operation 400
TRANSCRIPT
-
8/11/2019 Operation 400
1/479
Operation NWD-115476-03E
- 1 -
iPASOLINK 400
SECTION II OPERATION
CONTENTS
DOCUMENT WARRANTY.....................................................................................................- 5 -1. Gett ing Started .............................................................................................................1-1
1.1 Conventions Used in This Manual ...................................................... .................................... 1-1
1.2 LCT Communication Interface ...................................................... .......................................... 1-1
1.2.1 Communications................................. ............................................................ .................1-1
1.2.2 Local Port Interface ..................................................... .................................................... 1-2
1.3 Equipment Configuration of iPASOLINK...................................................................... ........... 1-2
2. Instal lat ion of LCT .......................................................................................................2-1
2.1 Hardware Requirements...... ........................................................ ........................................... 2-1
2.2 Software Requirements .................................................... ...................................................... 2-2
2.3 OS Environment for Windows......................... ................................................................ ........2-22.3.1 Confirming Internet Explorer...................................................... ...................................... 2-2
2.3.2 Confirming and Setting TCP/IP ......................................................... .............................. 2-3
2.4 Recommended Browser Settings ............................................................ ............................... 2-4
2.4.1 Internet Explorer 8................................................ ........................................................... 2-4
2.4.2 Firefox 3.6.x................................. ............................................................ ........................ 2-8
3. System Conf iguration .................................................................................................3-1
3.1 General............................................................... .................................................................... 3-1
3.2 System Configuration ............................................... .............................................................. 3-2
3.3 System Overview....................... ............................................................ ................................. 3-5
3.3.1 IDU Block Diagram......................................................... ................................................. 3-6
3.3.2 ODU Block Diagram..................................................... ................................................... 3-6
3.4 Interfaces........................................................ ........................................................................ 3-7
3.4.1 Baseband Interface ..................................................... .................................................... 3-7
3.4.1.1 E1 Interface [MC-A4 Card]........................ ............................................................ .3-7
3.4.1.2 E1 Interface [Universal Card]................................................... .............................. 3-7
3.4.1.3 LAN Interface 2xGbE(ETH 3,4) (SFP) [MC-A4 Card] ............................................ 3-8
3.4.1.4 LAN Interface 2xETH(RJ-45) [MC-A4 Card] .......................................................... 3-8
3.4.1.5 LAN Interface 4xGbE(2xSFP+2xRJ-45) [Universal slot] ........................................ 3-8
3.4.1.6 STM-1 interface [Universal slot] ....................................................... ...................... 3-9
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
2/479
NWD-115476-03E Operation
- 2 -
3.4.2 ODU Interface ........................................................ ......................................................... 3-9
3.4.2.1 ODU Interface........................................................ ................................................ 3-9
3.4.3 LCT /NMS Interface................................. ............................................................ ............3-9
3.4.3.1 LCT Interface [MC-A4 Card] .................................................... .............................. 3-9
3.4.3.2 NMS Interface [MC-A4 Card] ................................................... .............................. 3-9
3.4.4 Functional card........................................................ ...................................................... 3-10
3.4.4.3 AUX interface [Universal slot] .................................................... .......................... 3-10
3.4.4.4 Multi Service Engine [Universal slot]........................................................ ............ 3-10
3.4.5 Other Interfaces.......................................... ....................................................... ............3-10
3.4.5.1 ALM/SC/CLK Interface..................................... .................................................... 3-10
3.4.5.2 USB Memory Interface............................ ............................................................. 3-10
3.4.5.3 Power supply ........................................................... ............................................ 3-11
3.5 IDU (Indoor Unit) and System performance......................................... ................................. 3-11
3.5.1 General ......................................................... ....................................................... 3-11
3.5.2 IDU Performance ......................................................... ........................................ 3-11
4. NE Setup .......................................................................................................................4-1
4.1 Login, Logout and Exit .......................................................... .................................................. 4-1
4.1.1 Log In to NE ................................................... ................................................................. 4-1
4.1.2 Log Out from NE ......................................................... .................................................... 4-4
4.1.3 Exit WebLCT .......................................................... ......................................................... 4-5
4.2 WebLCT Main Window.................................................... ....................................................... 4-6
4.3 User Management (Security Management) ............................................................... ............. 4-9
4.3.1 User Access Levels .......................................................... ............................................. 4-10
4.3.2 Default User Account .................................................. .................................................... 4-1
4.3.3 User Account........................................................ ......................................................... 4-13
4.3.3.1 Login User List ....................................................... .............................................. 4-14
4.3.3.2 User Authentication Configuration ........................................................ ............... 4-14
4.3.3.3 User Account Management............................................................. ..................... 4-20
4.3.3.4 User Group Profile Configuration..................................................... .................... 4-32
4.3.4 Security Management ............................................................. ...................................... 4-39
4.3.4.1 Service Status Setting.......................................... ................................................ 4-48
4.3.4.2 SNMP .................................................... ........................................................... ... 4-50
4.3.4.3 SNMP Community ................................................................ ............................... 4-52
4.3.4.4 SNMP Trap Entry....................... ................................................................ .......... 4-59
4.3.4.5 NTP................................................ ............................................................ ..........4-68
4.3.4.6 NTP Server Address ............................................................ ................................ 4-70
4.3.4.7 FTP........................................................ .............................................................. 4-76
4.3.4.7 SFTP................................................. ........................................................... ........4-78
4.3.4.8 HTTP ......................................................... .......................................................... 4-81
4.3.4.8 HTTPS....................................................... .......................................................... 4-83
4.3.4.9 RADIUS Setting ......................................................... .......................................... 4-85
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
3/479
-
8/11/2019 Operation 400
4/479
NWD-115476-03E Operation
- 4 -/END
5.1.3.3 Cross Connect Setting ........................................................... ............................ 5-185
5.1.4 PWE Setting....................................................... ......................................................... 5-198
5.1.4.1 PWE Setting....................................................... ................................................ 5-198
5.1.5 Equipment Clock / Synchronization Setting............... .................................................. 5-212
5.1.5.1 Equipment Clock Setting.................................. .................................................. 5-212
5.1.5.2 EXT Clock Setting................................................................ .............................. 5-218
5.1.6 Relay Alarm Mapping Setting........................................................ .............................. 5-222
5.1.6.1 Relay Control Setting ........................................................... .............................. 5-222
5.1.7 V.11/OW Setting...................................... ............................................................ ........5-226
5.1.7.1 V.11/SC Setting ........................................................ ......................................... 5-226
5.1.7.2 V.11 Directional Setting ...................................................... ............................... 5-234
5.1.7.3 OW Setting...................................................................... ................................... 5-236
5.1.8 Alarm/AIS Setting ..................................................... ................................................... 5-239
5.1.8.1 Correlation Setting .............................................................. ............................... 5-240
5.1.8.2 Alarm Severity Setting ........................................................ ............................... 5-242
5.1.8.3 AIS Setting........................................................... .............................................. 5-244
5.1.8.4 BER Threshold Setting ....................................................... ............................... 5-246
5.1.9 PMON/RMON Setting ....................................................... .......................................... 5-250
5.1.9.1 PMON Threshold Setting .............................................................. ..................... 5-250
5.1.9.2 PMON Other ........................................................... ........................................... 5-260
5.1.9.3 RMON Threshold Setting.............................................................. ..................... 5-262
5.1.9.4 RMON Other ........................................................... ........................................... 5-265
5.1.10 AUX Setting........................................................... ...................................................... 5-269
5.1.10.1 AUX Input Setting ............................................................... ............................... 5-269
5.1.10.2 AUX Output Setting.................................................. .......................................... 5-272
6. Abbreviations ...............................................................................................................6-1
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
5/479
DOCUMENT WARRANTY
Operation NWD-115476-03E
- 5 -
DOCUMENT WARRANTY
1. The information contained in this manual are subject to change without prior
notice.
2. The LCT screen figures in this manual are only examples. Screens will vary
according to equipment configurations, equipment operation modes, setting
parameters, LCT application program version, etc. Screens contained in this
manual are current at the moment of publishing; however, they may differ
slightly from the actual screens on your LCT.
3. This manual is written on the assumption that you already understand the
restrictions, limitations, and precautions necessary to operate the equipment
properly. Refer to the equipment manual for details.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
6/479
DOCUMENT WARRANTY
NWD-115476-03E Operation
- 6 -/END
This page is intentionally left blank.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
7/479
Getting Started
Operation NWD-115476-03E
1-1
1. GETTING STARTED
1.1 Conventions Used in This Manual
Table 1-1 Conventions Used in This Manual
Style What Represents Example
Italic For manual titles or related document names. Refer to iPASOLINK Operation
Manualfor details.
Bold Items and buttons on the user interface. Itemon the computer display. File and directory
names. Menus and items.
The Overall window
Arrow A menu name and then the item. Select System-> Login/Logout
A command variable where the user must
make the appropriate entry. This is also
commonly used when asking for a password.
