cc/td/doc/product/software/ios111
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Automatic Protection Switching of Packet-over-SONET Circuits

Feature Summary

Platforms

Supported MIBs and RFCs

Configuration Tasks

Configuration Examples

Command Reference

Automatic Protection Switching of Packet-over-SONET Circuits

Feature Summary

The automatic protection switching (APS) feature is supported on Cisco 7500 series routers. This feature allows switchover of packet-over-SONET (POS) circuits and is often required when connecting SONET equipment to telco equipment. APS refers to the mechanism of bringing a "protect" POS interface into the SONET network as the "working" POS interface on a circuit from the intervening SONET equipment.

The protection mechanism used for this feature is "1+1, Bidirectional, nonrevertive" as described in the Bellcore publication TR-TSY-000253, SONET Transport Systems; Common Generic Criteria, Section 5.3. In the 1+1 architecture, there is one working interface (circuit) and one protect interface, and the same payload from the transmitting end is sent to both the receiving ends. The receiving end decides which interface to use. The line overhead (LOH) bytes (K1 and K2) in the SONET frame indicate both status and action.

The protect interface is configured with the IP address of the router that has the working interface. The APS Protect Group Protocol, which runs on top of UDP, provides communication between the process controlling the working interface and the process controlling the protect interface. Using this protocol, POS interfaces can be switched due to a router failure, degradation or loss of channel signal, or manual intervention. In bidirectional mode, the receive and transmit channels are switched as a pair. In unidirectional mode, the transmit and receive channels are switched independently. For example, if the receive channel on the working interface has a loss of channel signal, both the receive and transmit channels are switched.

In addition to the new Cisco IOS commands added for the APS feature, the POS interface configuration commands pos threshold and pos report have been added to support user configuration of the bit error rate (BER) thresholds and reporting of SONET alarms.

Document Conventions

Command descriptions use these conventions:

Platforms

This feature is supported on the Cisco 7500 series platforms.

Supported MIBs and RFCs

None

Configuration Tasks

Two SONET connections are required to support APS. In a telco environment, the SONET circuits must be provisioned as APS. You must also provision the operation (for example, 1+1), mode (for example, bidirectional), and revert options (for example, no revert). If the SONET connections are homed on two separate routers (the normal configuration), an out of band (OOB) communications channel between the two routers needs to be set up for APS communication.

When configuring APS, we recommend you configure the working interface first. Normal operation with 1+1 operation is to configure it as a working interface. Also configure the IP address of the interface being used as the APS OOB communications path.

For more information on POS interfaces, refer to the Cisco IOS documentation (in particular, the "Configuring Interfaces" chapter in the Configuration Fundamentals Configuration Guide), and the installation and configuration documentation that accompanies the POS hardware.

Configure APS Working and Protect Interfaces

This section describes how to configure a working and protect interface. The tasks listed in this section are required. Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.

To configure the working interface, perform the following steps beginning in global configuration mode:
Task Command

Step 1 Specify the POS interface to be configured as the working interface and enter interface configuration mode.

interface pos slot/port-adapter/port

Step 2 Configure this interface as a working interface.

aps working circuit-number

Step 3 Exit configuration mode.

end

Step 4 Verify that the interface is configured correctly.

show controller pos

show interface pos

show aps


Note If a router has two or more protect interfaces, the aps group command for each interface must precede the corresponding aps protect command.

To configure the protect interface, perform the following steps beginning in global configuration mode:
Task Command

Step 1 Specify the POS interface to be configured as the protect interface and enter interface configuration mode.

interface pos slot/port-adapter/port

Step 2 Configure this interface as a protect interface. Specify the IP address of the router that contains the working interface.

aps protect circuit-number ip-address

Step 3 Exit configuration mode.

end

Step 4 Verify that the interface is configured correctly.

show controller pos

show interface pos

show aps

Configure Other APS Options

To configure the other APS options, perform any of the following tasks in interface configuration mode. The tasks listed in this section are optional.
Task Command

Enable authentication and specify the string that must be present to accept any packet on the OOB communication channel.

