ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
AES-100 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period, and upon...
AES-100 User’s Guide Interference Statements and Warnings Interference Statement: This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. (2) This device must accept any interference received, including interference that may cause undesired operations.
If you have questions about your ZyXEL product or desire assistance, contact ZyXEL Communications Corporation offices worldwide, in one of the following ways: Contacting Customer Support When you contact your customer support representative, have the following information ready: ♦ Product model and serial number.
Table of Contents ... vi List of Figures... ix List of Tables ... x Preface ... xi Chapter 1 Getting to Know the AES-100 ... 1-1 1.1 Features... 1-1 1.2 Benefits... 1-3 1.3 Physical Specifications ... 1-4 Chapter 2 Hardware Overview ... 2-1 2.1 Unpacking the AES-100 ...
Page 7
12.3 Configuration Restore ... 12-1 Chapter 13 Firmware Upload and Recovery ... 13-1 13.1 FTP Firmware Upload on the ADSL Networking Module... 13-1 13.2 BOOTP/TFTP Firmware Recovery of the ADSL Networking Module ... 13-2 Table of Contents AES-100 User’s Guide...
Page 8
AES-100 User’s Guide Chapter 14 Troubleshooting ... 14-1 14.1 ADSL LED(s) ... 14-1 14.2 Data Transmission... 14-1 14.3 ADSL LED(s) turn On and Off ... 14-2 14.4 Data Rate... 14-2 14.5 Configured Settings ... 14-2 14.6 Password ... 14-3 14.7 Remote Server...
Figure 2-2 AES-100 Rear Panel AC Power Version ...2-3 Figure 2-3 AES-100 Rear Panel DC Power Version ...2-3 Figure 2-4 Connecting the Power Cord to the AES-100 and a Power Source ...2-4 Figure 4-1 Example: Procedure to Save and View a Previous Error Log ...4-7 Figure 7-1 Default VLAN Settings ...7-6...
Table 4-1 Logs Sent to Your UNIX Server ... 4-5 Table 5-1 Maximum Transfer Rates of the AES-100’s ADSL Ports... 5-1 Table 7-1 Physical Ports, Port Numbers and AES-100 Default PVID Tags in Fast Mode... 7-9 Table 14-1 Troubleshooting the ADSL LED(s) ... 14-1 Table 14-2 Troubleshooting Data Transmission...
This guide provides detailed information about the physical specifications and procedures for installing the AES- 100 hardware. Support Notes More detailed information about the AES-100 and examples of its use can be found in the Support Notes accessible through the ZyXEL web pages at www.zyxel.com. ZyXEL Web Page and FTP Server Site You can access release notes as well as firmware upgrades at ZyXEL web and FTP sites.
Two-Slot Chassis The AES-100 has two slots for the ADSL to Ethernet multiplexer modules. This design provides the flexibility for you to install as few as a single module for the initial deployment and yet still has room to grow as demand increases.
IEEE 802.1p Priority gives your AES-100 the ability to regenerate priority changes for ports. Fast Mode The AES-100’s fast mode makes use of the “tag” subset of the IEEE 802.1Q standard to identify the source port of a frame and speed traffic through a service gateway.
A tenant connects a computer to the phone line in a unit using an ADSL modem. The other end of the phone line is connected to a port on the AES-100. The AES-100 aggregates the traffic from the tenants to the Ethernet port and forwards it to a router.
ISP Application The AES-100 can also be used by an Internet Service Provider (ISP) as an IP DSLAM. The AES-100 terminates all of the ADSL ATM circuits and converts the traffic to IP packets. All IP traffic goes directly to the ISP’s internal Ethernet network, before being routed to the Internet.
Unpacking the AES-100 Before installing, check to see that all the components of the AES-100 are included in the package. Additional Installation Requirements In addition to the contents of the package, you need the following hardware and software components before you install and use your product: •...
For the initial configuration, you need to use terminal emulator software on a computer and connect it to the AES- 100 through the console port. Connect the male 9-pin end of the console cable to the console port of the AES-100.