Capitalized key Key name on the keyboard. Press Enter key
1.2 LCT Communication Interface
1.2.1 Communications
The local craft terminal (LCT) is a useful tool to the installation and maintenance.
iPASOLINK provides users GUI environment through WEB browser. Moreover, this
tool supports remote connection.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
8/479
Getting Started
NWD-115476-03E Operation
1-2/END
1.2.2 Local Port Interface
The LCT Port is located on the front of the equipment.
Figure 1-1 LCT Port Interface
Use LAN Cable connected to the LCT Port at the front of the equipment.
The LCT port specifications are as follows:
10/100BASE-TX, Cable Type: RJ45
1.3 Equipment Configuration of iPASOLINK
The following configurations are available on a single iPASOLINK 400 IDU:
4-Way Nodal (Non-protected (1+0))
Protected (1+1) with hot standby / space diversity / twin path with hitless switch
One IDU 1+0 / 1+1 XPIC, Two IDU 1+0 / 1+1 XPIC
Back-to-back configuration ((1+0) x 2)
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
9/479
Installation of LCT
Operation NWD-115476-03E
2-1
2. INSTALLATION OF LCT
2.1 Hardware Requirements
* Windows XP
Item Required Recommend
CPU Pentium M 1.6 GHz
RAM 512 MB
HDD 40 GB
Display Color LCD (1024 x 768)
LAN Port 10/100BASE-T(X)
USB Port
* Windows Vista
Item Required Recommend
CPU Intel Core2 Duo 1.6 GHz
RAM 1 GB
HDD 40 GB
Display Color LCD (1024 x 768)
LAN Port 10/100BASE-T(X)
USB Port
* Windows 7
Item Required Recommend
CPU Intel Core2 Duo 1.6 GHz
RAM 1 GB
HDD 40 GB
Display Color LCD (1024 x 768)
LAN Port 10/100BASE-T(X)
USB Port
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
10/479
Installation of LCT
NWD-115476-03E Operation
2-2
2.2 Software Requirements
OS: Windows XP (English version), Windows Vista (English version), Windows7
(English version)
Browser: Internet Explorer 8, Internet Explorer 7, Firefox3.6, or higher
2.3 OS Environment for Windows
Check if the following configurations have been done on your PC. If not, perform the
following procedures to configure your PC.
Internet explorer is installed.
TCP/IP Protocol settings are set appropriately.
2.3.1 Confirming Internet Explorer
Confirm the Internet Explorer is installed on the LCT computer.
SelectStart-> Program-> Internet Explorer.
Figure 2-1 Windows Start Menu Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
11/479
Installation of LCT
Operation NWD-115476-03E
2-3
2.3.2 Confirming and Sett ing TCP/IP
The IP address of the LCT computer will be detected automatically from DHCP
server of NE side.
Setup the IP address to be detected automatically.
1. Log on the Windows OS as Administrator.
2. Select
Start -> Settings -> Control Panel from the Start menu of the
Windows.
3. The Control Panel window appears. Double-click the Network
Connectionsicon in the Control Panelwindow.
4. The Network Connectionswindow appears. Double-click the Local Area
Connection icon, then click Propertiesbutton.
5. The Local Area Connection Properties window appears. Select Internet
Protocol (TCP/IP), then click Propertiesbutton.
6. The Internet Protocol (TCP/IP) Properties box appears. Confirm that the
following parameters are set:
The Obtain an IP address automaticallyradio button is selected.
The Obtain DNS server address automaticallyradio button is selected.
Figure 2-2 Internet Protocol (TCP/IP) Propert ies Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
12/479
Installation of LCT
NWD-115476-03E Operation
2-4
7. Click OKbutton of the Internet Protocol (TCP/IP) Propertieswindow.
8. The Local Area Connection Properties window reappears. Click OKbutton of the Local Area Connection Propertieswindow.
9. The Network Connectionswindow reappears. Close this window.
2.4 Recommended Browser Settings
Following is the recommended settings for the most popular browsers.
2.4.1 Internet Explorer 8Tabbed browsing option is recommended.
1. SelectTools -> Internet Options -> General from the Tool Barmenu of
the Internet Explorer 8.
2. Click Settingsbutton of Tabs.
Figure 2-3 Internet Options Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
13/479
Installation of LCT
Operation NWD-115476-03E
2-5
3. The Tabbed Browsing Setting Properties box appears. Select Always
open pop-ups in a new tab radio button, then click OKbutton.
Figure 2-4 Tabbed Browsing Setting Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
14/479
Installation of LCT
NWD-115476-03E Operation
2-6
Security Setting is recommended.
1. Select
Tools -> Internet Options-> Security tabfrom the Tool Barmenu
of the Internet Explorer 8.
2. Click
Custom levelbutton of Security level for this zone.
Figure 2-5 Internet Options Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
15/479
Installation of LCT
Operation NWD-115476-03E
2-7
3. The Security Settings Internet Zone box appears. Select Downloads
"Automatic prompting for file downloads": Enable radio button, thenclick OKbutton.
Figure 2-6 Security Settings Internet Zone Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
16/479
Installation of LCT
NWD-115476-03E Operation
2-8/END
2.4.2 Firefox 3.6.x
1. Select
Tools -> Options from the Tool Barmenu of the Firefox.
2. The Options box appears. Select Always ask me where to save fi les
radio button, then click OKbutton.
Figure 2-7 Options Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
17/479
-
8/11/2019 Operation 400
18/479
System Configuration
NWD-115476-03E Operation
3-2
3.2 System Configuration
The system consists of the MDP-400MB-1AA Modulator-Demodulator (Indoor Unit
(IDU)) and TRP-( )G-1/1D Transmitter-Receiver (Outdoor Unit (ODU)), Hybrid
Combiner/Divider and the antenna.
Note: The Combiner/Divider is used in (1+1) single antenna configuration for
antenna direct mount type ODUs.
IDU with Antenna Direct Connection
IDU HS/ HS with Antenna Direct Connection
IDU HS/ Hybrid SD with Antenna Direct Connection
IDU Twin-path FD with Antenna Direct Connection
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
19/479
-
8/11/2019 Operation 400
20/479
System Configuration
NWD-115476-03E Operation
3-4
1+0 XPIC with Antenna Direct Connection
1+1 XPIC with Waveguide/Coaxial Cable Connection
2U 1+1 XPIC with Waveguide/Coaxial Cable Connection
HYB
MD
MD
ODU
ODUIF Cable
IF Cable
IDU
DATA
IN/OUT HYB
V(H)
H(V)
f1f1
f1
f1
f1f1
f1
f1
HYB
MD
MD
ODU
ODUIF Cable
IF Cable
IDU
DATAIN/OUTHYB
H(V)
V(H)
XIF Cable XIF CableXIF Cable
XIF Cable
V(H)
H(V)
f1f1
f1
f1
f1f1
f1
f1
H(V)
V(H)
DATAIN/OUT
ODU
ODU
IF Cable
HYB
HYB
MD
MD
IDU
ODU
ODUIF Cable
HYB
MD
MD
XIF Cable
DATA
IN/OUT
ODU
ODU
IF Cable
HYB
HYB
MD
MD
IDU
ODU
ODUIF Cable
HYB
MD
MD
XIF Cable
DATA
IN/OUT
ODU
ODU
IF Cable
HYB
HYB
MD
MD
IDU
ODU
ODUIF Cable
HYB
MD
MD
XIF Cable
V(H)
H(V)
f1f1
f1
f1
f1f1
f1
f1
H(V)
V(H)
DATAIN/OUT
ODU
ODU
IF Cable
HYBHYB
MD
MD
IDU
ODU
ODUIF Cable
HYB
MD
MD
HYBDATAIN/OUT
XIF Cable
DATAIN/OUT
ODU
ODU
IF Cable
HYBHYB
MD
MD
IDU
ODU
ODUIF Cable
HYB
MD
MD
HYBDATAIN/OUT
XIF Cable
DATAIN/OUT
ODU
ODU
IF Cable
HYB HYB
MD
MD
IDU
ODU
ODU IF Cable
HYB
MD
MD
HYBDATAIN/OUT
XIF Cable
DATAIN/OUT
ODU
ODU
IF Cable
HYB HYB
MD
MD
IDU
ODU
ODU IF Cable
HYB
MD
MD
HYBDATAIN/OUT
XIF Cable
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
21/479
System Configuration
Operation NWD-115476-03E
3-5
3.3 System Overview
- ODU-IDU separate mount type. The connection line is only one coaxial cable.
- No protection or protection system is available using common ODU and IDU.
- Flexible configuration for ODU and antenna, direct mount / remote mount / 1+0
(non redundant) / 1+1 hot stand-by / 1+1 space diversity / 1+1 frequency diversity
(twin path), 2+0, N way, 1+0 XPIC, 1+1 XPIC (1/2 x IDU).
- ACCP, ACAP, CCDP and these combined configurations are available.
- 19 inches one rack unit size compact IDU,
> 483 mm (W) x 44 mm (H) x 240 mm (D)
Figure 3-1 IDU Outline
- Small and light weight ODU for easy handling and installation.