aps authenticate string

Manually switch the specified circuit to a protect interface, unless a request of equal or higher priority is in effect.

aps force circuit-number

Allow more than one protect/working interface group to be supported on a router.

aps group group-number

Prevent a working interface from switching to a protect interface.

aps lockout circuit-number

Manually switch a circuit to a protect interface, unless a request of equal or higher priority is in effect.

aps manual circuit-number

Enable automatic switchover from the protect interface to the working interface after the working interface becomes available.

aps revert minutes

Change the time between hello packets and the time before the protect interface process declares a working interface's router to be down (that is, seconds1 for the hello time, and seconds2 for the hold time).

aps timers seconds1 seconds2

Configure a protect interface for unidirectional mode.

aps unidirectional

Monitor and Maintain APS

To provide information about system processes, the Cisco IOS software includes an extensive list of EXEC commands that begin with the word show, which, when executed, display detailed tables of system information. Following is a list of some of the common show commands for the APS feature.

Perform these tasks in privileged EXEC mode to display the information described:
Task Command

Display information about the automatic protection switching feature.

show aps

Display information about the hardware.

show controllers pos

Display information about the interface.

show interface pos

Configure SONET Alarm Reporting

To configure the thresholds and the type of SONET alarms that are reported, perform any of the following tasks in interface configuration mode. The tasks listed in this section are optional. The default settings are adequate for most POS installations.
Task Command

Configure the BER threshold values for signal failure (SF), signal degrade (SD), or threshold crossing alarms alarms (TCA).

pos threshold {b1-tca | b2-tca | b3-tca | sd-ber | sf-ber} rate

Enable reporting of selected SONET alarms.

pos report {b1-tca | b2-tca | b3-tca | lais | lrdi | pais | plop | prdi | rdool | sd-ber | sf-ber | slof | slos}

To display the current BER threshold setting or to view the reporting of the SONET alarms, use the show controllers pos EXEC command.

Configuration Examples

The following examples show how to configure basic APS on a router and how to configure more than one protect/working interface on a router by using the aps group command.

Basic APS Configuration

The following example shows the configuration of APS on router A and router B (see Figure 1). In this example, router A is configured with the working interface, and router B is configured with the protect interface. If the working interface on router A becomes unavailable, the connection will automatically switchover to the protect interface on router B.


Figure 1: Basic APS Configuration

On router A, which contains the working interface, use the following configuration:

router# configure terminal
router(config)# interface ethernet 0/0
router(config-if)# ip address 7.7.7.7 255.255.255.0
router(config)# interface pos 2/0/0
router(config-if)# aps working 1
router(config-if)# end
router#

On router B, which contains the protect interface, use the following configuration:

router# configure terminal
router(config)# interface ethernet 0/0
router(config-if)# ip address 7.7.7.6 255.255.255.0
router(config)# interface pos 3/0/0
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# end
router#

To verify the configuration or to determine if a switchover has occurred, use the show aps command.

Multiple APS Interface Configuration

To configure more than one protect/working interface on a router, you must use the aps group command. The following example shows the configuration of grouping more than one working/protect interface on a router. In this example, router A is configured with a working interface and a protect interface, and router B is configured with a working interface and a protect interface. If the working interface 2/0/0 on router A becomes unavailable, the connection will switchover to the protect interface 3/0/0 on router B because they are both in APS group 10. Similarly, if the working interface 2/0/0 on router B becomes unavailable, the connection will switchover to the protect interface 3/0/0 on router A because they are both in APS group 20.


Figure 2:
Multiple Working and Protect Interfaces Configuration

Note Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.

