
Planning for Provisioning
Plexus 9000 Planning and Engineering Guide
Issue 11, January 24, 2003
Section 130-200-100
6-38 Telica,
Inc.
6.2.3.2 Timing
Interfaces
The Plexus 9000 can obtain timing inputs from the two external BITS
timing inputs or it can recovered Line timing from IOMs in I/O-1 and I/O-
2 slots or I/O-8 and I/O-10 slots. The BITS connections are provided on
wire wrap pins of the rear SF modules. The BITS cabling is connected
during installation and then configured during provisioning of the
Plexus 9000. The BITS or recovered line timing interfaces typically
operate with ESF-framed DS-1 all-ones clock signals. Timing
provisioning information required is identified in
this section.
6.2.3.3 Security
Security must be provisioned using TL1 commands. The default user
name and default password are both
telica
. It is recommended that new
usernames and passwords be assigned and the defaults be deleted or
removed for security. An administrator can add a user’s account, set the
user's password, the user's access privilege, the password-aging interval,
and the password update grace period.
describes the access
levels. After a new user has logged on, he must change his password.
System security commands allow an administrator to set the maximum
allowable number of invalid session setup attempts, the alert condition
duration, the time out intervals, the period in which to generate a password
expiration alert message, the lower limit for the password aging interval,
the heartbeat interval, and whether the TCP connection and trusted hosts
are enabled.
Security commands also allow an administrator to create a list of IP
addresses representing trusted hosts; that is, hosts that may connect to the
Plexus 9000.
at the end of this section lists the parameters that may need to
be entered for security.
6.2.3.4 Other
Provisioning
Before provisioning is begun information such as point codes, IP
addresses, trunk groups, routing, subscribers and so forth must be
obtained. Tables at the end of this section provide some of the
information that must be acquired. The flowchart found in the
Installation
and Operation Manual
lists the Non-Trouble Procedures (NTPs) and their
typical order execution when provisioning a switch.