Part Number: 770-0145 BA
Product Release: 1.6
September 2007
Page 2
Copyright 2007 Carrier Access Corporation. All rights reserved.
The information presented in this manual is subject to change without notice and does not represent a commitment on the
part of Carrier Access Corporation. The hardware and software described herein are furnished under a license or nondisclosure agreement. The hardware, software, and manual may be used or copied only in accordance with the terms of this
agreement. It is against the law to reproduce, transmit, transcribe, store in a retrieval system, or translate into any medium
- electronic, mechanical, magnetic, optical, chemical, manual, or otherwise - any part of this manual or software supplied
with the Adit 3104 for any purpose other than the purchaser’s personal use without the express written permission of
Carrier Access Corporation.
The Carrier Access logo and Adit are registered trademarks of Carrier Access Corporation. All other brand or product
names are trademarks or registration trademarks of their respective companies or organizations.
Contact Information:
Carrier Access Corporation
5395 Pearl Parkway
Boulder, CO 80301-2490
Corporate Phone: (303) 442-5455
Fax: (303) 443-5908
www.carrieraccess.com
Customer Support Direct: (800) 786-9929
E-mail: tech-support@carrieraccess.com
Page 3
Compliance
Safety of Information Technology Equipment
The Adit 3104 is safety certified by Underwriters Laboratories and is compliant with the following
safety standards for information technology equipment:
UL 60950-1
CSA 60950-1
FCC Requirements, Part 15
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
PREFACE
Preface
This device may not cause harmful interference, and
This device must accept any interference received, including interference that may cause undesired operation
This equipment has been tested and found to comply with the limits for a Class A digital device
pursuant to Part 15 of the Federal Communications Rules. These limits are designed to provide
reasonable protection against harmful interference when equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy, and if not
installed and used in accordance with the instruction manual may cause harmful interference to
radio communications. Operation of this equipment in a residential area is likely to cause harmful
interference, in which case the user will be required to correct the interference at the user’s own
expense.
FCC Requirements, Part 68
This equipment complies with Part 68 of the FCC rules and the requirements adopted by the ACTA.
On the rear panel of this equipment is a label that contains, among other information, a product
identifier in the format US:AAAEQ##TXXXX. If requested, this number must be provided to the
telephone company.
FCC Registration Number:US: 2Z6ISNAN675849
Service Center in the USA:Carrier Access Corporation
5395 Pearl Parkway
Boulder, CO 80301-2490
Page 4
Preface
Compliance
The Facility Interface Code (FIC) associated with each private line application represents the type
of service that will be provided by the telephone company. The following are currently registered:
Plug and Jack Statement
A plug and jack used to connect this equipment to the premises wiring and telephone network must
comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant
telephone cord and modular plug is provided with this product. It is designed to be connected to a
compatible modular jack that is also compliant. See installation instructions for details.
Ringer Equivalence Number (REN)
The assignment of a Ringer Equivalence Number (REN) is not applicable for this device.
If the Adit 3104 causes harm to the telephone network, the telephone company will notify you in
advance. If advance notice proves impractical, the telephone company will notify the customer as
soon as possible. Also, you will be advised of your right to file a complaint with the FCC if you
believe such action is necessary.
The telephone company may make changes in its facilities, equipment operations, or procedures
that could affect the operation of the Adit 3104. If this occurs, the telephone company will provide
advance notice so that you may make necessary modifications to maintain uninterrupted service.
If you experience trouble with the Adit 3104, please first contact the distributor or dealer from
which you purchased the product and then, as a second point of contact, contact Carrier Access
Corporation for repair and/or warranty information.
If the trouble is causing harm to the telephone network, the telephone company may request that
you remove the Adit 3104 from the network until the problem is resolved. User repairs must not be
made. Doing so will void the warranty.
Do not install the Adit 3104 on public coin service provided by the telephone company. Connection
to Party Line service is subject to state tariffs. (Contact your state public utilities commission for
further information.)
To minimize damage caused by local lightning strikes and other electrical surges, it is
recommended that the customer install an AC surge arrestor in the AC outlet to which the Adit 3104
is connected.
ivAdit 3104 - Release 1.6
Page 5
Compliance
Industry Canada ICES-003
English
This class A digital apparatus complies with Canadian ICES-003.
French
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
Industry Canada CS-03
Registration Number: IC: 2638A-675849
This equipment meets the applicable Industry Canada Terminal Equipment Technical
Specifications. This is confirmed by the registration number. The abbreviation, IC, before the
registration number signifies that registration was performed based on a Declaration of Conformity
indicating that Industry Canada technical specifications were met. It does not imply that Industry
Canada approved the equipment.
The assignment of a Ringer Equivalence Number (REN) is not applicable for this device.
Before installing this equipment, users should ensure that it is permissible to be connected to the
facilities of the local telephone company. The equipment must also be installed using an acceptable
method of connection. The customer should be aware that compliance with the above conditions
may not prevent degradation of service in some situations.
Preface
Repairs to certified equipment should be coordinated by a representative designated by the supplier.
Any repairs or alternations made by the user to this equipment, or equipment malfunctions, may
give the telecommunications company cause to request the user to disconnect the equipment.
Users should ensure for their own protection that the electrical ground connections of the power
utility, telephone lines and internal metallic water pipe system, if present, are connected together.
This precaution may be particularly important in rural areas.
CAUTION! USERSSHOULDNOTATTEMPTTOMAKESUCHCONNECTIONSTHEMSELVES, BUT
SHOULDCONTACTTHEAPPROPRIATEELECTRICINSPECTIONAUTHORITY, ORELECTRICIAN, AS
APPROPRIATE.
Never touch uninsulated telephone wires and terminals unless the telephone line has been
disconnected at the Network Interface (NI) as voltage potentials as high as 300 VAC may be
present across the transmit and receive pairs
Only use No. 26 AWG or larger telecommunication line cord, to reduce the risk of fire
Never install telephone wiring during a lightning storm
Never install telephone jacks in wet locations unless the jack is specifically designed for wet
locations
Refer to the installation section of this manual for a safe and proper installation procedure. All
wiring external to this equipment should follow the current provision of the National Electrical
Code
Notices
This manual contains important information and warnings that must be followed to ensure safe
operation of the equipment.
DANGER! A DANGERNOTICEINDICATESTHEPRESENCEOFAHAZARDTHATCANORWILL
CAUTION! A CAUTIONNOTICEINDICATESTHEPOSSIBILITYOFINTERRUPTINGNETWORK
SERVICEIFTHEHAZARDISNOTAVOIDED.
WARNING! A WARNINGNOTICEINDICATESTHEPOSSIBILITYOFEQUIPMENTDAMAGEIFTHE
HAZARDISNOTAVOIDED.
NOTE: A Note indicates information to help you understand how to perform a procedure or how the
system works. Notes should be read before performing the required action.
viAdit 3104 - Release 1.6
Page 7
Electrostatic Discharge (ESD) Precautions
Electrostatic Discharge (ESD) Precautions
ESD can damage processors, circuit cards, and other electronic components. Always observe the
following precautions before installing a system component.
1. Do not remove a component from its protective packaging until ready to install.
2. Wear a wrist grounding strap and attach it to a metal part of the system unit before handling
components. If a wrist strap is not available, maintain contact with the system unit throughout
any procedure requiring ESD protection.
The ESD warning label appears on packages and storage bags that contain
static-sensitive products and components.
Preface
Adit 3104 - Release 1.6vii
Page 8
Preface
Warranty
Warranty
Carrier Access warrants to BUYER that Product Hardware will be free from substantial defect in
material and workmanship under normal use in accordance with its Documentation and given
proper installation and maintenance for period of five years from the date of shipment by Carrier
Access.
Carrier Access warrants that the Licensed Software, when used as permitted under its License
Terms and in accordance with the instructions and configurations described in the Documentation
(including use on Carrier Access product or a computer hardware and operating system platform
supported by Carrier Access), will operate substantially as described in the Documentation for a
period of ninety (90) days after date of shipment of the Licensed Software to BUYER.
This warranty shall not apply to Products or Software that have been either resold or transferred
from BUYER to any other party. Any such transfer voids the above warranty and related licenses.
Carrier Access offers expanded product care beyond what is covered by the warranty through
different support plans. The plans are designed to maximize network availability through advance
replacement for defective equipment. Please contact your Carrier Access representative for support
program details.
Warranty Procedure
BUYER must promptly notify Carrier Access of any defect in the Product or Software and comply
with Carrier Access' return/repair policy and procedures. Carrier Access or its agent will have the
right to inspect the Product or workmanship on BUYER's premises. With respect to a warranty
defect in Product hardware reported to Carrier Access by BUYER during the warranty period,
Carrier Access, as its sole obligation and BUYER's exclusive remedy for any breach of warranty,
will use commercially reasonable efforts, at its option, to:
a. repair, replace, or service at its factory or on the BUYER's premises the Product, or component therein,
or workmanship found to be defective so that the Product hardware operates substantially in accordance
with Carrier Access Documentation, or
b. credit BUYER for the Product in accordance with Carrier Access's depreciation policy.
