Summary of the content on the page No. 1
TM
Broadmore 1750
USER MANUAL
Part Number: 770-0020-DC
Product Release 4.6
January 2008
Summary of the content on the page No. 2
Copyright© 2008 Carrier Access Corporation. All rights reserved. The information presented in this manual is subject to change without notice and does not represent a commitment on the part of Carrier Access Corporation. The hardware and software described herein are furnished under a license or non-disclosure agreement. The hardware, software, and manual may be used or copied only in accordance with the terms of this agreement. It is against the law to reproduce, transmit, transcribe, store
Summary of the content on the page No. 3
PREFACE Preface Compliance FCC Requirements, Part 15 This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the Federal Communications Rules. These limits are designed to provide reasonable protection against harmful interference when equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instruction manual ma
Summary of the content on the page No. 4
Preface DISA Validated Defense Information System Agency, Center for Information Assurance Engineering validated Broadmore Information Assessment, 2 August 2006, contract number SP0700-98-D-1002, TAT 5-15. FIPS 140-2 Validated FIPS 140-2 Inside. National Institute of Technology (NIST) Cryptographic Module Validation Program (CMVP) validated Broadmore to FIPS 140-2, Level 1 overall, Certificate #478, November 2004. Certificate and Security Policy maintained at http://csrc.nist.gov/cryptval
Summary of the content on the page No. 5
Preface NEBS Validated Network Equipment Building System (NEBS). The Broadmore 1750 has been validated to Telcordia GR-1089-CORE, Level 3 Requirements, Issue 2, December 1997 Revision 1, February 1999. See MET Labs report ESL-9647 and TEL-9647.2000. National Electrical Code Requirements Equipment intended to be electrically connected to a telecommunications network shall be listed for the purpose. The Broadmore 1750 is listed and is in compliance with UL60950 third edition, and CSA-C22.2 N
Summary of the content on the page No. 6
Preface Safety Information CAUTION! ALWAYS USE CAUTION WHEN INSTALLING TELEPHONE LINES. READ THE CAUTIONS BELOW FOR DETAILS ON SAFETY GUIDELINES TO PREVENT INJURY. Never touch uninsulated telephone wires and terminals unless the telephone line has been disconnected at the Network Interface (NI) as voltage potentials as high as 300 VAC may be present across the transmit and receive pairs. Only use No. 26 AWG or larger telecommunication line cord, to reduce the risk of fire. Never insta
Summary of the content on the page No. 7
Preface Notices This manual contains important information and warnings that must be followed to ensure safe operation of the equipment. DANGER! A DANGER NOTICE INDICATES THE PRESENCE OF A HAZARD THAT CAN OR WILL CAUSE DEATH OR SEVERE PERSONAL INJURY IF THE HAZARD IS NOT AVOIDED. CAUTION! A CAUTION NOTICE INDICATES THE POSSIBILITY OF INTERRUPTING NETWORK SERVICE IF THE HAZARD IS NOT AVOIDED. WARNING! A WARNING NOTICE INDICATES THE POSSIBILITY OF EQUIPMENT DAMAGE IF THE HAZARD IS NOT
Summary of the content on the page No. 8
Preface Electrostatic Discharge (ESD) Precautions WARNING! THE BROADMORE CONTAINS CIRCUIT CARDS AND COMPONENTS THAT ARE SUBJECT TO DAMAGE BY ELECTROSTATIC DISCHARGE. ESD can damage processors, circuit cards, and other electronic components. Always observe the following precautions before installing a system component. 1. Do not remove a component from its protective packaging until ready to install it. 2. Wear a wrist grounding strap and attach it to an ESD connector or a metal part of t
Summary of the content on the page No. 9
Preface Warranty Carrier Access warrants to BUYER that Product Hardware will be free from substantial defect in material and workmanship under normal use in accordance with its Documentation and given proper installation and maintenance for period of one year from the date of shipment by Carrier Access. Carrier Access warrants that the Licensed Software, when used as permitted under its License Terms and in accordance with the instructions and configurations described in the Documentation (
Summary of the content on the page No. 10
Preface b. replace the defective Licensed Software, as follows: Should a Severity 1 or 2 warranty defect with the Software occur during the 90-day warranty period, Carrier Access will provide, in its sole determination, either 1. software to resolve the defect to be downloaded into the affected units by the BUYER or 2. a documented workaround to address the issue. Severity 1 issues are failures of the Licensed Software to comply with the Carrier Access software specifications and that c
Summary of the content on the page No. 11
Preface b. the negligent, unlawful or other improper use or storage of the Product or Software, including its use with incompatible equipment or software; or c. fire, explosion, power failures, acts of God, or any other cause beyond Carrier Access' reasonable control; or d. handling or transportation after title of the Product passes to BUYER. Other manufacturer's equipment or software purchased by Carrier Access and resold to BUYER will be limited to that manufacturer's warranty. Carrier
Summary of the content on the page No. 12
Preface Warranty Product Returns Before returning any equipment to Carrier Access Corporation, first contact the distributor or dealer from which you purchased the product. A Return Material Authorization (RMA) number is required for all equipment returned to Carrier Access Corporation. Call Carrier Access Corporation Customer Support at (800) 786-9929 or (303) 442-5455 for RMA number, repair/warranty information and shipping instructions. Be prepared to provide the following information:
Summary of the content on the page No. 13
Table of Contents TABLE OF CONTENTS Preface Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vii Electrostatic Discharge (ESD) Precautions . . . . . . . . . . . . . . . . . . . . . . . . viii Warranty . . . . . . .
Summary of the content on the page No. 14
Table of Contents Structured DS3 IOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19 Unstructured DS3-3/E3-3 IOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20 Protection IOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21 CPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22 CPU IOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 15
Table of Contents 4 Chassis Installation and Grounding Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2 Installation Factors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Rack Mounting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 M
Summary of the content on the page No. 16
Table of Contents 6 Electrical Installation Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2 Electrical Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Power . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Cable Management . . .
Summary of the content on the page No. 17
Table of Contents ATM Address List (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11 Connection Retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13 Retry Cause Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13 CIP over ATM (RFC 1577) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-14 Static Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 18
Table of Contents 8 Maintenance and Troubleshooting Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2 Chassis Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2 OC-12c/STM-4c NIM Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Alarm Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4 Slot Statistics for NIM/SAM Cards . . . .
Summary of the content on the page No. 19
Table of Contents 9 Command Line Interface CLI Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2 Creating and Running Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4 Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-6 Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8 About Command . . .
Summary of the content on the page No. 20
Table of Contents 11 Security Management (FIPS Mode) Security Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-2 Security Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3 Authentication and Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-6 Authorized Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-7 Key Management . . . . . . .