10 Ethernet Service Configuration 10-1
Introducing MEF Terminology ............................................................................................................... 10-2
MEF10 QoS flow Overview ................................................................................................................... 10-4
EVC Connection Definition .................................................................................................................... 10-5
VLAN and EVC Mapping ...................................................................................................................... 10-6
BW Profile Definition ............................................................................................................................. 10-7
EVC Services Definition ...................................................................................................................... 10-10
Identification Rules Definition ............................................................................................................. 10-13
Edit Rule (Basic) ....................................................................................................................... 10-16
Edit Rule (Advanced) ................................................................................................................ 10-18
Calculating the Range Covered by a Rule ................................................................................. 10-21
Range Calculator Dialog ........................................................................................................... 10-23
Deployment Considerations .................................................................................................................. 10-24
11 Ethernet Operation, Administration and Management 11-1
802.1ag CFM .......................................................................................................................................... 11-2
802.1ag OAM Configuration Overview ...................................................................................... 11-2
CFM MEP Monitoring and Analysis Tools ............................................................................... 11-10
Y.1731 Ethernet OAM .......................................................................................................................... 11-19
Setting ML to Operate with Y.1731 .......................................................................................... 11-20
Y.1731 MEG Definition ............................................................................................................ 11-21
Y.1731 MIP Definitions ............................................................................................................ 11-21
Y.1731 MEP Definitions and Management ............................................................................... 11-22
Y.1731 RMEP Configuration .................................................................................................... 11-24
Y.1731 Tools ............................................................................................................................. 11-26
12 Security Management 12-1
Configuring Session Access Warning Text ............................................................................................ 12-2
Managing User Accounts ........................................................................................................................ 12-3
The User Accounts Pane .............................................................................................................. 12-4
Default User Accounts and Privileges ......................................................................................... 12-5
Adding a User Account ............................................................................................................... 12-5
Editing User Account .................................................................................................................. 12-7
Deleting a User Account .............................................................................................................. 12-7
Password Control .................................................................................................................................... 12-8
System Wide User Settings ......................................................................................................... 12-8
Editing Password in Session ...................................................................................................... 12-10
Locking Out Users ................................................................................................................................ 12-11
Lock a User Account ................................................................................................................. 12-11
System Wide Lockout Behavior ................................................................................................ 12-11
Managing Sessions ............................................................................................................................... 12-13
User Session Information .......................................................................................................... 12-13
Viewing and Managing Current Logged in Sessions ................................................................ 12-13
RADIUS ............................................................................................................................................... 12-15
Configuring for RADIUS Operation ......................................................................................... 12-15
Configuring RADIUS on ML .................................................................................................... 12-16
RADIUS Message Parameters Supported by ML ..................................................................... 12-18
RADIUS Service Type Parameters Supported by ML .............................................................. 12-19
Radius Server Configuration for ML Versions .......................................................................... 12-20
IP Access Control List (ACL)............................................................................................................... 12-21
Managing the IP Access Control List (ACL) ............................................................................ 12-21