On router A, which contains the working interface for group 10 and the protect interface for group 20, use the following configuration:

router# configure terminal
router(config)# interface ethernet 0/0
router(config-if)# ip address 7.7.7.6 255.255.255.0
router(config)# interface pos 2/0/0
router(config)# aps group 10
router(config-if)# aps working 1
router(config)# interface pos 3/0/0
router(config-if)# aps group 20
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# end
router#

On router B, which contains the protect interface for group 10 and the working interface for group 20, use the following configuration:

router# configure terminal
router(config)# interface ethernet 0/0
router(config-if)# ip address 7.7.7.7 255.255.255.0
router(config)# interface pos 2/0/0
router(config)# aps group 20
router(config-if)# aps working 1
router(config)# interface pos 3/0/0
router(config-if)# aps group 10
router(config-if)# aps protect 1 7.7.7.6
router(config-if)# end
router#

To verify the configuration or to determine if a switchover has occurred, use the show aps command.

Command Reference

This section documents new or modified commands. All other commands used with this feature are documented in the Cisco IOS Release 11.1 command references.

aps authenticate

To enable authentication and specify the string that must be present to accept any packet on the out of band (OOB) communications channel, use the aps authenticate interface command. To disable authentication, use the no form of the command.

aps authenticate string
no aps authenticate

Syntax Description

string

Text that must be present to accept the packet on a protected or working interface. Up to 8 alphanumeric characters are accepted.

Default

Authentication is disabled.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps authenticate command to ensure that only valid packets are accepted on the OOB communication channel.

The aps authenticate command must be configured on both the working and protect interfaces.

Examples

The following example enables authentication on POS interface 0 in slot 4:

router# configure terminal
router(config)# interface pos 4/0/0
router(config-if)# aps working 1
router(config-if)# aps authenticate sanjose
router(config-if)# exit
router(config)# exit
router#
Related Commands

aps protect
aps working

aps force

To manually switch the specified circuit to a protect interface, unless a request of equal or higher priority is in effect, use the aps force interface configuration command. To cancel the switch, use the no form of the command.

aps force circuit-number
no aps force circuit-number

Syntax Description

circuit-number

Number of the circuit to switch to the protect interface.

Default

No circuit is switched.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps force command to manually switch the interface to a protect interface when you are not using the aps revert command. For example, if you need to change the fiber connection, you can manually force the working interface to switch to the protect interface.

In a one-plus-one (1+1) configuration only, you can use the aps force 0 command to force traffic from the protect interface back onto the working interface.

The aps force command has a higher priority than any of the signal failures or the aps manual command.

The aps force command is configured only on protect interfaces.

Examples

The following example forces the circuit on POS interface 0 in slot 3 (a protect interface) back onto a working interface:

router# configure terminal
router(config)# interface pos 3/0/0
router(config-if)# aps protect 1
router(config-if)# aps force 1
router(config-if)# exit
router(config)# exit
router#
Related Commands

aps manual
aps protect
aps working

aps group

To allow more than one protect and working interface to be supported on a router, use the aps group interface configuration command. To remove a group, use the no form of the command.

aps group group-number
no aps group group-number

Syntax Description

group-number

Number of the group. The default group number is 0.

Default

No groups exist.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps group command to specify more than one working and protect interfaces on a router. For example, working channel for group 0 and protect channel for group 1 on one router and working channel for group 1 and protect channel for group 0 on another router.

The aps group command must be configured on both the protect and working interfaces.

Examples

The following example configures two working/protect interface pairs. Working interface (3/0/0) is configured in group 10 (the protect interface for this working interface is configured on another router), and protect interface (2/0/1) is configured in group 20:

router# configure terminal
router(config)# interface ethernet 0/0
router(config-if)# ip address 7.7.7.6 255.255.255.0
router(config)# interface pos 3/0/0
router(config-if)# aps group 10
router(config-if)# aps working 1
router(config)# interface pos 2/0/1
router(config-if)# aps group 20
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# end

On the second router, protect interface (4/0/0) is configured in group 10, and working interface (5/0/0) is configured in group 20 (the protect interface for this working interface is configured on another router):

router(config)# interface ethernet 0/0
router(config-if)# ip address 7.7.7.7 255.255.255.0
router(config)# interface pos 4/0/0
router(config-if)# aps group 10
router(config-if)# aps protect 1 7.7.7.6
router(config)# interface pos 5/0/0
router(config-if)# aps group 20
router(config-if)# aps working 1 
router(config)# end
router#
Related Commands

aps protect
aps working

aps lockout

To prevent a working interface from switching to a protect interface, use the aps lockout interface configuration command. To remove the lockout, use the no form of the command.

aps lockout circuit-number
no aps lockout circuit-number

Syntax Description

circuit-number

Number of the circuit to lock out.

