ZyXEL Communications AES-100 User Manual
ZyXEL Communications AES-100 User Manual

ZyXEL Communications AES-100 User Manual

Adsl-ethernet switch
Hide thumbs Also See for AES-100:
Table of Contents

Advertisement

Quick Links

AES-100
ADSL-Ethernet Switch
May 2002
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AES-100 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ZyXEL Communications AES-100

  • Page 1 AES-100 ADSL-Ethernet Switch May 2002 User’s Guide...
  • Page 2: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 3: Zyxel Limited Warranty

    AES-100 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period, and upon...
  • Page 4: Interference Statements And Warnings

    AES-100 User’s Guide Interference Statements and Warnings Interference Statement: This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. (2) This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5: Contacting Customer Support

    If you have questions about your ZyXEL product or desire assistance, contact ZyXEL Communications Corporation offices worldwide, in one of the following ways: Contacting Customer Support When you contact your customer support representative, have the following information ready: ♦ Product model and serial number.
  • Page 6: Table Of Contents

    Table of Contents ... vi List of Figures... ix List of Tables ... x Preface ... xi Chapter 1 Getting to Know the AES-100 ... 1-1 1.1 Features... 1-1 1.2 Benefits... 1-3 1.3 Physical Specifications ... 1-4 Chapter 2 Hardware Overview ... 2-1 2.1 Unpacking the AES-100 ...
  • Page 7 12.3 Configuration Restore ... 12-1 Chapter 13 Firmware Upload and Recovery ... 13-1 13.1 FTP Firmware Upload on the ADSL Networking Module... 13-1 13.2 BOOTP/TFTP Firmware Recovery of the ADSL Networking Module ... 13-2 Table of Contents AES-100 User’s Guide...
  • Page 8 AES-100 User’s Guide Chapter 14 Troubleshooting ... 14-1 14.1 ADSL LED(s) ... 14-1 14.2 Data Transmission... 14-1 14.3 ADSL LED(s) turn On and Off ... 14-2 14.4 Data Rate... 14-2 14.5 Configured Settings ... 14-2 14.6 Password ... 14-3 14.7 Remote Server...
  • Page 9: List Of Figures

    Figure 2-2 AES-100 Rear Panel AC Power Version ...2-3 Figure 2-3 AES-100 Rear Panel DC Power Version ...2-3 Figure 2-4 Connecting the Power Cord to the AES-100 and a Power Source ...2-4 Figure 4-1 Example: Procedure to Save and View a Previous Error Log ...4-7 Figure 7-1 Default VLAN Settings ...7-6...
  • Page 10: List Of Tables

    Table 4-1 Logs Sent to Your UNIX Server ... 4-5 Table 5-1 Maximum Transfer Rates of the AES-100’s ADSL Ports... 5-1 Table 7-1 Physical Ports, Port Numbers and AES-100 Default PVID Tags in Fast Mode... 7-9 Table 14-1 Troubleshooting the ADSL LED(s) ... 14-1 Table 14-2 Troubleshooting Data Transmission...
  • Page 11: Preface

    This guide provides detailed information about the physical specifications and procedures for installing the AES- 100 hardware. Support Notes More detailed information about the AES-100 and examples of its use can be found in the Support Notes accessible through the ZyXEL web pages at www.zyxel.com. ZyXEL Web Page and FTP Server Site You can access release notes as well as firmware upgrades at ZyXEL web and FTP sites.
  • Page 13: Features

    Two-Slot Chassis The AES-100 has two slots for the ADSL to Ethernet multiplexer modules. This design provides the flexibility for you to install as few as a single module for the initial deployment and yet still has room to grow as demand increases.
  • Page 14: Igmp Snooping

    IEEE 802.1p Priority gives your AES-100 the ability to regenerate priority changes for ports. Fast Mode The AES-100’s fast mode makes use of the “tag” subset of the IEEE 802.1Q standard to identify the source port of a frame and speed traffic through a service gateway.
  • Page 15: Benefits

