ZyXEL Communications AES-100 User Manual
ZyXEL Communications AES-100 User Manual

ZyXEL Communications AES-100 User Manual

Adsl-ethernet switch
Hide thumbs Also See for AES-100:
Table of Contents

Advertisement

Quick Links

AES-100
ADSL-Ethernet Switch
August 2001
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AES-100 and is the answer not in the manual?

Questions and answers

Summary of Contents for ZyXEL Communications AES-100

  • Page 1 AES-100 ADSL-Ethernet Switch August 2001 User’s Guide...
  • Page 2: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 3: Zyxel Limited Warranty

    AES-100 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period and upon...
  • Page 4: Interference Statements And Warnings

    AES-100 User’s Guide Interference Statements and Warnings Interference Statement: This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. (2) This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5: Customer Support

    AES-100 User’s Guide Customer Support If you have questions about your ZyXEL product or desire assistance, contact ZyXEL Communications Corporation offices worldwide, in one of the following ways: Contacting Customer Support When you contact your customer support representative, have the following information ready: ♦...
  • Page 6: Table Of Contents

    Interference Statements and Warnings ..............................iv Customer Support ......................................v List of Figures........................................x List of Tables........................................x Preface..........................................xii Chapter 1 Getting to Know the AES-100.............................1-1 1.1 Features .............................1-1 1.2 Benefits.............................. 1-3 1.2.1 MTU Application ........................1-3 1.2.2 ISP Application ...........................1-4 1.2.3 Compact Design for Limited Space....................1-4 1.2.4 Scalable Platform for Future Expansion..................1-4...
  • Page 7 AES-100 User’s Guide 3.4.1 Uptime Command........................3-2 3.4.2 Version Command ........................3-2 3.4.3 Restart Command........................3-3 3.4.4 Passwd Command ........................3-3 3.4.5 Config Print Command........................ 3-3 3.4.6 Config Save Command........................ 3-3 3.4.7 Exit Command ..........................3-3 Chapter 4 ADSL Configuration................................4-1 4.1 ADSL Standards..........................4-1...
  • Page 8 AES-100 User’s Guide 5.3.2 Status Command..........................5-1 Chapter 6 Bridge Configuration................................6-1 6.1 Bridge Port Numbers ...........................6-1 6.2 Port-Based VLAN..........................6-1 6.2.1 Default Settings of Port-Based VLAN...................6-1 6.3 Bridge Commands..........................6-2 6.3.1 Device Command ........................6-2 6.3.2 Filter Command...........................6-2 6.3.3 Filterage Command........................6-2 6.3.4 Flush Command...........................6-3 6.3.5 Info Command..........................6-3...
  • Page 9 8.4.4 Trap Flush Command........................8-5 8.4.5 Trap List Command ........................8-5 Chapter 9 Configuration Backup/Restore............................9-1 9.1 Configuration Files of the AES-100 .......................9-1 9.2 Control Files Used In TFTP Operation ....................9-1 9.3 Configuration Backup ..........................9-2 9.4 Configuration Restore..........................9-2 Chapter 10 Firmware Upload .................................10-1 10.1...
  • Page 10 Figure 1-2 ISP Application.....................................1-4 Figure 2-1 AES-100 Front Panel ...................................2-2 Figure 2-2 AES-100 Rear Panel AC Power Version ..........................2-3 Figure 2-3 AES-100 Rear Panel DC Power Version ..........................2-3 Figure 2-4 Connecting the Power Cord to the AES -100 and a Power Source..................2-4 Figure 6-1 Default VLAN Settings ................................6-2...
  • Page 11 AES-100 User’s Guide Table 11-8 Troubleshooting the SNMP Server ............................11-3 Table 11-9 Troubleshooting Telnet................................11-4 Table of Contents...
  • Page 12: Preface

    AES-100 User’s Guide Preface Congratulations on your purchase of the AES-100 ADSL-Ethernet Switch. This preface introduces you to the AES-100 and discusses the organization and conventions of this user’s guide. It also provides information on other related documentation. About the AES-100 The AES-100 is an ADSL (Asymmetrical Digital Subscriber Line) to Ethernet switch.
  • Page 13: Chapter 1 Getting To Know The Aes-100

