Dlp- D89 Remap The K3 Byte - Cisco ONS 15454 SDH Procedure Manual

Hide thumbs Also See for ONS 15454 SDH:
Table of Contents

Advertisement

Chapter 17
DLPs D1 to D99
DLP-D89 Remap the K3 Byte
Purpose
Tools/Equipment
Prerequisite Procedures
Required/As Needed
Onsite/Remote
Security Level
If you remap the K3 byte, remap to the same extended byte (Z2, E2, or F1) on each side of the span.
Caution
Step 1
In node view, double-click the STM-16 card that connects to the third-party equipment.
Step 2
Click the Provisioning > Line tabs.
Click MS-SPRing Ext Byte and choose the alternate byte: Z2, E2, or F1.
Step 3
Click Apply.
Step 4
(Four-fiber MS-SPRing only) Repeat Steps
Step 5
Repeat this task at the node and card on the other end of the MS-SPRing span.
Step 6
Note
Return to your originating procedure (NTP).
Step 7
DLP-D90 Provision a Firewall Tunnel
Purpose
Tools/Equipment
Prerequisite Procedures
Required/As Needed
Onsite/Remote
Security Level
78-17194-01
This task provisions the K3 byte. Do not remap the K3 byte unless it is
specifically required to run an ONS 15454 SDH MS-SPRing through
third-party equipment. This task is unnecessary for most users.
STM-16 cards must be installed on the MS-SPRing span that you will
remap.
DLP-D60 Log into CTC, page 17-49
As needed
Onsite or remote
Provisioning or higher
The extension byte chosen in Step
This task provisions destinations that will not be blocked by the firewall.
Firewall tunnels are only necessary when the proxy server is enabled and a
foreign DCC termination exists, or if static routes exist so that the DCC
network is used to access remote networks or devices. You can provision a
maximum of 12 firewall tunnels.
None
DLP-D60 Log into CTC, page 17-49
DLP-D363 Provision Regenerator-Section DCC Terminations, page 20-68
As needed
Onsite or remote
Superuser
2
through
4
for each protect card.
3
should match at both ends of the span.
Cisco ONS 15454 SDH Procedure Guide, R7.0

DLP- D89 Remap the K3 Byte

17-83

Advertisement

Table of Contents
loading

Table of Contents