    A tenant connects a computer to the phone line in a unit using an ADSL modem. The other end of the phone line is connected to a port on the AES-100. The AES-100 aggregates the traffic from the tenants to the Ethernet port and forwards it to a router.
  • Page 16: Physical Specifications

    ISP Application The AES-100 can also be used by an Internet Service Provider (ISP) as an IP DSLAM. The AES-100 terminates all of the ADSL ATM circuits and converts the traffic to IP packets. All IP traffic goes directly to the ISP’s internal Ethernet network, before being routed to the Internet.
  • Page 17: Storage Environment

    80 watts maximum • 100 - 240 VAC, 50/60 Hz Operating Environment • Temperature: 0 - 50°C; Humidity: 5% - 95% Storage Environment • Temperature: -30 - 60°C; Humidity: 2% - 95% Getting to Know the AES-100 AES-100 User’s Guide...
  • Page 19: Chapter 2 Hardware Overview

    Unpacking the AES-100 Before installing, check to see that all the components of the AES-100 are included in the package. Additional Installation Requirements In addition to the contents of the package, you need the following hardware and software components before you install and use your product: •...
  • Page 20: Table 2-1 Front Panel Ports Of An Adsl Network Module

    For the initial configuration, you need to use terminal emulator software on a computer and connect it to the AES- 100 through the console port. Connect the male 9-pin end of the console cable to the console port of the AES-100.
  • Page 21: Adsl Port Connections

    ADSL Port Connections The line from the user carries both the ADSL and the voice signals. For each line, the AES-100 has a built-in splitter that separates the high frequency ADSL signal from the voice band signal and feeds the ADSL signal to the AES-100, while the voice band signal is diverted to the CO port.
  • Page 22: Figure 2-4 Connecting The Power Cord To The Aes-100 And A Power Source

    AES-100 User’s Guide Connect the female end of the power cord to the power receptacle on the rear panel of your AES-100 (just to the right of the warning sticker) as seen next. Connect the other end of the cord to a power outlet. Make sure that no objects obstruct the airflow of the fans (located on the side of the unit).
  • Page 23: Factory Default Settings

    • VCI: 33 • Enable/Disable State: Disabled • Maximum Upstream Rate: 1024 Kbps for G.dmt, 512 Kbps for G.Lite Factory Default Settings Factory Default Settings This section describes the factory default settings of the AES-100. AES-100 User’s Guide Chapter 3...
  • Page 24: Ethernet Port

    Maximum Downstream Rate: 8160 Kbps for G.dmt, 1536 Kbps for G.Lite • Operational Mode: auto Ethernet Port The factory default settings for the Ethernet port of the AES-100 are: Auto-negotiation: ON Speed used with auto-negotiation OFF: 100Mbps Duplex mode used with auto-negotiation OFF: half duplex Other Factory Defaults •...
  • Page 25: Chapter 4 System Commands

    Command Line Interface (CI) The AES-100 uses text command lines as the user interface for software configuration. Before discussing the details of configuration, the rules of the commands are listed next. The command keywords are in regular courier font. 1. The command keywords must be entered exactly as shown, that is, no abbreviations are allowed.
  • Page 26: Saving Your Configuration

    This command saves all system configurations into nonvolatile memory. You must use this command to save any configurations that you make, otherwise the AES-100 will return to its default settings when it is restarted. Do not turn off your AES-100 while saving your configuration.
  • Page 27: Sys Commands

    Set Name Command Syntax: 192.168.1.1 sys> set name <name> This command allows you to set the name of your AES-100. The previous setting will be cleared if the command is entered with the <name> parameter omitted. 4.5.3 Set Contact Command...
  • Page 28: Set Location Command

    AES-100 User’s Guide 192.168.1.1 sys> set contact [<name>] This command allows you to set the name of the contact person for your AES-100. The previous setting will be cleared if the command is entered with the name omitted. 4.5.4 Set Location Command Syntax: 192.168.1.1 sys>...
  • Page 29: Secured Host Delete Command