    The integrated splitters eliminate the need to use external splitters to separate voice-band and ADSL signals. 10 Mbps Ethernet Port This 10 Mbps Ethernet port connects the AES-100 to an Ethernet network. With Ethernet as the backbone, you can create a network that provides ADSL service to hundreds of subscribers.
  • Page 14 SNMP manageable • Text-based management locally via console port and remotely via telnet • TFTP (Trivial File Transfer Protocol) for transferring firmware and configuration files Security • Password protection for system management • Port-based VLAN Getting to Know the AES-100...
  • Page 15: Benefits

    A tenant connects a computer to the phone line in a unit using an ADSL modem. The other end of the phone line is connected to a port on the AES-100. The AES-100 aggregates the traffic from the tenants to the Ethernet port and forwards it to a router.
  • Page 16: Isp Application

    ISP Application The AES-100 can also be used by an Internet Service Provider (ISP) as an IP DSLAM. The AES-100 terminates all of the ADSL ATM circuits and converts the traffic to IP packets. All IP traffic goes directly to the ISP’s internal Ethernet network, before being routed to the Internet.
  • Page 17: Power Consumption

    Power Consumption • 80 watts maximum • 100 - 240 VAC, 50/60 Hz Operating Environment • Temperature: 0 - 50°C; Humidity: 20% - 95% Storage Environment • Temperature: -30 - 60°C; Humidity: 20% - 95% Getting to Know the AES-100...
  • Page 19: Chapter 2 Hardware Overview

    This chapter gives a brief introduction to the AES-100 hardware. Unpacking the AES-100 Before installing, check to see that all the components of the AES-100 are included in the package. Additional Installation Requirements In addition to the contents of the package, you need the following hardware and software components before you install and use your product: •...
  • Page 20: Front Panel Ports

    For the initial configuration, you need to use terminal emulator software on a computer and connect it to the AES- 100 through the console port. Connect the male 9-pin end of the console cable to the console port of the AES-100.
  • Page 21: Adsl Port Connections

    ADSL Port Connections The line from the user carries both the ADSL and the voice signals. For each line, the AES-100 has a built-in splitter that separates the high frequency ADSL signal from the voice band signal and feeds the ADSL signal to the AES-100, while the voice band signal is diverted to the CO port.
  • Page 22: Figure 2-4 Connecting The Power Cord To The Aes-100 And A Power Source

    AES-100 User’s Guide Connect the female end of the power cord to the power receptacle on the rear panel of your AES-100 (just to the right of the warning sticker) as seen next. Connect the other end of the cord to a power outlet. Make sure that no objects obstruct the airflow of the fans (located on the side of the unit).
  • Page 23: Chapter 3 Software Configuration

    This section describes the general software configuration of the AES-100 through the command line interface. Command Line Interface The AES-100 uses text command lines as the user interface for software configuration. Before discussing the details of configuration, the rules of the commands are listed below. 1. The command keywords are in regular font.
  • Page 24: Command Structure

    AES-100 User’s Guide Command Structure The system uses a two-level command structure. The commands related to one subsystem are grouped under a primary command of that subsystem, e.g., to configure the ADSL parameters, you must first ente r the ADSL subsystem by entering the command.
  • Page 25: Restart Command

    You must use this config save command to save any configurations that you make, otherwise the AES-100 will return to its default settings when it is restarted. 3.4.7 Exit Command...
  • Page 27: Chapter 4 Adsl Configuration

    The ADSL (Asymmetrical Digital Subscriber Line) subsystem allows you to configure and monitor the ADSL ports. ADSL Standards The AES-100 supports both the G.lite and the G.dmt standards. G.lite is intended to minimize the cost for the consumer market. Table 4-1 ADSL Standards...
  • Page 28: Adsl Commands

