0 Preface 0.1 Audience This manual is intended for network installers and system administrators who are responsible for installing, configuring or maintaining networks. It assumes that you understand the transmission and management protocols used on your network. This manual also assumes prior knowledge and understanding of the terminology, theories, practices and specific knowledge about the networking devices, protocols, and interfaces that comprise your network. You should have working experiences of the graphical user interfaces (GUIs), Command Line Interface (CLI), Simple Network Management Protocol (SNMP) and Web browsers. ...
1 Device Introduction 1.1 Brief Introduction AE208 P2P Switch series ONU (Optical Network Unit) support data, VoIP (Voice over IP) and CATV “triple play” services in the P2P (point to point) based FTTH (Fiber to the Home) network with high performance and effective cost. The integrated layer 2 Ethernet switch function supports back‐pressure in half duplex mode and 802.3x flow control in full duplex mode, and intelligent address recognition algorithm which allows the AE208 Gateway to recognize up to 8096 different MAC addresses and enables filtering and forwarding at full wire speed. AE208 Gateway provides a wide transparent bandwidth to support CATV analog channels or a combination of analog and digital channels including HDTV broadcast. It has an integrated VoIP ...
In‐band DTMF DTMF Function Out‐of‐band DTMF (Only for VoIP option) SIP info Monitoring CATV status CATV on/off Control CATV Send CATV alarm trap IEEE 802.3 af (PoE) standard PoE Up to 15.4W for each PoE port (Only for 1000Mbps Uplink PoE) Firmware Upgrade TFTP 1.3.2 Hardware Overview SFP‐based Module WAN Ports CATV optical power: ‐8 to 0 dBm Four/Eight ...
1.4 LED Panel About the CATV ports and phone ports, please refer to the table on the cover of this manual. LED panel behind the cover of 8 port ONU is shown in the following figure. The following table shows the LED panel descriptions for AE208 P2P Switch Series. LED Name LED Color Meaning Monitored CATV optical power is from –8dbm Green to 0dbm. Monitored CATV optical power is from ‐10dBm CATV ON Yellow to ‐8dBm or from ‐0dBm to +2dBm Monitored CATV optical power is beyond the Red above ranges. OFF CATV is disabled. Link and activity: ON = LAN port is connected, Green(100M) ...
1.5 Fiber Tray AE208 P2P Switch series ONU uses standard fiber tray shown as follows. This fiber tray shall be installed firstly. 1.6 Connector Panel The connector‐panel includes an F‐type CATV RF output port, RJ45 10BASE‐T/100BASE‐TX ports, a multi‐function reset button and a power receptacle in front of the device and a 100Base‐FX optical port at the back. About the CATV ports and Phone ports, please refer the table on the cover of this manual. 1.6.1 100Base‐FX Optical Port AE208 P2P Switch series WAN port uses standard SC / APC or FC / APC port connector to attach 9/125 micron single mode fiber optic cable with 1310nm TX/1490 nm RX data and 1550nm CATV overlay the figure below shows the location of the connectors. ...
1.6.2 10BASE‐T/100BASE‐TX Ports AE208 P2P Switch series LAN ports use 10/100Base‐TX RJ‐45 (8‐pin modular) port connectors. The 10BASE‐T/100BASE‐TX port connectors are configured as MDI‐X (media‐dependent interface‐crossover). These ports connect over straight cables to the network interface controller (NIC) card in a node or server, similar to a conventional Ethernet repeater hub. If you are connecting it to an Ethernet hub or Ethernet switch, you need a crossover cable unless an MDI connection exists on the associated port of the attached device. AE208 P2P Switch series LAN ports use auto sense ports that are designed to operate at 10 Mb/s ...
Page 14
The multi‐function reset button performs the following functions: Press for (or less than) 3 second during the normal operation to change the device into static fixed IP mode; Static fixed IP Mode Network Information: IP Address: 192.168.0.253 Subnet: 255.255.255.0 Press and hold for more than 3 seconds during normal operation to reload the factory default settings.
2 Login to AE208 Gateway To access AE208 Gateway web management function, connect your PC to any LAN port of AE208 Gateway. Open a web‐browser and type in the default address http://192.168.0.253 address field of the browser, and then press the Enter key. Note: To log in to the ONU, the IP address of your PC should be set in the same subnet addresses of the Switch. The IP address is 192.168.0.x ("x" is any number from 2 to 254), Subnet Mask is 255.255.255.0. After you enter the Web configuration page, you can modify the device IP address according to you need. For more details, please refer to 17.1 IP Configuration. ...
Page 16
user superuser 123 admin manager 123 And you also can use the multi‐function reset button to change AE208 P2P Switch series to static fixed IP mode. Press the multi‐function reset button for (or less than) 3 second during the normal operation to change the AE208 P2P Switch series into static fixed IP mode (IP address: 192.168.0.253, Subnet Mask: 255.255.255.0). Note: After clicking <Apply> in the management web pages, all of the changes will be saved automatically. ...
3 System Information It shows the system information of the ONU as follows. System name and system address can be changed via SNMP software for available network management. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 17 of 114 ...
4 Advanced Configuration On this page, you can enable or disable the following items: IGMP Snooping, STP and 802.1x globally. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 18 of 114 ...
5 CATV Configurations This function is only for the ONUs with CATV option. You can check CATV status and change CATV configuration. If this module supports the function of monitoring, Operating Temperature, Power Supply Voltage, CATV Optical Input, and CATV RF Output will be shown on this webpage. If CATV control is set as “OFF”, the CATV module is powered off. If set as “ON”, CATV module is powered on. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
6 Port Management 6.1 Port Configuration Port Configuration page is used to set up the port parameters as shown follows. State: If set as “Enabled”, the corresponding port will allow the Ethernet packets to pass normally. If set as “Disabled”, any Ethernet packet cannot pass. Negotiation: The function provides a mechanism for exchanging configuration information between two ends of a link segment, and automatically selecting the highest performance mode of operation supported by both devices if it is enabled. Speed&Duplex: Speed: Allows the user to choose 100Mbps or 10Mbps mode. Duplex: Allows the user to choose between full and half duplex mode. Note: The speed and duplex of the WAN port is fixed to be 1000M Full. Flow Control: Flow control can eliminate frame loss by “blocking” traffic from end station or segment connected directly to AE200 when it buffers fully. When it is enabled, back pressure ...
6.2 Port Bandwidth You can configure the egress traffic limit on individual ports, so as to keep normal network service. The bottom of the page will show the rate limit list. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 21 of 114 ...