With respect to a warranty defect in the Licensed Software reported to Carrier Access by BUYER
during the 90-day software warranty period, Carrier Access, at its own expense and as its sole
obligation and BUYER's exclusive remedy for any breach of the software warranty, will use
commercially reasonable efforts to, at its option,
a. correct any reproducible error in the Licensed Software, or
b. replace the defective Licensed Software, as follows:
Should a Severity 1 or 2 warranty defect with the Software occur during the 90-day warranty period,
Carrier Access will provide, in its sole determination, either
1. software to resolve the defect to be downloaded into the affected units by the BUYER, or
2. a documented workaround to address the issue.
Severity 1 issues are failures of the Licensed Software to comply with the Carrier Access software specifications and
that completely or severely affect the Carrier Access Product and its traffic or service capacity, or maintenance or
monitoring capabilities.
Severity 2 issues are failures of the Licensed Software to comply with the Carrier Access software specifications and
that result in a major degradation of the Carrier Access Product so as to impact its system or service performance, or
significant impairments to network operator control or effectiveness. Should a Severity 3 warranty defect with the
Licensed Software occur during the 90-day warranty period, Carrier Access will provide assistance to Buyer to
determine if a solution or workaround will be provided in a subsequent software release following the reported issue.
viiiAdit 3104 - Release 1.6
Page 9
Severity 3 issues are defined as failures of the Licensed Software to comply with the Carrier Access software
specifications but that do not significantly impair the function or service of the Carrier Access Product or the system.
Determination of Severity 1, 2 or 3 shall be made solely by Carrier Access following receipt of the reported problem.
Refurbished material may be used to repair or replace the Product. BUYER shall bear the risk of loss for Products
or Software returned to Carrier Access for repair, replacement, or service, and the same must be shipped pre-paid by
BUYER.
Requests for warranty services and troubleshooting must be made to, and will be provided by, the
Carrier Access Customer Support Center via telephone during the warranty period and during
normal business hours. Normal business hours for Carrier Access Customer Support Center are
7:00 a.m. to 6:00 p.m. Mountain Standard Time, Monday through Friday, excluding weekends and
standard Carrier Access recognized holidays.
Limitation of Warranty & Limitation of Remedies
Correction of defects by repair, replacement, or service will be at Carrier Access's option and
constitute Carrier Access' sole obligation and BUYER's sole and exclusive remedy under the
limited warranty. Any such error correction or replacement provided to BUYER does not extend
the original warranty period for hardware or software, respectively.
Carrier Access assumes no warranty or other liability with respect to defects in the Product or
Software caused by:
Preface
Warranty
a. modification, repair, storage, installation, operation, or maintenance of the Product or Software by
anyone other than Carrier Access or its agent, or as authorized and in accordance with the Carrier
Access Documentation, or
b. the negligent, unlawful or other improper use or storage of the Product or Software, including its use
with incompatible equipment or software; or
c. fire, explosion, power failures, acts of God, or any other cause beyond Carrier Access' reasonable
control, or
d. handling or transportation after title of the Product passes to BUYER.
Other manufacturer's equipment or software purchased by Carrier Access and resold to BUYER
will be limited to that manufacturer's warranty. Carrier Access assumes no warranty liability for
other manufacturer's equipment or software furnished by BUYER.
BUYER UNDERSTANDS AND AGREES AS FOLLOWS: Except for the limited warranty set
forth above, the Product, License Software and all services performed by Carrier Access hereunder
are provided “as is”, without representations or warranties of any kind. Carrier Access does not
warrant that the Product, License Software, any hardware or software, or any update, upgrade, fix
or workaround furnished to BUYER will meet BUYER's requirements, that the operation thereof,
including any maintenance or major releases thereto will be uninterrupted or error-free.
THE WARRANTIES IN THIS AGREEMENT REPLACE ALL OTHER WARRANTIES,
EXPRESSED OR IMPLIED, AND ALL OTHER OBLIGATIONS OR LIABILITIES OF
CARRIER ACCESS, INCLUDING ANY WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE, NONINFRINGEMENT AND/OR ANY IMPLIED
WARRANTIES ARISING OUT OF COURSE OF PERFORMANCE OR COURSE OF
DEALING. ALL OTHER WARRANTIES ARE DISCLAIMED AND EXCLUDED BY
CARRIER ACCESS.
Adit 3104 - Release 1.6ix
Page 10
Preface
Warranty
THE REMEDIES CONTAINED IN THIS AGREEMENT WILL BE THE SOLE AND
EXCLUSIVE REMEDIES WHETHER IN CONTRACT, TORT, OR OTHERWISE, AND
CARRIER ACCESS WILL NOT BE LIABLE FOR INJURIES OR DAMAGES TO PERSONS
OR PROPERTY RESULTING FROM ANY CAUSE WHATSOEVER, WITH THE EXCEPTION
OF INJURIES OR DAMAGES CAUSED BY THE GROSS NEGLIGENCE OF CARRIER
ACCESS. THIS LIMITATION APPLIES TO ALL SERVICES, SOFTWARE, AND PRODUCTS
DURING AND AFTER THE WARRANTY PERIOD. IN NO EVENT WILL CARRIER ACCESS
BE LIABLE FOR ANY SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, LOSS
OF DATA, OR COMMERCIAL LOSSES EVEN IF CARRIER ACCESS HAS BEEN ADVISED
THEREOF.
No agent, BUYER, or representative is authorized to make any warranties on behalf of Carrier
Access or to assume for Carrier Access any other liability in connection with any of Carrier Access's
Products, software, or services.
The foregoing summarizes Carrier Access' entire product and software warranties, which are
subject to change without notice.
Warranty Product Returns
Before returning any equipment to Carrier Access Corporation, first contact the distributor or dealer
from which you purchased the product.
A Return Material Authorization (RMA) number is required for all equipment returned to Carrier
Access Corporation. Call Carrier Access Corporation Customer Support at (800) 786-9929 or
(303) 442-5455 for RMA number, repair/warranty information and shipping instructions. Be
prepared to provide the following information:
Carrier Access Corporation serial number(s) from the system chassis or circuit card(s)
Name of distributor or dealer from which you purchased the product
Description of defect
The Adit 3104 integrates the features of a high performance VPN capable router, stateful firewall, VoIP gateway
and T1 CSU/DSU. It replaces multiple elements at the customer premises that typically provide routing, security
appliances, and voice gateway functions, offering a powerful blend of speed, security and voice. This single
platform offers scalability, security, and high performance for secure Internet and IP access, LAN-to-LAN
connectivity over private and public networks and hosted Voice over IP (VoIP) service applications.
Speed without Sacrificing Security and Performance
Unlike competing offerings, the Adit 3104 maintains T1 wire-speed throughput with low latency for all packet
sizes even with all security applications enabled. The Adit 3104’s VoIP-aware routing engine is based on the latest
advanced network processing technology and enables support of key security applications without the typical
degradation in performance seen in other legacy solutions on the market.
By integrating all routing and security functions into a single processor, the Adit 3104 cost-effectively supports
Network Address Translation (NAT/NAPT), stateful packet inspection, flow classification, Application Layer
Gateway (ALG), intrusion detection and IPSec VPN tunneling. Access control lists also protect traffic flowing in
and out of the network. Integrated firewall keeps the network and LAN segments secure from intrusions and
attacks while allowing authorized access to network resources.
Carrier-Grade VoIP Service Delivery
Based on the analog voice technology in our TDM gateway solutions, the Adit 3104 is a carrier-class solution that
enables the key calling features used by today’s business services. Built on top of the base routing engine, the Adit
3104 provides a scalable integrated SIP line side gateway capable of terminating up to 24 analog business grade
phone lines. The Adit 3104 also supports T.38 allowing businesses to connect their fax machines directly to the
gateway. The routing engine provides ample support for the small packet sizes characteristic of full-capacity voice
and data plus Quality of Service (QoS) necessary to deliver carrier-grade voice. It also adds small-size packet
throughput and deep packet inspection.
Simplified Configuration and Management
The Adit 3104’s scalability does not increase its complexity. Remote provisioning is simplified through both an
easy-to-use web interface and an intuitive Command Line Interface (CLI). Remote alarms from the Adit 3104 are
reported via SNMP, Syslog, e-mail alerts, or through a web interface. The router can also be automatically
configured and upgraded remotely.
Key Benefits
Comprehensive router, stateful firewall, VoIP gateway, managed Ethernet switch and integrated
T1 in a single platform
Speed without sacrificing security to deliver public and private IP access at wire-speed across
all packet sizes with security applications enabled
VPN capabilities to deliver secure connection over the Internet
Web-enabled stateful firewall provides integrated network level and application-level
protection
Scalable SIP Gateway delivers full capacity voice and data with QoS required for carrier-grade
VoIP
Carrier grade reliability, performance and life cycle to enable mission critical business
applications
1-2Adit 3104 - Release 1.6
Page 15
Adit 3104 Base Platform
Application Drawings
Application Drawings
Secure Access Routing
As a Secure Mobile Worker router, the Adit 3104:
Integrates access router, firewall/ALG, VPN Host and Ethernet switch.
Provides wire-speed performance without a hardware co-processor.
Integrates with existing enterprise infrastructure. Layer 2 Tunneling Protocol (L2TP) and
Point-to-Point Tunneling Protocol (PPTP) support integration with leading market solutions.
NOTE: VPN and PPTP are not supported in this release.
Secure Mobile Worker
As a Secure Mobile Worker router, the Adit 3104:
Integrates access router, firewall/ALG, BPN Host and Ethernet switch.