ADSL Port Connections The line from the user carries both the ADSL and the voice signals. For each line, the AES-100 has a built-in splitter that separates the high frequency ADSL signal from the voice band signal and feeds the ADSL signal to the AES-100, while the voice band signal is diverted to the CO port.
AES-100 User’s Guide Connect the female end of the power cord to the power receptacle on the rear panel of your AES-100 (just to the right of the warning sticker) as seen next. Connect the other end of the cord to a power outlet. Make sure that no objects obstruct the airflow of the fans (located on the side of the unit).
Maximum Downstream Rate: 8160 Kbps for G.dmt, 1536 Kbps for G.Lite • Operational Mode: auto Ethernet Port The factory default settings for the Ethernet port of the AES-100 are: Auto-negotiation: ON Speed used with auto-negotiation OFF: 100Mbps Duplex mode used with auto-negotiation OFF: half duplex Other Factory Defaults •...
Command Line Interface (CI) The AES-100 uses text command lines as the user interface for software configuration. Before discussing the details of configuration, the rules of the commands are listed next. The command keywords are in regular courier font. 1. The command keywords must be entered exactly as shown, that is, no abbreviations are allowed.
This command saves all system configurations into nonvolatile memory. You must use this command to save any configurations that you make, otherwise the AES-100 will return to its default settings when it is restarted. Do not turn off your AES-100 while saving your configuration.
Set Name Command Syntax: 192.168.1.1 sys> set name <name> This command allows you to set the name of your AES-100. The previous setting will be cleared if the command is entered with the <name> parameter omitted. 4.5.3 Set Contact Command...
AES-100 User’s Guide 192.168.1.1 sys> set contact [<name>] This command allows you to set the name of the contact person for your AES-100. The previous setting will be cleared if the command is entered with the name omitted. 4.5.4 Set Location Command Syntax: 192.168.1.1 sys>...
Use UNIX syslog commands to send logs to your UNIX syslog server. If the ADSL link is on or goes down, the AES-100 will send a log to your UNIX syslog server. The table, shown next, indicates what is logged in each case.
(not be sent). System Error Log Commands The system error log will record error events locally to the AES-100 memory. You may clear or display these logs using the commands listed in this section. The following lists what logs the system error log can record.
4.8.3 Saving and Viewing a Previous Error Log You may save and view a previous error log after warm restarting the AES-100 (refer to Figure 4-1). 192.168.1.1> sys 192.168.1.1 sys> errlog display 0 Thu Jan 01 00:00:12 SNMPR 1 Thu Jan 01 00:00:14 CONSOL 192.168.1.1 sys>...
The ADSL (Asymmetrical Digital Subscriber Line) subsystem allows you to configure and monitor the ADSL Standards The AES-100 supports both the G.lite and the G.dmt standards. G.lite is intended to minimize the cost for the consumer market. Table 5-1 Maximum Transfer Rates of the AES-100’s ADSL Ports STANDARD G.dmt...
Default Settings The default profile always exists and all of the ADSL ports belong to it when the AES-100 is shipped. The default profile's name is set to DEFVAL 5.4.1 Default Profile Settings The following are the settings of the default profile.
ADSL port generates more heat than an operating port. To minimize heat generation and to enhance reliability, remember to disable a port when it is not in use. 5.5.5 Enable Ports Command Syntax: ADSL Configuration AES-100 User’s Guide...
AES-100 User’s Guide 192.168.1.1 adsl> enable ports command forcibly enables all ADSL ports. enable ports The factory default of all ports is disabled. A port must be enabled before data transmission can occur. An enabled but disconnected ADSL port generates more heat than an operating port. To minimize heat generation and to enhance reliability, remember to disable a port when it is not in use.
AES-100 User’s Guide nsec-ds/nsec-us n-eb-ds/n-eb-us n-bbe-ds/n-bbe-us n-es-ds/n-es-us n-ses-ds/n-ses-us non-ses-blks-ds/non-ses-blks-us : 120878/120878 n-uas-ds/n-uas-us fe_loss_seconds/ne_loss_seconds : 0/0 fe_fec_seconds/ne_fec_seconds fast_trains fast_trains_fail These counts contain line performance data that has been accumulated since the system started. In the list above the definitions of near end/far end will always be relative to the ATU-C (ADSL Termination Unit-Central Office).
The minimum acceptable ADSL downstream signal/noise margin (0..31db). The maximum acceptable ADSL upstream signal/noise margin (0..31db). The maximum acceptable ADSL downstream signal/noise margin (0..31db). The minimum ADSL upstream transmission rate in Kbps. The minimum ADSL downstream transmission rate in Kbps. AES-100 User’s Guide...
AES-100 User’s Guide Even though you can specify arbitrary numbers in the of 32 Kbps. If you enter a rate that is not a multiple of 32 Kbps, the actual rate will be the next lower multiple of 32Kbps. For instance, if you specify 60 Kbps for a port, the actual rate for that port will not exceed 32 Kbps, and if you specify 66 Kbps, the actual rate will not be over 64Kbps.
ADSL ports that are assigned to it. ADSL Configuration Port number ranging from 1 to 8. The profile that will define the settings of this port. Operational mode; the available choices are glite, gdmt, t.413 or auto. AES-100 User’s Guide...
AES-100 User’s Guide The mode parameter specifies the standard that this port is allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line. When the mode is set to auto and the negotiated mode is G.lite, if the configured rates exceed those allowed by G.lite, the actual rates are governed by G.lite, regardless of the configured numbers.
VCI setting for the ADSL port for use with Rx based networks settings will be equal to those of either “llc” or “vc” settings will be equal to those of AES-100 User’s Guide if the rx settings <tx vpi> <tx vci>...
AES-100 User’s Guide 5.5.24 Show PVCs command Syntax: 192.168.1.1 adsl> show pvcs command allows you to display the PVC parameters of all ADSL ports. show pvcs 5-12 ADSL Configuration...
When auto-negotiation is turned on, the Ethernet port of the AES-100 negotiates with the peer Ethernet port on the Ethernet cable automatically to determine the optimal connection rate and duplex mode. If the peer Ethernet port does not support auto-negotiation or turns off this feature, the AES-100 determines the connection rate by detecting the signal on the cable and using half duplex mode.
AES-100 User’s Guide <speed> = 10 or 100 This command sets the connection speed used when auto-negotiation is turned off. 10 stands for 10Mbps and 100 stands for 100Mbps. 6.2.4 Status Command Syntax: 192.168.1.1 ethernet> status This command shows the current status of the Ethernet port.
This command saves the bridge configuration into nonvolatile memory. You must use this command to save any configurations that you make, otherwise the AES-100 will return to its default settings when it is restarted. Do not turn off your AES-100 while saving your configuration.
Use MACfilter commands to filter incoming packets based on MAC (Media Access Control) address(es) that you specify. If you do not use this command, your AES-100 will not filter packets. MACfilter commands are listed next. You may specify up to five MAC addresses per port.
Syntax: 192.168.1.1 bridge> mfilter This command displays the multicast filtering database. The mfilter command is what allows you to monitor the AES-100’s IGMP snooping activities. The following is an example of a multicast filtering database. 192.168.1.1 bridge> mfilter Bridge Commands a bridge port number.
2 and so on. The version of IGMP being used in the network. The number of query packets received by the AES-100. The longest period of time used to respond to a query packet, measured in tenths of a second.
Port-Based VLAN Commands The AES-100 VLAN (Virtual Local Area Network) mechanism can be used to limit the broadcast domain to the members of a VLAN group only. In this way, VLAN increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain.