    AES-100 User’s Guide Enable/Disable State: disabled Maximum upstream speed: 512 Kbps Maximum downstream speed: 2048 Kbps Operational mode: auto ADSL Commands 4.4.1 Config Save Command Syntax: config save command saves the ADSL configuration into nonvolatile memory. config save 4.4.2 Disable Port Command Syntax: disable port <port number>...
  • Page 29: Enable Port Command

    AES-100 User’s Guide 4.4.4 Enable Port Command Syntax: enable port <port number> where <port number> = port number, from 1 to 8 command forcibly enables the specified ADSL port. enable port The factory default of all ports is disabled. A port must be enabled before data transmission can occur.
  • Page 30: Lineinfo Command

    AES-100 User’s Guide tone 128-159: 44 44 44 34 44 34 43 44 33 43 34 33 33 33 33 34 tone 160-191: 43 33 33 34 34 33 23 33 33 33 22 33 33 33 33 33 tone 192-223: 33 33 33 23 22 33 33 33 23 33 33 33 22 23 22 32...
  • Page 31: Lineperf Command

    AES-100 User’s Guide Total Transceiver Output Power Current ATUR Information: Country code 0 Provider Code 01020304 Capabilities: g.dmt POTS overlap (Annex A) The results contain the operating modes, interleave delay, parity byte assignment, parity bytes per codeword, symbols per codeword and interleave depth. Current ATUR Information contains data acquired from the ATU-R (stands for ADSL Termination Unit –...
  • Page 32: Linerate Command

    AES-100 User’s Guide fe_loss_seconds/ne_loss_seconds : 0/0 fe_fec_seconds/ne_fec_seconds : 0/0 fast_trains fast_trains_fail These counts contain line performance data that has been accumulated since the system started. In the list above the definitions of near end/far end will always be relative to the ATU-C. Downstream (ds) refers to data from the ATU-C and upstream (us) refers to data from the ATU-R.
  • Page 33: 4.4.11 List Ports Command

    66 Kbps, the actual speed will not be over 64Kbps. The mode parameter specifies the standard that this port is allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line.
  • Page 34: 4.4.14 Show Port Command

    ADSL ports. Note that the upstream speed must be less than or equal to the downstream speed. The mode parameter specifies the standard that the ports are allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line.
  • Page 35: 10 Mbps Ethernet Port Configuration

    The Ethernet subsystem allows you to configure and monitor the 10 Mbps Ethernet port. 10 Mbps Ethernet The AES-100 supports 10 Mbps Ethernet. In a 10 Mbps Ethernet, the duplex mode can be half duplex or full duplex. The Ethernet port uses the pre-configured duplex mode setting when making a connection, thus requiring you to check the setting of the peer Ethernet port in order to connect.
  • Page 36 AES-100 User’s Guide 10 Mbps Ethernet Port Configuration...
  • Page 37: Chapter 6 Bridge Configuration

    Bridge Port Numbers The bridge subsystem of the AES-100 defines its own numbering convention for ports. The bridge has a total of nine ports; bridge port 1 stands for Ethernet port, bridge port 2 stands for ADSL port 1, bridge port 3 stands for ADSL port 2, and so on.
  • Page 38: Bridge Commands

    Bridge port 9 (ADSL port 8) allowed to bridge port 1 (Ethernet port) only It is recommended that you do not alter these settings, or the AES-100 may not work correctly. The default VLAN settings allow each ADSL port to communicate back and forth with only the Ethernet port, and not with other ADSL ports.
  • Page 39: Flush Command

    AES-100 User’s Guide command sets or shows the aging out timer period of the filtering database. It is recommended filterage that you use the default setting. If the time interval is reduced to a setting that is too short, it could increase broadcast traffic and reduce the available bandwidth.
  • Page 40 AES-100 User’s Guide command sets or displays the port-based VLAN configuration. portfilter An example is shown next. 192.168.1.1 > bridge 192.168.1.1 bridge> portfilter Port 1 (edd): Port 2 (bun/port=atm:0/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 3 (bun/port=atm:1/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 4 (bun/port=atm:2/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 5 (bun/port=atm:3/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 6 (bun/port=atm:4/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33):...
  • Page 41: Figure 6-2 Example Of Modified Vlan Port 1