    Use UNIX syslog commands to send logs to your UNIX syslog server. If the ADSL link is on or goes down, the AES-100 will send a log to your UNIX syslog server. The table, shown next, indicates what is logged in each case.
  • Page 30: System Error Log Commands

    (not be sent). System Error Log Commands The system error log will record error events locally to the AES-100 memory. You may clear or display these logs using the commands listed in this section. The following lists what logs the system error log can record.
  • Page 31: Saving And Viewing A Previous Error Log

    4.8.3 Saving and Viewing a Previous Error Log You may save and view a previous error log after warm restarting the AES-100 (refer to Figure 4-1). 192.168.1.1> sys 192.168.1.1 sys> errlog display 0 Thu Jan 01 00:00:12 SNMPR 1 Thu Jan 01 00:00:14 CONSOL 192.168.1.1 sys>...
  • Page 33: Chapter 5 Adsl Configuration

    The ADSL (Asymmetrical Digital Subscriber Line) subsystem allows you to configure and monitor the ADSL Standards The AES-100 supports both the G.lite and the G.dmt standards. G.lite is intended to minimize the cost for the consumer market. Table 5-1 Maximum Transfer Rates of the AES-100’s ADSL Ports STANDARD G.dmt...
  • Page 34: Default Settings

    Default Settings The default profile always exists and all of the ADSL ports belong to it when the AES-100 is shipped. The default profile's name is set to DEFVAL 5.4.1 Default Profile Settings The following are the settings of the default profile.
  • Page 35: Adsl Commands

    ADSL port generates more heat than an operating port. To minimize heat generation and to enhance reliability, remember to disable a port when it is not in use. 5.5.5 Enable Ports Command Syntax: ADSL Configuration AES-100 User’s Guide...
  • Page 36: Lineinfo Command

    AES-100 User’s Guide 192.168.1.1 adsl> enable ports command forcibly enables all ADSL ports. enable ports The factory default of all ports is disabled. A port must be enabled before data transmission can occur. An enabled but disconnected ADSL port generates more heat than an operating port. To minimize heat generation and to enhance reliability, remember to disable a port when it is not in use.
  • Page 37: Lineperf Command

    An example is shown next. 192.168.1.1 adsl> lineperf 7 nfebe-I/nfebe-ni ncrc-I/ncrc-ni nfecc-I/nfecc-ni nfec-I/nfec-ni nblks-ds/nblks-us ADSL Configuration : 1/1 : ON 4/ 4 ms : 0/ 1 : 0/ 1 2/ 2 : 0/0 : 0/0 : 0/0 : 0/0 : 120878/120878 AES-100 User’s Guide...
  • Page 38: Linerate Command

    AES-100 User’s Guide nsec-ds/nsec-us n-eb-ds/n-eb-us n-bbe-ds/n-bbe-us n-es-ds/n-es-us n-ses-ds/n-ses-us non-ses-blks-ds/non-ses-blks-us : 120878/120878 n-uas-ds/n-uas-us fe_loss_seconds/ne_loss_seconds : 0/0 fe_fec_seconds/ne_fec_seconds fast_trains fast_trains_fail These counts contain line performance data that has been accumulated since the system started. In the list above the definitions of near end/far end will always be relative to the ATU-C (ADSL Termination Unit-Central Office).
  • Page 39: List Ports Command

    The minimum acceptable ADSL downstream signal/noise margin (0..31db). The maximum acceptable ADSL upstream signal/noise margin (0..31db). The maximum acceptable ADSL downstream signal/noise margin (0..31db). The minimum ADSL upstream transmission rate in Kbps. The minimum ADSL downstream transmission rate in Kbps. AES-100 User’s Guide...
  • Page 40: Show Profile Command

    AES-100 User’s Guide Even though you can specify arbitrary numbers in the of 32 Kbps. If you enter a rate that is not a multiple of 32 Kbps, the actual rate will be the next lower multiple of 32Kbps. For instance, if you specify 60 Kbps for a port, the actual rate for that port will not exceed 32 Kbps, and if you specify 66 Kbps, the actual rate will not be over 64Kbps.
  • Page 41: Show Profiles Command