Provides wire-speed performance without a hardware co-processor.
Integrates with existing enterprise infrastructure. Layer 2 Tunneling Protocol (L2TP) and
Point-to-Point Tunneling Protocol (PPTP) support integration with leading market solutions.
Adit 3104 - Release 1.61-3
Page 16
Adit 3104 Base Platform
Application Drawings
Converged Network Appliance
As a Converged Network Appliance the Adit 3104 integrates the access router, firewall/ALG, VPN
Host and Ethernet switch:
The ALG including support for SIP provides secure application access.
The Quality of Service (QoS) feature supports both voice and data application.
Type of Service (ToS) prioritization gives voice packets priority.
Hosted VoIP Business Gateway
As a Hosted VoIP Business Gateway, the Adit 3104 integrates:
Access router, firewall/ALG, SIP media gateway, BPN Host and Ethernet switch.
With existing enterprise infrastructure, supporting both analog and IP phones.
1-4Adit 3104 - Release 1.6
Page 17
Adit 3104 Base Platform
Technical Specifications
Technical Specifications
Components
Software Features
- SIP Line Side Gateway Key: Enable SIP signaling conversion for analog lines
- G.729 Low Bit Rate CODEC Key: Enables G.729a support
Included Accessories
- Wall mount bracket
Additional Accessories
- Adit 3000 Battery Backup Unit
- Adit 3000 Rack Mount Kit
Interfaces
T1 WAN port (RJ-48C connector)
- Framing for T1: SF (D4) or ESF
- Line Code for T1: B8ZS or AMI
- Internal or line-derived clock source
- T1 Loop Codes and BERT testing
10/100Base-T WAN port (RJ-45 connector)
4 10/100Base-T switched LAN ports (RJ-45 connector)
8, 16 or 24 FXS ports (RJ-21 connector)
- FXS Signaling: Loop Start and Ground Start
- Terminating Impedances: 19 selectable
- Maximum Ringers: 5 REN, FCC Class B ringers
- Ringing Voltage: >
- Modem Support: Full compatibility with V.90 modems
- Telcordia GR-57-CORE (FXS)
RS-232 for local management (DB-9 connector)
55 Vrms @ 20 Hz
Network Standards
ANSI/TIA T1.231, T1.403, T1.413 i2
ITU G.703, G.704
Adit 3104 - Release 1.61-5
Page 18
Adit 3104 Base Platform
Technical Specifications
Voice Signaling
FXS loop start, ground start
DTMF signaling per RFC 2833
Call Progress tone generation
CLASS support
Distinctive ringing
Multiple line appearance
Voice Processing and Mediation
SIP call control
Voice CODEC support for G.711 A-law, µ-law, G.729a
G.168 echo cancellation
Silence suppression
Voice activity detection/Comfort noise generation
RTP/RTCP
T.38 fax
Call progress tone and cadence generation
Max. 150 ms jitter butter
Gain control
Routing and Policy Management
IPv4
Static routes
RIP v1, v2
OSPF
PPP
- ACF, VJ compression
Spanning Tree Protocol (802.1d)
DHCP Server/Client/Relay
DNS Relay and Resolver
BootP Relay
PAP and CHAP authentication
Ping
IPCP, BCP
Multi-Protocol Encapsulation
VLAN support
1-6Adit 3104 - Release 1.6
Page 19
Adit 3104 Base Platform
Technical Specifications
VPN
IPSec tunneling
DES, 3DES and AES
IKE based key management
Digital certificates and pre-shared key authentication
Router Performance
Wire-speed on Ethernet to T1 interface
Quality of Service
ToS marking and interpretation per IETF Std. 5
VLAN Priority Queuing
Firewall Features
Stateful Firewall
NAT/NAPT, NAT Bypass, NAT Pin-Holes
L1-L4 Flow Classification
Application Layer Gateway including VoIP
Denial of Service Filtering
Intrusion Detection
Management
Status indicators
SNMP v1, v2c (10/100Base-T or in-band network)
Standard MIBs
Command Line Interface (CLI), FTP, telnet, TFTP
CLI over secure telnet
Web-based interface over SSL
RADIUS
Syslog
Power
AC Input Voltage: 120/240 VAC @ 60/50 Hz
DC Input Voltage -48 VDC, 1 amp
Internal solid-state (fuseless) protection
Adit 3104 - Release 1.61-7
Page 20
Adit 3104 Base Platform
Technical Specifications
Regulatory Approvals
USA
UL60950
FCC Part 15, Class A
FCC Part 68
Canada
CSA 60950-1
ICES-003, Class A
CS-03
Physical Information
Wall mount brackets (included)
Rack mount options: 19 or 23 inch rack
Dimensions: 1.75 in. (H-2 RU) x 8.25 in. (W) x 12 in. (D)
4.4 cm (H) x 21 cm (W) x 30.5 cm (D)
Weight: 6.25 lbs. (2.83 kg)
Environment
Operating temperature range: 32 to 104 °F (0 °C to 40 °C)
Storage temperature range: -40 to 158 °F (-40 °C to 70 °C)
Maximum operating altitude: 10,000 ft. (3,048 m)
Maximum non-operating altitude: 40,000 ft. (12,192 m)
Relative humidity (non-condensing) range: 0% to 95%
1-8Adit 3104 - Release 1.6
Page 21
Adit 3104 Base Platform
(1) 10/100Base-T
Ethernet (WAN)
(4) 10/100Base-T
Ethernet (LAN)
Tip & Ring Telco
Connector
Alarm
Status
Reset
RS-232
Management
Port
Power/Battery/Status
Ground
Back
Front
(1) DS1/E1 (WAN)
(E1-future)
Chassis
Chassis
Adit 3104 - Release 1.61-9
Page 22
Adit 3104 Base Platform
Chassis
1-10Adit 3104 - Release 1.6
Page 23
CHAPTER
Physical Installation
In this Chapter
Unpacking and Inspection
Installation Environment
Compliant Installation
1. Inspect containers for damage during shipment. Report any damage to the freight carrier for
possible insurance claims.
2. Compare packing list with office records. Report any discrepancies to the office.
3. Open shipping containers, be careful not to damage contents.
4. Inspect contents and report any damage.
5. If equipment must be returned for any reason, carefully repack equipment in the original
shipping container with original packing materials if possible.
6. If equipment is to be installed later, replace equipment in original shipping container and store
in a safe place until ready to install.
Installation Environment
The environment in which you are installing the Adit 3000 must meet the following conditions:
Operating temperature range: 32° to 104° F (0° to 40° C)
Storage temperature range: -40° to158° F (-40° to 70° C)
Maximum operating altitude: 10,000 ft. (3,048 m)
Maximum non-operating altitude: 40,000 ft. (12,192 m)
Relative humidity (non-condensing) range: 0 to 95%
WARNING! THE ADIT 3000 ISDESIGNEDFORWALLANDRACKMOUNTINGONLY. ITISNOT
DESIGNEDFORDESKTOPUSE.
2-2Adit 3104 - Release 1.6
Page 25
Physical Installation
User Safety
User Safety
CAUTION! WHEN USING YOUR TELEPHONE EQUIPMENT, BASIC SAFETY PRECAUTIONS SHOULD
ALWAYS BE FOLLOWED TO REDUCE THE RISK OF FIRE
INCLUDING THE FOLLOWING:
Do not use this product near water for example, near a bathtub, washbowl, kitchen sink or
laundry tub, in a wet basement or near a swimming pool.
Avoid using a telephone (other than a cordless type) during an electrical storm. There may be
a remote risk of electric shock from lightning.
Do not use the telephone to report a gas leak in the vicinity of the leak.
Use only the power cord and batteries indicated in this manual. Do not dispose of batteries in a
fire. They may explode. Check with local codes for possible special disposal instructions.
Refer to the installation section of this manual for a safe and proper installation procedure. All
wiring external to this equipment should follow the current provision of the National Electrical
Code
, ELECTRIC SHOCK AND INJURY TO PERSONS,
Compliant Installation
The following are instructions for a compliant installation of the Adit 3104. Please note the following
warnings, before installing the unit.
For wall and rack mount instructions, use the links listed below to the appropriate section:
Wall Mounting
Rack Mounting
WARNING! OBSERVEPRECAUTIONSFORHANDLINGELECTROSTATICDEVICES. SEE PREFACE,
WARNING! THE ADIT 3104 FXS INTERFACEPORTSAREINTENDEDTOSERVEINDOOR
COMMUNICATIONCONDUCTORSONLY. OVERVOLTAGEANDOVERCURRENTPROTECTIONIS
PROVIDEDTOPREVENTEQUIPMENTDAMAGEFROMLIGHTNINGSURGESOR AC POWERLINE
CONTACTINSIDEBUILDINGS. THE FXS PORTSARENOTSUITABLEFORCONNECTIONTOEXPOSED
OUTDOORCOMMUNICATIONCONDUCTORS.
WARNING! THE T1 NETWORKINTERFACESARECERTIFIEDWITHTHE FCC AND INDUSTRY
C
ANADAFORDIRECTCONNECTIONTOPUBLICCOMMUNICATIONNETWORKS. SECONDARY
LIGHTNINGSURGEAND AC POWERCROSSPROTECTIONISPROVIDED. UTILIZELISTEDPRIMARY
PROTECTORSWITHANOMINAL 230V BREAKDOWNRATINGTOENSUREVOLTAGECOORDINATION
WITHSECONDARYPROTECTION. THEINSTALLERISREQUIREDTOFOLLOW LOCALOR NATIONAL
ELECTRIC CODESFORCOMMUNICATIONCIRCUITS.
Adit 3104 - Release 1.62-3
Page 26
Physical Installation
Compliant Installation
NOTE: It is important the DS1/E1 Network Interface Cables are secured separately from the
power and Signal Cables.
1. Inspect the unit.
2. Mount the unit, see Wall Mounting on page 2-5, or Rack Mounting on page 2-6 for detailed
4. Connect DS1 (T1), Ethernet and Amphenol connectors as needed.
Note: If Amphenol (25-pin telco) connector is used, a ferrite bead is required to meet
compliance (see graphic above).
5. Connect RS-232 connector and open Terminal Emulator software on your PC. Note: With this
running first, you can monitor the boot process.
6. Connect Power to the unit.
7. Monitor the boot process on your PC, when complete the status light should be green.
8. For any software enabled features, enter the key command. See the key command in the Adit
3000 CLI Reference Manual, for detailed information.
9. To verify use the show version command.
10. Now you can proceed to provisioning the unit. See Chapter 4, Configuration for information.
Ferrite Beads
To be compliant with EMI standards, a ferrite bead is required on the following cable:
Ferrite bead shipped with Adit chassis:
Ferrite ProvidedPart NumberIntended For
1 large P/N 010-005125-pair Telco cable (connector on the front of the Adit).
2-4Adit 3104 - Release 1.6
Page 27
Physical Installation
Mounting Bracket
Leave adequate space
at the front/back for
access to connectors
Back of unit
Front of unit
Wall Mounting
Wall Mounting
Before beginning the mounting process, verify that the installation area is a stable environment, clean
and free from extremes of temperature, shock, vibration and EMI. See Installation Environment on page
2-2.
The Adit 3000 is delivered with mounting brackets that can easily be attached for quick and easy wall
mounting, as shown in the illustration above.
To install the unit to the wall:
1. Attach the wall mount brackets to the Adit 3000, with wall attachment flange pointing away
from the unit, as shown above. Attach with 4 screws provided (2 for each bracket).
2. Mount the unit to the wall using appropriate mounting screws (not included). Note: It is
acceptable to mount on drywall with suitable anchor-type mounting screws.
NOTE: The Adit 3000 must be mounted with the brackets on the top and bottom, as shown
above.
Adit 3104 - Release 1.62-5
Page 28
Physical Installation
23 in rack
19 in rack
Front
Front
screws
screws
screws
screws
Rack Mount Tray
Rack Mount Tray
Mounting Ear
Mounting EarMounting Ear
Mounting Ear
Mounting Ear
Rack Mounting Tray
Rack Mounting
Rack Mounting
NOTE: Rack mounting kits are available for both 19 and 23 inch racks. 1 Rack Unit (RU) of
spacing is required above the Adit 3000 in the Rack Mount Unit.
To rack mount the Adit 3000, follow the instructions below:
1. Attach bracket ears to Rack Mounting Tray using four #10-32 x 1/4” screws on each side. The
Mounting Ears can be used for both a 19 or 23 inch rack. The drawing below shows a top view
of the 2 versions.
2-6Adit 3104 - Release 1.6
2. Attach the Rack Mounting Tray assembly (with mounting ears attached) to rack, using four
#10-32 x 1/4” screws (two on each mounting ear).
3. Remove wall mount and screws, if attached, from Adit 3000 unit.
Note: Adit 3000 and wall mounting bracket are not assembled from the factory.
Page 29
Physical Installation
Tray Slide
screws
screws
Rack Mounting
4. Place the Adit on the Tray Slide and attach with 4 screws removed in step 2.
5. Slide the assembled piece (Adit 3000 and Tray Slide) onto the installed Rack Mounting Tray.
6. Secure the Tray Slide to the Rack Mounting Tray with the attached screws on the Tray Slide.
Adit 3104 - Release 1.62-7
Page 30
Physical Installation
Adit 3104, 3200, 3300 and 3400 Battery Backup
Adit 3104, 3200, 3300 and 3400 Battery Backup
The Adit 3104, 3200, 3300 and 3400 Battery Backup (P/N 730-0132), is a wall-mount battery backup
unit to provide up to 8 hours battery backup.
Please see the Battery Backup User Manual for product information and installation instructions, which
is provided with unit.
The following illustrations show all connectors on the Adit 3104.
3-2Adit 3104 - Release 1.6
Page 33
Electrical Installation & Cabling
Chassis
Ground
Interface Connectors
Interface Connectors
The following are the Adit 3104 interface connectors:
Front of Adit
(1) DS1 WAN port (RJ-48C). Note: E1 will be in a future release.
(1) 10/100Base-T WAN port (RJ-45)
(4) 10/100Base-T switched LAN ports (RJ-45)
Tip and Ring Analog Interface equipped with standard 25-pair Telco Connector
Back of Adit
RS-232 craft port connector for local management
Power input connector
Ground connector
Grounding the Unit
WARNING! THE ADIT 3104 AREREQUIREDTOBEPERMANENTLYGROUNDEDFORTHE
PROTECTIONOFUSERSANDSERVICEPERSONNEL.
Chassis ground is located on the back of the unit.
To ground the unit:
1. Connect a minimum 14 AWG ground
wire with a #8 ring tongue terminal (not
included) to the chassis ground on the
back of the unit. Secure with the 8-32
screw and lock washer provided.
2. Connect the opposite end of the ground
wire to a suitable earth grounding point
such as a building grounding electrode,
metal water pipe, or metal building
structure that is in compliance with article 250 of NEC.
Adit 3104 - Release 1.63-3
Page 34
Electrical Installation & Cabling
PIN 10 , ORANGE
PIN 5, BLACK
Interface Connectors
Power
The Adit 3000 is powered by a limited -48 VDC Power source. The
following options are available:
AC/DC Converter
Battery Backup module
AC/DC Converter
An AC/DC Converter generates 48VDC from any worldwide AC power source.
To connect AC power:
1. Plug power connector from AC/DC converter into rear of Adit 3000.
2. Connect AC/DC converter to wall outlet.
3. A green light should appear on the Status LED on the front of the unit.
The Adit 3000 Battery connection is provided for Battery Backup. See Adit 3104, 3200, 3300 and 3400
Battery Backup on page 2-8 for additional information.
3-4Adit 3104 - Release 1.6
Page 35
Electrical Installation & Cabling
50
25
26
1
Interface Connectors
25-Pair Telco Connector
Tip and Ring Analog Interface equipped with standard 25-pair Telco Connector (female) for connection
to key systems, fax machines, modems, and PBXs.
Circuit connections are made at the 25-pair telco connectors.
A standard 25-pair telephone cable with RJ-21X wiring and
a male D-type connector at the Adit 3000 end is required.
The RS-232 craft port connector (female) is for connection to an external PC or Hayes-compatible
modem for local or remote configuration, management, and performance monitoring using the Adit
3000 Command Line Interface (CLI).
The RS-232 craft port connects via a female DB-9 connector on the Adit
3000.
The pinouts are as follows:
Pin NumberDirectionDescription
1OutboundCarrier Detect
2OutboundReceive Data
3InboundTransmit Data
4InboundData Terminal Ready
5N/ASignal Ground
6OutboundData Set Ready
7InboundRequest to Send
8OutboundClear to Send
9N/CNot connected
3-6Adit 3104 - Release 1.6
Page 37
Electrical Installation & Cabling
18
Interface Connectors
DS1/E1 Connection Ports
Each DS1/E1 connection port is equipped with a standard RJ-48C (female) on the
Adit 3000 unit. Note: E1 will be available in a future release.
OffOff line
GreenNormal
RedLoss of Signal (LOS)
YellowBipolar Violation (BPV)
Flashing GreenLoopback active
Flashing YellowYellow Alarm (Remote Alarm Indication)
Flashing Red (Slow)Loss of Frame (LOF) or Alarm Indication Signal (AIS)
Flashing Red (Fast)Self-test Failure
Adit 3104 - Release 1.63-7
Page 38
Electrical Installation & Cabling
18
8 1
Interface Connectors
10/100Base-TX Ethernet
The 10/100Base-TX Ethernet (female) ports provide connectivity for Router
WAN and/or LAN ports and for management connection via Telnet and/or
SNMP to a Network Management System.
Ethernet (RJ-45)
The pinouts are as follows:
Note: This is a hub pinout, you will need a straight cable to connect to a PC.
Pin Name Description
1 Receive +Receive from network
2 Receive -Receive from network
3 Transmit + Transmit to network
4-5 N/CNot connected
6 Transmit - Transmit to network
7-8N/CNot connected
The LEDs are as follows:
LEDStateDescription
Left LEDThe left LED shall show Link Status.
OffLink Down
GreenLink Up
Flashing GreenTraffic on Link
YellowCollision status
Right LEDThe right LED shall indicate Link Speed.
Off10 Mbit/sec, down or not connected
Green100 Mbit/sec
3-8Adit 3104 - Release 1.6
Page 39
Electrical Installation & Cabling
Reset Button
Reset Button
The system can be reset by pressing the reset button located on the front panel.
user-configured manor environmental inputs, DS1 short, DS1 open, DS1
facility alarm, DS1 RAI, DS1 AIS, DS1 LOF, DS1 LOS, WAN fault,
Ethernet fault and dead card alarms.
MinorOffNo minor alarms present
RedMinor alarms present. Minor alarms include:
user-configured minor environmental inputs, DS1 excessive line code
violations.
StatusOffNo power to system
GreenApplication running, no detected system problems.
Green FlashingPower-On Self Test (POST) successful. System booted. Loading
Application.
Green/YellowFlashing alternate colors. Application Self Test in Process.
YellowYellow while booting. If this stays a steady yellow the Power-On Self Test
(POST) failed.
Yellow FlashingPower-On Self Test (POST) In Process.
RedSystem Failure
Adit 3104 - Release 1.63-9
Page 40
Electrical Installation & Cabling
Alarm/Status LEDs
3-10Adit 3104 - Release 1.6
Page 41
CHAPTER
4
Configuration
After the Adit 3104 is installed (see Compliant Installation on page 2-3), the system can now
be provisioned.
In this Chapter
PC Network Configuration
Web-Based Management
Setting up a CLI Connection
Log in
Key Enabled Software Features
Basic Configuration
-
Setup Adit 3104 for access via Web-Browser
- Restore Factory Defaults
- Modify Default Admin User
- Configure Ethernet WAN Interface
- Configure Serial1 as WAN
- Configure the Adit 3104 as a SIP Line Gateway
Page 42
Configuration
PC Network Configuration
PC Network Configuration
When a PC is connected directly or indirectly to the Adit 3104 Ethernet LAN port (Eth-1), IP addresses
will be acquired using the DHCP server or relay functionality of the Adit 3104.
Note: For either of these cases, the PC must be configured as a DHCP Client.
This configuration principle is identical but performed differently on each OS.
Windows XP
1. Access Network Connections from the Control Panel.
2. Right-click the Ethernet connection’s icon, and select Properties to display the connection’s
properties.
3. From the General tab select the Internet Protocol (TCP/IP) component and press the Properties button.
4. The Internet Protocol (TCP/IP) properties will be displayed and the following must be selected.
Select the Obtain an IP address automatically.
Select the Obtain DNS server address automatically.
5. Continue on the following setup for a LAN Connection.
Windows 2000/98/Me
1. Access Network and Dialing Connections from the Control Panel.
2. Right-click the Ethernet connection’s icon, and select Properties to display the connection’s
properties.
3. Select the Internet Protocol (TCP/IP) component and press the Properties button.
4. The Internet Protocol (TCP/IP) properties will be displayed and the following must be selected.
Select the Obtain an IP address automatically.
Select the Obtain DNS server address automatically.
5. Continue on the following setup for a LAN Connection.
Windows NT
1. Access Network from the Control Panel to display the network control panel.
2. From the Protocol tab select the Internet Protocol (TCP/IP) component and press the
Properties button.
3. From the IP Address tab select Obtain an IP address automatically.
4. From the DNS Address tab verify that no DNS server is defined in the DNS Service Search Order field, and no suffix is defined in the Domain Suffix Search Order field.
5. Reboot
6. Continue on the following setup for a LAN Connection.
4-2Adit 3104 - Release 1.6
Page 43
Configuration
PC Network Configuration
Linux
1. Login into the system as a super-user, by entering su at the prompt.
2. Type ifconfig to display the network devices and allocated IP’s.
3. Type pump -i dev, the dev is the network device name.
4. Type ifconfig again to view the new allocated IP address.
5. Continue on the following setup for a LAN Connection.
LAN Connection
Your computer can connect to the gateway in various forms, each requiring a different physical
connection. See Chapter 3, Electrical Installation & Cabling.
Internet Connection
Connect the gateway directly to the Internet.
Adit 3104 - Release 1.64-3
Page 44
Configuration
Web-Based Management
Web-Based Management
The web-based management interface allows you to control various system parameters. The interface
is accessed through a web browser.
To access the management console
NOTE: The following assumes that you have connected the PC to the LAN port of the Adit
3104.
1. Launch a web browser on your PC in the LAN to which the Adit 3104’s LAN port is connected.
Note: If connection to the Adit 3104 is to be through an Ethernet or T1 WAN, the remote admin
WAN access must be enabled with the following command sequence:
CommandDescription
Username: admin
Password: ********
Adit 3104> enableEnter the Privileged mode.
Password: ********
#configure terminal
(config)# remote-admin web
primary-port enable
Log into the system (username and password).
Enter password for the Privileged mode.
Enter the Configuration mode.
Enable remote web admin.
2. Type the Adit 3104’s IP address or name in the address bar.
Example: http://192.168.1.1.
Default IP address is http://192.168.1.1
Note: To display the current IP address of the systems, use the following CLI command:
3. Login to the unit.
Enter User Name and Password. Note: These setting should be changed from the default
settings after the initial login.
Default user name is admin
Default password is admin 123
NOTE: After a few minutes of inactivity, the session will automatically timeout and the
operator will be required to log in to continue the session.
WARNING! IFYOUR USER NAMEAND PASSWORDARESETTOTHEDEFAULTSETTING, ITIS
RECOMMENDEDTHATYOUMODIFYTHEMFORSECURITYPURPOSES.
4-4Adit 3104 - Release 1.6
Page 45
Configuration
Setting up a CLI Connection
Setting up a CLI Connection
A CLI connection will require the LAN or WAN IP address of the unit. Note: If the WAN IP address
is used, the remote admin WAN access must be enabled with the following command sequence:
CommandDescription
Username: admin
Password: ********
Adit 3104> enableEnter the Privileged mode.
Password: ********
#configure terminal
(config)# remote-admin web
primary-port enable
Log into the system (username and password).
Enter password for the Privileged mode.
Enter the Configuration mode.
Enable remote web admin.
NOTE: For Adit 3104 CLI commands see the Adit 3000 CLI Reference Manual. This is a
separate document and can be found on the CD that is provided with the product, or on the
Carrier Access customer website.
To connect with CLI, set up the connection:
If connecting via the Ethernet 100Base-T connection, use a Telnet TCP/IP program to access
the CLI. This requires an IP address of the unit.
Note: To display the current IP address of the unit, use the ifconfig command.
If connecting via RS-232, the port settings should be set to:
Bits per second: 115200 Data bits: 8
Parity: None Stop bits: 1
Flow control: None
Set your Terminal Emulation to: VT100
NOTE: When using Tera Term (Telnet program) TCP/IP, CLI commands will not be
recognized until the following setup is completed.
In Tera Term go to Setup/Terminal
Set the New-line/Transmit value CR
Adit 3104 - Release 1.64-5
Page 46
Configuration
Log in
Log in
After successful connection, via telnet or HyperTerm, the user must login. Default Logins are:
Login: admin
Password: admin123
After successful login the prompt will be displayed as follows:
Adit 3104>
Note: It is recommended that you change your password from the default. See the following to
modify the Admin level password on your system.
GUI interface - see Advanced/Users window
CLI interface - use the Adit 3000(config)#username command
4-6Adit 3104 - Release 1.6
Page 47
Configuration
Key Enabled Software Features
Key Enabled Software Features
The Adit 3104 has additional features that are not provided on the base system. These features can be
purchased with the product or added later as needed. These features are enabled via a Software Key
(example: G.729). The number of keyed features may expand with the development of the product,
therefore to see a list of current keyed features, or to purchase a key, contact Carrier Access Customer
Service or Sales.
To enter a software key, use the following CLI command:
Syntax:
(config)# key {key-code}
Example: (config)# key cxusdfutkj3diosn412C
NOTE: Keys may only be entered through the CLI (not through the GUI).
The Key Enabled Software Features are displayed on the Advanced/Technical Information window.
This information is also displayed with the following CLI command:
The following configuration is divided into logical sections, where each section configures an additional
function. The first must be configured before the second and so forth, however, you may stop at any
section and not add the following feature.
NOTE: The order in which commands are entered can affect the successful provisioning of
the Adit 3104.
Setup Adit 3104 for access via Web-Browser
Restore Factory Defaults
Modify Default Admin User
Configure Ethernet WAN Interface
Configure Serial1 as WAN
Configure the Adit 3104 as a SIP Line Gateway
Setup Adit 3104 for access via Web-Browser
The following steps will configure the Adit 3104 to allow access to the Web Browser for configuration,
through one of the 4 10/100Base-T LAN connections.
Note: For LAN access, no additional configuration is required to access the Adit 3104 using the web
browser.
To configure the WAN access:
1. Connect to the CLI via the DB-9 RS-232. See Setting up a CLI Connection on page 4-5.
2. Enable the remote admin WAN access with the following command sequence:
CommandDescription
Username: admin
Password: ********
Adit 3104> enableEnter the Privileged mode.
Password: ********
#configure terminal
(config)# remote-admin web
primary-port enable
Log into the system (username and password).
Enter password for the Privileged mode.
Enter the Configuration mode.
Enable remote web admin.
4-8Adit 3104 - Release 1.6
Page 49
Configuration
Basic Configuration
Restore Factory Defaults
If the unit is not out-of-the-box, you may want to verify that the unit is set to defaults. Note: This will
reset the IP address back to the default setting of 192.168.1.1.