7 VLAN Configurations The traditional Ethernet is a broadcast network, where all hosts are in the same broadcast domain and connected with each other through hubs or switches. The hub is a physical layer device without the switching function, so it forwards the received packet to all ports. The switch is a link layer device which can forward the packet according to the MAC address of the packet. However, when the switch receives a broadcast packet or an unknown unicast packet whose MAC address is not included in the MAC address table of the switch, it will forward the packet to all the ports except the inbound port of the packet. In this case, a host in the network receives a lot of packets whose destination is not the host itself. Thus, plenty of bandwidth resources are wasted, causing potential serious security problems. ...
Note:Select “port‐based VLAN” in Advanced VLAN Mode page before configuring port‐based VLAN. 7.3 802.1Q VLAN Configuration Note:Select “802.1Q VLAN” in Advanced VLAN Mode page before configuring 802.1Q VLAN. 7.3.1 802.1Q VLAN VLAN tags in the packets are necessary for the switch to identify packets of different VLANs. The switch works at Layer 2 and it can identify the data link layer encapsulation of the packet only, so you can add the VLAN tag field into only the data link layer encapsulation if necessary. In 1999, IEEE issues the IEEE 802.1Q protocol to standardize VLAN implementation, defining the structure of VLAN‐tagged packets. In traditional Ethernet data frames, the type field of the upper layer protocol is encapsulated after the destination MAC address and source MAC address, as shown in the follow figure of Encapsulation format of traditional Ethernet frames. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 24
DA refers to the destination MAC address, SA refers to the source MAC address, and Type refers to the protocol type of the packet. IEEE 802.1Q protocol defines that a 4‐byte VLAN tag is encapsulated after the destination MAC address and source MAC address to show the information about VLAN. As shown in the following figure of Format of VLAN tag, a VLAN tag contains four fields, including TPID, priority, CFI, and VLAN ID. TPID is a 16‐bit field, indicating that this data frame is VLAN‐tagged. By default, it is 0x8100 in AE200 Ethernet switches. ...
7.3.2 802.1Q Configuration Configure the member ports of a VLAN to be a specific type. Tag Indicates the port is a tagged member of the VLAN group. All packets forwarded by the port are tagged. The packets contain VLAN information. Untag Indicates the port is an untagged VLAN member of the VLAN group. Packets forwarded by the port are untagged. Exclude Excludes the port from the VLAN group. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 25 of 114 ...
7.3.3 802.1Q Port This tab page configures 802.1Q VLAN port parameters: PVID: Each port can have only one Port VLAN ID (PVID), an untagged Ethernet package will be tagged a VID of PVID when arriving at the port. The default PVID is 1 for each port. Link Type: An Ethernet port on an AE208 Gateway device can operate in one of the three link types: ...
Page 27
Note: A hybrid port allows the packets of multiple VLANs to be sent without tags, but a trunk port only allows the packets of the default VLAN to be sent without tags. You can configure all the three types of ports on the same device. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 27 of 114 ...
8 QoS Configuration In data communications, Quality of Service (QoS) is the ability of a network to provide differentiated service guarantees for diversified traffic in terms of bandwidth, delay, jitter, and drop rate. On traditional IP networks, devices treat all packets equally and handle them using the first in first out (FIFO) policy. All packets share the resources of the network and devices. How many resources the packets can obtain completely depends on the time they arrive. This service is called best‐effort. It delivers packets to their destinations as possibly as it can, without any guarantee for delay, jitter, packet loss ratio, reliability and so on. ...
shows the port priority list. 802.1P Enable or disable 802.1P. Port‐based Priority There are 8 priorities (0~7) corresponding to 802.1P priority. DSCP Enable or disable DSCP. 8.2 Scheduling Mechanism This page sets the queue scheduling mechanism as strict priority or Weighted Round‐Robin (8:4:2:1). Strict Priority: SP queue‐scheduling algorithm is specially designed for critical service applications. An important feature of critical services is that they demand preferential service in congestion ...
priority. In this case, critical service packets are sent preferentially and non‐critical service packets are sent when critical service groups are not sent. The disadvantage of SP queue is that: if there are packets in the queues with higher priority for a long time in congestion, the packets in the queues with lower priority will be “starved” because they are not served. Weighted Round‐Robin (WRR) (8:4:2:1): WRR queue‐scheduling algorithm schedules all the ...
You can change the priority map according to your need, if unnecessary, click <Apply> directly. 8.4 DSCP Map This page sets the mapping between the DSCP value and the local precedence priority. DSCP (Differentiated Services CodePoint) priority ranges from 0 to 63. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 31 of 114 ...
9 Forwarding Configurations AE208 Gateway series ONU forwarding mechanism has unicast MAC address forwarding and multicast MAC address forwarding, the following is the detailed introduction. 9.1 Unicast MAC Address MAC address forwarding table: the device forwards the packets to the corresponding port according to the packet destination MAC address. The MAC address forwarding table reflects the relationship between the MAC address and the forwarding port. A MAC address table is maintained for packet forwarding. Each entry in this table indicates the following information: ...
After configuration, a MAC address list will be shown at the bottom. And the dynamic MAC address will be shown in the Dynamic Unicast MAC list within the valid time. The port and type in the entries can be modified and the entries can be deleted. 9.1.2 Dynamic Unicast MAC It shows the dynamic MAC addresses which are learnt by the port and added manually. They can be deleted manually, and it updates the list when the timer is timeout. By default, the timer is ...
Page 34
source server sends separate copy information to each receiver. When a large number of users require this information, the server must send many pieces of information with the same content to the users. Therefore, large bandwidth will be occupied. In broadcast, the system transmits information to all users in a network. Any user in the network can receive ...
9.3 IGMP Snooping Configuration Note: Before configuring IGMP Snooping, first enable IGMP Snooping in the Advanced Configuration. Internet Group Management Protocol Snooping (IGMP Snooping) is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups. By listening to and analyzing IGMP messages, a Layer 2 device running IGMP Snooping establishes mappings between ports and multicast MAC addresses and forwards multicast data based on these mappings. As shown in the following figure, when IGMP Snooping is not running on the device, multicast packets are broadcast to all devices at Layer 2. When IGMP Snooping is running on the switch, ...
9.3.1 IGMP Snooping With the wider application of multicast, IGMP V3 is used more and more. It adds the source multicast filtering function, making the receiver not only specify the multicast group to join but also specify to receive the multicast information from certain multicast group. The configuration steps are as follows: Step 1 Specify the VLAN ID of a multicast group, the VLAN name can be no changed here. Step 2 ...
