C-75
Cisco ONS 15454 Reference Manual, R7.0
78-17191-01
Appendix C Network Element Defaults
C.3 C.3 Node Default Settings
General settings—Set general node management defaults, including whether to use Daylight
Savings Time (DST), whether to insert Alarm Indication Signal VT (AIS-V) in each VT when the
carrying STS crosses the signal degrade (SD) path bit error rate (BER) threshold, the IP address of
the NTP/SNTP server to be used, the time zone where the node is located, the SD path BER value,
the defaults description, whether to raise a condition on an empty card slot, and whether to report
loopback conditions on Out-of-Service, Maintenance (OOS-MT) state ports.
Power Monitor settings—Set default voltage thresholds for the node.
Network settings—Set whether to prevent display of node IP addresses in CTC (applicable for all
users except Superusers); default gateway node type; whether to raise an alarm when the backplane
LAN cable is disconnected; and whether to display the IP address in the LCD in an editable mode
(in which you can change the IP address directly from LCD screen), to display the IP address on the
LCD as read-only, or to suppress display of the IP on the LCD entirely.
OSI settings—Set Open System Interconnection (OSI) main setup, generic routing encapsulation
(GRE) tunnel, link access protocol on the D channel (LAP-D), router subnet, and TID address
resolution protocol (TARP) settings.
1+1 and Optimized 1+1 protection settings—Set whether or not protected circuits have bidirectional
switching, are revertive, and what the reversion time is; set optimized 1+1 detection, recovery, and
verify guard timer values.
Note Optimized 1+1 supports three timers that ensure the correct state of the cards at key points
in card communication. A verification guard timer is used when a Force is issued, to ensure
that the far end has a chance to respond. A detection guard timer is used to ensure the
presence of an SF/SD condition before switching away from a card. A recover guard timer
ensures the absence of SF/SD prior to switching to a card. You can change the default
number of seconds before these timers expire by changing the NE default for the
corresponding timer to a value within its domain of allowable values.
BLSR protection settings—Set whether BLSR-protected circuits are revertive, and what the
reversion time is, at both the ring and span levels.
Legal Disclaimer—Set the legal disclaimer that warns users at the login screen about the possible
legal or contractual ramifications of accessing equipment, systems, or networks without
authorization.
Security Grant Permissions—Set default user security levels for activating/reverting software,
performance monitoring data clearing, database restoring, and retrieving audit logs.
Security DataComm settings—Set default security settings for TCC Ethernet IP address and IP
netmask, and CTC backplane IP suppression; set secure mode on and secure mode locked (for
TCC2P cards only).
Security Access settings—Set default security settings for LAN access, shell access, serial craft
access, element management system (EMS) access (including Internet Inter-Object Request Broker
Protocol [IIOP] listener port number), TL1 access, and SNMP access.
Security RADIUS settings—Set default RADIUS server settings for accounting port number,
authentication port number, and whether to enable the node as a final authenticator.
Security Policy settings—Set the allowable failed logins before lockout, idle user timeout for each
user-level, optional lockout duration or manual unlock enabled, password reuse and change
frequency policies, number of characters difference between the old and new password, password
aging by security level, enforced single concurrent session per user, and option to disable inactive
user after a set inactivity period.