In the web-browser:
Select Advanced from the Navigation bar
Select Restore Defaults
Select OK to restore defaults
Adit 3104 - Release 1.64-9
Page 50
Configuration
Basic Configuration
Modify Default Admin User
For security purposes it is recommended that the Administrator User be changed from the default
settings.
Modify the Administrator User in the web-browser:
Select Advanced from the Navigation bar
Select Users icon
Select Administrator, to open the profile.
4-10Adit 3104 - Release 1.6
Page 51
Configuration
Basic Configuration
Modify the User information, and select OK to save. It is important to note that you need to
have a minimum of one user with Administrative Privileges. For users with other access
levels, add a New User.
Note: For security purposes, the password should be changed.
You will be required to login again, if you have modified the User Profile that you are logged
in with.
Adit 3104 - Release 1.64-11
Page 52
Configuration
Basic Configuration
Configure Ethernet WAN Interface
In the web-browser:
1. Select Network Connections from the Navigation bar.
2. It is recommended that you disable/delete the Serial1 port.
3. Select (click) Ethernet 2 (WAN Ethernet) connection to configure.
4. Select the Enable button, to configure the WAN Ethernet up (or in-service).
5. Select the Settings button.
4-12Adit 3104 - Release 1.6
Page 53
Configuration
Basic Configuration
6. Set Internet Protocol to Obtain an IP Address Automatically, from the pulldown menu. This
will enable the Adit 3104 as a DHCP Client. Leave the other fields to their default settings.
7. Select Apply to apply the new settings.
Adit 3104 - Release 1.64-13
Page 54
Configuration
Basic Configuration
Configure Serial1 as WAN
In the web-browser:
1. Select Network Connections from the Navigation bar.
2. Select Serial1.
3. Select Settings button.
4. Set Network to WAN.
5. Select Apply to apply the new settings.
4-14Adit 3104 - Release 1.6
Page 55
Configuration
Basic Configuration
6. Select the Enable button.
Adit 3104 - Release 1.64-15
Page 56
Configuration
Basic Configuration
Configure the Adit 3104 as a SIP Line Gateway
In the web-browser:
1. Select Voice Over IP from the Navigation bar.
2. Select Use SIP Proxy.
3. Enter Softswitch IP Address, User name and Password.
4. Select applicable Codecs.
5. Select Apply to apply the new settings.
4-16Adit 3104 - Release 1.6
Page 57
Configuration
Basic Configuration
6. Select the Phone Settings tab.
7. Select the Action icon on line #1 to edit.
Adit 3104 - Release 1.64-17
Page 58
Configuration
Basic Configuration
8. Enter a telephone number in the User ID field and select OK.
9. Repeat this step for each line you would like to have register with your Softswitch.
4-18Adit 3104 - Release 1.6
Page 59
Glossary
AMIAutomatic Mark Inversion
ARPAddress Resolution Protocol
B8ZSBipolar with 8 Zero Substitution
BITBinary Digit
BPSBits Per Second
BPVBipolar Violation
CACertificate Authority
CASChannel Associated Signaling
CCSCommon Channel Signaling
CHAPChallenge Handshake Authentication Protocol
CIDCaller ID
GLOSSARY
CIDRClassless Inter-Domain Routing
CLASSCustom Local Area Signaling Service
CLEICommon Language Equipment Identification
CLICommand Line Interface
COCentral Office
CPDCalling Party Disconnect
CPECustomer Provided Equipment
CRCCyclic Redundancy Check
CRVCall Reference Value
CSUChannel Service Unit
dBdecibel
DCSDigital Signal Processor
DDNSDynamic Domain Name System
DDSDigital Data Service
DLCDigital Loop Carrier
Page 60
Glossary
DLCI
DLCIData Link Connection Identifier
DMZDemilitarized Zone
DNSDomain Naming System
DS0Digital Signal Level Zero (64 kbps) (1 voice channel)
DS1Digital Signal Level 1 (1.544 Mbps)
DSUDigital Service Unit/Data service Unit
DTEData Terminal Equipment
DTMFDual Tone Multi-Frequency
ESErrored Seconds
ESFExtended Superframe
FDLFacilities Data Link
FXSForeign Exchange Station
GSGround Start
HDB3High Density Bipolar 3
IPInternet Protocol
IPXInternet Packet eXchange
ISDNIntegrated Services Digital Network
LANLocal Area Network
LAPDLink Access Procedure on the D channel status
LBOLine Build Out
LLCLogical Link Control
LMILocal Management Interface
LSLoop Start
LULTLine Unit Line Termination
MbpsMillion Bits Per Second
MLPPPMultilink PPP
MPPEMicrosoft Point-to-Point Encryption
MS-CHAPMicrosoft CHAP
MVECMajority Vote Error Correction
Glossary-2Adit 3104 - Release 1.6
Page 61
Glossary
NAT
NATNetwork Address Translation
NCSNetwork-based Call Signaling
NEBSNetwork Equipment Building Standards
NRZNon-Return to Zero
NSENamed Service Event
NTPNetwork Time Protocol
OSPFOpen Shortest Path First
PAPPassword Authentication Protocol
PHYPhysical specifications
PPPPoint-to-Point Protocol
PRIPrimary Rate Interface
PVCPermanent Virtual Circuit
QoSQuality of Service
RADIUSRemote Authentication Dial-In Service
SABMESet Asynchronous Balanced Mode Extended
SDPSession Description Protocol
SIPSession Initiation Protocol
STPSpanning Tree Protocol
T1Trunk Level 1 (1.544 Mbps)
TDMTime Division Multiplex
TEITerminal Endpoint Identifier
TFTPTrivial File Transfer Protocol
TOSType of Service
UACUser Agent Client
UASUser Agent Server
VCVirtual Channel
VLANVirtual Local Area Network
VPNVirtual Private Network
Adit 3104 - Release 1.6Glossary-3
Page 62
Glossary
WAN
WANWide Area Network
WINSWindows Internet Naming Service
Glossary-4Adit 3104 - Release 1.6
Page 63
Glossary
10Base-T
10Base-TThe most widely installed Ethernet local area networks (LANs) use ordinary telephone
twisted-pair wire. When used on Ethernet, this carrier medium is known at 10BASE-T.
10BASE-T supports Ethernet’s 10 Mbps transmission speed.
100Base-TXAlso called “Fast Ethernet”, it is a 100 Mbps version of Ethernet. 100Base-T transmits at
100 Mbps rather than 10 Mbps. Like regular Ethernet, Fast Ethernet is a shared media LAN.
All nodes share the 100 Mbps bandwidth. 100Base-TX uses two pairs of Category 5
cabling, one pair for transmission, one pair for receiving.
Address Resolution
Protocol (ARP)
Alternate Mark
Inversion (AMI)
analogThe telephone transmission of voice, video or image. Telephone transmission and/or
Asynchronous Transfer
Mode (ATM)
authenticationThe process of identifying an individual, usually based on a username and password
bandwidthThe width of a communications channel. Analog is typically measured in Hertz (cycles per
An internet protocol used to map dynamic internet addresses to physical addresses on Local
Area Networks.
The line-coding format in T1 transmission systems whereby successive ones (marks) are
alternately inverted (sent by polarity opposite that of the preceding mark).
switching that is not digital.
Very high speed transmission technology. ATM is a high bandwidth, low-delay,
connection-oriented, packet-like switching and multiplexijng technique. Usable capacity is
segmented into 53-byte fixed-size cells, consisting of header and information fields,
allocated to services on demand. The term “asynchronous” applies, as each cell is presented
to the network on a “start-stop” basis - in other words, asynchronously.
combination, although the process can be many more steps. In security systems,
authentication is distinct from authorization, which is the process of giving individuals
access to system objects based on their identity. Authentication merely ensures that the
individual is who he or she claims to be, but says nothing about the access rights of the
individual. Authentication in whatever form, is usually followed by authorization.
second), a voice conversation is typically measured in bits per second.
Basic Rate Interface
(BRI)
Bipolar 8-Zero
Substitution
bipolar violationBPV. A violation is declared for AMI if two successive pulses have the same polarity.
bitContraction of the words "binary" and "digit".
Bit Error RateThe number of erred bits divided by the total number of bits.
broadbandA technology that provides an extremely wide and fast bandwidth so that many people can
Adit 3104 - Release 1.6Glossary-5
Basic Rate Interface (2b+d) in ISDN.
A coding scheme that maintains ones density.
simultaneously use the service. It is generally associated with multiple types of
transmissions on the same connection such as voice, data, video and digital or analog
information.
Page 64
Glossary
Central Office (CO)
Central Office (CO)Where telephone companies terminate customer lines and locate switching equipment to
interconnect those lines with other networks.
channelA generic term for a communications path on a given medium; multiplexing techniques
allow providers to put multiple channels over a single medium.
Channel Associated
Signaling (CAS)
Channel Service Unit
(CSU)
Classless Inter-Domain
Routing
CLEI CodesCommon Language Equipment Identifier codes, that are assigned by Bellcore to provide a
CLICommand Line Interface
collisionIn Ethernet, the result of two nodes transmitting simultaneously. The frames from each
command lineThe command line is where you enter MS-DOS commands.
companderCompanding is the process of compressing the amplitude range of a signal for economical
Demilitarized Zone
(DMZ)
Carrying signaling information within the data channels of a T1 line (in band) rather than
on a separate control channel. CAS signaling is also used to carry 911 emergency data such
as telephone number and location information.