9.3.2 Route Port On this page, you can configure a port in a specified VLAN group as a static router port. By default, a port is not a static router port. If a port is fixed to receive the packets from a multicast group, it can be configured to join in the multicast group statically, so that the device can receive IGMP message by the port from router. Route port: the port directly connected to multicast devices, which is the IGMP Querier. The bottom part of this page lists static router ports of all VLANs. Caution: the router port should be within the VLAN. Please refer to 7 VLAN Configuration. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
9.3.3 Misc Configuration This tab page sets IGMP Snooping Misc configuration parameters: Host Timeout, Route Timeout, IGMP Querier, Query Transmit Interval, Max Response Time, and Fast Leave. Host Timeout T he device starts for a port after the port joins a multicast group. After it time out, the port will be deleted from the group. It is in the range of 200 to 1000; by default, the value is 260 seconds. Route Timeout The device starts Router Timeout for each router port when it time out, it will be deleted from the router port list. It is in the range of 1 to 1000; by default, the value is 105 seconds. IGMP Querier I GMP Querier sends IGMP general query packets to all the hosts and router ports in the network segment to check the multicast group memebers. By default, IGMP Querier is disabled. Query Transmit Interval The interval IGMP Querier sends IGMP general query packets to all the hosts and router ports. After it times out, it will delete the port form the group. It is in the ...
Page 39
group, the switch will delete the port directly. In this way, when the port has only one user, it can save bandwidth. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 39 of 114 ...
10 Security It includes management security, port authentication, MAC authenticaiton and storm control. IEEE 802.1X is an IEEE Standard for port‐based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. 10.1 Management Security Note:Enable 802.1 in Advanced Configuration first. This page configures the 802.1x system as follows: Authentication RADIUS Server IP, Authentication Port, Authentication Shared Key, Accounting RADIUS Server IP, Accounting Port and Accounting Shared Key. Authentication RADIUS Server IP: IP address of the radius server to be used, a valid unicast address in dotted decimal notation; the default value is 192.168.0.234. ...
10.2 Port Authentication IEEE 802.1x authentication system uses EAP protocol to exchange information between a RADIUS client and the RADIUS server. When the client passes the authentication, the server will send user information to the device, and then PAE decides whether to set the port as authorized or unauthorized according to the RADIUS indication: accept or reject. Note:Enable 802.1 in Advanced Configuration first. 10.2.1 802.1x Port RADIUS operates in the following manner: 1. The host initiates a connection request carrying the username and password to the RADIUS client. 2. Having received the username and password, the RADIUS client sends an authentication request (Access‐Request) to the RADIUS server, with the user password encrypted by using the Message‐Digest 5 (MD5) algorithm and the shared key. ...
Page 42
6. The user accesses the network resources. 7. The host requests the RADIUS client to tear down the connection and the RADIUS client sends a stop‐accounting request (Accounting‐Request) to the RADIUS server. 8. The RADIUS server returns a stop‐accounting response (Accounting‐Response) and stops accounting for the user. 9. The user stops access to network resources. On this tab page, 802.1x Admin, Re‐authentication as well as Guest VLAN can be enabled for a specified Ethernet port, and a specific PortControl mode can also be selected. The PortControl can be selected among Auto, ForceAuthorized and ForceUnauthorized. ...
10.2.2 802.1x Misc This tab page configures 802.1x: Quiet Period, Tx Period, Supplicant Timeout, Server Timeout, Max Request Count, Reauth Period, and Guest VLAN. Quiet Period Sets the quiet‐period, when a supplicant system fails to pass the authentication, the switch quiets for the set period before it processes another authentication request re‐initiated by the supplicant system. During this quiet period, the device does not perform any 802.1x authentication‐related actions for the supplicant system. The value is in the range of 1 to 65535, and is set to 60 seconds by default. Tx Period Sets the transmission timer, and is triggered in two cases. The first case is when the client requests authentication, the switch sends a unicast request/identity packet to a supplicant ...
10.3 MAC Authentication Note:Enable MAC Authenticantion in 4 Advanced Configuration first. MAC address authentication is port and MAC address‐based authentication used to control user permissions to access a network. MAC address authentication can be performed without client‐side software. With this type of authentication employed, an ONU authenticates a user upon detecting the MAC address of the user for the first time. In the process of authentication, users don’t need to input a username or password manually. 10.3.1 Port Configuration Enable or disable the MAC authentication status on each port and the port status list is shown at the bottom. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
10.3.2 Misc Configuration MAC authentication process is affected by the following timers: Offline detect time To check whether the client is offline in this time interval. The device will immediately notify the RADIUS server to stop billing from the client when offline is detected. The value ranges from 1 to 65535, and the default value is 300 seconds. Quiet Period To set the time interval the client must wait after a client authentication fails. During this time interval, the device does not perform the user authentication function. The value ranges from 1 to 3600, and the default value is 60 seconds. Server Timeout To set the time interval the device waits for a response, when there is a connection request from the authentication server to the client. The value ranges from 1 to ...
10.3.3 Authenticate Information This page lists all the MAC authentication information including VID, MAC Address, From Port, and Authenticate state. 10.4 Storm Control Traffic storm will be generated when there are multiple broadcast / multicast / DLF (Destination Lookup Failed) packets passing through a port, thus it will lead to traffic congestion. If the transmission rate of the three kind packets exceeds the set bandwidth, the packets will be automatically discarded to avoid network broadcast storm. ...
11 Wireless This function applies to the models with Wireless option. Wireless Local Area Networks (WLAN) have become very popular because they are very easy to setup and use, and have low maintenance costs. Generally, one or more access points (APs) can cover a building or an area. The WLAN solution allows you to provide the following wireless LAN services to your customers: Connectivity to the Internet WLAN client connectivity to conventional 802.3 LANs Secured WLAN access with different authentication and encryption methods Seamless roaming of WLAN clients in the mobility domain The Wireless Settings include the following items: 11.1 Basic Configuration 11.1.1 Basic This page is used to configure basic wireless parameters like Network Mode, SSID, channel Number and so on. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 48
WiFi UP/DOWN If set to “OFF”, the WiFi is powered off. If set to “ON”, the WiFi is powered on. Network Mode AE208 Gateway can connect to 11b/g mixed mode,11b only, 11g only, 11b/g/n mixed mode, and 11n only (2.4G) modes. By default, it is in 11b/g/n mixed mode. Network Name (SSID) Set a name for AE208 Gateway to be identified. SSID T he service set identifier. A client scans all networks at first, and then selects a specific SSID to connect to a specific wireless network. Hidden Check it to prevent from wireless sniffing and make it harder for unauthorized clients or stations to join your wireless LAN. Depending on the wireless utility, the user may only see the information except SSID or just cannot see anything about AE208 Gateway while site surveying. The system allows you to set three sets of SSID for different usage. Isolated Check this box to make the wireless clients (stations) with the same SSID not have an access to each other. ...
