[an error occurred while processing this directive]

Support

Chapter 5, Security and Timing

 Feedback

Table Of Contents

Security and Timing

5.1  Users and Security

5.1.1  Security Requirements

5.1.2  Security Policies

5.2  Node Timing

5.2.1  Network Timing Example

5.2.2  Synchronization Status Messaging


Security and Timing


This chapter provides information about Cisco ONS 15327 user security and SONET timing. To provision security and timing, refer to the Cisco ONS 15327 Procedure Guide.

Chapter topics include:

Users and Security

Node Timing

5.1  Users and Security

The CISCO15 ID is provided with the ONS 15327 system, but this user ID is not prompted when you sign into CTC. This ID can be used to set up other ONS 15327 users. (To do this, complete the "Create Users and Assign Security" procedure in the Cisco ONS 15327 Procedure Guide.)

You can have up to 500 user IDs on one ONS 15327. Each Cisco Transport Controller (CTC) or TL1 user can be assigned one of the following security levels:

Retrieve—Users can retrieve and view CTC information but cannot set or modify parameters.

Maintenance—Users can access only the ONS 15327 maintenance options.

Provisioning—Users can access provisioning and maintenance options.

Superusers—Users can perform all of the functions of the other security levels as well as set names, passwords, and security levels for other users.

By default, multiple concurrent user ID sessions are permitted on the node, that is, multiple users can log into a node using the same user ID. However, you can provision the node to allow only a single login per user and prevent concurrent logins for all users.


Note You must add the same user name and password to each node the user accesses.


5.1.1  Security Requirements

Table 5-1 shows the actions that each user privilege level can perform in node view.

Table 5-1 ONS 15327 Security Levels—Node View 

CTC Tab
Subtab
[Subtab]: Actions
Retrieve
Maintenance
Provisioning
Superuser

Alarms

Synchronize/Filter/Delete Cleared Alarms

X

X

X

X

Conditions

Retrieve/Filter

X

X

X

X

History

Session

Filter

X

X

X

X

Node

Retrieve/Filter

X

X

X

X

Circuits

Create/Edit/Delete

X

X

Filter/Search

X

X

X

X

Provisioning

General

General: Edit

Partial1

X

Power Monitor: Edit

X

X

EtherBridge

Spanning trees: Edit

X

X

Network

General: All

X

Static Routing: Create/Edit/ Delete

X

X

OSPF: Create/Edit/Delete

X

X

RIP: Create/Edit/Delete

X

X

Proxy: Create/Edit/Delete

X

Firewall: Create/Edit/Delete

X

Protection

Create/Delete/Edit

X

X

View

X

X

X

X

BLSR

All

X

X

Security

Users: Create/Delete/Clear Security Intrusion

X

Users: Change

Same user

Same user

Same user

All users

Active Logins: Logout

X

Policy/Access/Legal Disclaimer: Edit

X

SNMP

Trap destinations/Selected Destination: Create/Edit/Delete

X

X

Trap destinations/Selected Destination: View

X

X

X

X

Comm Channels

SDCC/Provisionable Patchcords: Create/Edit/Delete

X

X

Timing

General/BITS Facilities: Edit

X

X

Alarm Profiles

Alarm Behavior: Edit

X

X

Alarm Profile Editor: Store/Delete2

X

X

Alarm Profile Editor: New/Load/Compare/Available/Usage

X

X

X

X

Defaults

Edit/Import

X

Export

X

X

X

X

Inventory

Delete

X

X

Reset

X

X

X

Maintenance

Database

Backup

X

X

X

Restore

X

EtherBridge

Spanning Trees: View

X

X

X

X

MAC Table: Retrieve

X

X

X

X

MAC Table: Clear/Clear All

X

X

X

Trunk Utilization: Refresh

X

X

X

X

Circuits: Refresh

X

X

X

X

Protection

Switch/Lock out/Lockon/Clear/ Unlock

X

X

X

BLSR

West/East Switches

X

X

X

Software

Download

X

X

X

Activate/Revert

X

Cross-Connect

Resource Usage: Delete/Refresh

X

X

Overhead XConnect

View

X

X

X

X

Diagnostic

Retrieve/Lamp Test

X

X

X

Timing

Source: Edit

X

X

X

Report: View/Refresh

X

X

X

X

Audit

Retrieve/Archive

X

Routing Table

Retrieve

X

X

X

X

RIP Routing Table

Retrieve

X

X

X

X

Test Access

Read-only

X

X

X

X

1 Provisioner user cannot change node name, contact, location, or AIS-V insertion on STS-1 signal degrade (SD) parameters.

2 The action buttons in the subtab are active for all users, but the actions can be completely performed only by the users assigned with the required security levels.


Table 5-2 shows the actions that each user privilege level can perform in network view.

Table 5-2 ONS 15327 Security Levels—Network View 

CTC Tab
Subtab
[Subtab]: Actions
Retrieve
Maintenance
Provisioning
Superuser

Alarms

Synchronize/Filter/Delete cleared alarms

X

X

X

X

Conditions

Retrieve/Filter

X

X

X

X

History

Filter

X

X

X

X

Circuits

Create/Edit/Delete/Filter

Partial

X

X

Search

X

X

X

X

Provisioning

Security

Users: Create/Delete

X

Users: Change

Same User

Same User

Same User

All Users

Active logins: Logout

X

Policy: Change

X

Alarm Profiles

Store/Delete1

X

X

New/Load/Compare/Available/Usage

X

X

X

BLSR

Create/Delete/Edit/Upgrade

X

X

Overhead Circuits

Create/Delete/Edit/Merge

X

X

Search

X

X

X

X

Maintenance

Software

Download/Cancel

X

X

X

1 The action buttons in the subtab are active for all users, but the actions can be completely performed only by the users assigned with the required security levels.


5.1.2  Security Policies

Users with Superuser security privilege can provision security policies on the ONS 15327. These security policies include idle user timeouts, password changes, password aging, and user lockout parameters. In addition, a Superuser can access the ONS 15327 through the XTC RJ-45 port, the backplane LAN connection, or both.

5.1.2.1  Idle User Timeout

Each ONS 15327 CTC or TL1 user can be idle during his or her login session for a specified amount of time before the CTC window is locked. Timed-out users must re-enter their password to access the CTC session. The lockouts prevent unauthorized users from making changes. Higher-level users have shorter default idle periods and lower-level users have longer or unlimited default idle periods, as shown in Table 5-3. The user idle period can be modified by a Superuser; refer to the Cisco ONS 15327 Procedure Guide for instructions.

Table 5-3 ONS 15327 Default User Idle Times 

Security Level
Idle Time

Superuser

15 minutes

Provisioning

30 minutes

Maintenance

60 minutes

Retrieve

Unlimited


5.1.2.2  User Password, Login, and Access Policies

Superusers can view real-time lists of users who are logged into CTC or TL1 user logins by node. Superusers can also provision the following password, login, and node access policies.

Password expirations and reuse—Superusers can specify when users must change and when they can reuse their passwords.

Login attempts and Locking out users—Superusers can specify the maximum number of invalid login attempts that a user is allowed before they are locked out of CTC.

Disabling users—Superusers can provision the length of time before inactive users are disabled.

Node access and user sessionsSuperusers can limit the number of CTC sessions one user can have, and they can prohibit access to the ONS 15327 using the XTC RJ-45 LAN connection.

In addition, a Superuser can select secure shell (SSH) instead of Telnet at the CTC Provisioning > Security > Access tabs. SSH is a terminal-remote host Internet protocol that uses encrypted links. It provides authentication and secure communication over unsecure channels. Port 22 is the default port and cannot be changed.

5.1.2.3  Audit Trail

Audit trails prove useful for maintaining security, recovering lost transactions, and enforcing accountability. Accountability refers to tracing user activities; that is, associating a process or action with a specific user.