13-42GHz
Figure 3-2 ODU Type
- Wide temperature range of ODU and IDU
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
22/479
System Configuration
NWD-115476-03E Operation
3-6
- DC input voltage nominal rating: -48 VDC
3.3.1 IDU Block Diagram
Figure 3-3 IDU Block Diagram
3.3.2 ODU Block Diagram
Figure 3-4 ODU Block Diagram
E1
Interface
LAN
Interface
Alarm
Optional AUX
TDM
XC and
MUX /
DEMUX
Packet
Switch
CPU
Optional
Clock
PS
N
ative
Packet
Line
Native TDM Line
Optional
Card Slot
-48V
Universal
Card Slot
PS
MODEM-A
16E1-A
STM1-A
GBE-A
AUX-A
TX: 350 MHzRX: 140 MHz
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
23/479
System Configuration
Operation NWD-115476-03E
3-7
3.4 Interfaces
Figure 3-5 IDU Interface Layout
3.4.1 Baseband Interface
The iPASOLINK 400 has various interfaces specified by the ITU-T standard and
IEEE standard as listed below:
3.4.1.1 E1 Interface [MC-A4 Card]
- Signal rate: 16 x E1 (2.048 Mbps)
- Interface: HDB-3 (ITU-T G.703)
- Impedance:75 ohms or 120 ohms (selectable)
- Connector:MDR68
3.4.1.2 E1 Interface [Universal Card]
- Signal rate: 16 x E1 (2.048 Mbps)
- Interface: HDB-3 (ITU-T G.703)
- Impedance:75 ohms or 120 ohms (selectable)
- Connector:MDR68
UniversalSlot #1
LCT/NMSUSBMemorySlot
ETH3,4(SFP)
ALM/DSC/Clock
16xE1Power supply(Redundant option)
Universal Card Slots- ODU interface (Modem)- GbE (10/100/1000Base-X)- 16xE1 TDM- STM-1 (Up to 2xSTM-1)- Multi Service Engine- AUX (DI DO/ EXT ALM)
Fan unit
UniversalSlot #2
UniversalSlot #3
UniversalSlot #4
MC-A4 Card
NE1/ETH1,2
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
24/479
System Configuration
NWD-115476-03E Operation
3-8
3.4.1.3 LAN Interface 2xGbE (ETH 3,4) (SFP) [MC-A4 Card]
- Type:1000Base-SX/LX (SFP) / 10/100/1000BASE-T(X) (auto or fixed) (RJ45)
- Port number and in terface:2
- VLAN:Port-based VLAN / Tag-based VLAN / IEEE 802.1ad Provider Bridges
- QoS:802.1p CoS / ToS / Diffserv / MPLS EXP
- QoS control:Deficit WRR or SP+Deficit WRR, 4/8 classes support
- Bandwidth management:Port and class shaper, policing per VLAN or Port
- Protection: RSTP (802.1w) , LACP (IEEE802.1AX), ERPS(G.8032v2)
3.4.1.4 LAN Interface 2xETH(RJ-45) [MC-A4 Card]
- Type:10/100Base-T(X) (auto or fixed) / RJ-45
1000BASE-T / RJ45 (Optional)
- Port number and in terface:2
- VLAN:Port-based VLAN / Tag-based VLAN / IEEE 802.1ad Provider Bridges
- QoS:802.1p CoS / ToS / Diffserv / MPLS EXP
- QoS control:Deficit WRR or SP+ Deficit WRR, 4/8 classes support
- Bandwidth management:Port and class shaper, policing per VLAN or Port
- Protection: RSTP (802.1w) , LACP (IEEE802.1AX) , ERPS(G.8032v2)
Note: ETH1 interface is for "ETH" or "NE1" selectable. NE1 interface is the managementinterface to be used for IDU-IDU back-to-back stacking.
3.4.1.5 LAN Interface 4xGbE(2xSFP+2xRJ-45) [Universal slo t]
- Type:1000Base-SX/LX (SFP) / 10/100/1000BASE-T(X) (auto or fixed) (RJ45)
- Port number and in terface:4
- VLAN:Port-based VLAN / Tag-based VLAN / IEEE 802.1ad Provider Bridges
- QoS:802.1p CoS / ToS / Diffserv / MPLS EXP, 4/8 classes support
- QoS control:Deficit WRR or SP+3class Deficit WRR
- Bandwidth management:Port and class shaper, policing per VLAN or Port
- Protection: RSTP (802.1w) , LACP (IEEE802.1AX) , ERPS(G.8032v2)
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
25/479
System Configuration
Operation NWD-115476-03E
3-9
3.4.1.6 STM-1 interface [Universal slot]
STM-1 interface card has two SFP interfaces. The Second STM-1 interface issupported only for APS (Automatic Protection Switching) function.
- Single rate:1 or 2 x 155.52 Mbps
- Interface: S-1.1/L-1.1 (ITU-T G.957) / CMI (ITU-T G.703)
- Connector:LC (SFP) / IEC 169-29 (1.0/2.3)
3.4.2 ODU Interface
3.4.2.1 ODU InterfaceThis interface is a port used to connect ODU with IDU with the coaxial cable. This
interface card can be added into up to 4 universal slots.
-Connector:SMA female
3.4.3 LCT /NMS Interface
3.4.3.1 LCT Interface [MC-A4 Card]
The local craft terminal is a useful tool to the installation and maintenance.
iPASOLINK provides users GUI environment through WEB browser. Moreover, this
tool supports remote connection.
- Type:10/100Base-TX / RJ-45
- Port number and interface:1
3.4.3.2 NMS Interface [MC-A4 Card]
This port is used to connect with the NMS server through the network.
- Type: 10/100Base-TX / RJ-45
- Port number and interface: 1
Note: NMS interface has NE1 These interfaces are to be used for
IDU-IDU back-to-back stacking.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
26/479
System Configuration
NWD-115476-03E Operation
3-10
3.4.4 Functional card
3.4.4.1 AUX interface [Universal slot]
This interface card supports cluster alarms and DI/DO. (data-in/ data-out)
- Cluster alarm:Alarm extension and combining
- DI:Remote input port for external alarms, etc.
- DO:Remote output from EMS controller
- Connector:D-sub high density 44 ways female
3.4.4.2 MSE (Multi Service Engine) [Universal slot]
This interface card supports TDM PWE3 (Pseudowire Emulation Edge-to-Edge).
- Protocols: SAToP (RFC4553, MEF8)
- Maximum number of mounting: 1
- Number of E1 paths:up to 64
- Support Payload size:32 (+padding), 64, 96, 128, 160, 192, 224, 256 bytes
- Jitter Buffer size: 2, 4, 8 ,16, 32, 64, 128 ms
- Number of ACR (Adaptive Clock Recovery): 16
3.4.5 Other Interfaces
3.4.5.1 ALM/SC/CLK Interface
This port is used for alarm outside connection, and for digital service channels and
external clock signal.
- Connector:D-sub high density 44 ways female
3.4.5.2 USB Memory Inter face
USB memory is useful to store the equipment setting and configuration data. This
information storage is used for equipment replacement and recovery of setting and
configuration.
- Connector: USB type 1 female
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
27/479
System Configuration
Operation NWD-115476-03E
3-11
3.4.5.3 Power supplyAdditional power supply can be applied for redundant power system.
- Connector: 4 ways 3.81mm pitch (1-178288-4)- Input Voltage Range:-48 VDC (-40.5 to -57 VDC)
3.5 IDU (Indoor Unit ) and System Performance
3.5.1 GeneralNO Item IDU
1 Environmental condition
Operation:-5 to +50 deg.C (ETSI EN300019-1-3 class 3.1E), Humidity: 95% (at 50 deg.C, No condensing)
(Workable: -10 to +55 deg.C)