Tx Power T his setting will determine the number of milliwatts used to power the radio signal output from the AE208 Gateway. HT TxStream & HT RxStream This is used in conjunction with external antennas to give optimum performance. After all settings are completed, click <Apply> to activate them. 11.1.2 WMM WMM is an abbreviation of Wi‐Fi Multimedia. It defines the priority levels for four access categories derived from 802.1d (prioritization tabs). The categories are designed with specific ...
Page 50
WMM Capable To apply WMM parameters for wireless data transmission, please click the <Enable> radio button. APSD Capable The default setting is Disable. Click Enable to enable the function of automatic power‐save delivery (APSD). IGMP Snooping The default setting is Disable. Click Enable to enable the function of IGMP Snooping. ...
categories. For the service of voice or video image, please set small value for AC_VI and AC_VO categories. As to the service of e‐mail or web browsing, please set large value for AC_BE and AC_BK categories. CWMin/CWMax CWMin means contention Window‐Min and CWMax means contention Window‐Max. ...
Page 52
Security Mode 1) Disable: The encryption mechanism is turned off. OPENWEP: Accepts only WEP clients. The encryption key should be entered in the WEP Key fields. Any client is allowed to authenticate as long as it conforms to any MAC address filter policies that may have been set. All authentication packets are transmitted without encryption. Default WEP Key You ...
Page 53
Default WEP Key You may use up to four different keys for four different networks. Select the current key that will be used. WEP Key1‐Key4 Four keys can be entered here, but only one key can be selected at a time. The format of WEP Key is restricted to 10 or 26 Hex characters except '#' and ','. After all settings are completed, click <Apply> to activate them. WEPAUTO: Of OPENWEP and SHAREDWEP, if you are not sure which one to use, choose WEPAUTO. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 54
Default WEP Key You may use up to four different keys for four different networks. Select the current key that will be used. WEP Key1‐Key4 Four keys can be entered here, but only one key can be selected at a time. The format of WEP Key is restricted to 10 or 26 Hex characters except '#' and ','. After all settings are completed, click <Apply> to activate them. WPA: The WPA encrypts each frame transmitted from the radio using the key; you can either enter PSK (Pre‐Shared Key) manually in the following page or make it automatically negotiate via 802.1x authentication. WPA Algorithms Select TKIP, AES or TKIP/AES as the algorithm for WPA. Key Renewal Interval WPA uses shared key for authentication to the network. However, normal network operations use a different encryption key that is randomly generated. This randomly generated key is periodically replaced. Enter the renewal security time (seconds) in the column. ...
Page 55
successfully completed. (The unit is second.) After all settings are completed, click <Apply> to activate them. WPA‐PSK: One variation of WPA is called WPA Pre Shared Key or WPA‐PSK for short. WPA‐PSK is a simplified but still powerful form of WPA most suitable for home Wi‐Fi networking. To use WPA‐PSK, a person sets a static key or "passphrase" as with WEP. But, using TKIP, WPA‐PSK automatically changes the keys at a preset time interval, making it much ...
Page 56
WPA Algorithms Select TKIP, AES or TKIP/AES as the algorithm for WPA. Key Renewal Interval WPA uses shared key for authentication to the network. However, normal network operation uses a different encryption key that is randomly generated. This randomly generated key is periodically replaced. Enter the renewal security time (seconds) in the column. Smaller interval leads to greater security but lower performance. Default is 3600 seconds. Set 0 to disable re‐key. PMK Cache Period T ype PMK cache period. Pre‐Authentication Enable/disable this function. IP Address Enter the IP address of RADIUS Server. Port The UDP port number that the Radius Server is using. The default value is 1812, based on RFC ...
Page 57
WPA Algorithms Select TKIP, AES or TKIP/AES as the algorithm for WPA. Pass Phrase Either 8‐63 ASCII characters,such as 012345678…(or 64 Hexadecimal digits led by 0x,such as “0x32152fabde…”). Key Renewal Interval WPA uses shared key for authentication to the network. However, normal network operations use a different encryption key that is randomly generated. This randomly generated key that is periodically replaced. Enter the renewal security time (seconds) in the column. Smaller interval leads to greater security but lower performance. Default is 3600 seconds. Set 0 to disable re‐key. After all settings are completed, click <Apply> to activate them. WPA‐PSK/WPA2‐PSK: This is a mixed mode, the most secure encryption mode at present. WPA Algorithms Select TKIP, AES or TKIP/AES as the algorithm for WPA. Pass Phrase Either 8‐63 ASCII characters,such as 012345678…(or 64 Hexadecimal digits led by 0x,such as “0x32152fabde…”). Key Renewal Interval WPA uses shared key for authentication to the network. However, normal Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 58
network operations use a different encryption key that is randomly generated. This randomly generated key that is periodically replaced. Enter the renewal security time (seconds) in the column. Smaller interval leads to greater security but lower performance. Default is 3600 seconds. Set 0 to disable re‐key. After all settings are completed, click <Apply> to activate them. WPA1/WPA2: Incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. WPA Algorithms Select TKIP, AES or TKIP/AES as the algorithm for WPA. Key Renewal Interval WPA uses shared key for authentication to the network. However, normal network operations use a different encryption key that is randomly generated. This randomly generated key is periodically replaced. Enter the renewal security time (seconds) in the column. ...
successfully completed. (The unit is second.) After all settings are completed, click <Apply> to activate them. 802.1X: 802.1X is an IEEE standard for authenticated network access to wired Ethernet networks and wireless 802.11 networks. IEEE 802.1X enhances security and deployment by providing support for centralized user identification, authentication, dynamic key management and accounting. 802.1x WEP Enable or disable the WEP Encryption. If the WEP encryption is disabled, data sent to the AP will not be encrypted. ...
