In this section

 

TL1 input commands have the following syntax:

<Verb>-<Modifier1>-<Modifier2>:[TID]:[AID]:[CTAG]:[General Block];
Note

Verbs and modifiers are separated by hyphens ( - ), attribute fields (TID, AID, CTAG, and General Block) are separated by colons (:), and every command is terminated by a semicolon (;).

Any attribute that contains TL1 special characters [ equal signs ( = ), colons ( : ), dashes ( - ), and commas ( , ) ] should be enclosed in double quotes ( " ) to help the attribute values escape. See the following example:

ADD-GTT-PCLR::WORKSPACE-"TEST-NAME"-1.2.3:s:::::COST=10;RSP:hrlab248slot6:ADD-GTT-PCLR:s:COMPLD;

Note
Both IPv6 addresses and TL1 commands use colons (:) as special characters. To use an IPv6 address as a TL1 attribute within a TL1 command, the IPv6 address must be placed between double quotes (" "). For example:

CHG-SLK::51-1.2.52-2:CTAG001::::M2PA:LOCAL_IPADDR1="fd17:625c:f037:a838:a00:27ff:febb:eec4",LOCAL_IPADDR2=,LOCAL_PORT=15902;

The following table describes the TL1 input syntax elements and provides usage examples. For additional input examples, see Example Input Commands.

TL1 Input Command Syntax Elements and Examples

Syntax element Definition Syntax Example (in Bold)
<Verb>

The verb defines the type of action to be applied by the command to a network element. The verbs used with the Ribbon Signaling System are as follows:

  • ADD - adds an network object
  • CHG - changes a network object
  • DLT - deletes a network object
  • SET - sets a network object
  • UNLOCK - unlocks a network object
  •  FORCELOCK - releases and   acquires a lock from a network   object filtering table that is owned by   another session. 
  • VFY - verifies a network objects 

Note:

For filtered network objects, it is recommended to use the UNLOCK command first to ensure subsequent commands will execute. This action releases the Network Object Filtering Table for the current session when it is locked by another user.

VFY-BRD-SER::6:;

Verify (VFY) specifies the action of the command.

<Modifier1> -<Modifier2>

The modifiers define the nature of the network object. There can be up to two modifiers for a command.

VFY-BRD-SER;

In this case the action is to verify the attributes configured for serial (SER) cards (BRD) attached to a Ribbon Signaling System.

TID Each Ribbon Signaling System can have network management cards that provide network management interfaces. Each management interface is given a Host Name called a Source Identifier (SID) 1. The SID consists of the name of the management card and the chassis slot number for the card. The Target Identifier (TID) in a TL1 command specifies the SID of a network management interface for appropriate command routing and processing. The TID is not used in the input command, but it is displayed in the response. Not used.
[AID] The Access Identifier (AID) specifies the equipment or utility that the command accesses. Some commands have an implied AID and do not require the AID to be entered, however, all commands use the AID attribute.

VFY-BRD-SER::6:;

The command is sent to a specific serial card in the 6th slot of the Ribbon Signaling System chassis.

Empty tokens within an AID must be with double quotation marks.

PTI_TL1> VFY-DSC-RLMRTREC::8-RR-""-sonusnet:S;

The command is sent using the null parameter in place of the optional AID attribute. A syntax error occurs if the null parameter is not specified.

All: If no AID is specified for verify (VFY) commands, all available AIDs and attributes associated with each AID are listed. 2

VFY-BRD-SER;  

This command identifies the configuration attributes for all serial cards on a Ribbon Signaling System system since no specific AID was entered.

Note:

Any attribute that contains TL1 special characters [ equal signs ( = ), colons ( : ), dashes ( - ), and commas ( , ) ] should be enclosed in double quotes ( " ) to help the attribute values escape. See the following example:

ADD-DSC-ALLOWIP::1-mlvmw.sonus.com-1-TCP-10.91.3.100-38680-"fe80::20c:29ff:fe8e:11b7:1:1"-52000:ctag;

 
[CTAG] The Correlation Tag (CTAG) specifies a command specific alphanumeric code that can be entered into the input command. The command response has the same CTAG in the response syntax. This provides a method to associate the input command with the output response.

VFY-BRD-SER::6:abCD123;

The entered CTAG appears in the response message.

[General Block]

The General Block contains all configurable attributes associated with the TL1 command verb, modifiers, and the AID. As a general rule, there are two types of attributes:

  • Named attributes : Each attribute value is preceded by the attribute name followed by the equal sign (=). Each used attribute is separated by a comma (,).
  • Unnamed attributes : The attribute value is identified by its position in the command and is not preceded by an attribute name and equal sign.

An attribute may be optional for a command and does not have to be specified. An object may have optionable, creatable attributes of type string, which can be omitted from the command when creating the object. The interface will assign the default empty string value to the attribute.