    ADSL ports that are assigned to it. ADSL Configuration Port number ranging from 1 to 8. The profile that will define the settings of this port. Operational mode; the available choices are glite, gdmt, t.413 or auto. AES-100 User’s Guide...
  • Page 42: Show Ports Command

    AES-100 User’s Guide The mode parameter specifies the standard that this port is allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line. When the mode is set to auto and the negotiated mode is G.lite, if the configured rates exceed those allowed by G.lite, the actual rates are governed by G.lite, regardless of the configured numbers.
  • Page 43: Set Pvcs Command

    VCI setting for the ADSL port for use with Rx based networks settings will be equal to those of either “llc” or “vc” settings will be equal to those of AES-100 User’s Guide if the rx settings <tx vpi> <tx vci>...
  • Page 44: Show Pvcs Command

    AES-100 User’s Guide 5.5.24 Show PVCs command Syntax: 192.168.1.1 adsl> show pvcs command allows you to display the PVC parameters of all ADSL ports. show pvcs 5-12 ADSL Configuration...
  • Page 45: 10/100M Fast Ethernet Port Commands

    When auto-negotiation is turned on, the Ethernet port of the AES-100 negotiates with the peer Ethernet port on the Ethernet cable automatically to determine the optimal connection rate and duplex mode. If the peer Ethernet port does not support auto-negotiation or turns off this feature, the AES-100 determines the connection rate by detecting the signal on the cable and using half duplex mode.
  • Page 46: Status Command

    AES-100 User’s Guide <speed> = 10 or 100 This command sets the connection speed used when auto-negotiation is turned off. 10 stands for 10Mbps and 100 stands for 100Mbps. 6.2.4 Status Command Syntax: 192.168.1.1 ethernet> status This command shows the current status of the Ethernet port.
  • Page 47: Chapter 7 Bridge Commands

    This command saves the bridge configuration into nonvolatile memory. You must use this command to save any configurations that you make, otherwise the AES-100 will return to its default settings when it is restarted. Do not turn off your AES-100 while saving your configuration.
  • Page 48: Macfilter Commands

    Use MACfilter commands to filter incoming packets based on MAC (Media Access Control) address(es) that you specify. If you do not use this command, your AES-100 will not filter packets. MACfilter commands are listed next. You may specify up to five MAC addresses per port.
  • Page 49: Filter Commands

    Syntax: 192.168.1.1 bridge> mfilter This command displays the multicast filtering database. The mfilter command is what allows you to monitor the AES-100’s IGMP snooping activities. The following is an example of a multicast filtering database. 192.168.1.1 bridge> mfilter Bridge Commands a bridge port number.
  • Page 50: Flush Command

    2 and so on. The version of IGMP being used in the network. The number of query packets received by the AES-100. The longest period of time used to respond to a query packet, measured in tenths of a second.
  • Page 51: Info Command

    Port-Based VLAN Commands The AES-100 VLAN (Virtual Local Area Network) mechanism can be used to limit the broadcast domain to the members of a VLAN group only. In this way, VLAN increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain.
  • Page 52: Figure 7-1 Default Vlan Settings

    AES-100 User’s Guide 7.5.1 Portfilter Command Syntax: 192.168.1.1 bridge> portfilter <source port> [all|<dest ports>] where <source port> = <dest ports> This command sets or displays the port-based VLAN configuration. An example is shown next. 192.168.1.1 > bridge 192.168.1.1 bridge> portfilter...
  • Page 53: Figure 7-2 Example Of Modified Vlan Port 2

    Figure 7-2 Example of Modified VLAN Port 2 The following figure illustrates the 192.168.1.1 bridge> portfilter 3 1 2 command line. Port 3 (ADSL port 2) is able to send to both the Ethernet port and port 2 (ADSL port 1). Bridge Commands AES-100 User’s Guide...
  • Page 54: Figure 7-3 Example Of Modified Vlan Port 3

