100% found this document useful (1 vote)
840 views16 pages

IP20C Activation Key

The document discusses activation keys for the IP-20C product which enable additional features and capacity. Activation keys are generated per device and managed through a license management system. Features require specific activation keys, and demo keys are available to trial features for 60 days.

Uploaded by

Rogerio Ferreira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
840 views16 pages

IP20C Activation Key

The document discusses activation keys for the IP-20C product which enable additional features and capacity. Activation keys are generated per device and managed through a license management system. Features require specific activation keys, and demo keys are available to trial features for 60 days.

Uploaded by

Rogerio Ferreira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

IP-20C Activation Key

Activation Key
Demo Activation key
IP-20C Activation key concept
IP-20C Activation Key Scheme
Features

Proprietary and Confidential

Activation Key

IP-20C offers a pay as-you-grow licensing concept in which future


capacity growth and additional functionality can be enabled with Activation
key.
For purposes of licensing, each IP-20N chassis is considered a distinct
device, regardless of which cards are included in the chassis. Each device
contains a single Activation key.
Licenses are divided into two categories:
Per Carrier The license is per carrier
Per Device The license is per device, regardless of the number of
carriers supported by the device.

Ceragon provides a web-based License Management System (LMS).


The LMS enables authorized users to generate Activation keys, which are
generated per IDU serial number.

A 1+1/2+2 HSB configuration requires the same set of licenses for both
the active and the protected interfaces.

Proprietary and Confidential

License Management System

Proprietary and Confidential

Activation key generating

Serial Number
important for license
generating

Proprietary and Confidential

DEMO Activation key


A demo mode is available that enables all features for 60 days.
The demo mode expires in 60 days from the time it was activated,
and the most recent valid license goes into effect.

The 60-day period is only counted when the system is powered up.
10 days before the demo license expires, an alarm is raised
indicating to the user that the demo license is about to expire.

Proprietary and Confidential

Activation key violation


Activation key violation yellow color screen has been implemented from sw.
T7.9

Proprietary and Confidential

IP-20C Pricing Concept (Value Structure)


CeraOS (Software)
Licensed Scalability

Radio capacity
2nd core activation
Additional GE user
interfaces
Additional CET-Node
services/EVCs (L2)

Licensed Premium Functionality

Advanced radio configurations


Advanced QoS
Ethernet OAM
TDM PW services
Synchronization
Network Resiliency
Advanced Security

Licensed Mode - CET-Node

Smart-Pipe services (L1)


10M radio capacity
1x GE user interface

CET services/EVCs (L2)


2x GE user interfaces

Base-line
functionality

Proprietary and Confidential

Activation Key-Enabled Features


The default (base) activation key provides each carrier with a capacity of 10
Mbps. In addition, the default activation key provides:

A single management service.

Unlimited Smart Pipe (L1) services.


A single 1 x GbE port for traffic.
Full QoS with basic queue buffer management (fixed queues with 1 Mbit
buffer size limit, tail-drop only).

LAG

No synchronization

Proprietary and Confidential

IP-20 Activation Key Scheme


Per Carrier

Scalability
Radio capacity

ACM
XPIC
Multi-Carrier ABC
MIMO
Header De-duplication

Per Node scalability

Sync group

Sync-Unit
IEEE-1588 TC
IEEE-1588 OC
IEEE-1588 BC

Redundancy/Resiliency group
Network Resiliency
Main Card Redundancy

Ethernet OAM group


Eth-OAM FM
ETH-OAM PM

General node scalability


2nd core activation (IP-20C only)
GE user interfaces

QoS group
Enhanced Packet Buffer
Frame Cut Through
H-QoS

CET-Node mode/scalability
Edge (8 services/EVCs)
Agg-Lvl-1 (64 services/EVCs)

Advanced radio configurations

Per Node Premium Functionality

Security
Secure management

10

Proprietary and Confidential

Features
License Name

Description

Radio Capacity

Enables you to increase your systems radio capacity in


gradual steps by upgrading your capacity activation key.
Without a capacity activation key, each core has a
capacity of 10 Mbps. Activation-key-enabled capacity is
available from 50 Mbps to 650 Mbps. A separate activation
key is required per core.

IP-20-SL-2nd-Core-Act.

11

Enables use of second core

IP-20-SL-ACM

Enables the use of Adaptive Coding and Modulation


(ACM) scripts. A separate activation key is required per
core.

IP-20-SL-MIMO

Enables the use of MIMO. A separate activation key is


required for each core in the MIMO configuration.

Proprietary and Confidential

Features
License Name
IP-20-SL-MC-ABC

Enables Multi-Carrier ABC. A separate licenseactivation


key is required per core.

IP-20-SL-Header-DeDuplication

Enables the use of Header De-Duplication, which can be


configured to operate at L2 through L4.

IP-20-SL-XPIC

IP-20-SL-GE-Port

12

Description

Enables the use of Cross Polarization Interference


Canceller (XPIC). A separate licenseactivation key is
required for each core in the XPIC pair.
Enables the use of an Ethernet port for traffic. An
activation key is required for each traffic port that is used
on the device. Any of these activation keys can be
installed multiple times with dynamic allocation inside the
unit.

Proprietary and Confidential

Features
License Name

Edge CET Node

Ethernet Service Model


Quality of Service (QoS)

IP-20-SL-Network-Resiliency

IP-20-SL-H-QoS

13

Description

Enables Carrier Ethernet Transport (CET) and a number of


Ethernet services (EVCs), depending on the type of CET
Node activation key:
Edge CET Node Up to 8 EVCs.
Aggregation Level 1 CET Node Up to 64 EVCs.
A CET Node activation key also enables the following:
Network resiliency (MSTP/RSTP) for all services.
Full QoS for all services including basic queue buffer
management (fixed queues buffer size limit, tail-drop only)
and eight queues per port, no H-QoS.

Enables G.8032 for improving network resiliency.

Enables H-QoS. This activation key is required to add


service-bundles with dedicated queues to interfaces.
Without this activation key, only the default eight queues
per port are supported.

Proprietary and Confidential

Features
License Name

IP-20-SL-Enh-Packet-Buffer

IP-20-SL-Sync-Unit

Enables configurable (non-default) queue buffer size limit


for Green and Yellow frames. Also enables WRED. The
default queue buffer size limit is 1Mbits for Green frames
and 0.5 Mbits for Yellow frames.
Enables the G.8262 synchronization unit. This
licenseactivation key is required in order to provide end-toend synchronization distribution on the physical layer. This
licenseactivation key is also required to use Synchronous
Ethernet (SyncE).

IP-20-SL-Frame-Cut-Through

Enables Frame Cut-Through.

IP-20-SL-Secure-Management

Enables secure management protocols (SSH, HTTPS,


SFTP, SNMPv3, and RADIUS)

IP-20-SL-Eth-OAM-FM
( support in future release )

IP-20-SL-Eth-OAM-PM
( support in future release )

14

Description

Enables Connectivity Fault Management (FM) per Y.1731/


802.1ag and 802.3ah (CET mode only).
Enables performance monitoring pursuant to Y.1731 (CET
mode only).

Proprietary and Confidential

Activation Key Configuration

Sanction state
If an Activation Key Violation alarm has occurred, and the 48-hour activation key violation grace period
has expired without the system having been brought into conformance with the activation-key-enabled
capacity and feature set, Yes appears in this field to indicate that the system is in an Activation Key
Violation sanction state.
All other alarms are hidden until the capacity and features in use are brought within the activation-keyenabled capacity and feature set
15

Proprietary and Confidential

Activation Key Overview

16

Proprietary and Confidential

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy