
Redundant AC or DC powersupplies are provided with
a mean time between failure (MTBF) of over 1,000,000
hours. Each power supply has redundant fans as well as
internal protection features. Operational parameters are all
monitored via internal sensors to the power supplies, and
alarm status is provided to the system. Power-supply
configuration adjusts automatically to system changes,
allowing systems operations to continue without
interruption.
Threeredundant methodsare includedby default onthe
Cisco AS5400 that can be used to backhaul traffic from the
server to the network. The first method uses the two Fast
Ethernetports.These can beconfiguredtorun differenttypes
of traffic on each link or use the Hot Standby Router
Protocol (HSRP) in a redundant mode for increased
reliability. The second method utilizes the two 8-MB serial
ports. These ports support all of the Cisco serial routing
protocols for flexibility in connecting to remote networks.
The third method is achieved by usingone ormore of the T1/
E1 trunks for backhaul instead of inbound calls. This can be
done on either the T1/E1 cards or the CT3 card with part of
the T3 provisioned for inbound and part for backhaul.
The Cisco AS5400 chassis provides four high-capacity
fans with front-to-back airflow that cool the chassis when
fully loaded. Thermal sensors monitor the inlet and outlet
temperatures and temperature rise across each card. If the
operating temperature of the system exceeds its maximum,
the thermal sensors initiate a shutdown of the dial feature
cards (DFCs), starting with the modem cards and finishing
with the trunk cards. The trunk cards are shut down last, so
the system has a chance to recover before putting the trunks
into alarm status at the central office. If the system continues
to exceed its maximum operating temperature, the thermal
sensors initiate a shutdown, preventing damage to the unit
andprotecting itssurrounding environmentfrom excessheat.
NEBS/ETSI Regulatory Compliance
The Cisco AS5400 complies with Network Equipment
Building System (NEBS) Level 3 requirements, as defined
by Telcordia SR-3580 and European requirements by the
European Telecommunication Standards Institute (ETSI).
Rich Protocol Support
The Cisco AS5400 takes advantage of the full-feature
richness and strong routing capabilities of Cisco IOS
software. The Cisco AS5400 can be deployed in a variety
of architectures, from multiprotocol corporate networks to
service-provider IP networks. In addition, the Cisco AS5400
fully supports the specializedneeds of AOL, MSN, andother
content-oriented dialup services through Point-to-Point
Protocol (PPP), Layer 2 Tunneling Protocol (L2TP) or
“TCP-Clear” connections.
Manageability
The Cisco AS5400 has a wide range of console and Simple
Network Management Protocol (SNMP) management
tools designed to reduce operations costs. The console
management features include a comprehensive set of
debugging commands that can be enabled on a specific
calling line identification (CLID) or automatic number
identification (ANI), called number dialed-number
identification string (DNIS), per user or per interface to
immediately isolate only the relevant debugging output.
The SNMP management capability includes a rich
call-tracking SNMP Management Information Base (MIB)
that provideshighly detailed records for active and historical
calls, with a configurable call historybuffer. Call records can
also be obtained via syslog or Remote Access Dial-In User
Service(RADIUS) asan alternative topolling viaSNMP. Call
records include modem connect rate, connect duration,
disconnect codes, end-to-end delay, and line statistics. This
informationallows serviceproviders(SPs)todebugproblems
for individual users. Wholesale dial SPs can use this
performance management data to establish service-level
agreements (SLAs) with their retail ISP customers.
Security Management
Cisco IOS software security features allow authorized users
dial access while preventing access to intruders. These features
include: multilevel password protection, user authentication
suchasPasswordAuthenticationProtocol(PAP)andChallenge
Handshake Authentication Protocol (CHAP), access control
lists (ACLs), IP address spoofing prevention and logging, and
support ofthe industry-standard authentication,authorization
and accounting (AAA) protocols, RADIUS, and Terminal
Access Controller Access Control System (TACACS+).
Comentarios a estos manuales