Default

No lockout exists.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

The aps lockout command is configured only on protect interfaces.

Examples

The following example locks out (that is, prevents the circuit from switching to a protect interface in the event that the working circuit becomes unavailable) the POS interface 3/0/0:

router# configure terminal
router(config)# interface pos 3/0/0
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# aps lockout 1
router(config-if)# end
router#
Related Commands

aps protect
aps working

aps manual

To manually switch a circuit to a protect interface, use the aps manual interface configuration command. To cancel the switch, use the no form of the command.

aps manual circuit-number
no aps manual circuit-number

Syntax Description

circuit-number

Number of the circuit to switch to a protect interface.

Default

No circuit is switched.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps manual command to manually switch the interface to a protect interface. For example, you can use this feature when you need to perform maintenance on the working channel. If a protection switch is already up, you can also use the aps manual command to revert the communication link back to the working interface before the wait to restore (WTR) time has expired. The WTR time period is set by the aps revert command.

In a one-plus-one (1+1) configuration only, you can use the aps manual 0 command to force traffic from the protect interface back onto the working interface.

The aps manual command is a lower priority than any of the signal failures or the aps force command.

Examples

The following example forces the circuit on POS interface 0 in slot 3 (a working interface) back onto the protect interface:

router# configure terminal
router(config)# interface pos 3/0/0
router(config-if)# aps working 1
router(config-if)# aps manual 1
router(config-if)# end
router#
Related Commands

aps force
aps protect
aps revert
aps working

aps protect

To enable a POS interface as a protect interface, use the aps protect interface command. To remove the POS interface as a protect interface, use the no form of the command.

aps protect circuit-number ip-address
no aps protect circuit-number ip-address
Syntax Description

circuit-number

Number of the circuit to enable as a protect interface.

ip-address

IP address of the router that has the working POS interface.

Default

No circuit is protected.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps protect command to configure the POS interface used by a working interface if the working interface becomes unavailable due to a router failure, degradation or loss of channel signal, or manual intervention.


Note Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.
Examples

The following example configures circuit 1 on POS interface 5/0/0 as a protect interface for the working interface on the router with the IP address of 7.7.7.7. For information on how to configure the working interface, refer to the aps working command.

router# configure terminal
router(config)# interface pos 5/0/0
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# end
router#
Related Commands

aps working

aps revert

To enable automatic switchover from the protect interface to the working interface after the working interface becomes available, use the asp revert interface command. To disable automatic switchover, use the no form of the command.

aps revert minutes
no aps revert

Syntax Description

minutes

Number of minutes until the circuit is switched back to the working interface after the working interface is available.

Default

Automatic switchover is disabled.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps revert command to return the circuit to the working interface when it becomes available.

The asp revert command is configured only on protect interfaces.

Examples

The following example enables circuit 1 on POS interface 5/0/0 to revert to the working interface after the working interface has been available for 3 minutes:

router# configure terminal
router(config)# interface pos 5/0/0
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# aps revert 3
router(config-if)# end
router#
Related Commands

aps protect

aps timers

To change the time between hello packets and the time before the protect interface process declares a working interface's router to be down, use the aps timers interface configuration command. To return to the default timers, use the no form of the command.

aps timers seconds1 seconds2
no aps timers

Syntax Description

seconds1

Number of seconds to wait before sending a hello packet (hello timer). The default is 1 second.

seconds2

Number of seconds to wait to receive a response from a hello packet before the interface is declared down (hold timer). The default is 3 seconds.

Default

Hello time is 1 second, and hold time is 3 seconds.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps timers command to control the time between an automatic switchover from the protect interface to the working interface after the working interface becomes available.

Normally, the hold time is greater than or equal to three times the hello time.

