17-83
Cisco ONS 15454 SDH Procedure Guide, R7.0
78-17194-01
Chapter 17 DLPs D1 to D99
DLP- D89 Remap the K3 Byte
DLP-D89 Remap the K3 Byte
Caution If you remap the K3 byte, remap to the same extended byte (Z2, E2, or F1) on each side of the span.
Step 1 In node view, double-click the STM-16 card that connects to the third-party equipment.
Step 2 Click the Provisioning > Line tabs.
Step 3 Click MS-SPRing Ext Byte and choose the alternate byte: Z2, E2, or F1.
Step 4 Click Apply.
Step 5 (Four-fiber MS-SPRing only) Repeat Steps 2 through 4 for each protect card.
Step 6 Repeat this task at the node and card on the other end of the MS-SPRing span.
Note The extension byte chosen in Step 3 should match at both ends of the span.
Step 7 Return to your originating procedure (NTP).
DLP-D90 Provision a Firewall Tunnel
Purpose This task provisions the K3 byte. Do not remap the K3 byte unless it is
specifically required to run an ONS 15454 SDH MS-SPRing through
third-party equipment. This task is unnecessary for most users.
Tools/Equipment STM-16 cards must be installed on the MS-SPRing span that you will
remap.
Prerequisite Procedures DLP-D60 Log into CTC, page 17-49
Required/As Needed As needed
Onsite/Remote Onsite or remote
Security Level Provisioning or higher
Purpose This task provisions destinations that will not be blocked by the firewall.
Firewall tunnels are only necessary when the proxy server is enabled and a
foreign DCC termination exists, or if static routes exist so that the DCC
network is used to access remote networks or devices. You can provision a
maximum of 12 firewall tunnels.
Tools/Equipment None
Prerequisite Procedures DLP-D60 Log into CTC, page 17-49
DLP-D363 Provision Regenerator-Section DCC Terminations, page 20-68
Required/As Needed As needed
Onsite/Remote Onsite or remote
Security Level Superuser