functionality
•
1535.04
•
1535.82
•
1536.61
•
1538.19
•
1538.98
•
1539.77
•
1540.56
•
1542.14
•
1542.94
•
1543.73
•
1544.53
•
1546.12
•
1546.92
•
1547.72
•
1548.51
•
1550.12
•
1550.92
•
1551.72
•
1552.52
•
1554.13
•
1554.94
•
1555.75
•
1556.55
•
1558.17
•
1558.98
•
1559.79
•
1560.61
•
USE_DEFAULT
ENUM Value Changes for RTRV-GIGE, RTRV-G1000
The OPTICS enum has added the following 4 items in Release 4.0.x:
•
IR
•
LR
•
SR
•
VLR
ENUM Value Changes for ENT-FFP-CLNT and RTRV-FFP-CLNT
The PROTTYPE enum has added the following item in Release 4.0.x:
Release Notes for Cisco ONS 15454 Release 4.0.4
62
OL-7776-01
New Features and Functionality
•
Y-CABLE
ENUM Value Changes for ED-OCH and RTRV-OCH
The RDIRN_MODE enum has added the following 2 items in Release 4.0.x:
•
E-W
•
W-E
ENUM Value Changes for COPY-RFILE
The RFILE enum has added the following 2 items in Release 4.0.x:
•
RFILE-DB
•
RFILE-PKG
ENUM Value Changes for ED-DWDM and RTRV-DWDM
The TERM_MODE enum has added the following 3 items in Release 4.0.x:
•
LINE
•
SEC
•
TRANS
ENUM Value Changes for ED-TRC-OCH and RTRV-TRC-CLNT
The TRCFORMAT enum has added the following 3 items in Release 4.0.x:
•
1-BYTE
•
16-BYTE
•
64-BYTE
ENUM Value Changes for ED-TRC-CLNT, ED-TRC-OCH, RTRV-TRC-CLNT, and RTRV-TRC-OCH
The TRCLEVEL enum has added the following 5 items in Release 4.0.x:
•
J0-SEC
•
PATH
•
SEC
•
TCM1
•
TCM2
ENUM Value Changes for RTRV-FSTE, RTRV-GIGE, and RTRV-POS
The UP_DOWN enum has added the following 2 items in Release 4.0.x:
•
DOWN
•
UP
ENUM Value Changes for ED-OCH and RTRV-OCH
The VOA_STATE enum has added the following 2 items in Release 4.0.x:
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
63
Related Documentation
•
NORMAL
•
SHUTDOWN
Related Documentation
Release-Specific Documents
•
Release Notes for the Cisco ONS 15454, Release 4.0.1
•
Release Notes for the Cisco ONS 15454 SDH, Release 4.0.1
•
Release Notes for the Cisco ONS 15327, Release 4.0.1
•
Cisco ONS 15454 Software Upgrade Guide, Release 4.0
Platform-Specific Documents
•
Cisco ONS 15454 Procedure Guide, Release 4.0
•
Cisco ONS 15454 Reference Guide, Release 4.0
•
Cisco ONS 15454 Troubleshooting Guide, Release 4.0
•
Cisco ONS 15454 and Cisco ONS 15327 TL1 Command Guide, Release 4.0
•
Cisco ONS 15454 Product Overview, Release 4.0
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml
Release Notes for Cisco ONS 15454 Release 4.0.4
64
OL-7776-01
Documentation Feedback
Documentation DVD
Cisco documentation and additional literature are available in a Documentation DVD package, which
may have shipped with your product. The Documentation DVD is updated regularly and may be more
current than printed documentation. The Documentation DVD package is available as a single unit.
Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product
number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:
•
Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from
the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
•
Nonregistered Cisco.com users can order documentation through a local account representative by
calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in
North America, by calling 1 800 553-NETS (6387).
Documentation Feedback
You can send comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you can perform these tasks:
•
Report security vulnerabilities in Cisco products.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
65
Obtaining Technical Assistance
•
Obtain assistance with security incidents that involve Cisco products.
•
Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you can access a Product
Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Reporting Security Problems in Cisco Products
Cisco is committed to delivering secure products. We test our products internally before we release them,
and we strive to correct all vulnerabilities quickly. If you think that you might have identified a
vulnerability in a Cisco product, contact PSIRT:
Tip
•
Emergencies — security-alert@cisco.com
•
Nonemergencies — psirt@cisco.com
We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive
information that you send to Cisco. PSIRT can work from encrypted information that is compatible with
PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one that has the most recent creation date in this public key server list:
http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com&op=index&exact=on
In an emergency, you can also reach PSIRT by telephone:
•
1 877 228-7302
•
1 408 525-6532
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco
Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical
Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical
Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service
contract, contact your reseller.
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for troubleshooting and
resolving technical issues with Cisco products and technologies. The website is available 24 hours a day,
365 days a year, at this URL:
http://www.cisco.com/techsupport
Release Notes for Cisco ONS 15454 Release 4.0.4
66
OL-7776-01
Obtaining Technical Assistance
Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password.
If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Note
Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting
a web or phone request for service. You can access the CPI tool from the Cisco Technical Support
Website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product
Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product
Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID
or model name; by tree view; or for certain products, by copying and pasting show command output.
Search results show an illustration of your product with the serial number label location highlighted.
Locate the serial number label on your product and record the information before placing a service call.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3
and S4 service requests are those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service Request Tool provides
recommended solutions. If your issue is not resolved using the recommended resources, your service
request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down or severely degraded.)
Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity
definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You
and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your
business operation are negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
67
Obtaining Additional Publications and Information
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
•
Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit
Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
•
Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com
•
Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and
networking investments. Each quarter, Packet delivers coverage of the latest industry trends,
technology breakthroughs, and Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet magazine at
this URL:
http://www.cisco.com/packet
•
iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies
learn how they can use technology to increase revenue, streamline their business, and expand
services. The publication identifies the challenges facing these companies and the technologies to
help solve them, using real-world case studies and business strategies to help readers make sound
technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
•
Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
•
World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
Release Notes for Cisco ONS 15454 Release 4.0.4
68
OL-7776-01
Obtaining Additional Publications and Information
This document is to be used in conjunction with the documents listed in the “Related Documentation” section.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work,
Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP,
CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital,
the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink,
Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo,
Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet,
The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the
United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0601R)
Copyright © 2005 Cisco Systems, Inc. All rights reserved.
Release Notes for Cisco ONS 15454 Release 4.0.4
OL-7776-01
69
Obtaining Additional Publications and Information
Release Notes for Cisco ONS 15454 Release 4.0.4
70
OL-7776-01
Download