The aps timers command is configured only on protect interfaces.

Examples

The following example specifies a hello time of 2 seconds and a hold time of 6 seconds on circuit 1 on POS interface 5/0/0:

router# configure terminal
router(config)# interface pos 5/0/0
router(config-if)# aps working 1
router(config-if)# aps timers 2 6
router(config-if)# end
router#

aps unidirectional

To configure a protect interface for unidirectional mode, use the aps unidirectional interface configuration command. To return to the default, bidirectional mode, use the no form of the command.

aps unidirectional
no aps unidirectional

Syntax Description

This command has no keywords or arguments

Default

Bidirectional mode.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Use the aps unidirectional command when you must interoperate with SONET network equipment (ADMs) that supports unidirectional mode.


Note We recommend bidirectional mode when it is supported by the interconnecting SONET equipment. When the protect interface is configured as unidirectional, the working and protect interfaces must cooperate to switch the transmit and receive SONET channel in a bidirectional fashion. This happens automatically when the SONET network equipment is in bidirectional mode.

The asp unidirectional command is configured only on protect interfaces.

Examples

The following example configures POS interface 3/0/0 for unidirectional mode:

router# configure terminal
router(config)# interface pos 3/0/0
router(config-if)# aps unidirectional
router(config-if)# aps protect 1 7.7.7.7
router(config-if)# end
router#

aps working

To configure a POS interface as a working interface, use the aps working interface command. To remove the protect from the POS interface, use the no form of the command.

aps working circuit-number
no aps working circuit-number
Syntax Description

circuit-number

Circuit number associated with this working interface.

Default

No circuit is configured as working.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

When a working interface becomes unavailable because of a router failure, degradation or loss of channel signal, or manual intervention, the circuit is switched to the protect interface to maintain the connection.

To enable the circuit on the protect interface to switch back to the working interface after the working interface becomes available again, use the aps revert interface configuration command.


Note Configure the working interface before configuring the protect interface to avoid the protect interface from becoming the active circuit and disabling the working circuit when it is finally discovered.
Examples

The following example configures the POS interface 0 in slot 4 as a working interface. For information on how to configure the protect interface, refer to the aps protect command.

router# configure terminal
router(config)# interface pos 4/0/0
router(config-if)# aps working 1
router(config-if)# end
router#
Related Commands

aps protect
aps revert

pos report

To permit selected SONET alarms to be logged to the console for a POS interface, use the pos report interface command. To disable logging of select SONET alarms, use the no form of this command.

pos report {b1-tca | b2-tca | b3-tca | lais | lrdi | pais | plop | prdi | rdool | sd-ber | sf-ber |
slof | slos}
no pos report {b1-tca | b2-tca | b3-tca | lais | lrdi | pais | plop | prdi | rdool | sd-ber | sf-ber |
slof | slos}

Syntax Description

b1-tca

Report B1 bit error rate (BER) threshold crossing alarm errors. Reported by default.

b2-tca

Report B2 BER threshold crossing alarm errors. Reported by default.

b3-tca

Report B3 BER threshold crossing alarm errors. Reported by default.

lais

Report line alarm indication signal errors.

lrdi

Report line remote defect indication errors.

pais

Report path alarm indication signal errors.

plop

Report path loss of pointer errors. Reported by default.

prdi

Report path remote defect indication errors.

rdool

Report receive data out of lock errors.

sd-ber

Report signal degradation BER errors.

sf-ber

Report signal failure BER errors. Reported by default.

slof

Report section loss of frame errors. Reported by default.

slos

Report section los of signal errors. Reported by default.

Default

b1-tca, b2-tca, b3-tca, plop, sf-ber, slof, and slos are reported by default.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Reporting an alarm means that the alarm can be logged to the console. Just because an alarm is permitted to be logged does not guarantee that it is logged. SONET alarm hierarchy rules dictate that only the most severe alarm of an alarm group is reported. Whether an alarm is reported or not, you can view the current state of a defect by checking the "Active Defects" line from the show controllers pos command output. A defect is a problem indication that is a candidate for an alarm.