Figure 7-2 Example of Modified VLAN Port 2 The following figure illustrates the 192.168.1.1 bridge> portfilter 3 1 2 command line. Port 3 (ADSL port 2) is able to send to both the Ethernet port and port 2 (ADSL port 1). Bridge Commands AES-100 User’s Guide...
AES-100 User’s Guide Figure 7-3 Example of Modified VLAN Port 3 The following figure illustrates that port 1 (the Ethernet port) is linked to ports 2 (ADSL port 1) and 3 (ADSL port 2). Ports 2 (ADSL port1) and 3 (ADSL port 2) are also linked to each other. Or, in other words, the following figure is a result of the following commands: 192.168.1.1 bridge>...
In this way, the VLAN membership of a frame can be carried across switches. The following table displays the physical port and corresponding default PVID tag on the AES-100. Table 7-1 Physical Ports, Port Numbers and AES-100 Default PVID Tags in Fast Mode PHYSICAL...
LAN bridge. A filtering database consists of a static entries (Static VLAN or SVLAN table) and dynamic entries (Dynamic VLAN or DVLAN table). 8.4.1 Static Entries (SVLAN Table) Static entry registration information is added, modified and removed by management only. IEEE 802.1Q Tagged VLAN Commands 802.1Q Tagged VLAN. AES-100 User’s Guide Chapter 8...
AES-100 User’s Guide 8.4.2 Dynamic Entries (DVLAN Table) Dynamic entries are learned by the bridge and cannot be created or updated by management. The bridge learns this information by observing what port, source address and VLAN ID (or VID) is associated with a frame. Entries are added and deleted using GARP VLAN Registration Protocol (GVRP), where GARP is the Generic Attribute Registration Protocol.
AES-100 User’s Guide 8.5.6 SVLAN Setentry Command Syntax: 192.168.1.1 vlan1q> svlan setentry <vid> <port#> <ad_control> <tag_control> where <vid> <port#> <ad_control> <tag_control> = This command adds or modifies an entry into the static VLAN table. Display your configuration by using the Svlan List command.
AES-100 User’s Guide Forwarding Process Example The switch uses the SVLAN in making frame-forwarding decisions. First the switch checks the MAC address in a frames header against the MAC filtering database. Next the switch checks the VLAN ID (VID) of tagged frames or assigns temporary VIDs to untagged frames (see the PVID Command).
AES-100 User’s Guide The switch sees that port #s 2, 3, 4, 6, 8 and 9 (ADSL ports 1, 2, 3, 5, 7 and 9) are all set to “fixed” and “untag” which means the SVLAN allows the frame to be sent to those ports without a tag.
= [0 - 7], where 0 is the lowest priority and 7 is the highest priority. the regenerated user priority the incoming user priority is mapped to for <port #>. Valid parameter range = [0 - 7], where 0 is the lowest priority and 7 is the highest priority. AES-100 User’s Guide Chapter 9...
Page 66
AES-100 User’s Guide This command sets the mapping of incoming user priority to a regenerated user priority for an ingress port. To display the regeneration table, simply use the Regen Port command without parameters, as shown next. 192.168.1.1 vlan1q> regen port...
Line 2 clears the old parameters of the AES-100. Line 3 allows you to add a new IP address for the AES-100. The MAC address of the AES-100 is displayed in the command prompt. The system will automatically compute the subnet mask when the system is restarted. If you want to specify a subnet manually, add the following two commands before line 4: 192.168.1.1 ip>...
AES-100 User’s Guide For example, if you want the AES-100 to have 172.21.100.1 as the IP address, 255.255.255.0 for the subnet mask and 172.21.100.254 for the default gateway, you may use the following command sequence: 192.168.1.1> ip 192.168.1.1 ip> device delete ether 192.168.1.1 ip>...
Time to Live (optional). This parameter limits the number of hops (routers) that the echo request can travel before it reaches the target. The parameter specifies the size of the payload, that is, not counting the headers, of the echo request. The default size is 32 octets. AES-100 User’s Guide 10-3...