Transportation ETSI EN300019-1-2 class 2.3
Storage ETSI EN300019-1-1 class 1.2
Power consumption Power consumption Dimension (W x H x D mm) Weight
2 Main card40 W 300x22x220 0.8 kg
3 Fan unit5 W 30x44x220 0.5 kg
4 Modem (ODU Interface)10 W 100x22x220 0.4 kg
5 16xE1 Inteface8 W 100x22x220 0.4 kg
6 STM-1 Interface8 W 100x22x220 0.4 kg
7 4xGbE(2xSFP+2xRJ-45)8 W 100x22x220 0.4 kg
8 Option Multi service enginefor PWE 10 W 100x22x220 0.4 kg
9 Option External clock board3 W 40x10x220 0.1 kg
10 Option AUX3 W 100x22x220 0.4 kg
11 Power Supply- 50x22x220 0.4 kg
12 Chassis- 44x482x240 0.8 kg
Mechanical Dimensions
13 IDU Size 482(W)x44(H)x240(D) mm, 6kg Approx.
14 EMC Conforms to EN301489-4
15 Safety Conforms to EN60950-1
3.5.2 IDU performancesNO Item IDU
ChannelSpace
7 MHz 14 MHz (13.75MHz)* 28 MHz (27.5 MHz)* 56 MHz (55MHz)*
QPSK14 28 57 114
16QAM28 57 114 230
32QAM35 71 143 287
64QAM42 85 172 345
1
Transmission
Capacity**and
ChannelSpacing
(Mbps)
128QAM49 99 200 402
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
28/479
System Configuration
NWD-115476-03E Operation
3-12
256 QAM56 114 229 460
512 QAM - - 257 517
* ;Channel separation at 18GHz band, ** Physical layer maximum throughput at 64 bytes VLAN Tagged packet size, -; Not available
E116 x E1 (G.703) MDR68 connector (option : up to total 32x E1 available with additional card)
LAN2 x 10/100 Base-T(X) RJ45 connector (option : up to 10/100/1000Base-T available)
2 x 1000Base-SX or LX with optional SFP modules ( connector type : LC)2Main Signal
Interface
STM-11 or 2 x STM-1 (S-1.1, L-1.1 or STM-1e) with optional card,
Connector type: LC(S-1.1, L-1.1) / DIN 1.0/2.3 (STM-1e)
3 Interconnecting Connector,Cable impedance and Cable
length (IDU-ODU)
Connector type : TNC female
Cable length: Nominal 300 m maximum with 8D-FB-E or equivalent performance cable
4 Power Line Requirement-48 VDC (-40.5 to -57 VDC) , Conforms to EN300 132-2
Option: +/- (20 to 60 VDC)
Function outline
5 Native IP and Native TDM MODEM has both native IP and Native TDM signal proccessing circuit
6 Adaptive modulation (AMR) QPSK/ 16QAM/ 32QAM/ 64QAM/ 128QAM/ 256QAM/ 512QAM : 7 modulation schemes changeable
7 Radio protection method 1+1 HS/HS, HS/SD, FD (HS: Hot Stand by, SD: Space Diversity, FD: Frequncy Diversity
8 E1 Ring protection E1 SNCP support
Switching Capacity 48Gbps (Non Blocking)
MAC LearningTable
Independent VLAN Learning(VLAN + MAC),
Up to 128K (configurable)
VLAN
802.1Q Port based, Tag based, Tunnel,
802.1ad Port based, Tag based, Selective,
Up to 4094 VLAN per equipment,
MEF 9 Certified EPL, EVPL and ELAN services support with L2CP Tunneling function
Jumbo Frame Support (Up to 9600 byte)
MEF/RFC4115 compliant policing(CIR/EIR/CBS/EBS)
IngressQoS Class Classification: VLAN CoS/IPv4 DSCP/IPv6 DSCP/MPLSEXP/ETH Port, VLAN ID
4/8 Classes SP/D-WRR queues
- per-class rate configurable shaping
- per-class configurable maximum burst length
- shaping for strict priority queue
Hierarchical shaping (Port and Class)
QoS
Egress
WRED congestion avoidance and Weighted Tail Drop
ETH OAM 802.1ag Service OAM (CC/LB/LT), Y.1731 Performance Monitoring (LM/DM)
Protection STP/RSTP, G.8032v2 ERPS
Link Aggregation Radio Link Aggregation, 802.1AX, 1:1 LACP redundancy
SyncE SupportTDM PWE RFC4553 SAToP (MEF8)
9 ETH functions
Other Link Loss Forwarding, Mirroring, Broadcast Storm Control, L2 Filter, Port Isolation
10 XPIC(CCDP) function support QPSK to 512QAM modulation at 14/28/56 MHz channel spacing
11AMR, 1+1 and XPIC
combinationAMR and 1+1, AMR and XPIC combination available
12DXC (E1 cross connect )
capacityUp to 168 x 168 E1 non blocking
13External clock interface
(option)2.048 MHz or 2.048 Mbps external clock input /output, 75 or 120 orms selectable, D-sup 44 ways connctor
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
29/479
System Configuration
Operation NWD-115476-03E
3-13
NO Item IDU
DCN and Service channel outline
1 port, 10/100 Base-T RJ 45 (inband or outband connection available)13 NMS interface
SNMPv1/v2c/v3, https, sftp
14 NE1 1 port, 10/100 Base-T(X), RJ 45
15 RS485 1 port, Serial signal port for legacy equipment, with optional AUX card, D-sub 44 ways
16 LCT (Local craft terminal) 1 port, 10/100Base-T(X), RJ45, DHCP server support
17House keeping and cluster
alarmInput 4 ch, output 6ch available with optional AUX card, D-sub 44 ways
18 Service channel 1 2 ports, RS-232C: 9.6kbps async, D-sub 44 ways
19 Service channel 2 2 ports, V-11 (co or contra direction selectalbe) 64kbps sync, D-sub 44 ways
20 Engneering order wire 1 port 4 wires voice channel, D-sub 44 ways
21 User Authentication Radius, local
22 Loop Backa) Far End Baseband Loop Back
b) Near End Baseband Loop Back
c) IF Loop Back
23 Modem TX output Control Manual control, Automatic control (ATPC), Mute control
PMON Items;
a) OFS, b) BBE, c) ES, d) SES, e) SEP, f) UAS
Metering Items
a) Output power level (TX PWR), b) Received signal level (AGC V), c) Bit error rate (BER MON)24
Performance Monitoring(PMON)/Metering
LAN monitoring Items;
a) RX Unicast, b) RX Broadcast, c) RX Multicast, d) RX Pause, e) RX CRC error
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
30/479
System Configuration
NWD-115476-03E Operation
3-14/END
This page is intentionally left blank.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
31/479
NE Setup
Operation NWD-115476-03E
4-1
4. NE SETUP
4.1 Login, Logout and Exit
4.1.1 Log In to NE
Users are registered by means of login names and their passwords. To protect the
network and network management system from unauthorized access or unauthorized
modifications, three levels with different privileges (refer to the table shown in
section 4.3.2 User Account Management) define users. The available functions tooperate depend on the users privilege level. Therefore, some of the functions may or
may not be carried out.
The highest or administrator level (Admin) has the full access to the network and
network management system.
Procedure 4-1
1. Power on the computer.
2. Log in to the Windows asAdministrator.
3. Select Start -> Programs -> Internet Explorer from start menu. The
Internet Explorerwindow appears.
4. Enter an IP address of the NE adding /weblct/inAddress field as an example
shown below, and hit the Return key. TheWebLCT loginwindow appears.
Example: http://172.17.254.253/weblct/
Figure 4-1 Internet Explorer Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
32/479
NE Setup
NWD-115476-03E Operation
4-2
5. Enter a user name and his/her password into User Nameand Passwordfields,
then click OKbutton.
Figure 4-2 WebLCT Login Window
Following are the default user name and its password for iPASOLINK 400:
User Name :Admin
Password : 12345678
6. After user name and password are successfully entered, System Status boxappears.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
33/479
NE Setup
Operation NWD-115476-03E
4-3
Figure 4-3 System Status Box
7. After the login completed, the System Status box automatically closed. Or
you may click OKbutton to close the box quickly.
8. The WebLCTmain window appears.
Figure 4-4 WebLCT Main Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
34/479
NE Setup
NWD-115476-03E Operation
4-4
4.1.2 Log Out from NE
Procedure 4-2
1. Click Logout button in the upper right of the WebLCT main window. The
Confirmation dialog box appears.
Figure 4-5 WebLCT Main Window
2. ClickOKbutton to log out.
Figure 4-6 Confirmation Dialog Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
35/479
NE Setup
Operation NWD-115476-03E
4-5
3. The WebLCT Loginwindow appears again.
Figure 4-7 WebLCT Login Window
This step ends the procedure.
4.1.3 Exit WebLCT
Following are the methods to exit the WebLCT:
Select File (F)-> Close (X)from the Internet Explorermenu bar.
Click Xbutton in the upper right of theInternet Explorerwindow.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
36/479
NE Setup
NWD-115476-03E Operation
4-6
4.2 WebLCT Main Window
This section describes the contents and structure of the WebLCTmain window.
Figure 4-8 WebLCT Main Window
(1) Login User Name
This field indicates a user name that is currently logged in.
(2) Refresh Button
Click Refresh button to manually update the current status displayed in the
WebLCT main window. Click to check Auto Mode check box to enable
refreshing the window automatically.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
37/479
NE Setup
Operation NWD-115476-03E
4-7
(3) Equipment Status View
This field shows the current equipment status.
(4) Opposite Site Links
This drop-down list shows a list of NEs on the opposite sites. A user can select
an NE from the list to log in to.
(5) Maintenance Button
ClickMaintenancebutton before starting any maintenance operation.
(6) Logout Button
Click Logoutbutton to log out from NE.
(7) Alarm and Status View
Click a tab to select an event to show its logs.
(8) Menu Tree
This part shows the relevant configuration and provisioning menu of the
equipment by tree view.