For B1, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B1 byte of the following frame. Differences indicate that section level bit errors have occurred.

For B2, the bit interleaved parity error report is calculated by comparing the BIP-8/24 code with the BIP-8 code extracted from the B2 byte of the following frame. Differences indicate that line level bit errors have occurred.

For B3, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B3 byte of the following frame. Differences indicate that path level bit errors have occurred.

PAIS is sent by line terminating equipment (LTE) to alert the downstream path terminating equipment (PTE) that it has detected a defect on its incoming line signal.

PLOP is reported as a result of an invalid pointer (H1, H2) or an excess number of new data flag (NDF) enabled indications.

SLOF is detected when a severely error framing (SEF) defect on the incoming SONET signal persists for 3 milliseconds.

SLOS is detected when an all-zeros pattern on the incoming SONET signal lasts 19(+-3) microseconds or longer. This defect might also be reported if the received signal level drops below the specified threshold.

To determine the alarms that are reported on the interface, use the show controllers pos command.

Example

The following example enables reporting of SD-BER and LAIS alarms on the interface:

Router(config)# interface pos 3/0/0
Router(config-if)#  pos report sd-ber
Router(config-if)#  pos report lais
Router(config-if)# end
Router#
Related Commands

interface pos
show controllers pos

pos threshold

To set the BER threshold values of the specified alarms for a POS interface, use the pos threshold interface command. To return to the default setting, use the no form of this command.

pos threshold {b1-tca | b2-tca | b3-tca | sd-ber | sf-ber} rate
no pos threshold {b1-tca | b2-tca | b3-tca | sd-ber | sf-ber} rate

Syntax Description

b1-tca

B1 bit error rate (BER) threshold crossing alarm.

b2-tca

B2 BER threshold crossing alarm.

b3-tca

B3 BER threshold crossing alarm.

sd-ber

Signal degrade BER threshold.

sf-ber

Signal failure BER threshold.

rate

Bit error rate from 3 to 9 (10-n). The default is 6 for all thresholds except for the sf-ber. For sf-ber, the default is 3 (that is, 10e-3).

Default

The default is 6 for b1-tca, b2-tca, b3-tca, and sd-ber. The default is 3 for sf-ber.

Command Mode

Interface configuration

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

For B1, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B1 byte of the following frame. Differences indicate that section level bit errors have occurred.

For B2, the bit interleaved parity error report is calculated by comparing the BIP-8/24 code with the BIP-8 code extracted from the B2 byte of the following frame. Differences indicate that line level bit errors have occurred.

For B3, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B3 byte of the following frame. Differences indicate that path level bit errors have occurred.

SF-BER and SD-BER are sourced from B2 BIP-8 error counts (as is B2-TCA). However, SF-BER and SD-BER feed into the APS machine and can lead to a protection switch (if APS is configured).

B1-TCA, B2-TCA, and B3-TCA do nothing more than print a log message to the console (if reports for them are enabled).

To determine the BER thresholds configured on the interface, use the show controllers pos command.

Example

The following example configures thresholds on the interface:

Router(config)# interface pos 3/0/0
Router(config-if)#  pos threshold sd-ber 8
Router(config-if)#  pos threshold sf-ber 4
Router(config-if)#  pos threshold b1_tca 4
Router(config-if)# end
Router#
Related Commands

interface pos
show controllers pos

show aps

To display information about the current automatic protection switching (APS) feature, use the show aps EXEC command.

show aps
Syntax Description

This command has no arguments or keywords.

Command Mode

Privileged EXEC

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC.