The ONS 15327 maintains a 640-entry, human-readable audit trail of user or system actions such as login, logout, circuit creation or deletion, and user- or system-generated actions. Login events include authorized Cisco logins using the ONS 15454 command line interface or the graphical user interface named Cisco Transport Controller (CTC). You can move the log to a local or network drive for later review. The ONS 15327 generates an event to indicate when the log is 80 percent full, and another event to indicate that the oldest log entries are being overwritten.

Table 5-4 contains the columns listed in Audit Trail window.

Table 5-4 Audit Trail Window Columns

Heading
Explanation

Date

Date when the action occured

Num

Incrementing count of actions

User

User ID that initiated the action

P/F

Pass/Fail (whether or not the action was executed)

Operation

Action that was taken


5.2  Node Timing

SONET timing parameters must be set for each ONS 15327. Each ONS 15327 independently accepts its timing reference from one of three sources:

The building integrated timing supply (BITS) pins on the ONS 15327 Mechanical Interface card (MIC).

An OC-N card installed in the ONS 15327. The card is connected to a node that receives timing through a BITS source.

The internal ST3 clock on the XTC card.

You can set ONS 15327 timing to one of three modes: external, line, or mixed. If timing is coming from the BITS port, set ONS 15327 timing to external. If the timing comes from an OC-N card, set the timing to line. Typical ONS 15327 networks have the following timing configurations:

One node is set to external. The external node derives its timing from a BITS source wired to the BITS MIC port. The BITS source derives its timing from a primary reference source (PRS) such as a Stratum 1 clock or global positioning satellite (GPS) signal.

The other nodes are set to line. The line nodes derive timing from the externally timed node through the OC-N trunk (span) cards.

You can set three timing references for each ONS 15327. The first two references are typically two BITS-level sources, or two line-level sources optically connected to a node with a BITS source. The third reference is usually assigned to the internal clock provided on every ONS 15327 XTC card. However, if you assign all three references to other timing sources, the internal clock is always available as a backup timing reference. The internal clock is a Stratum 3 (ST3), so if an ONS 15327 node becomes isolated, timing is maintained at the ST3 level.

The CTC Maintenance > Timing > Report tabs show current timing information for an ONS 15327, including the timing mode, clock state and status, switch type, and reference data.


Caution Mixed timing allows you to select both external and line timing sources. However, Cisco does not recommend its use because it can create timing loops. Use mixed timing mode with caution.

5.2.1  Network Timing Example

Figure 5-1 shows an example of an ONS 15327 network timing setup. Node 1 is set to external timing. Two references are set to BITS, and the third reference is set to internal. The BITS output pins on the MIC cards of Node 3 provide timing to outside equipment, such as a digital access line access multiplexer.

Figure 5-1 ONS 15327 Timing Example

5.2.2  Synchronization Status Messaging

Synchronization status messaging (SSM) is a SONET protocol that communicates information about the quality of the timing source. SSM messages are carried on the S1 byte of the SONET line layer. They enable SONET devices to automatically select the highest quality timing reference and to avoid timing loops.

SSM messages are either Generation 1 or Generation 2. Generation 1 is the first and most widely deployed SSM message set. Generation 2 is a newer version. If you enable SSM for the ONS 15327, consult your timing reference documentation to determine which message set to use. Table 5-5 and Table 5-6 show the Generation 1 and Generation 2 message sets.

Table 5-5 SSM Generation 1 Message Set 

Message
Quality
Description

PRS

1

Primary reference source—Stratum 1

STU

2

Synchronization traceability unknown

ST2

3

Stratum 2

ST3

4

Stratum 3

SMC

5

SONET minimum clock

ST4

6

Stratum 4

DUS

7

Do not use for timing synchronization

RES

 

Reserved; quality level set by user


Table 5-6 SSM Generation 2 Message Set

Message
Quality
Description

PRS

1

Primary reference source—Stratum 1

STU

2

Synchronization traceability unknown

ST2

3

Stratum 2

TNC

4

Transit node clock

ST3E

5

Stratum 3E

ST3

6

Stratum 3

SMC

7

SONET minimum clock

ST4

8

Stratum 4

DUS

9

Do not use for timing synchronization

RES

 

Reserved; quality level set by user



[an error occurred while processing this directive]