Management by Telnet After you have set up the IP parameters and connected the AES-100 to the network, you can manage it remotely with telnet. You can use any telnet client that you find convenient. The configuration procedures with telnet are exactly the same as those using the direct connection via the console port.
AES-100 User’s Guide An agent is a management software module that resides in a managed device (the AES-100). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the station through which network administrators perform network management functions. It executes operations that control and monitor the managed devices.
This trap is sent when an ADSL port is down. ♦ overheat Trap (defined in ZYXEL-MIB) : This trap is sent when the ADSL Networking Module is overheated. Remote Management AES-100 User’s Guide commands in the SNMP subsystem. After trap config save...
AES-100 User’s Guide ♦ overheatOver Trap (defined in ZYXEL-MIB) : This trap is sent periodically when the ADSL Networking Module is no longer overheated. 11.4.2 Trap Add Command Syntax: 192.168.1.1 snmp> trap add <community> <IP addr> [<port>] where <community> = The password used by the ADSL Networking Module to authenticate itself to the trap server.
You can restore configuration files from your computer to the ADSL Networking Module. Restore the system configuration by following the example shown next. Configuration Backup/Restore Configuration Backup/Restore ftp.exe in Windows) to backup/restore the ADSL Networking Module’s AES-100 User’s Guide Chapter 12 12-1...
Page 76
AES-100 User’s Guide Do not turn off the ADSL Networking Module during the restore process, as it may corrupt the firmware and Connect to the ADSL Networking Module with your favorite FTP client. The command is generally Step 1. C:\> ftp <ADSL Networking Module IP address>...
The command is generally: ftp <ADSL Networking Module IP address> at the computer command prompt. Enter the user name (just press [ENTER]). For example, User: <ENTER> Firmware Upload and Recovery Firmware Upload and Recovery www.zyxel.com AES-100 User’s Guide Chapter 13 every now and then for the latest firmware release. 13-1...
Wait for the update to finish. The ADSL Networking Module restarts automatically. Do not turn off the AES-100 during the updating process, as it may corrupt the firmware and make your unit 13.2 BOOTP/TFTP Firmware Recovery of the ADSL...
IP address (the IP address of this computer), net mask, gateway and filename (the new firmware name) into the appropriate fields in the screen shown next. Click Update Database. Firmware Upload and Recovery Figure 13-1 BOOTP/TFTP Server Figure 13-2 Input MAC AES-100 User’s Guide 13-3...
AES-100 User’s Guide Select Normal Bootp to enable normal BOOTP/TFTP functions. Restart the ADSL Networking Module and press any key within three seconds to get the following screen. SDRAM Testing ... Mac address 00:A0:C5:12:34:56 Press any key within 3 seconds to enter debug mode Press any key at the “Press any key within 3 seconds to enter debug mode...
Page 81
Use the following command sequence on the ADSL Networking Module to write new firmware to flash memory. 192.168.1.1> flashfs 192.168.1.1 flashfs> wipe 192.168.1.1 flashfs> update Wait for the update to complete and then restart the ADSL Networking Module. Firmware Upload and Recovery AES-100 User’s Guide 13-5...
(refer to the Default Settings in the ADSL Configuration chapter of this User’s Guide). Also make sure that it is using RFC-1483 encapsulation, bridge mode and LLC- based multiplexing. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
Table 14-3 Troubleshooting a Non-Constant ADSL LED STEPS Unplug the phone wire coming from the USER port of the AES-100 and connect the user’s ADSL modem or router directly to the USER port of the AES-100 using a different telephone wire.
Table 14-7 Troubleshooting a Remote Server STEPS Refer to Data Transmission in this chapter to make sure that the user is able to transmit to the AES-100. Make sure the gateway’s IP address is the same as the one configured in the user’s computer.
AES-100. If you are attempting to telnet from the Ethernet side of the AES-100, check the Ethernet cable. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
Need help?
Do you have a question about the AES-100 and is the answer not in the manual?
Questions and answers