    AES-100 User’s Guide Figure 7-3 Example of Modified VLAN Port 3 The following figure illustrates that port 1 (the Ethernet port) is linked to ports 2 (ADSL port 1) and 3 (ADSL port 2). Ports 2 (ADSL port1) and 3 (ADSL port 2) are also linked to each other. Or, in other words, the following figure is a result of the following commands: 192.168.1.1 bridge>...
  • Page 55: Table 7-1 Physical Ports, Port Numbers And Aes-100 Default Pvid Tags In Fast Mode

    In this way, the VLAN membership of a frame can be carried across switches. The following table displays the physical port and corresponding default PVID tag on the AES-100. Table 7-1 Physical Ports, Port Numbers and AES-100 Default PVID Tags in Fast Mode PHYSICAL...
  • Page 57: Ieee 802.1Q Tagged Vlan Commands

    LAN bridge. A filtering database consists of a static entries (Static VLAN or SVLAN table) and dynamic entries (Dynamic VLAN or DVLAN table). 8.4.1 Static Entries (SVLAN Table) Static entry registration information is added, modified and removed by management only. IEEE 802.1Q Tagged VLAN Commands 802.1Q Tagged VLAN. AES-100 User’s Guide Chapter 8...
  • Page 58: Dynamic Entries (Dvlan Table)

    AES-100 User’s Guide 8.4.2 Dynamic Entries (DVLAN Table) Dynamic entries are learned by the bridge and cannot be created or updated by management. The bridge learns this information by observing what port, source address and VLAN ID (or VID) is associated with a frame. Entries are added and deleted using GARP VLAN Registration Protocol (GVRP), where GARP is the Generic Attribute Registration Protocol.
  • Page 59: Figure 8-1 Example: Pvid Command Display

    ----- ----- 192.168.1.1 vlan1q> VLAN ID. Valid parameter range = [1 – 4094]. port# ad_control ------- ------------ fixed normal normal normal fixed normal normal normal fixed AES-100 User’s Guide tag_control ------------ UnTag UnTag UnTag UnTag UnTag UnTag UnTag UnTag...
  • Page 60: Svlan Setentry Command

    AES-100 User’s Guide 8.5.6 SVLAN Setentry Command Syntax: 192.168.1.1 vlan1q> svlan setentry <vid> <port#> <ad_control> <tag_control> where <vid> <port#> <ad_control> <tag_control> = This command adds or modifies an entry into the static VLAN table. Display your configuration by using the Svlan List command.
  • Page 61: Forwarding Process Example

    AES-100 User’s Guide Forwarding Process Example The switch uses the SVLAN in making frame-forwarding decisions. First the switch checks the MAC address in a frames header against the MAC filtering database. Next the switch checks the VLAN ID (VID) of tagged frames or assigns temporary VIDs to untagged frames (see the PVID Command).
  • Page 62: Display A Static Vlan Table Entry Example

    AES-100 User’s Guide The switch sees that port #s 2, 3, 4, 6, 8 and 9 (ADSL ports 1, 2, 3, 5, 7 and 9) are all set to “fixed” and “untag” which means the SVLAN allows the frame to be sent to those ports without a tag.
  • Page 63: Dvlan List Command

    ---- ---- ---- >> >> >> >> >> >> >> VLAN ID. Valid parameter range = [1 – 4094]. ---- ---- ---- >> AES-100 User’s Guide ---- ---- ---- ---- >> >> >> >> >> >> >> >> >> >>...
  • Page 64: Figure 8-8 Example: Vlan List Command Display

    AES-100 User’s Guide ---- ---- Figure 8-8 Example: VLAN List Command Display In the figure above “O" denotes “egress port”, “V” denotes “tagged” and “X” denotes “ untagged”. ---- ---- ---- ---- ---- ---- ---- ---- IEEE 802.1QTagged VLAN Commands...
  • Page 65: Ieee 802.1P Priority Commands