The interface to the T1 line that terminates the local loop.
CIDR is a new addressing scheme for the Internet which allows for more efficient
allocation of IP addresses than the old Class A, B, and C address scheme.
standard method of identifying telecommunications equipment in a uniform, featureoriented language.
device impact and are damaged when they meet on the physical media.
transmission and then expanding them back to their original form at the receiving end.
A collection of computers that are shielded from both the trusted network and the untrusted
network by packet-filtering routers and gateways.
Domain Naming System
(DNS)
downloadTo transfer data from a larger “host” system to a smaller “client” system's hard drive or
Dual Tone MultiFrequency (DTMF)
Dynamic Domain Name
System (DDNS)
Dynamic Host
Configuration Protocol
(DHCP)
Earth groundA wire conductor that terminates in the earth for electrical purposes. It is generally the
Glossary-6Adit 3104 - Release 1.6
DNS. A mechanism used in the Internet for translating names of host computers into
addresses.
other local storage device.
Dual Tone Multi-Frequency is a term describing push button or Touchtone dialing.
Allows the hosting of a website, FTP server, or e-mail server with a fixed domain name
(e.g., www.xyz.com) and a dynamic IP address.
DHCP is a network configuration that allows maintenance to be performed from a central
site rather than by end users.
negative side of the circuit and is most important in alternating current (AC) circuits.
Chassis Ground is the general term used in direct current (DC) circuits.
Page 65
Glossary
Electro-magnetic Interference (EMI)
Electro-magnetic
Interference (EMI)
EthernetEthernet is a particular network topology and protocol, especially useful in LANs. It comes
Facilities Data Link
(FDL)
filterAn operating parameter used with routers that can be set to block the transfer of packets
firewallAny of a number of security schemes that prevent unauthorized users from gaining access
frameA fragment of data that is packaged into a frame format, which comprises a header,
Equipment used in high speed data systems, including ATM, that generate and transmit
many signals in the radio frequency portion of the electromagnetic spectrum. Interference
to other equipment or radio services may result if sufficient power from these signals
escape the equipment enclosures or transmission media. National and international
regulatory agencies (FCC, CISPR, etc.) set limits for these emissions. Class A is for
industrial use and Class B is for residential use.
in various speeds and is often regarded as THE current technology for general network
direct connection. The current connectivity is generally considered to be 10Base-T or
100Base-T, while the backbone, if one is used, is coaxial cable or Fiber optics. There is also
a 1000Base-T for certain specialty copper joining situations.
FDL supports the communication of various network information in the form of in-service
monitoring and diagnostics.
from one LAN to another.
to a computer network and/or may monitor the transfer of information to and from the
network.
payload, and trailer.
Frame Reject (FRMR)The FRMR response frame is sent to report the receiver of a frame cannot successfully
process that frame and that the error condition is not correctable by sending the offending
frame again.
Foreign ExchangeA Central Office trunk which has access to a distant central office. Dial Tone is returned
from that distant Central Office, and a location can be reached in the area of the foreign
Central Office by dialing a local number. This will provide easier access for customers in
that area and calls may be made anywhere in the foreign exchange area for a flat rate.
Foreign Exchange
Service
G.711ITU-T Recommendation for an algorithm designed to transmit and receive A-law and mu-
G.729International Telecommunications Union’s standard voice algorithm (CS-ACELP) voice
Foreign exchange (FX) service is a service that can be ordered from the telephone company
that provides local telephone service from a central office which is outside (foreign to) the
subscriber’s exchange area. Simply, a user can pick up the phone in one city and receive a
dial tone in the foreign city. This kind of connection is provided by a type of trunk called
foreign exchange (FX) trunk. FX trunk signaling can be provided over analog or T-1 links.
Connecting POTS telephones to a computer telephony system via T-1 links requires a
channel bank configured with FX type connections.
law PCM voice at digital bit rates of 48, 56, and 64 Kbps. It is used for digital telephone
sets on digital PBX and ISDN channels.
algorithm for the coding of encoding/decoding of speech at 8 Kbps using conjugatestructure, algebraic-code excited linear predictive methods. Described in the ITU-T
standard in its G-series recommendations.
Adit 3104 - Release 1.6Glossary-7
Page 66
Glossary
gateway
gatewayAn entrance and exit into a communications network
Graphical User Interface
(GUI)
groundA physical connection to the earth or other reference point.
ground start (GS)A method of signaling on subscriber trunks in which one side of the two wire trunk
hash algorithmA one way function that takes an input message of arbitrary length and produces a fixed
High Density Bipolar 3HDB3. A bipolar coding method that does not allow more than 3 consecutive zeros.
hopEach individual short trip that packets make from router to router, as they are routed to their
host A computer that allows users to communicate with other host computers on a network.
impedanceThe total opposition a circuit offers to the flow of alternating current. It is measured in ohms
internet“A network of networks,” the Internet supports FTP, WWW, Gopher,
GUI, pronounced “GOOEY”. A set of screen presentations and metaphors that utilize
graphic elements such as icons in an attempt to make an operating system easier to use.
(typically the ring conductor of Tip and Ring) is momentarily grounded to get dial tone.
length digest. Adit uses both Secure Hash Algorithm (SHA) and Message Digest 5 (MD5)
hashes within our implementation of the IPSec framework.
destination.
and the lower the ohmic value, the better the quality of the conductor
E-Mail, Telnet, and many other world-wide information transfer protocols and services.
ISPs provide an effective interface with the Internet. The Internet itself is made up of
thousands of LANs and WANs, all using TCP/IP to provide information services to
millions of users. A worldwide network of networks that all use the TCP/IP
communications protocol and share a common address space.
Internet Protocol (IP)Internet Protocol, the method by which most Internet activity takes place. Members with
access to TCP/IP through a SLIP or PPP connection can connect to many ISP services in
this manner. As the name implies, it is a protocol for network activity. Most current
networks support some sort of TCP or IP directly or indirectly.
IP addressA string of four numbers separated by periods (such as 111.22.3.144) used to represent a
computer on the Internet. The format of the address is specified by the Internet Protocol in
RFC 791. Each of the four number must be 255 or less; they may be 0.
IPSecIPSec (IP Security) is a set of IP extensions developed by IETF to provide security services
compatible with the existing IP standard (IPv.4) and also the upcoming one (IPv.6). In
addition, IPSec can protect any protocol that runs on top of IP, for instance TCP, UDP, and
ICMP. The IPSec provides cryptographic security services. These services allow for
authentication, integrity, access control, and confidentiality. IPSec allows for the
information exchanged between remote sites to be encrypted and verified. You can create
encrypted tunnels (VPNs), or just do encryption between computers.
jitterInterference on an analog line caused by a variation of a signal from its reference timing
slots. Jitter can cause problems in the receipt of data and any subsequent processing of that
data.
Glossary-8Adit 3104 - Release 1.6
Page 67
Glossary
Local Area Network (LAN)
Local Area Network
(LAN)
Line Build Out (LBO)T1s require the last span to lose 15 - 22.5 dB, a selectable output attenuation is generally
Line Coding Violation
(LCV)
Line Errored Seconds
(LES)
Local Link Control
(LLC)
Local Management
Interface
loop start (LS)A method of demanding dial tone from the central office by completing an electrical
loopbackA diagnostic test in which a signal is transmitted across a medium while the sending device
A short distance data communications network (typically within a building or campus)
used to link together computers and peripheral devices under some form of standard
control.
required of DTE equipment.
This parameter is a count of both BPVs and EXZs occurring over the accumulation period.
An EXZ increments the LCV by one regardless of the length of the zero string.
A Line Errored Second is a second in which one or more CVs occurred OR one or more
LOS defects.
A protocol developed by the IEEE 802.2 committee for data-link-level transmission control
A specification for the use of frame-relay products that define a method of exchanging
status information between devices such as routers
pathway between the outbound and return conductors of a telephone line. Loop start is
employed by single-line telephone instruments, for example
waits for its return.
MAC AddressThe address for a device as it is identified at the Media Access Control layer in the network
architecture
Management
Information Base (MIB)
mappingIn network operations, the logical association of one set of values, such as addresses on one
Media Access Control
(MAC)
Media Gateway Control
Protocol (MGCP)
Microsoft CHAPMicrosoft Challenge Handshake Authentication Protocol (MS-CHAP) is the Microsoft
A data base of objects, with attributes and values, representing the manageable components
of a network device. Used in SNMP. There are industry standardized MIBs and proprietary
MIBs
network, with quantities or values of another set, such as devices on another network.
The lower of the two sub-layers of the data link layer defined by the IEEE. The MAC sublayer handles access to shared media, such as whether token passing or contention will be
used. The MAC contains the standardized data link layer address that is required for every
port or device that connects to a LAN. Other devices in the network use these addresses to
locate specific ports in the network and to create and update routing tables and data
structures. MAC addresses are 6 bytes long and are controlled by the IEEE.