Note:

Any attribute that contains TL1 special characters [ equal signs ( = ), colons ( : ), dashes ( - ), and commas ( , ) ] should be enclosed in double quotes ( " ) to help the attribute values escape. See the following examples:

CHG-NA::1:s:::::CLLI="NA,1",ROTATESLS=ENABLED;

CHG-NA::1:s:::::CLLI="NA=1",ROTATESLS=ENABLED;

 

Named attribute example: CHG-ATM-LINKMGR::1:::::: DEBUG=DISABLED;

Unnamed attribute example: SET-ATM-LINKMGR::1:::: DEACT;

Optional ‘host = y’ attribute example:

Name = x, host = y; Name = x;

Optional attribute example: instead of:

ADD-DSC-NODE::5-"":S :::::REALM=pt.com,DID_HOST =hh,NAME=;

a short form can be used:

ADD-DSC-NODE::5:S :::::REALM=pt.com,DID_HOST =hh;

1 The SID cannot be configured using TL1. Configure the SID using the Web UI.

2 If no TID, AID, CTAG, or attributes are specified, colons (:) do not need to be entered after the verb and modifiers. The semi colon (;) can be entered.

Example of Input Commands

The following are examples of input commands.

Example 1

CHG-ATM-LINK (Change ATM Link Attributes)

CHG-ATM-LINK::5-1:abc:::::IF_TYPE=T1_ESF,CLKSRC=MASTER,ENCODING=B8ZS,VPI=12,VCI=0,SCRAMBLING=DISABLED,HEC_POLY=ENABLED,HEC_VERIF=FILTER,QOS=CBR,T1=1000,T2=300000,T3=10,ALIGNMENT=NORMAL,N1=500,CNGS_LVL1_ONST=40,CNGS_LVL2_ONST=60,CNGS_LVL3LONST=80,CNGS_LVL1_ABT=30,CNGS_LVL2_ABT=50,CNGS_LVL3_ABT=70;

Example 2

ADD-PCE-TRUNKMAP (Add a Trunk Mapping for PCE)

ADD-PCE-TRUNKMAP::WORKSPACE:abc:::::PUB_NODE=ASD,PUB_GW=LKJ, PUB_CIC_MIN=3,PUB_CIC_MAX=300,PRIV_NODE=ASD,PRIV_CIC_MIN=3;

Example 3

CHG-GWST-ALWCLGPA (Change Allowed Calling Party Attributes for GWST)

CHG-GWST-ALWCLGPA::3-240.115.6-251-ANY-ANY:abc:::::REMARK=change,NEXT_TABLE=ALLOWED SCCP CLDS,NEXT_EPR=9,SS7_VARIANT=ANSI,MSU_TRACING=DISABLED,SCREEN_TEST_MODE=DISABLED;

Example 4

SET-ATM-LINKMGR (Activate or Deactivate ATM Link Manager)

SET-ATM-LINKMGR::9:abc:::::ACT;

Example 5

ADD-SUA-CONFASP (Add Configured SUA ASP)

ADD-SUA-CONFASP::213:abc:::::ID=213,IP1=10.81.1.09,IP2=,PORT=2222;

Example 6

ADD-RTE (Add a Route)

ADD-RTE::5-STANDARD-007.007.007-MEMBER-007.007.007:abc:::::COST=2;

Input Commands AID Descriptions

In general, an AID with the following format is defined as the AID identifying 'object 3' that is a child of 'object 2', which in turn is a child of 'object 1'.

[<Obj1/Attr1>]-[<Obj1/Attr2>]-[<Obj2/Attr1>]-[<Obj3/Attr1>]-[<Obj3/Attr2>]-[<Obj3/Attr3>]

The “AID Description” sections in the document only list the current object's attributes that are contributing to the command's AID. That is, three (3) AID descriptions are shown for object 3:

[<Obj3/Attr1>]-[<Obj3/Attr2>]-[<Obj3/Attr3>]

For AID information on a parent object’s portion of a command, refer to the parent object’s section in the TL1 document.

For example, consider an SCCP User Connection command where we only provide the description and the position order of the attributes within the User Connection object (in this case, Peer ID and Connection ID). It follows that a description of the 'Network Appearance' attribute is provided in the “SCCP NA” command section of the document.

For example, the Input Command:

VFY-SCCP-USERCX::[<SCCP NA/Network Appearance>]-[<User Connection/Peer ID>-<User Connection/Connection ID>]:[CTAG];

Following the command, only the required AID descriptions are listed. They are numbered according to their order in the command, starting at postion 1 for each object type:

AID Description

Peer ID - Position 1
Type: int
Description: Peer Identifier from LDL configuration.

Connection ID - Position 2
Type: int
Description: Unique User Connection identifier for this peer ID.