Available operations via the WebLCT are listed below:
(a) Current Status
Current Status shows the equipment current status or event histories of
each part of an NE (Active Alarm, Event Log, ODU, IDU,AUX).
(b) Easy Setup Wizard
Follow the Easy Setup Wizard to set up the basic configuration of theequipment. The wizard includes functions of registering/removing ODU and
IDU packages. This wizard also provides easier steps to set up
cross-connection, VLAN service and other necessary configuration for the
new equipment.
(c) EquipmentSetup
Select this menu to register or remove ODU and IDU packages and other
relevant configuration.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
38/479
NE Setup
NWD-115476-03E Operation
4-8
(d) Provisioning
Select this menu to configure the detailed settings of IDU and ODU.
(e) Maintenance Control
Select this menu to operate Protection Switch, Loopback, H/W_F/W Reset,
etc.
(f) Maintenance Test
Maintenance Testmeasures the link quality of Ethernet traffic.
(g) Current/History PMON/RMON Report
Select this menu to browse reports of Current, History, PMON and RMON.
User can also export the data to external storage (Local PC, USB Memory).
For more details, refer toMaintenance Manual.
(h) Metering
Meteringmeasures the real time TX power, RX level, ODU power supply
and BER.
(i) Equipment Utility
Select this menu to upload and download equipment configuration data,software, firmware and FPGA data.
(j) User Account/Security Setting
Select this menu to add, remove and modify user accounts for the equipment,
and set up the security levels for user accounts.
(k) Inventory
Inventory retrieves the information regarding the equipment and software
license.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
39/479
NE Setup
Operation NWD-115476-03E
4-9
4.3 User Management (Security Management)
The user management is a function to manage an authorized user to access to anetwork system, and to prevent an unauthorized access.
Access Level
iPASOLINK provides three user access levels with different privilege as shown
in the table below. For details of each access level and its available operations,
refer to Table 4-3 User Access Privilege Levels.
Table 4-1 Access Level
Access Level Descr ip tion File Operation SNMP Operat ion
Operator View configuration and equipment status. Upload only Get
Config Beside the functions available by Operatorlevel,
manage radio base band and switching function.
Upload/Download Get/Set
Admin Beside the functions available by Configlevel,
manage user accounts and time adjustments.
Upload/Download Get/Set
Note: For the terms, such as Upload and Download mentioned in the table
above, refer to the following description.
1. Uploadis to copy a file from NE to external storage, such as WebLCT PC.
2. Download is to copy a file from external storage to the equipment internalstorage.
User Group
User Group configuration allows a user to manage the protocol type and access
level for each group.
A user of the specified user group in iPASOLINK will be assigned with
pre-defined protocol and access level of the group.
Beside the three default user groups, up to six user groups can be added. The
default user groups are shown below.
Note: Options of the default user groups cannot be changed.
Table 4-2 User Group Profi le
Group Name Classification TELNET SSH FTP HTTP SNMP Access Level
OPERATOR Unchangeable Operator
CONFIG Unchangeable Config
ADMIN Unchangeable Admin
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
40/479
-
8/11/2019 Operation 400
41/479
NE Setup
Operation NWD-115476-03E
4-11
WebLCT Menu Admin Conf ig Operator Remote
Other ETH Port Setting R/W R/W R O
LLF Setting R/W R/W R O
Cross Connect Setting R/W R/W R O
E1 Port Setting R/W R/W R O
E1/STM-1/Cross
Connect Setting
STM-1 Port Setting R/W R/W R O
PWE Setting R/W R/W R O
Equipment Clock Setting R/W R/W R OEquipment Clock /
Synchronization Setting EXT Clock Setting R/W R/W R O
Relay Control Setting R/W R/W R ORelay-Alarm Mapping
Setting Cluster Alarm Setting R/W R/W R O
V.11/SC Setting R/W R/W R O
V.11 Directional Setting R/W R/W R O
V.11/OW Setting
OW Setting R/W R/W R O
Correlation Setting R/W R/W R O
AIS Setting R/W R/W R O
Alarm/AIS Setting
BER Threshold Setting R/W R/W R
PMON Threshold R/W R/W R O
PMON Other R/W R/W R O
RMON Threshold R/W R/W R O
PMON/RMON
Threshold Setting
RMON Other R/W R/W R OAUX Input Setting R/W R/W R OAUX Setting
AUX Output Setting R/W R/W R O
Maintenance Control
MODEM Loopback Control R/W R/W R O
TDM Loopback Control (E1
Loopback 1)
R/W R/W R O
TDM Loopback Control (E1
Loopback 2)
R/W R/W R O
TDM Loopback Control (STM-1
Loopback 1)
R/W R/W R O
Loopback Control
TDM Loopback Control (STM-1
Loopback 2)
R/W R/W R O
MODEM TX/RX Switch Control R/W R/W R O
RSTP Control R/W R/W R O
SNCP Switch Control R/W R/W R O
APS Switch Group Control R/W R/W R O
Protection Control
Timing Source Switch Control R/W R/W R O
MODEM Maintenance Control R/W R/W R O:*1
Auto Laser Shutdown Control R/W R/W R O
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
42/479
NE Setup
NWD-115476-03E Operation
4-12
WebLCT Menu Admin Conf ig Operator Remote
H/W Reset Control R/W OH/W_F/W Reset
Control F/W Reset Control R/W O
PMON/RMON/FDB Clear R/W R O
Offline Maintenance R/W R
Maintenance Test ETH OAM LB/LT/LM/DM Control R/W R R O
Current/History PMON/RMON Report
MODEM PMON Report R R R O
E1 PMON Report R R R O
STM-1 PMON Report R R R O
ETH RMON Report R R R O
VLAN Counter Report R R R O
Metering
Current Metering R/W R/W R O
Equipment Utility
Export(NE->Storage) Utility R/W R/W O
Update(Storage->NE) Utility R/W O
Program ROM Switching R/W O
USB Memory Utility R/W O
Shipment R/W
Date/Time Setting R/W R R O
User Account/Security Setting
Login User R O
User Account Management R/W O
User Group Profile Configuration R/W O
Security Management Security Status Setting R/W O
Inventory
Equipment Inventory Information R R R R
S/W License Information R R R R
S/W License Information
Import License Key R/W O
Radio Capacity Setting R/W R R O
SFP Port License Setting R/W R R O
Note *1: CW Control is not editable.
4.3.2 Default User Account
iPASOLINK provides three default user accounts with the pre-defined access levels
and privileges. Up to nine user accounts can be added.
Following describes the details of the default user account.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
43/479
NE Setup
Operation NWD-115476-03E
4-13
Table 4-4 Default User Account
User Name Default Password Description Default GroupUser 87654321 Useris able to confirm the system configuration and
equipment status, but is not able to make any changes
to the configuration.
OPERATOR
Config 87654321 Beside the functions available to User, Configuser is
able to operate radio management, baseband
management, switching management for C-Plane
control.
CONFIG
Admin 12345678 Beside the functions available to Configuser,Admin
user is able to operate database management, file
management, user management and time adjustment
for M-Plane control.
ADMIN
4.3.3 User Account
Following are User Management Functions available on iPASOLINK:
Login User List
Used to display the information of user accounts registered to iPASOLINK,
and to modify user profiles, such as passwords and User Group Profiles.
User Authentication Configuration
Used to register authentication method selects.
User Account Management
Used to register new user accounts, and to modify/delete registered user
accounts.
User Group Profile Configuration
Used to register new user groups, and to modify/delete registered user
groups.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
44/479
-
8/11/2019 Operation 400
45/479
NE Setup
Operation NWD-115476-03E
4-15
(1) Authentication Setting
Procedure 4-4
1. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Select User AuthenticationConfiguration from the User
Account/Secur ity Setting sub menu.
3. The User Authentication Configurationwindow appears. Click
Authentication Sett ingbutton.
Figure 4-10 User Authentication Configuration
4. The AuthenticationSettingdialog box appears. Enter the proper value for each
parameter.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
46/479
NE Setup
NWD-115476-03E Operation
4-16
Figure 4-11 Authentication Configuration
Table 4-5 Authentication Setting
Item Parameter Description
IDU Only The outside authentication server isn't used,and Login authentication is done only by the
inner authentication function.
Authentication MethodIDU + RADIUS The outside authentication server as well as
the inner authentication function is used for
Login authentication. But, it's necessary to
build RADIUS Server on the RADIUS
Setting screen.
IDU -> RADIUS Server Login authentication is performed by the
order of IDU and RADIUS Server.
(This item can only set when Authentication
Method = IDU + RADIUS.)Authentication Sequence
RADIUS Server -> IDU Login authentication is performed by the
order of RADIUS Server and IDU.
(This item can only set when Authentication
Method = IDU + RADIUS.)
5. Click OKbutton after configuring the parameters.
6. The Information box appears. Click OKbutton.
Figure 4-12 Information Box
7. The User Authentication Configuration window appears again. Confirm
AuthenticationSettinginformation displayed.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
47/479
NE Setup
Operation NWD-115476-03E
4-17
Figure 4-13 User Authentication Configuration
This step is the end of the procedure.
