
Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
9.1 Introduction..................................................................................................................................................362
9.2 EFM .............................................................................................................................................................364
9.2.1 Introduction.........................................................................................................................................364
9.2.2 Preparing for configurations ...............................................................................................................364
9.2.3 Default configurations of EFM ...........................................................................................................364
9.2.4 Configuring basic functions of EFM...................................................................................................365
9.2.5 Configuring active functions of EFM .................................................................................................366
9.2.6 Configuring EFM passive function.....................................................................................................367
9.2.7 Checking configurations .....................................................................................................................369
9.2.8 Maintenance........................................................................................................................................370
9.3 CFM (IEEE 802.1ag/ITU-Y.1731)...............................................................................................................370
9.3.1 Introduction.........................................................................................................................................370
9.3.2 Preparing for configurations ...............................................................................................................373
9.3.3 Enabling CFM.....................................................................................................................................373
9.3.4 Configuring basic functions of CFM ..................................................................................................374
9.3.5 Configuring CFM fault detection........................................................................................................375
9.3.6 Configuring fault acknowledgement...................................................................................................377
9.3.7 Configuring CFM fault location..........................................................................................................378
9.3.8 Configuring alarm indication signal....................................................................................................379
9.3.9 Configuring Ethernet locked signal ....................................................................................................380
9.3.10 Configuring Ethernet CSF ................................................................................................................381
9.3.11 Configuring performance monitoring ...............................................................................................381
9.3.12 Checking configurations ...................................................................................................................381
9.3.13 Example for configuring CFM..........................................................................................................382
9.4 SLA..............................................................................................................................................................385
9.4.1 Introduction.........................................................................................................................................385
9.4.2 Preparing for configurations ...............................................................................................................387
9.4.3 Limits on SLA configuration ..............................................................................................................387
9.4.4 Default configurations of SLA............................................................................................................388
9.4.5 Creating SLA operation ......................................................................................................................388
9.4.6 Configuring SLA scheduling ..............................................................................................................389
9.4.7 Configuring SLA threshold.................................................................................................................389
9.4.8 Configuring maintenance window......................................................................................................390
9.4.9 Configuring availability test................................................................................................................390
9.4.10 Enabling alarms ................................................................................................................................391
9.4.11 Checking configurations ...................................................................................................................391
9.4.12 Example for configuring SLA...........................................................................................................392
9.5 BFD..............................................................................................................................................................393
9.5.1 Introduction.........................................................................................................................................393
9.5.2 Preparing for configurations ...............................................................................................................394
9.5.3 Configuring BFD session binding.......................................................................................................394
9.5.4 Configuring BFD session parameters .................................................................................................395