    = [0 - 7], where 0 is the lowest priority and 7 is the highest priority. the regenerated user priority the incoming user priority is mapped to for <port #>. Valid parameter range = [0 - 7], where 0 is the lowest priority and 7 is the highest priority. AES-100 User’s Guide Chapter 9...
  • Page 66 AES-100 User’s Guide This command sets the mapping of incoming user priority to a regenerated user priority for an ingress port. To display the regeneration table, simply use the Regen Port command without parameters, as shown next. 192.168.1.1 vlan1q> regen port...
  • Page 67: Chapter 10 Ip Commands

    Line 2 clears the old parameters of the AES-100. Line 3 allows you to add a new IP address for the AES-100. The MAC address of the AES-100 is displayed in the command prompt. The system will automatically compute the subnet mask when the system is restarted. If you want to specify a subnet manually, add the following two commands before line 4: 192.168.1.1 ip>...
  • Page 68: Figure 10-1 Setting Ip Address And Default Gateway

    AES-100 User’s Guide For example, if you want the AES-100 to have 172.21.100.1 as the IP address, 255.255.255.0 for the subnet mask and 172.21.100.254 for the default gateway, you may use the following command sequence: 192.168.1.1> ip 192.168.1.1 ip> device delete ether 192.168.1.1 ip>...
  • Page 69: Statistics Command

    Time to Live (optional). This parameter limits the number of hops (routers) that the echo request can travel before it reaches the target. The parameter specifies the size of the payload, that is, not counting the headers, of the echo request. The default size is 32 octets. AES-100 User’s Guide 10-3...
  • Page 71: Chapter 11 Remote Management

    Management by Telnet After you have set up the IP parameters and connected the AES-100 to the network, you can manage it remotely with telnet. You can use any telnet client that you find convenient. The configuration procedures with telnet are exactly the same as those using the direct connection via the console port.
  • Page 72: Supported Mibs

    AES-100 User’s Guide An agent is a management software module that resides in a managed device (the AES-100). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the station through which network administrators perform network management functions. It executes operations that control and monitor the managed devices.
  • Page 73: Snmp Trap Configuration

    This trap is sent when an ADSL port is down. ♦ overheat Trap (defined in ZYXEL-MIB) : This trap is sent when the ADSL Networking Module is overheated. Remote Management AES-100 User’s Guide commands in the SNMP subsystem. After trap config save...
  • Page 74: Trap Add Command

    AES-100 User’s Guide ♦ overheatOver Trap (defined in ZYXEL-MIB) : This trap is sent periodically when the ADSL Networking Module is no longer overheated. 11.4.2 Trap Add Command Syntax: 192.168.1.1 snmp> trap add <community> <IP addr> [<port>] where <community> = The password used by the ADSL Networking Module to authenticate itself to the trap server.
  • Page 75: Chapter 12 Configuration Backup/Restore

    You can restore configuration files from your computer to the ADSL Networking Module. Restore the system configuration by following the example shown next. Configuration Backup/Restore Configuration Backup/Restore ftp.exe in Windows) to backup/restore the ADSL Networking Module’s AES-100 User’s Guide Chapter 12 12-1...
  • Page 76 AES-100 User’s Guide Do not turn off the ADSL Networking Module during the restore process, as it may corrupt the firmware and Connect to the ADSL Networking Module with your favorite FTP client. The command is generally Step 1. C:\> ftp <ADSL Networking Module IP address>...
  • Page 77: Chapter 13 Firmware Upload And Recovery

    The command is generally: ftp <ADSL Networking Module IP address> at the computer command prompt. Enter the user name (just press [ENTER]). For example, User: <ENTER> Firmware Upload and Recovery Firmware Upload and Recovery www.zyxel.com AES-100 User’s Guide Chapter 13 every now and then for the latest firmware release. 13-1...
  • Page 78: Bootp/Tftp Firmware Recovery Of The Adsl Networking Module