(2) Privilege ID / Group Name
Procedure 4-5
1. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Select User Authentication Configuration from the User
Account/Secur ity Setting sub menu.
3. The User Authentication Configurationwindow appears. Click Privilege
ID No..
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
48/479
NE Setup
NWD-115476-03E Operation
4-18
Figure4-14 User Authentication Configuration
4. The Privilege IDdialog box appears. Enter the proper value for each parameter.
Figure 4-15 Privi lege ID Dialog Box
Table 4-6 Privi lege ID
Item Parameter
Group Name
The choices of Group Name are all Group Name registered on
the User Group Profile screen and Default Permissions.
When choosing Default Permissions, Group Name set in Default
Permissions of RADIUS Setting screen is used.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
49/479
NE Setup
Operation NWD-115476-03E
4-19
5. Click OKbutton after configuring the parameters.
6. The Information box appears. Click OKbutton.
Figure 4-16 Information Box
7. The UserAuthentication Configurationwindow appears again. Confirm
PrivilegeIDinformation displayed.
Figure 4-17 User Authentication Configuration
This step ends the procedure.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
50/479
NE Setup
NWD-115476-03E Operation
4-20
4.3.3.3 User Account Management
This function allows to register new user accounts, and to modify/delete user
accounts registered to iPASOLINK.
Note: This function is available for the Admin access level user only.
Add User Account
This function is used to register a new user account to add.
Note: Up to nine user accounts can be added beside the three default user
accounts.
Modify User Account
This function is used to modify the information of registered user accounts
including his/her password and user group.
Delete User Account
This function is used to remove registered user accounts.
(1) Add User Account
Note: Security Level (Hash Algorithm / Priv (Privacy) Algorithm) is required to
be set when registering a new user account. The security level cannot
be modified after the registration of a user is completed.
Procedure 4-6
1. Expand User Account/Security Setting from the WebLCT menu.
2. Select User Account Management from the User Account/SecuritySettingsub menu. TheUser Account Management window appears.
3. ClickAdd Userbutton.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
51/479
NE Setup
Operation NWD-115476-03E
4-21
Figure 4-18 User Account Management Window
4. TheUser Setting option box appears.
5. Enter the appropriate value to each parameter.
Figure 4-19 User Setting Option Box
Table 4-7 Add User AccountParameter Value/Description
User Name 1 to 31 characters long.
Password 8 to 31 characters long.
Group ADMIN/CONFIG/OPERATOR or GROUP added. (For
more details, refer to 4.3.3.3 User Group Profile
Management)
Security Level NoAuthNoPriv User login without authentication and encryption.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
52/479
NE Setup
NWD-115476-03E Operation
4-22
Parameter Value/Description
AuthNoPriv User login needs authentication (MD5 or SHA1 based)
but without encryption.
AuthPriv User login needs authentication (MD5 or SHA1 based)
and data are encrypted by DES or AES.
Auth Algorithm Select Authentication Algorithm between MD5 and SHA.
(For more details, refer to (b) For AhthNoPriv).
Auth Key Enter 8 to 16 digits of MD5 or SHA1 public key.
Priv Algorithm Select the encryption method, DES or AES. (For more
details, refer to (c) For AuthPriv)
Priv Key Enter 8 to 16 digits of DES or AES public key.
6. Click Set Password in the User Setting option box. The Set Password
option box appears.
7. Enter the same passwords into New Passwordand Re-Enterfields,and then
click OKbutton.
Figure 4-20 Set PassWord Option Box
8. The User Setting option box appears again. Click OK button to close the
option box.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
53/479
NE Setup
Operation NWD-115476-03E
4-23
Figure 4-21 User Setting Option Box
9. Select the security level.
Note: Selection of Auth / Priv Algorithm changes according to the security level
shown below.
Table 4-8 Security Level Parameters
Parameter Description
NoAuthNoPriv User login without authentication and encryption.
AuthNoPriv User login needs authentication (MD5 or SHA1
based) but without encryption.
Security Level
AuthPriv User login needs authentication (MD5 or SHA1
based), and data are encrypted by DES or AES.
Auth Algorithm Select Authentication Algorithm from MD5 or SHA.
(For more details, refer to (b) ForAuthNoPriv)
Auth Key Enter 8 to 16 digits of MD5 or SHA1 public key.
Priv Algorithm Select the encryption method from DES or AES.
(For more details, refer to (c) For AuthPriv)
Priv Key Enter 8 to 16 digits of DES or AES public key.
Security Level
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
54/479
NE Setup
NWD-115476-03E Operation
4-24
(a) For NoAuthNoPriv
For NoAuthNoPriv, Auth Algorithm and Private Algorithm are notselectable.
Figure 4-22 User Setting (NoAuthNoPriv) Option Box
(b) For AuthNoPriv
For AuthNoPriv, Auth Algorithm and Auth Key are selectable.
Figure 4-23 User Setting (AuthNoPriv) Option Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
55/479
NE Setup
Operation NWD-115476-03E
4-25
Table 4-9 Auth Algori thm
Auth Algori thm Type Descr ip tion
MD5 One of the Hash Algorithm for authentication and digital signature. In
order to detect the falsification of original data during the data
transmitting, the original data will be converting the Hash by comparing
them at both ends.
SHA One of the Hash Algorithm for authentication and digital signature. In
order to detect the falsification of original data during the data
transmitting, less than 264
bits of the original data will be converting the
Hash of 160 bits by comparing it at both ends.
Figure 4-24 Set Auth Key Option Box
Figure 4-25 User Setting (AuthNoPriv) Option Box
(c) For AuthPriv
For AuthPriv, Auth Algorithm, Auth key and Pri Algorithm Priv Key are
selectable.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
56/479
NE Setup
NWD-115476-03E Operation
4-26
Figure 4-26 User Setting (AuthPriv) Option Box
Table 4-10 Auth Algori thm
Auth Algori thm Type Descr ip tion
MD5 One of the Hash Algorithm for authentication and digital signature. In order
to detect the falsification of original data during data transmitting, the
original data will be converting the Hash by comparing it at both ends.
SHA One of the Hash Algorithm for authentication and digital signature. In order
to detect the falsification of original data during data transmitting, less than2
64bits of the original data will be converting the Hash of 160 bits by
comparing it at both ends.
Figure 4-27 Set Auth Key Option Box
Table 4-11 Privacy Algori thm
Privacy Algorithm Type Description
DES DES is 56 bits encryption key and encryption by 64 bit block.
AES SPN structured block encryption, block length is 128 bits, and the
length of key is 128 / 192 / 256 bits.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
57/479
-
8/11/2019 Operation 400
58/479
NE Setup
NWD-115476-03E Operation
4-28
12.Confirm the displayed user account information.
Figure 4-31 User Account Management Window
This step ends the procedure.
(2) Modify User Account
Procedure 4-7
1. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Select User Account Management from the User Account/Security
Settingsub menu. TheUser Account Management window appears.
3. Click on a target user account. TheUser Setting option box appears.
Figure 4-32 User Account Management Window
4. Modify values:
Select a user group from Group Name drop-down list to change his/her
user group.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
59/479
NE Setup
Operation NWD-115476-03E
4-29
Click Set Passwordbutton on the User Settingbox menu bar to change
the current password. Set PassWord option box appears.
Figure 4-33 User Setting Option Box
Enter a new password into each New Password and Re-Enterfield on the
Set PassWordoption box.
Figure 4-34 Set PassWord Option Box
Click OKbutton. TheUser Settingoption box appears again.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
60/479
NE Setup
NWD-115476-03E Operation
4-30
5. Click OKbutton when completed. TheInformationdialog box appears.
Figure 4-35 User Setting Option Box
6. Click OKbutton. TheUser Account Managementwindow appears again.
Figure 4-36 Information Dialog Box
7. Confirm the information for the modified user account.
Figure 4-37 User Account Management Window
This step ends the procedure.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
61/479
NE Setup
Operation NWD-115476-03E
4-31
(3) Delete User Account
Procedure 4-8
1. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Select User Account Management from the User Account/Security
Settingsub menu.
3. Click Delete Userbutton on the User Account Management window. The
User Setting option box appears.
Figure 4-38 User Account Management Window
4. From drop-down list, select a user account to be removed, and click OK button.
The Confirmation dialog box appears.
Figure 4-39 User Setting Option Box
5. Confirm the user name to be removed, and then click OKbutton.
Figure 4-40 Confirmation Dialog Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
62/479
NE Setup
NWD-115476-03E Operation
4-32
6. The Information dialog box appears. Click OK button. The User Account
Management window appears again.
Figure 4-41 Information Dialog Box
7. Confirm that the selected user account is removed.
Figure 4-42 User Account Management Window
This step ends the procedure.
4.3.3.4 User Group Profi le Configuration
This operation registers and modifies user group profiles.
The privilege of iPASOLINK user is subject to change according to the user access
level and protocols that are assigned by the User Group Profile. Only Admin level
user is available to configure the settings.