Sample Displays

The following is sample output of the show aps command on a router configured with a working interface. In this example, POS interface 0/0/0 is configured as a working interface in group 1, and the interface is selected (that is, active).

router1# show aps
POS0/0/0 working group 1 channel 1 Enabled Selected

The following is sample output of the show aps command on a router configured with a protect interface. In this example, POS interface 2/0/0 is configured as a protect interface in group 1, and the interface is not selected (the ~ indicates that the interface is not active). The output also shows that the working channel is located on the router with the IP address 15.1.6.1 and that the interface is currently selected (that is, active).

router2# show aps
POS2/0/0 protect group 1 channel 0 bidirectional ~Selected
        Rx_K1= 0, Rx_K2= 0 Tx_K1= 0 Tx_K2= 5
        Working channel 1 at 15.1.6.1 Enabled 

For the K1 field (8 bits), the first 4 bits indicate the channel number that has made the request, and the last 4 bits map to the the requests (local or external) listed in Table 1. For K2 field (8 bits), the first 4 bits indicate the channel number bridged onto the protect line, the next bit is the architecture used, and the last 3 bits indicate the mode of operation or non-APS use listed in Table 2.


Table 1: K1 Bit Descriptions
Bits (hex) Description
K1 Bits 87654321

Bits 8 through 5

nnnn

Channel number that made the request.

Bits 4 through 1

1111 (0xF)

Lockout of protection request.

1110 (0xE)

Forced switch request.

1101 (0xD)

Signal failure (SF)-high priority request.

1100 (0xC)

Signal failure (SF)-low priority request.

1011 (0xB)

Signal degradation (SD)-high priority request.

1010 (0xA)

Signal degradation (SD)-low priority request.

1001 (0x9)

Not used.

1000 (0x8)

Manual switch request.

0111 (0x7)

Not used.

0110 (0x6)

Wait to restore request.

0101 (0x5)

Not used.

0100 (0x4)

Exercised request.

0011 (0x3)

Not used.

0010 (0x2)

Reverse request.

0001 (0x1)

Do not revert request.

0000 (0x0)

No request.


Table 2: K2 Bits Descriptions
Bits Description
K2 Bits 87654321

Bits 8 through 5

nnnn

Channel number bridged on the protection line.

Bit 4

1

One to n (1:n) architecture.

0

One plus one (1+1) architecture.

Bits 3 through 1

111

Line AIS.

110

Line RDI.

101

Bidirectional operation mode.

100

Unidirectional operation mode.

other

Reserved.

Related Commands

aps protect
aps working

show controllers pos

To display information about the POS controllers, use the show controllers pos privileged EXEC command.

show controllers pos [slot-number] [details]
Syntax Description

slot-number

(Optional) The chassis slot that contains the POS interface. For the Cisco 7500 series, use slot/port-adapter/port (for example, 2/0/0). For the Cisco 12000 series, use slot/port (for example, 4/0). The "/" is required. If you do not specify a slot number, information for all the installed POS controllers is displayed.

details

(Optional) In addition to the normal information displayed by the show controllers pos command, the details option provides a hexadecimal and ASCII "dump" of the path trace buffer.

Command Mode

Privileged EXEC

Usage Guidelines

This command first appeared in Cisco IOS Release 11.1 CC and 11.2 GS.

The information displayed is generally useful for diagnostic tasks performed by technical support personnel only.

Sample Display

The following is sample output of the show controllers pos command on a Cisco 7500 series router:

router# show controllers pos      
POS2/0/0
SECTION
  LOF = 0          LOS = 2335                         BIP(B1) = 77937133
LINE
  AIS = 2335       RDI = 20         FEBE = 3387950089 BIP(B2) = 1622825387
PATH
  AIS = 2340       RDI = 66090      FEBE = 248886263  BIP(B3) = 103862953
  LOP = 246806     NEWPTR = 11428072   PSE = 5067357     NSE = 4645
Active Defects: B2-TCA B3-TCA
Active Alarms:  None
Alarm reporting enabled for: B1-TCA
APS
  COAPS = 12612784   PSBF = 8339
  State: PSBF_state = False
  Rx(K1/K2): 00/CC  Tx(K1/K2): 00/00
  S1S0 = 03, C2 = 96
CLOCK RECOVERY
  RDOOL = 64322060
  State: RDOOL_state = True
PATH TRACE BUFFER: UNSTABLE
  Remote hostname :
  Remote interface:
  Remote IP addr  :
  Remote Rx(K1/K2): ../..  Tx(K1/K2): ../..
BER thresholds:  SF = 10e-3  SD = 10e-8
TCA thresholds:  B1 = 10e-7   B2 = 10e-3  B3 = 10e-6
router#

Table 3 describes the fields shown in the display.