MGCP. A control and signal standard for the conversion of audio signals carried on
telephone circuits (PSTN) to data packets carried over the Internet or other packet
networks.
version of CHAP and is an extension to RFC 1994. Like the standard version of CHAP,
MS-CHAP is used for PPP authentication; in this case, authentication occurs between a PC
using Microsoft Windows NT or Microsoft Windows 95 and a Cisco router or access server
acting as a network access server (NAS).
Adit 3104 - Release 1.6Glossary-9
Page 68
Glossary
Multilink PPP (MLPPP)
Multilink PPP (MLPPP)MultiLink PPP. An extension to the point-to-point protocol that enables two channels to be
linked together to double the throughput. It is used for ISDN transmission and channel
bonding
Microsoft Point-to-Point
Encryption (MPPE)
modemMOdulator-DEModulator, a device that takes digital computer signal, converts it to analog,
multiplexerElectronic equipment which allows two or more signals to pass over one communications
MUXSee multiplexer
NetBIOSNetwork Basic Input/Output System.NetBIOS is a program that allows applications on
networkA set of computers linked to one another for data sharing, or the link itself.
Network Time Protocol
(NTP)
Non-Return to Zero
(NRZ)
A 128-bit key or 40-bit key encryption algorithm using RSA RC4. MPPE provides for
packet confidentiality between the remote access client and the remote access or tunnel
server and is useful where IP security (IPSec) is not available. MPPE 40-bit keys are used
to satisfy current North American export restrictions. MPPE is compatible with Network
Address Translation.
and sends it across the phone line. Another modem on the reverse does the exact opposite
action. Modems transfer data at different speeds or rates, called baud.
circuit. The circuit may be analog or digital
different computers to communicate within a Local Area Network (LAN).
Network Time Protocol, developed to maintain a common sense of time among Internet
hosts around the world. Many systems on the Internet run NTP, and have the same time
(relative to Greenwich Mean Time).
A binary encoding scheme in which ones and zeros are represented by opposite and
alternating high and low voltages and where there is no return to a zero (reference) voltage
between encoded bits.
Open Shortest Path First
(OSPF)
packetA packet consists of the data to be transmitted and certain control information.
PAPPassword Authentication Protocol
PATPort Address Translation
Glossary-10Adit 3104 - Release 1.6
Short for Open Shortest Path First, an interior gateway routing protocol developed for IP
networks based on the shortest path first or link-state algorithm.
Routers use link-state algorithms to send routing information to all nodes in an
internetwork by calculating the shortest path to each node based on a topography of the
Internet constructed by each node. Each router sends that portion of the routing table (keeps
track of routes to particular network destinations) that describes the state of its own links,
and it also sends the complete routing structure (topography).
The advantage of shortest path first algorithms is that they results in smaller more frequent
updates everywhere. They converge quickly, thus preventing such problems as routing
loops and Count-to-Infinity (when routers continuously increment the hop count to a
particular network). This makes for a stable network.
Note: OSPF Version 2 is defined in RFC 1583. It is rapidly replacing RIP on the Internet.
Page 69
Glossary
PHY
PHYPHY as in physical specifications. OSI Physical Layer, which provides for transmission of
cells over a physical medium connecting two ATM devices.
pingPacket InterNet Grouper. PING is a program used to test whether a particular network
destination on the Internet is online (i.e. working) by repeatedly bouncing a "signal" off a
specified address and seeing how long that signal takes to complete the round trip. No
return signal - site is down or unreachable. Portion is returned - trouble with the connection.
PLARPrivate Line, Automatic Ringdown. A leased voice circuit that connects two single
instruments together. When either handset is lifted, the other instrument automatically
rings.
PPPPoint-to-Point Protocol. is used for establishing a point-to-point link that provides a single,
preestablished WAN communications path from the customer premises, through a carrier
network (the telephone company), to a remote network
PPPoDS0Point-to-Point over DS0.
PRACKProvisionable acknowledgement.
Primary Rate Interface
(PRI)
protocolProcedure or set of rules.
PVCPermanent Virtual Circuit. A PVC is a permanent channel connection between two ATM
Quality of Service (QoS)The measure of the telephone service quality provided to a subscriber.
RADIUSRemote Authentication Dial-In Service. RADIUS is a client/server-based authentication
robbed bitA type of analog signaling that will occasionally steal information bits used for circuit
routerA computer or internet working device that directs traffic and moves packets between
The ISDN equivalent of a T1. The Primary Rate Interface (delivered to the customer’s
premise) provides 23B+D (N.America) or 30B+D (Europe) running at 1.544 Mb/sec and
2.048 Mb/sec, respectively.
devices. PVC’s allow network transmissions to be started without having to first establish
a connection with the end point ATM device. When a PVC is constructed, the end points
of the connection will agree upon a path in which data will travel, and therefore agree upon
the route that data will travel to reach its destination.
software system. The software supports remote access applications, allowing an
organization to maintain user profiles in a centralized database residing on an
authentication server which can be shared by multiple remote access servers.
signaling coding.
networks. A hardware architecture used in LANs, MANs, WANs, the Internet and
Intranets. A device that connects any number of LANs. Routers use headers and a
forwarding table to determine where packets go, and they use ICMP to communicate with
each other and configure the best route between any two hosts.
Adit 3104 - Release 1.6Glossary-11
Page 70
Glossary
Router Information Protocol (RIP)
Router Information
Protocol (RIP)
Router Information
Protocol Version 1
(RIPv1)
Router Information
Protocol Version 2
(RIPv2)
SAPService Access Point.
Session Initiation
Protocol (SIP)
signalA generated electrical impulse that is a change in voltage to trigger an event.
Simple Network
Management Protocol
(SNMP)
RIP is based on distance vector algorithms that measure the shortest path between two
points on a network, based on the addresses of the originating and destination devices. The
shortest path is determined by the number of hops between those points. Each router
maintains a routing table, or routing database, of known addresses and routes; each router
periodically broadcasts the contents of its table to neighboring routers in order that the
entire network can maintain a synchronized database.
Original version of RIP. This is a classful routing protocol, it does not have the ability to
transmit the subnet mask within its updates. RIP v1 imposes the subnet mask on the
inbound interface and this is normally defined by the engineer. Learned routes are entered
into the routing table with their natural mask. As a result there can be a great waste of
internet host addresses.
Second version of RIP, additional to Version 1, enables the use of a simple authentication
mechanism to secure table updates. More importantly, RIP 2 supports subnet masks, a
critical feature that is not available in RIP (v1).
SIP is the emerging standard for setting up telephone call, multimedia conferencing, instant
messaging and other types of real-time communication on the internet.
SNMP is the most common method by which network managements applications can
query a management agent using a supported MIB (Management Information Base).
SNMP operates at the OSI application layer.
spanning treeSpanning Tree Protocol is a link management protocol that provides path redundancy while
preventing undesirable loops in the network. For an Ethernet network to function properly,
only one active path can exist between two stations.
SRVSRV is an resource record that specifies the locations of servers.
subnet mask32-bit quantity indicating which bits in an IP address identify the physical network
T1Trunk Level 1. A digital transmission link with a total signaling speed of 1.544 Mbps. T-1
is a standard for the digital transmission in North America.
telnetAn Internet standard protocol that enables a computer to function as a terminal working
from a remote computer
TDMTime Division Multiplex. A technique for transmitting a number of separate data, voice
and/or video signals simultaneously over one communications medium by quickly
interleaving a piece of each signal one after another.
Terminal Endpoint
Identifier (TEI)
TFTPTrivial File Transfer Protocol.
Up to eight devices can be connected to one ISDN BRI (or PRI) line. The TEI defines, for
a given message, which of the eight devices is communicating with the Central Office
switch. In general, more than one of the eight may be communicating.
Glossary-12Adit 3104 - Release 1.6
Page 71
Glossary
ticks
ticksThe distance between two networks, measured in time increments. Ticks may be used to
designate primary and secondary routes to the same network.
trafficThe load of packets carried by a network or portion of a network. Heavy traffic slows down
the response time of the individual packets.
trunkA communication line between two switching systems.
tunnelingTo provide a secure, temporary path over the Internet.
User Agent Client (UAC)One of the two types of User Agents in SIP. UAC initiates a request that is sent to a UAS.
User Agent Server (UAS)One of the two types of User Agents in SIP. UAS receives a request from a UAC and
returns.
V.90The standard for full-duplex modems sending and receiving data across phone lines at up
to 56,600 bps, approved by the International Telecommunication Union (ITU) in February,
1998.
Virtual Private Network
(VPN)
VC MUXVirtual Channel Multiplexer
Wide Area Network
(WAN)
WINSWindows Internet Naming Service. A system that determines the IP address associated
Virtual Connection (VC)A connection between two hosts in a packet-switching network. In this case, the two hosts
Virtual Local Area
Network (VLAN)
A software defined network offering the appearance, functionality and usefulness of a
dedicated private network, at a price savings.
A private long distance network that uses leased lines to connect computers or LANs. A
wide area network is a linking of computers not physically attached through conventional
network connectivity. Usually the WAN connection is a dedicated or high grade dial up
phone link. It is often done with T1 or T3 connections but can also be through satellite or
other technologies.
with a particular network computer.
can communicate as though they have a dedicated connection even though the packets
might actually travel very different routes before arriving at their destination.
A VLAN consists of a network of computers that behave as if connected to the same wire,
though they may actually be physically connected to different segments of a LAN. VLANs
are configured through software rather than hardware, which makes them extremely
flexible.