Add User Group Prof ile
This operation registers a new User Group Profile adding to the default User
Group Profile.
Note:Up to six User Group Profiles can be registered beside the three default
User Group Profiles.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
63/479
NE Setup
Operation NWD-115476-03E
4-33
Modify User Group Profile
This operation modifies a registered User Group Profile (Access Level and
Protocol).
Delete User Group Profile
This operation deletes a registered User Group Profile.
(1) Add User Group
Procedure 4-9
1. Expand User Account/Security Setting from the WebLCTmenu.
2. Select User Group Profile Configuration. The User Group Profile
Configuration window appears.
3. Click Add Group on the menu bar of the User Group Profile
Configuration window. TheGroup Setting option box appears.
Figure 4-43 User Group Profile Configuration Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
64/479
NE Setup
NWD-115476-03E Operation
4-34
4. Specify the appropriate value to each parameter, and click OK button. The
Information dialog box appears.
Figure 4-44 Group Setting Option Box
Table 4-12 User Group Profi le Configuration
Parameter Description
Group Name 1 to 32 characters long.
FTP Al lowor Denyusing FTP Protocol to transmit Files.
SFTP Al lowor Denyusing FTP Protocol to transmit Files.
HTTP Al lowor Denyusing HTTP Protocol for WebLCT to access equipment.
HTTPS Al lowor Denyusing HTTP Protocol for WebLCT to access equipment.
SNMP Al lowor Denyusing SNMP Protocol to access to network equipment.
Access Level Specify the user access level (Admin/Config/Operator)
(For more details, refer to Table 4-3 User Access Privilege Levels)
5. Click OK button. TheUser Group Profile Configuration window appears
again.
Figure 4-45 Information Dialog Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
65/479
NE Setup
Operation NWD-115476-03E
4-35
6. Confirm that the information of newly added user group profile is displayed.
Figure 4-46 User Group Profile Configuration Window
This step ends the procedure.
(2) Modify User Group
Procedure 4-101. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Select User Group Profile Configuration from the submenu. The User
Group Profile Configurationwindow appears.
3. Click on a desired group name. TheGroup Setting option box appears.
Figure 4-47 User Group Profile Configuration Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
66/479
NE Setup
NWD-115476-03E Operation
4-36
4. Modify parameters:
Figure 4-48 Group Setting Option Box
Click eitherAl lowor Denyradio button to select a protocol.
Select the appropriate level from Access Level drop-down list to change
the access level of the user group.
5. Click OKbutton when completed. TheInformationbox appears.
6. Click OK button. TheUser Group Profile Configurationwindow appears
again.
Figure 4-49 Information Dialog Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
67/479
NE Setup
Operation NWD-115476-03E
4-37
7. Confirm the user group profile information displayed.
Figure 4-50 User Group Profile Configuration Window
This step ends the procedure.
(3) Delete User Group
Note: A user group can be deleted only when the user group has no assigned
user.
Procedure 4-11
1. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Select User Group Profile Configuration from the submenu. The User
Group Profile Configurationwindow appears.
3. Click Delete Groupbutton. The Group Setting option box appears.
Figure 4-51 User Group Profile Configuration Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
68/479
NE Setup
NWD-115476-03E Operation
4-38
4. Select a target group profile name from the drop-down list, and click OKbutton.
The Confirmation box appears.
Figure 4-52 Group Setting Option Box
5. Confirm the User Group name to be deleted, and then click OK button. The
Information box appears.
Figure 4-53 Confirmation Dialog Box
6. Click OK button. TheUser Group Profile Configuration window appears
again.
Figure 4-54 Information Dialog Box
7. Confirm the displayed User Group Profile information.
Figure 4-55 User Group Profile Configuration Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
69/479
NE Setup
Operation NWD-115476-03E
4-39
This step ends the procedure.
4.3.4 Secur ity Management
iPASOLINK supports the following protocol and security management functions.
(1) SNMPv1 (Simple Network Management Protocol Version 1)
SNMPv1 is a communication protocol to monitor/control NEs on an IP network,
which is specified by the following RFCs:
Table 4-13 RFC Standards
RFC No. Title
RFC 1155 Structure and Identification of Management Information on
TCP/IP-based Internets (SMIv1)
RFC 1157 A Simple Network Management Protocol (SNMP)
RFC 1213 Management Information Base on Network Management of
TCP/IP-based internets: MIB-II
iPASOLINK provides SNMPv1 to support the following functions:
- GET/SET of MIB
Following are response to the request of PDU (Protocol Data Unit) supported by
SNMPv1.
Up to ten SNMP managers including the setting of IP address, community name,
security settings, etc., can be registered via the WebLCT.
By default, iPASOLINK uses the port 161 to receive the SNMP request UDP. To
use the other than the default port, change the settings via the WebLCT.
Table 4-14 PDU Supported by SNMPv1
Item Description
GetRequest Requests the specified instancevalue.
GetNextRequest Requests the subsequent instance value of specified instance value in the list.
GetResponse Responds to the corresponding GetRequest and SetReaquest.
SetRequest Sets the specified instance value.
Trap Informs the change of state and troubles (SNMPv1-Trap).
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
70/479
NE Setup
NWD-115476-03E Operation
4-40
- Send Trap
iPASOLINK can send SNMPv1 trap initiatively to UDP Port 162. Except for
sending the trap to the connected NMS, user can specify an IP address of one
additional destination. A user can also specify the community name and UDP
Port.
- User Application (Log)
iPASOLINK records the logged-in user names in the log file.
(2) SNMPv2c (Simple Network Management Protocol Version 2c)
SNMPv2c is a communication protocol to monitor/control NEs on an IP network,
and is a revised version of SNMPv1. The differences between v1 and v2c are
that the GetBulk, the inform request, unified packet format of each PDU are
added, conforming to SMIv2 and following RFCs:
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
71/479
NE Setup
Operation NWD-115476-03E
4-41
Table 4-15 RFC Standards
RFC No. Titl e
SNMPv2c
RFC 1901 Introduction to Community-based SNMPv2
RFC 3416 Version 2 of the Protocol Operations for the Simple Network Management
Protocol (SNMP)
RFC 3417 Transport Mappings for the Simple Network Management Protocol (SNMP)
RFC 3418 Management Information Base (MIB) for the Simple Network Management
Protocol (SNMP)
RFC 3584 Coexistence between Version 1, Version 2, and Version 3 of the
Internet-standard Network Management Framework
SMIv2
RFC 2578 Structure of Management Information Version 2 (SMIv2)
RFC 2579 Textual Conventions for SMIv2
RFC 2580 Conformance Statements for SMIv2
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
72/479
NE Setup
NWD-115476-03E Operation
4-42
iPASOLINK provides SNMPv2c to support the following functions:
- GET/SET of MIB
iPASOLINK responds to the request of the network management system.
Up to ten SNMP managers including the setting of IP address, community name,
security settings, etc., can be registered via WebLCT.
By default, iPASOLINK uses the port 161 to receive the SNMP request UDP. To
use other than the default port, change the settings via WebLCT.
Table 4-16 PDU Suppor ted by SNMPv2c
Item Description
GetRequest Requests the specified instancevalue.
GetNextRequest Requests the subsequent instance value of specified instance value in the list.
Response Responds to the corresponding various kinds of Request.
SetRequest Sets the specified instance value.
SNMPv2-Trap Informs the change of state and troubles. The format is different from SNMP v1 trap.
GetBulkRequest Requests a number of instance value.
InformRequest Inform an event.
- Send Trap
iPASOLINK can send SNMPv2 trap and InformRequest initiatively to UDP port
162. Except for sending the trap to the connected NMS, user can specify an IP
address of one additional destination. User can also specify the community name
and UDP Port.
- User Application (Log)
iPASOLINK records the logged-in user name in the log file.
(3) SNMPv3 (Simple Network Management Protocol: Version 3)
SNMPv3 is a communication protocol to monitor/control NEs on an IP network,
and is the newest version of SNMP. The differences between SNMPv1/v2c and
v3 are that the user authentication, ciphered communication, and the
change-packet format are enhanced, conforming to the following RFCs for
SMIv2 that define SNMPv3, SNMPv2c:
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
73/479
NE Setup
Operation NWD-115476-03E
4-43
Table 4-17 RFC Standards
RFC No. Title
SNMPv3
RFC 3411 An Architecture for Describing Simple Network Management
Protocol (SNMP) Management Frameworks
RFC 3412 Message Processing and Dispatching for the Simple Network
Management Protocol (SNMP)
RFC 3413 Simple Network Management Protocol (SNMP) Applications
RFC 3414 User-based Security Model (USM) for version 3 of the Simple
Network Management Protocol (SNMPv3)
RFC 3415 View-based Access Control Model (VACM) for the Simple
Network Management Protocol (SNMP)
RFC 3416 Version 2 of the Protocol Operations for the Simple Network
Management Protocol (SNMP)
RFC 3417 Trans port Mappings for the Simple Network Management
Protocol (SNMP)
RFC 3418 Management Information Base (MIB) for the Simple Network
Management Protocol (SNMP)
RFC 3584 Coexistence between Version 1, Version 2, and Version 3 of theInternet-standard Network Management Framework
SMIv2
RFC 2578 Structure of Management Information Version 2 (SMIv2)
RFC 2579 Textual Conventions for SMIv2
RFC 2580 Conformance Statements for SMIv2
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
74/479
NE Setup
NWD-115476-03E Operation
4-44
iPASOLINK provides SNMPv3 to support the following function:
- GET/SET of MIB
Response the request of PDU (Protocol Data Unit) that correspond by SNMPv3
Table 4-18 PDU Supported by SNMPv3
Item Description
GetRequest Required the specified instance value
GetNextRequest Required the subsequent instance value of specified instance value
in the list.