Attribute-based Search Using VFY Commands

As an option, the VFY input command is specified with additional search attributes using the format:

VFY-<Modifier1>-<Modifier2>:[TID]:[AID]:[CTAG]::[Filtering Criteria]::::[<searchedAttrKey1=Value1>][,<searchedAttrKey2=Value2>]...[,<searchedAttrKeyN=ValueN>]

where:

  • <searchedAttrKey(x)> is a search attribute keyword that is returned in the output response format.

  • <Value(x)> is the value of the attribute.

If search attributes are specified, the VFY input command returns all objects matching the attribute keyword values.

As an example, the output response format for the VFY-VND comand contains the following keywords and values:

::[<MTP3 NA/Network Appearance>]-[<VNode/VPC>]:<CLLI=string>,<DESC=string>,<STATE=ActivationState>,<TFA=Feature>,<TFP=Feature>,<TFR=Feature>,<MATE_DIST=Feature>;

 

For comparison, the VFY-VND command is specified without a search attribute:

VFY-VND::[<MTP3 NA/Network Appearance>]-[<VNode/VPC>]:[CTAG];

Using a keyword from the output response, the VFY-VND command is specified with search attributes, as follows:

VFY-VND::[<MTP3 NA/Network Appearance>]-[<VNode/VPC>]:[CTAG]::::::[<DESC=string>][,<STATE=ActivationState>];

GWST Wildcard and Ranging Usage

The following section provides usage rules for GWST AID and attribute options that can use wildcard and ranging. The wildcard symbol (*) can be used to select all possible values of an attribute for certain TL1 commands. The ranging symbols (&&) can be used to specify a range of values. These two symbols can be combined when the object is a point code range.

The following table provides a list of wildcard and ranging rules applicable to certain GWST commands.

GWST Wildcard and Ranging Usage Rules

Usage Context            Definition                                                 Syntax Example (in Bold)
Wildcard for integers

When the wildcard is applied to a single integer value, all values within the possible range is indicated.

 

ADD-GWST-ACCMTP3 ::H2:s:::::NA=7,APC=005.005.005,DIRECTION=TX,OPC_RANGE=1.2.3,DPC_RANGE=1.3.4,SI_RANGE=*;

The possible range of values for SI_RANGE is 0 to 15. Using the * symbol specifies all values in this range.

Ranging for integersWhen ranging is applied to a single integer value, a subset of the values within the possible range is indicated.

ADD-GWST-ACCMTP3 ::H2:s:::::NA=7,APC=005.005.005,DIRECTION=TX,OPC_RANGE=1.2.3,DPC_RANGE=1.3.4,SI_RANGE=0&&12;

The possible range of values for SI_RANGE is 0 to 15. Using the && symbol specifies that the range 0 to 12 is used

Wildcard for point codes

When a wildcard symbol is used in a point code, the * symbol can be applied to one or all of the PC values. If the wildcard is applied to the network or cluster portion of the PC for ANSI, or the zone or area portion of the PC for ITU, the remaining portion(s) of the PC must use the wildcard symbol.

PC validation applies according to supported ITU and ANSI PC formation standards.

ADD-GWST-ACCMTP3 ::H2:s:::::NA=7,APC=005.005.005,DIRECTION=TX,

OPC_RANGE=1.2.*,

DPC_RANGE=1.*.*,SI_RANGE=0&&12;

Assuming the PC format for the example above is ANSI, the possible range of values for the member portion of the OPC_RANGE is 0 to 255. Using the * symbol indicates all values in the member portion of the PC.

The same applies to the DPC_RANGE where the wildcard value is used for the cluster and the member portions of the PC.

Ranging for point codes

When ranging is used in a point code (PC), ranging applies to the PC portion immediately before the ranging symbol. Only one range can be specified within a PC. If the range is applied to the network or cluster portion of the PC for ANSI, or the zone or area portion of the PC for ITU, the remaining portion(s) of the PC must use the wildcard “*” symbol.

PC validation applies according to supported ITU and ANSI PC formation standards.

ADD-GWST-ACCMTP3 ::H2:s:::::NA=7,APC=005.005.005,DIRECTION=TX,

OPC_RANGE=1.2.1&&15,

DPC_RANGE=1.25&&30.*,SI_RANGE=0&&12;

Assuming the PC format for the example above is ANSI, the possible range of values for the member portion of the OPC_RANGE is 0 to 255. Using the ranging symbol in the member portion of the PC indicates the range 1 to 15 for the given network, and cluster values.

The DPC_RANGE indicates a range of 25 to 30 in the cluster portion of the PC along with the wildcard symbol specifying all member values associated with the cluster range for the network with the value of 1.

Changing Incoming Linksets Using a TL1 Command

When making changes to an incoming Linkset using a TL1 command, do not use any leading zero’s (0s) in the Point Code. For example, a Point Code is added as 004.004.004 for an Incoming Linkset, but to modify the entry you must enter 4.4.4.

  • No labels