reject it. And you can add the wireless station MAC. On the lower part of the interface, you can see the list, the entries can be deleted. 11.2.3 WPS WPS (Wi‐Fi Protected Setup) provides easy procedure to make network connection between wireless station and wireless access point with the encryption of WPA and WPA2. It is the simplest way to build connection between wireless network clients and AE208 Gateway. Users do not need to select any encryption mode and type any long encryption passphrase to setup a wireless client every time. The user only needs to press a button on wireless client, and WPS will connect for client and AE208 automatically. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 61
WPS Enable/disable WPS setting. WPS Current Status Display related system information for WPS. If the wireless security (encryption) function of the AE208 Gateway is properly configured, you can see ‘Configured’ message here. WPS Configured “No” will be displayed when AE208 Gateway is not connected with any STA by WPS at present, while “Yes” will be displayed while AE208 Gateway is connected with STA by WPS. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
WPS SSID Display current selected SSID. WPS Auth Mode Display current authentication mode. Only WPA2/PSK and WPA/PSK support WPS. WPS Encrypt Type Display encryption mode (None, WEP, TKIP, AES, etc.) of AE208 Gateway. WPS Default Key Index The default key index that WPS uses. WPS Key( ASCII ) Display WPS Key by ASCII code. AP PIN The number displayed here is used for remote client entering the registrar’s PIN code in remote station to make a network connection. Clicking <Generate> can generate different AP PIN. PBC C lick Start PBC to invoke Push‐Button style WPS setup procedure. The AE208 Gateway will wait for WPS requests from wireless clients. ...
Page 63
Phy Mode There are three types of transmission rates developed by different techniques for Phy Mode. Data will be transmitted via communication channel. Encryp Type There are four types for security, Disabled, WEP, TKIP and Key or Peer Mac Address field valid or not. Choose one of the types for the router. Please disable the unused link to get better performance. Encryp Key If WEP is selected, input 10/26 hexdecimal or 5/13 ascii as encrypt key; If WEP or AES is selected, input 8~64 characters as encrypt key. 2) Bridge Mode Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 64
Phy Mode There are three types of transmission rates developed by different techniques for Phy Mode. Data will be transmitted via communication channel. Encryp Type There are four types for security, Disabled, WEP, TKIP and Key or Peer Mac Address field valid or not. Choose one of the types for the router. Please disable the unused link to get better performance. Encryp Key If WEP is selected, input 10/26 hexdecimal or 5/13 ascii as encrypt key; If WEP or AES is selected, input 8~64 characters as encrypt key. AP MAC Address Four AP MAC Addresses are allowed to be entered on this page at one time. 3) Repeater Mode Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Phy Mode There are three types of transmission rates developed by different techniques for Phy Mode. Data will be transmitted via communication channel. Encryp Type There are four types for security, Disabled, WEP, TKIP and Key or Peer Mac Address field valid or not. Choose one of the types for the router. Please disable the unused link to get better performance. Encryp Key If WEP is selected, input 10/26 hexdecimal or 5/13 ascii as encrypt key; If WEP or AES is selected, input 8~64 characters as encrypt key. AP MAC Address Four AP MAC Addresses are allowed to be entered on this page at one time. 11.4 APSCAN 11.4.1 AP Scan AE208 Gateway can scan all regulatory channels and find working APs in the neighborhood. Based on the scanning result, users will know which channel is clean for usage. Also, it can be used to facilitate finding an AP for a WDS link. Note that during the scanning process (about 5 seconds); no client is allowed to connect to AE208 Gateway. ...
This page is used to scan the existence of the APs on the wireless LAN. Yet, only the AP which is in the same channel of this router can be found. SSID Display the SSID of the AP scanned by this router. BSSID Display the MAC address of the AP scanned by this router. RSSI Display the signal strength. RSSI is the abbreviation of Receive Signal Strength Indication. Channel Display the wireless channel used for the AP that is scanned by this router. Encryption Display the encryption mode for the scanned AP. Authentication Display the authentication type that the scanned AP applied. ReScan It is used to discover all the connected AP again. Add selected BSSID to WDS Select the SSID of the Access Point that AE208 Gateway wants to connect to. ...
11.5 Information 11.5.1 Station List This page is used to display the knowledge of connecting wireless clients along with its status code. The list shows the station information. Index Index number. MAC Address Display the MAC Address for the connecting client. SSID Display the SSID that the wireless client connects to. Authentication Display the authentication that the wireless client uses for connection with the AP. Encryption Display the encryption mode used by the wireless client. 11.5.2 Statistics Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 68
This page displays all the wireless statistic information of AE208 Gateway. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 68 of 114 ...
12 VoIP Voice over IP (VoIP) enables IP networks to provide voice services such as plain old telephone service (POTS). In VoIP, the voice gateway encapsulates voice signals packets to transmit. IP telephony is a typical VoIP application. Currently, interworking between PSTN and IP is implemented via VoIP gateways. The PC‐to‐telephone, telephone‐to‐PC, and telephone‐to‐telephone technologies are mature and ...
6. The session application compares the collected digits with the match template while collecting digits. 7. After finding a match template for the called number, the originating VoIP gateway maps the number to the terminating VoIP gateway. 8. The originating VoIP gateway initiates a VoIP call to the terminating VoIP gateway over the IP network and establishes a logical channel for the call to send and receive voice data. 9. The terminating VoIP gateway receives the call from the IP network and seeks the destination telephone according to the match template. If the call is to be processed by a private branch exchange (PBX), the terminating VoIP gateway passes the call via PSTN signaling to the PBX for processing until the destination telephone is connected. When the calling party or the called party hangs up, the conversation ends. ...
After all settings are completed, click <Apply> to activate them. 12.1.2 Dial Plan Settings The dial plan can be configured on this page. Replace Prefix Code This can be set to “on” or “off”. When it is “on”, the Replace Rule will take effect. Replace Rule The leading digits of an input number will be replaced if they match those specified in the Replace Rule. There are some examples in the following: a). If the Replace Rule is 001 ‐> 005, Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 71 of 114 ...
Page 72
The dialing Number “001+86+755+27602040” will be changed to “005‐+86+755+27602040”. b). If the Replace Rule is 001+009+006 ‐> 005, The dialing Number “001+86+755+27602040” will become “005‐+86+755+27602040”; The dialing Number “009+86+755+27602040” will be changed to “005‐+86+755+27602040”; and The dialing Number “006+86+755+27602040” will be changed to “005‐+86+755+27602040”. Dial Plan: There are some examples in the following: a). If Dial Plan is *xx Input number (Dial Number) is *0#,System Send out Number is “*0#”. b). If Dial Plan is 11x After Input number (Dial Number) is “118”,auto stop to handle input number, system Send out Number is “118”. digits description *0# If the leading three characters are *0#, only these three characters will be dialed. *xx If the leading three characters are *00, *01, …, or *99, only these three characters will be dialed. ...