Response Response to the corresponding various kinds of Request.
SetRequest Setting the specified instance value.
SNMPv2-Trap Inform the change of state and troubles.
GetBulkRequest Required a number of instance value.
InformRequest Inform the event.
Report Return the packet if the reportableFlag is set to ON .
- Send Trap
iPASOLINK can send SNMPv2-Trap and InformRequest initiatively to UDP
Port 162.
IP address of SNMP entity, security level, and user name are required to set the
Trap.
Authentic method and authentic password are required when the security level is
authNoPriv or authPriv.
Encryption algorithm and encrypted password are required when the security
level is authPriv.
- Security (userauthentication, session management and encryption)
SNMPv3 PDU is not authenticated by the community name as v1, v2c., but by
the user name, which requires the user registrations beforehand.
User authentication is carried out when the security level of the sent SNMP
request is authNoPriv or authPriv. The cryptographic hash function of the
password is selectable between MD5 and SHA.
Submission ProhibitedNEC Internal Use Only
http://ejje.weblio.jp/content/userhttp://ejje.weblio.jp/content/userhttp://ejje.weblio.jp/content/userhttp://ejje.weblio.jp/content/user -
8/11/2019 Operation 400
75/479
NE Setup
Operation NWD-115476-03E
4-45
Ciphered communication is enabled by the user authentication when the security
level of the sent SNMP request is authPriv. The cipher algorithm is selectable
between DES and AES. For the ciphered communication, a password must be setwhen registering users.
User can also specify an SNMP Engine ID for each NE, which should be 16-byte
long and unique within the network.
(4) NTP (Network Time Protocol)
This protocol synchronizes the clocks of the server and associated clients in a
network, which is specified by the following RFCs:
Table 4-19 RFC Standards
RFC No. Title
RFC 1305 Network Time Protocol (Version 3) Specification, Implementation
and Analysis
RFC 2030 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6
and OS
iPASOLINK can be set either as NTP Client or Server. Following shows the
available functions of NTP Client and Server:
- As NTP Client
When the unicast mode is selected on the NTP Client, the client sends a request
to obtain the current time to the pre-configured server, and then adjusts the clock
according to the replied information. Up to four NTP Severs can be registered
via WebLCT.
When the multicast mode is selected on the NTP Client, the client will listen to
the broadcast of the time server and then adjusts the clock according to the first
received valid broadcast and ignores the broadcasts from remaining servers ifexist.
If the NTP Client receives neither a response nor broadcasts, the synchronization
among the Server and Clients cannot be accomplished, which allows to use the
current time of the equipment.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
76/479
NE Setup
NWD-115476-03E Operation
4-46
- As NTP Server
When the unicast mode is selected on the NTP Server, Server will respond the
current time information to the Client.
When the multicast mode is selected, the Server will broadcast the current time
information of its own periodically.
(5) FTP (File Transfer Protocol)
This protocol transfers a file among NEs, and specified by the following RFCs.
Table 4-20 RFC Standards
RFC No. Title
RFC 959 Original FTP spec.
RFC 1123 The small FTP related section extends / clarifies RFC-959.
RFC 2228 FTP security extensions (vsftpd implements the small subset
needed to support TLS / SSL connections).
RFC 2389 Proposes FEAT and OPTS commands
RFC 2428 Essentially IPv6 support.
Using iPASOLINK as FTP Server provides the following functions:
- Data upload and download service
Data upload and download service are available; however the data download is
restricted, which can be operated only by a user with the appropriate privilege
files and the directories accessed via FTP protocol are predetermined as well as
the file names and types, which will be downloaded.
- Session management
Upon at accepting the connection from external device, the system proceeds to
the login authentication process. An unauthorized user is denied.
The default setting of TCP Port 21 to listen and transfer a file on TCP port 20
can be changed using WebLCT. When Passive Mode is selected, the port number
is selected by the equipment automatically.
If no command is issued by the Client for ninety seconds, the current TCP
session will be disconnected automatically.
- User authentication funct ion
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
77/479
NE Setup
Operation NWD-115476-03E
4-47
iPASOLINK supports two types of the authentications:
External RADIUS Server with internal authentication
Internal authentication only
(6) HTTP (Hyper Text Transfer Protocol )
HTTP is the protocol for transferring data between Web server and client
(WebLCT).
The HTTP is based on the following RFC standards:
Table 4-21 RFC Standards
RFC No. Titl e
RFC 1945 Hypertext Transfer Protocol -- HTTP/1.0
RFC 2616 Hypertext Transfer Protocol -- HTTP/1.1
Using iPASOLINK as HTTP server enables the following functions:
- WebLCT
WebLCT operation via HTTP protocol is available.
- Session Management
Upon at accepting the connection from external device, the system proceeds to
the login authentication process. An unauthorized user is not accepted.
The default port number of HTTP Service is 80, which can be changed using
WebLCT.
- User authentication funct ion
iPASOLINK supports the internal authentication only.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
78/479
NE Setup
NWD-115476-03E Operation
4-48
4.3.4.1 Service Status Setting
Service Status Settingdisplays the status of service and protocol:
Procedure 4-12
1. Expand User Account/Security Settingfrom the WebLCT menu.
2. Expand Security Management from the User Account/Security Setting
sub menu.
3. Select Service Status SettingfromtheSecurity Managementsub menu.
The Service Status Settingwindow appears.
4. Confirm the status of each Service.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
79/479
NE Setup
Operation NWD-115476-03E
4-49
Figure 4-56 Service Status Setting Window
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
80/479
NE Setup
NWD-115476-03E Operation
4-50
Figure 4-57 Service Status Window
Table 4-22 Service Status Indications
Status Description
Running Protocol or service is enabled
Stopped Protocol or service is disabled
This step ends the procedure.
4.3.4.2 SNMP
Procedure 4-13
1. Expand User Account/Security Settingfrom the WebLCT menu.
2. Expand Security Management from the User Account/Security Setting
sub menu.
3. Select Service Status Settingfrom theSecurity Management sub menu.
The Service Status Settingwindow appears.
4. Click SNMP.TheSNMP Setting option box appears.
Figure 4-58 Service Status Setting Window
ClickSNMP.
4-1
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
81/479
NE Setup
Operation NWD-115476-03E
4-51
5. Specify an appropriate value to each parameter:
Figure 4-59 SNMP Setting Option Box
Table 4-23 SNMP Setting Parameters
Parameter Value Description
Enable Enables SNMPv1/v2c (running)SNMPv1/
SNMPv2c Disable Disables SNMPv1/v2c (stopped)
Enable Enables SNMPv3 (running)SNMPv3
Disable Disables SNMPv3 (stopped)
UDP Port 161
Range: 1 to 65535
Assigns the UDP Port number. The
default port is 161.
Caution
You must reboot the CPU in order to apply the values properly after changing
the UDP port number.
6. Click OKbutton when completed. The Information dialog box appears.
7. ClickOKbutton. The Service Status Settingwindow appears again.
Figure 4-60 Information Dialog Box
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
82/479
NE Setup
NWD-115476-03E Operation
4-52
8. Confirm the displayed SNMP information.
Figure 4-61 Service Status Setting Window (1/2)
Figure 4-62 Service Status Setting Window (2/2)
This step ends the procedure.
4.3.4.3 SNMP Community
This operation registers, modifies, or deletes the SNMP Manager information. Only
the registered SNMP managers have the right to access to the equipment. Up to ten
servers can be registered.
(1) Registration of SNMP Community
Procedure 4-14
1. Expand User Account/Security Settingfrom the WebLCTmenu.
2. Expand Security Management fromthe User Account/Security Setting
sub menu.
Submission ProhibitedNEC Internal Use Only
-
8/11/2019 Operation 400
83/479
NE Setup
Operation NWD-115476-03E
4-53
3. Select Service Status Settingfrom the Security Management sub menu.
4. The Service Status Settingwindow appears. ClickCommunity No. of theSNMP Community field.
Figure 4-63 Service Status Setting Window
5. The SNMP Communityoption box appears. Specify the appropriate value to
each parameter.
Figure 4-64 SNMP Community Option Box
Table 4-24 SNMP Community P