Table 3: Show Controllers POS Field Descriptions
Field Description

POS2/0/0

Slot number of the POS interface.

LOF

Section loss of frame is detected when a severely error framing (SEF) defect on the incoming SONET signal persist for 3 milliseconds.

LOS

Section loss of signal is detected when an all-zeros pattern on the incoming SONET signal lasts 19(+-3) microseconds or longer. This defect might also be reported if the received signal level drops below the specified threshold.

BIP(B1)/BIP(B2)/BIP(B3)

Bit interleaved parity error reported.

For B1, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B1 byte of the following frame. Differences indicate that section level bit errors have occurred.

For B2, the bit interleaved parity error report is calculated by comparing the BIP-8/24 code with the BIP-8 code extracted from the B2 byte of the following frame. Differences indicate that line level bit errors have occurred.

For B3, the bit interleaved parity error report is calculated by comparing the BIP-8 code with the BIP-8 code extracted from the B3 byte of the following frame. Differences indicate that path level bit errors have occurred.

AIS

Alarm indication signal.

Line alarm indication signal is sent by the section terminating equipment (STE) to alert the downstream line terminating equipment (LTE) that a LOS or LOF defect has been detected on the incoming SONET section.

Path alarm indication signal is sent by the LTE to alert the downstream path terminating equipment (PTE) that it has detected a defect on its incoming line signal.

RDI

Remote defect indication.

Line remote defect indication is reported by the downstream LTE when it detects LOF, LOS, or AIS.

Path remote defect indication is reported by the downstream PTE when it detects a defect on the incoming signal.

FEBE

Far end block errors.

Line far end block error (accumulated from the M0 or M1 byte) is reported when the downstream LTE detects BIP(B2) errors.

Path far end block error (accumulated from the G1 byte) is reported when the downstream PTE detects BIP(B3) errors.

LOP

Path loss of pointer is reported as a result of an invalid pointer (H1, H2) or an excess number of new data flag (NDF) enabled indications.

NEWPTR

An inexact count of the number of times the SONET framer has validated a new SONET pointer value (H1,H2).

PSE

An inexact count of the number of times the SONET framer has detected a positive stuff event in the received pointer (H1, H2).

NSE

An inexact count of the number of times the SONET framer has detected a negative stuff event in the received pointer (H1, H2).

Active Defects

List of all currently active SONET defects.

Active Alarms

List of current Alarms as enforced by Sonet Alarm Hierarchy.

Alarm reporting enabled for

List of alarms that you enabled reporting for with the pos report interface command.

APS

Automatic protection switching.

COAPS

An inexact count of the number of times a new APS value has been detected in the K1, K2 bytes.

PSBF

An inexact count of the number of times a protection switching byte failure has been detected (no three consecutive SONET frames contain identical K1 bytes).

PSBF_state

Protection switching byte failure state.

Rx(K1/K2)/Tx(K1/K2)

Contents of the received and transmitted K1 and K2 bytes. For more information on the K1 field, refer to Table 1. For more information on the K2 field, refer to Table 2.

S1S0

The two S bits received in the last H1 byte.

C2

The value extracted from the SONET path signal label byte (C2).

CLOCK RECOVERY

SONET clock is recovered using information in the SONET overhead. RDOOL is an inexact count of the number of times Receive Data Out Of Lock has been detected which indicates the clock recovery phased lock loop is unable to lock to the receive stream.

PATH TRACE BUFFER

SONET path trace buffer is used to communicate information regarding the remote hostname, interface name/number and IP address. This is a Cisco-proprietary use of the J1 (path trace) byte.

BER thresholds

List of the bit error rate (BER) thresholds you configured with the pos threshold interface command.

TCA thresholds

List of threshold crossing alarms (TCA) you configured with the pos threshold interface command.


hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.