If the input number is 0075, 070075 will be dialed. If the input number is 10075, 10075 will be dialed. c). Auto Prefix is 07, Prefix Unset Plan is 0+1 If the input number is 0075, 0075 will be dialed. If the input number is 1075, 1075 will be dialed. If the input number is 2075, 070075 will be dialed. Digits Description 0 Ignore auto prefix if first digit is ‘0’ 1 Ignore auto prefix if first digit is ‘1’ xxxx Ignore auto prefix if input number has 4 leading digits. xxxxxx Ignore auto prefix if input number has 6 leading digits. Auto Dial Time: If the input number does not end with “#”, the number will be dialed after Auto Dial Time expires. After all settings are completed, click <Apply> to activate. 12.1.3 Port Function Settings You can configure Hot Line Settings, Volume Settings, Block, Caller ID, T.38 Fax, Call Waiting and Call forward on this page. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
Page 74
Select Port Select a phone port to be configured. Hotline Click the checkbox to disable or enable hotline function. Handset Volume Set the volume of the calling party’s handset. Handset Gain This feature controls the volume of the called party’s handset. DND Always All incoming calls will be blocked until this feature is disabled. DND Period Set a time period during which incoming calls will be blocked. If the “From” setting is greater than the “To” setting, the “To” setting represents a time of the following day. Call Waiting Enable or disable call waiting. Call ID There are four settings of Caller ID. Select an FSK‐based or DTMF‐based setting that works with your telephone network. ...
Call Forward There are three Forward modes: All Forward, Busy Forward and No Answer Forward. All Forward All incoming calls will be forwarded to a preset number. If a speed dial number is entered in the URL field, all incoming calls will be forwarded to this speed dial number. Busy Forward If you are on the phone, an incoming call will be forwarded to a specified number. If a speed dial number is entered in the URL field, the incoming calls will be forwarded to this speed dial number. No Answer Forward If you do not answer the phone until the Time Out time expires, the incoming call will be forwarded to a specified number. If a speed dial number is entered in the URL field, the incoming call will be forwarded to this speed dial number. Also you have to set ...
Page 76
Select Port Select a phone port to be configured. Active Enable or disable SIP phone register. Display Name Type a display name. User Name Type the user name assigned by the ISP. Register Name Type the register name assigned by the ISP. Register Password Type the register password for the register name. Domain Server Type the ISP’s domain server IP address. Proxy Server Type the ISP’s proxy server IP address. Outbound Proxy Type the ISP’s outbound proxy IP address. Leave this field blank, if you do not have the information. Subscribe for MWI ...
12.2.2 Codec Settings You can configure the Codec Priority, RTP Packet Length, VAD and Codec ID on this page. Codec Priority1~9 Select the codec priority. There are 10 codec options: G.711 u‐law, G711 a‐law, G.723, G.729, G.726‐16, G.726‐32, G.726‐40, GSM and Not Used. G.711/G.729 RTP Packet Length Select G.711/G.729 RTP packet length. There are 9 options: 10ms, 20ms, 30ms, 40ms, 50ms, 60ms, 70ms, 80ms and 90ms. G.723 RTP Packet Length Select G.711/G.729 RTP packet length. There are 3 options: 30ms, 60ms and 90ms. Codec ID Settings Set the codec ID’s. After all settings are completed, click <Apply> to activate them. 12.2.3 Other Settings You can set up DTMF, Voice/SIP QoS and SIP expiry time on this page. ...
DTMF Settings There are 3 options for DTMF, including RFC2833,InBand DTMF and Send DTMF SIP Info. Voice QoS Set up the quality of service for voice. SIP Qos Set up the quality of service for SIP. SIP Expire Time Set the SIP registration expiry time. Use DNS SRV Disable or enable DNS SRV. STUN Disable or enable STUN server. STUN Server Type the STUN server. STUN Port Specify the STUN port. ...
Page 79
enable/disable the DHCP Client role for VoIP VLAN; Step 4 If DHCP Client is not enabled, you have to specify its IP address, subnet mask, route 1and route 2. If the Phone 1 SIP server can only be reached by a specified route, type the next route IP address in Phone 1 Route field, otherwise it will adopt default route to look for the Phone 1 SIP server. And in Phone 2 Route field, type the next route IP address of the Phone 2 SIP server. ...
13 Statistics It shows the concerned statistic information of the device, including port status, port statistics, VLAN list, MAC address table and IGMP snooping group. 13.1 Port status This page shows the State, Link, Negotiation, Speed & Duplex, Flow Control, Learning and MDI/MDIX of each Ethernet port. 13.2 Port statistics This page shows the TxGoodPkts, TxBadPkts, RxGoodPkts, RxBadPkts, TxAbort, Collision, and DropPkt of each Ethernet port. ...
Collision The number of detected collisions DropPkt The number of packets dropped for various reasons 13.3 VLAN List This page lists the information of all VLANs, including VID, Name, Type and member port type: Tagged or Untagged Tagged lists all ports from which packets are sent tagged; Untagged lists all ports from which packets are sent untagged. 13.4 MAC Address Table This page shows information of unicast MAC address entries in the MAC address table, including VID, Unicast MAC Address, Port, and Type. Type includes Dynamic, Static, and Blackhole. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
13.5 IGMP Snooping Group This page shows IGMP Snooping multicast group information, including VID, Multicast Group, MAC Address, and Member Ports. Multicast Group is the IP address of a multicast group, MAC Address is the address of a multicast MAC group, and Member Ports include all ports belonging to this IGMP Snooping group. ...
14 Spanning Tree (1) Introduction to STP STP was developed based on the 802.1d standard of IEEE to eliminate loops at the data link layer in a local area network (LAN). Devices running this protocol detect loops in the network by exchanging information with one another and eliminate loops by selectively blocking certain ports to prune the loop structure into a loop‐free tree structure. This avoids proliferation and infinite cycling of packets that would occur in a loop network and prevents decreased performance of network devices caused by duplicate packets received. In the narrow sense, STP refers to the IEEE 802.1d STP; in the broad sense, STP refers to the IEEE 802.1d STP and various enhanced spanning tree protocols derived from that protocol. (2) Protocol Packets of STP ...
