This section provides information to configure cards, MDAs, and ports.
7210 SAS routers have a console port to connect terminals to the router. The 7210 SAS does not support a management port.
Configure parameters from a system console connected to a console port, using Telnet to access a the device remotely or SSH to open a secure shell connection.
The 7210 SAS auto-provisions card and MDA types.
On 7210 SAS platforms, where cards/MDAs are not auto-provisioned, to initialize a card, the chassis slot, line card type, and MDA type must match the preprovisioned parameters. In this context, preprovisioning means to configure the entity type (such as the line card type, MDA type, port, and interface) that is planned for a chassis slot, line card, or MDA. Preprovisioned entities can be installed but not enabled or the slots can be configured but remain empty until populated. Provisioning means that the preprovisioned entity is installed and enabled.
You can:
Some recommendations to configure a port include:
An encapsulation type may be specified to distinguish services on the port or channel. Encapsulation types are not required for network ports.
To configure an Ethernet access port, refer to Configuring Ethernet Port Parameters.
On 7210 SAS platforms that do not support any removable cards and/or MDAs, the most basic configuration must have the following:
This describes common configuration tasks.
This section describes Ethernet port configuration.
A network port is network facing and participates in the service provider transport or infrastructure network processes.
The following is a sample network port configuration output.
Ethernet network port configuration is supported only on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C.
An access-uplink port is network facing and participates in the service provider transport or infrastructure network processes. This is similar to a network port concept.
A SAP can be created when a port is configured in access uplink mode. When a port is configured in access uplink mode, then the encapsulation type of the port is set to QinQ.
The following is a sample network port configuration output.
Access uplink port configuration is supported on the 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C.
Services are configured on access ports used for customer-facing traffic. If a Service Access Port (SAP) is to be configured on a port, it must be configured as access mode or access uplink mode. When a port is configured for access mode, the appropriate encapsulation type can be specified to distinguish the services on the port. When a port has been configured for access mode, multiple services may be configured on the port.
The following is a sample Ethernet access port configuration (for 7210 SAS-D) output.
Access port configuration is supported on the 7210 SAS-D, 7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C.
The following is a sample of an 802.1x port configuration output.
Note: MAC authentication is only supported on 7210 SAS-Dxp. |
The 7210 SAS supports a fallback MAC authentication mechanism for client devices (for example, PCs and cameras) on an Ethernet network that do not support 802.1x EAP.
MAC authentication provides protection against unauthorized access by forcing the device connected to the 7210 SAS to have its MAC address authenticated by a RADIUS server before the device is able to transmit packets through the 7210 SAS.
Use the following CLI syntax to configure MAC authentication for an Ethernet port.
The following example shows the command usage to configure MAC authentication for an Ethernet port.
Use the info detail command to display port configuration information. The following is a sample port configuration output.
Note: VLAN authentication is only supported on 7210 SAS-Dxp. |
The 7210 SAS supports VLAN authentication for client devices (for example, PCs and STBs) on an Ethernet network.
VLAN authentication provides protection against unauthorized access by forcing the device connected to the 7210 SAS to be authenticated by a RADIUS server before the device is able to transmit packets through the 7210 SAS.
Use the following CLI syntax to configure VLAN authentication for an Ethernet port.
The following example shows the command usage to configure VLAN authentication for an Ethernet port.
Use the info detail command to display port configuration information. The following is a sample port configuration output.
The following are general rules for configuring LAGs:
The following is a sample LAG configuration output.
Note: This feature is supported on all 7210 SAS platforms as described in this document, except the 7210 SAS-K 2F1C2T. |
This feature allows the user to track CRC (cyclic redundancy check) errors received on a specific port and notify them. The detection mechanism is based around a configurable threshold specified by the administrator. Two thresholds are configurable, one for CRC degrade and one for CRC signal fail. The first threshold crossing generates an alarm, log entry, trap, but does not bring the physical port down, while the second (signal fail) threshold crossing logs an alarm, trap generation, and brings the port operationally down.
The thresholds are configurable with the following CLI command config>port>ethernet crc-monitor.
This behavior is enabled on a per-port basis. By default, the command and functionality is disabled for the signal degrade and the signal fail.
The user can configure different values for the sf-threshold and the sd-threshold. However, sf-threshold value must be less than or equal to the sd-threshold value.
The values provided by the user for threshold and multiplier is used to compute the error ratio as (Multiplier * (10 ^ - (threshold value)). Port Stats are collected once per second and accumulated over the configured window size. Each second, the oldest sample is discarded and the new sample is added to a running total. If the error ratio exceeds the configured threshold (the preceding computation) over the window size for two consecutive seconds, appropriate actions are taken as follows:
When the condition is cleared, a SNMP trap message to clear the event is sent out.
This section describes basic procedures of the service management tasks:
To change an MDA type already provisioned for a specific slot/card, first you must shut down the slot/MDA/port configuration and then delete the MDA from the configuration. Modify and delete operations can be performed only on the MDAs that are not auto equipped or auto provisioned.
Use the following syntax to modify an MDA.
The modify operation cannot be performed on an IOM card that is auto equipped and auto provisioned during bootup and is fixed.
The delete operation cannot be performed on an IOM card that is auto equipped and auto provisioned during bootup and is fixed.
Use the following syntax to delete a port provisioned for a specific card.