    Wait for the update to finish. The ADSL Networking Module restarts automatically. Do not turn off the AES-100 during the updating process, as it may corrupt the firmware and make your unit 13.2 BOOTP/TFTP Firmware Recovery of the ADSL...
  • Page 79: Figure 13-1 Bootp/Tftp Server

    IP address (the IP address of this computer), net mask, gateway and filename (the new firmware name) into the appropriate fields in the screen shown next. Click Update Database. Firmware Upload and Recovery Figure 13-1 BOOTP/TFTP Server Figure 13-2 Input MAC AES-100 User’s Guide 13-3...
  • Page 80: Figure 13-3 Database Edit Dialog

    AES-100 User’s Guide Select Normal Bootp to enable normal BOOTP/TFTP functions. Restart the ADSL Networking Module and press any key within three seconds to get the following screen. SDRAM Testing ... Mac address 00:A0:C5:12:34:56 Press any key within 3 seconds to enter debug mode Press any key at the “Press any key within 3 seconds to enter debug mode...
  • Page 81 Use the following command sequence on the ADSL Networking Module to write new firmware to flash memory. 192.168.1.1> flashfs 192.168.1.1 flashfs> wipe 192.168.1.1 flashfs> update Wait for the update to complete and then restart the ADSL Networking Module. Firmware Upload and Recovery AES-100 User’s Guide 13-5...
  • Page 83: Chapter 14 Troubleshooting

    (refer to the Default Settings in the ADSL Configuration chapter of this User’s Guide). Also make sure that it is using RFC-1483 encapsulation, bridge mode and LLC- based multiplexing. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
  • Page 84: Adsl Led(S) Turn On And Off

    Table 14-3 Troubleshooting a Non-Constant ADSL LED STEPS Unplug the phone wire coming from the USER port of the AES-100 and connect the user’s ADSL modem or router directly to the USER port of the AES-100 using a different telephone wire.
  • Page 85: Password

    Table 14-7 Troubleshooting a Remote Server STEPS Refer to Data Transmission in this chapter to make sure that the user is able to transmit to the AES-100. Make sure the gateway’s IP address is the same as the one configured in the user’s computer.
  • Page 86: Telnet

    AES-100. If you are attempting to telnet from the Ethernet side of the AES-100, check the Ethernet cable. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
  • Page 87: Index

    Command Structure ... 4-1 Community... 11-2 Config Command ... 10-2 Config Print Command ... 4-3 Config Save Command ... 4-2, 5-3, 7-1 Index AES-100 User’s Guide Configuration Backing up... 12-1 Restoring ... 12-1 Configuration Backup/Restore... 12-1 Connections ADSL Port... 2-3 Console Port...
  • Page 88 Filtering Databases ...8-1 Firmware Recovery ... 13-1, 13-2 Remote Upload ...13-1 Firmware Upload File Types ...13-1 FTP ...13-1 Impact to the AES-100 ...13-1 Protocols ...13-1 Timing ...13-1 Flush Command ...7-4 Front Panel ...2-1 Front Panel Indicators ...2-2 Front Panel Ports ...2-2 FTP ...13-1...
  • Page 89 PVID Command... 7-8 Rear Panel ... 2-3 Rear Panel Connections Connections ... 2-4 Rear Panel... 2-3 Index AES-100 User’s Guide Related Documentation... xi Remote Firmware Upload ... 13-1 Remote Management ... 11-1 Restart Command... 4-2 RFC 1213 ... 11-2 RFC 1215 ...11-2, 11-3 RFC 1483 ...
  • Page 90 AES-100 User’s Guide Splitters Integrated Splitters...1-1 Statistics Command...10-3 Status Command... 6-2, 7-1 Storage Environment...1-5 Supported Traps ...11-3 SVLAN Table...8-1 Syntax Conventions... xi Sys Errlog ...4-6 Clear Log ...4-6 Logs ...4-6 Saving and Viewing a Previous Error Log ...4-7 Sys Error Log Default ...3-2...

Table of Contents