Classification Designated bridge Designated port A device directly connected to The port through which the the local device and designated bridge For a device responsible for forwarding forwards BPDUs to the BPDUs to the local device. local device. The port through which the The device responsible for designated bridge For a LAN forwarding BPDUs to this forwards BPDUs to this LAN segment. ...
Note:Enable STP in Advanced Configuration. 14.1.1 Basic STP The flowing factors should be considered to configure STP. Priority Configure the priority of the device. It ranges from 0 to 65535, and 32768 by default. The priority is greater with a smaller value. Hello Time It specifies the interval to send BPDU packets. It is used to test the links. Hello Time ranges from 1 to 10 seconds and is 2 by default. Max Age It specifies the maximum time the device can wait without receiving a BPDU before attempting to reconfigure. Max. Age ranges from 6 to 40 seconds and is 20s by default. Forward Delay Time It specifies the time for the port to transit its state after the network topology is changed. Forward Delay ranges from 4 to 30 seconds and is 15 by default. ...
It shows the bridge information of the device. Bridge ID C onsisting of the priority and MAC address of the bridge. Bridge priority is 32768 by default. With the same bridge priority, the device with the lower bridge ID has the higher priority. Root Bridge ID Consisting of the priority and MAC address of the root bridge. Bridge priority is 32768 by default. With the same root priority, the device with the lower root bridge MAC has the higher priority. Root Port ...
default value is 55. You can also make it auto‐configured. Priority Sets a port priority for a specified port. It is in the range of 0 to 255, the default value is 128. Port attributes are listed at the bottom. 14.2 RSTP Note: Enable RSTP in Advanced Configuration before configuration, while the STP parameters are effective. Developed based on the 802.1w standard of IEEE, RSTP is an optimized version of STP. It achieves rapid network convergence by allowing a newly elected root port or designated port to enter the forwarding state much quicker under certain conditions than in STP. Point to Point I ndicates the link between two devices directly connected. Protocol Migration When enable Protocol Migration on a specified port, if RSTP is enabled on this port, while the port on the peer device enables STP, and then the BPDU packets sent from this port will be automatically transited from RSTP to STP. Edge Port Indicates the port connected directly to terminals. Select “Yes” to configure the specified port as an edge port. By default, all ports are edge ports. Solutions Provider for FTTx, RFoG and HFC ...
Page 88
If the designated port is an edge port, it can directly transit to forwarding state; if the designated port is connecting to a point‐to‐point link, it can transit to forwarding state after getting response from the downstream device through handshake. So it is suggested to configure the ports connected with terminals to be edge ports. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 88 of 114 ...
15 SNMP Manager The Simple Network Management Protocol (SNMP) is an Internet standard protocol, widely used for a network management station (NMS) to access and operate the devices (SNMP agents) on a network, regardless of their vendors, physical characteristics and interconnect technologies. SNMP enables network administrators to read and set the variables on managed devices to monitor their operating and health state, diagnose network problems, and collect statistics for management purposes. ...
through SNMP (Simple Network Management Protocol). The relationship among SNMP Management Station, SNMP Agent and MIB is illustrated in the following figure. 15.1 SNMP Account 15.1.1 SNMP Community Create SNMP account. Select SNMP version (v1 and v2c) Type a community name; it is a string of 3 to 16 characters. Select the privilege (RW and RO) RO: Specifies the community that has been created has read‐only permission to access MIB objects. Communities of this type can only query MIBs for device information. RW: Specifies the community that has been created has read‐write permission to access MIB objects. Communities of this type are capable of configuring devices. ...
15.1.2 SNMP User The User can manage the device via the management station software. You can configure the SNMP User on this page. User Name Type the User Name here. It is a string of 3 to 16 characters. Privilege Select the privilege to be RO or RW. SNMP V3 Encryption Click to enable SNMP V3 Encryption. If SNMP V3 Encryption is not selected, neither encryption nor authentication will be performed. Auth Algorithm Select the Authentication Algorithm for the SNMP v3 User. MD5: The authentication is performed via HMAC‐MD5 algorithm. SHA: The authentication is performed via SHA (Secure Hash Algorithm). This authentication mode has a higher security than MD5 mode. ...
15.2 SNMP Trap Agent use SNMP Trap to send traps to NMS. 15.2.1 Global Trap On this page, you can enable or disable Trap globally. 15.2.2 Trap Host IP This tab page specifies SNMP trap Host IP. Host IP is the IPv4 address of the host to receive the traps. The bottom part of this page lists all existing trap host IP addresses. They can be deleted. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 92 of 114 ...
15.2.3 Trap Filter On this page, you can decide to trigger traps in what situations. You can enable or disable the trap and further set the threshold. Port Link Trap: If enable the port link trap function, the device will send a trap in port link up or link down. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 93 of 114 ...
Page 94
CATV Off: If enable CATV trap function, when CATV module status is changed, trap will be sent. CATV Optical Input & CATV Optical Input Threshold: If “CATV Optical Input” is set as “Enable”, when CATV input optical power is lower than “CATV Optical Input Threshold”, trap will be sent. CATV Operating Temperature & CATV Operating Temperature Threshold: If “CATV Operating Temperature” is set as “Enable”, when CATV operating temperature is higher than “CATV Operating Temperature Threshold”, trap will be sent. ...
16 RMON RMON (Remote Monitoring) based on SNMP (Simple Network Management Protocol) architecture, functions to monitor the network. RMON is currently a commonly used network management standard defined by Internet Engineering Task Force (IETF), which is mainly used to monitor the data traffic across a network segment or even the entire network so as to enable the network administrator to take the protection measures in time to avoid any network malfunction. In addition, RMON MIB records network statistics information of network performance ...
Page 96
Stats Octets The total number of octets of transmitted data, including bad packets, received from network; it excludes framing bits but includes Frame Check Sequence (FCS) octets. Stats Pkts The total number of transmitted packets, including bad packets, broadcast packets and multicast packets. Broadcastkts The total number of the received good packets that are directed to the broadcast address, except the multicast packets. MulticastPkts The total number of the received good packets that are directed to a multicast address, except the packets directed to the broadcast address. CRC Align Errors ...
(excluding framing bits, but including FCS octets). Fragments The total number of the received packets that are less than 64 octets in length (excluding framing bits, but including FCS octets), and has either a bad FCS with an integral number of octets (FCS Error) or a bad FCS with a non‐integral number of octets (Alignment Error). ...
Sampling interval(s) The data sample time interval of each group. The interval range is from 1 and 3600(1 hour). Sampling number The number of discrete sampling intervals over which data shall be saved in the part of the media‐specific table associated with this history control entry. It shall be an integer ranging from 1 to 50. 16.2.2 History List On this page, one of the histories can be selected to show the related statistics. The bottom part of this page shows the related statistic information: Index, DropEvents RxOctets, RxPkts, Broadcast, Multicast, CRCAlignErrors, Undersize, Oversize, Fragments, Jabbers, Collisions and Utilization. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 98 of 114 ...
16.3 Alarm This page sets an alarm entry. Port The ethernet port to collect statistics of Variable. Variable Select a variable from the drop‐down list. Sample Type Specify the sampling method for the selected variable and comparing the value against the thresholds. Absolute Compares the values directly with the thresholds at the end of the sampling interval. Delta Subtracts the last sampled value from the current value. The difference in the values is compared to the threshold. Rising Threshold Type the rising counter value that triggers the Rising Threshold alarm. Rising Event Index Select the index of the corresponding event which will be triggered if the sampled value is larger than the Rising Threshold. ...
16.4 Event Configuration 16.4.1 Event This page sets an event entry for an alarm. Community If an SNMP trap is to be sent, it will be sent to the SNMP community specified by this octet string. Description A comment to describe this event entry. Type The type of notification that the probe makes about this event, in the case of log, an entry is made in the log table for each event; in the case of SNMP‐trap, an SNMP trap is sent to one or more management. Owner The entity that configured this entry and is therefore using the resources assigned to it. The bottom part of this tab page lists all existing event entries. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
16.4.2 Event Log This page shows information about event log entries, including Event Index, Log Index, Log Time and Description. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 101 of 114 ...
17 Administration This part covers the following items: 17.1 IP Configuration The device supports DHCP client and Static IP. DHCP Client can be enabled by checking the Enabled checkbox. If static IP is used, IP Address, Subnet Mask, and Gateway shall be specified. 17.2 SNTP This page configures SNTP (Simple Network Time Protocol). SNTP Mode ...
Response Time Specify the time interval for the device to get a response from the SNTP server, in the unit of second. Time Zone Offset Time difference between Greenwich standard time and your local time. Time Offset (min) Time difference in minute between Greenwich standard time and your local time. In Service Mode, system time can be set with year, month, day, hour, minute and second. 17.3 SMTP This page sets SMTP (Simple Message Transfer Protocol) configuration. When a pre‐defined event occurs, an e‐mail will be sent to the following destination mail address. Destination Mail: The e‐mail address to receive the event information. SMTP Service IP: The IP address of SMTP server. Source Account Name: Source e‐mail account on SMTP server. SMTP Password: The password for source e‐mail account. Note: click <Test> to check whether the configuration is correct. If it is correct, the destination mail will receive an e‐mail. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
17.4 E‐mail Alarm This page sets the events that will trigger an e‐mail described in Section 2.15.3 SMTP, including system events and port events. 17.4.1 System Event This page sets the following system events. Select <Apply> for an event to trigger e‐mail sending when this event occurs. Onaccess cold start: The device is booted up by turning on the power. Onaccess warm start: The device is restarted without turning off power. Auth failure: Fails to login to the device due to incorrect username or password. RMON event log: see chapter 12 of this manual for details. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
17.4.2 Port Event This page sets the following port events. Select Enable for an event to trigger e‐mail sending when this event occurs. Port The port selected for event configuration Alarm Type If it is enabled, there are three alarm types for the event: Link Up, Link Down, and Up & Down. Traffic Overload It means that the port traffic exceeds Traffic Threshold during a statistics time of Traffic Duration. ...
17.5 System Logs This page shows all of the system logs, clicking <Clear> to clear all the records of the system logs. And you can turn to the next page to go back to the previous page by clicking <Next> and <Forward> respectively. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
17.6 Ping Diagnosis On this page, you can ping an IP address to check the network connectivity and the reachability of a host. If the device is reachable, it will remind you as follows: Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 107 of 114 ...
If the device is unreachable, it will remind you as follows: 17.7 Account This page can be used to add a new account. Username, Password, and Privilege for the new account are set on this page. Username Type a username; it is a string of 3 to 16 characters. Password Type the password; it is a string of 1 to 16 characters. Privilege It can be set as user or admin. User cannot add or delete an account, can neither use the TFTP service nor reset function, while admin can check and modify the device configuration. ...
17.8 TFTP Services 17.8.1 TFTP Firmware To upgrade the system is to get more functions and better performance. Before upgrading firmware, make sure the device is connected to the TFTP server and the TFTP software is turned on, and new firmware file exists on the server. You can get the newest firmware from Ascent Communication Technology, please contact your sales representative. The device will begin to update firmware after clicking on <Apply>. Please pay attention to the following reminds: Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page ...
If the upgrade is successful, it will remind you as follows. If the upgrade fails, it will remind you as follows. Maybe it is because the TFTP software is turned off. After upgrade, you should reboot the system manually to make upgrade effective. Caution: please don’t cut off the power supply during updating firmware, uploading or downloading a configuration file! 17.8.2 Backup Configuration This page sets a TFTP Server IP and File Name. Before backing up configuration, make sure the device is connected to the TFTP server. The device configuration file will be uploaded to TFTP ...
server with the specified File Name after clicking on <Apply>. 17.8.3 Restore Configuration This page sets a TFTP Server IP and File Name. Before restoring a configuration, make sure the device is connected to the TFTP server. The device will download the file with the specified File Name and use it as the configuration file after clicking on <Apply>. 17.9 Reboot On this page, there are two buttons: <Save And Reboot> and <Reboot Without Save>. ...
17.10 Reset There are two tab pages: Reset and Reset To Default. Reset: the device will be reset to the factory default setting, except that the IP address and user accounts are kept unchanged. Reset To Default: the device will be reset to the factory default setting. 17.11 Save Configuration This page saves current configurations. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 112 of 114 ...
18 Logout Click [Logout] in the left menu to log out from the Web interface. Solutions Provider for FTTx, RFoG and HFC www.ascentcomtec.com Page 113 of 114 ...
Page 114
Ascent Communication Technology Ltd. AUSTRALIA 487 Church St, Richmond, Victoria 3121, Australia Phone: +61‐488 293 682 Email: sales@ascentcomtec.com CHINA/HONG KONG 13/F., Shum Tower, 268 Des Voeux Road Central, Hong Kong Phone China: +86‐139 0173 4382 Phone Hong Kong: +852‐5483 7156 Email: sales@ascentcomtec.com ...
Need help?
Do you have a question about the AE208 Series and is the answer not in the manual?
Questions and answers