    AES-100 User’s Guide The following figures illustrate the above example. Notice that ports 2 (ADSL port 1) and 3 (ADSL port 2) are able to communicate with each other, as well as with the Ethernet. All of the other ports will only be able to communicate with the Ethernet port.
  • Page 42: Figure 6-5 Example Of Modified Vlan Settings

    AES-100 User’s Guide Figure 6-4 Example of Modified VLAN Port 3 This figure illustrates the fact that port 1 (the Ethernet port) is linked to ports 2 (ADSL port 1) and 3 (ADSL port 2). Ports 2 (ADSL port1) and 3 (ADSL port 2) are also linked to each other.
  • Page 43: Chapter 7 Ip Configuration

    Line 2 clears the old parameters of the AES-100. Line 3 adds the new IP address for the AES-100. The system will automatically compute the subnet mask when the system is restarted. If you want to specify a subnet manually, add the following two commands before line 4: 3.1 192.168.1.1 ip>...
  • Page 44: General Ip Commands

    AES-100 User’s Guide Line 7 tells the system to restart, in order to make the IP address configuration take effect. The AES-100 does not need to be restarted after configuration of other items. For example, if you want the AES-100 to have 172.21.100.1 as the IP address, 255.255.255.0 for the subnet mask and 172.21.100.254 for the default gateway, you may use the following command sequence:...
  • Page 45: Ping Command

    AES-100 User’s Guide 7.2.2 Ping Command Syntax: ping <host> [<ttl> [<size>]] This is an IP facility to check for network functionality by sending an echo request to another IP host and waiting for the reply. The parameter specifies the IP address of the target. The optional...
  • Page 47: Chapter 8 Remote Management

    Management by Telnet After you have set up the IP parameters and connected the AES-100 to the network, you can manage it remotely with telnet. You can use any telnet client that you find convenient. The configuration procedures with telnet are exactly the same as those using the direct connection via the console port.
  • Page 48: Supported Mibs

    An SNMP managed network consists of two main component types: agents and a manager. An agent is a management software module that resides in a managed device (the AES-100). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the station through which network administrators perform network management functions.
  • Page 49: Snmp Access Delete Command

    This command shows the allowed access. SNMP Trap Configuration The AES-100 uses the SNMP trapping facility to proactively report unusual events to one or more trap servers. To configure the trap parameters, use the commands in the SNMP subsystem. After configuring the SNMP...
  • Page 50 AES-100 User’s Guide ♦ coldStart Trap (defined in RFC-1215) : This trap is sent at system start-up. ♦ authenticationFailure Trap (defined in RFC-1215) : This trap is sent if a request arrives with an invalid community string. ♦ linkUp Trap (defined in RFC-1215) : This trap is sent when an ADSL port is up.
  • Page 51: Trap Add Command

    Trap Add Command Syntax: trap add <community> <IP addr> [<port>] where The password used by the AES-100 to authenticate itself to the trap server. <community> = The IP address of the trap server. <IP addr> = The optional port parameter is for specifying the UDP port number on the [<Port>] =...
  • Page 53: Configuration Backup/Restore

    AES-100 unusable. Configuration Files of the AES-100 The AES-100 uses configuration files to store the user’s settings, so they can be applied the next time the A ES- 100 is booted. The AES-100 has the following seven important configuration files: The configuration file for ADSL ports.
  • Page 54: Configuration Backup

    AES-100 User’s Guide Configuration Backup You can backup all or some configuration files from the AES-100 to your computer. For example, to backup the configuration of ADSL ports and IP settings, the procedure on your computer is as follows: Connect to the AES-100 with your favorite TFTP client. The command is generally Step 1.
  • Page 55 AES-100 User’s Guide tftp> put initadsl tftp> put resolve tftp> put tftpupdt.end where The file that contains the SNMP write community string (password). tftplock.key = An empty file (with no content). Marks the beginning of the restore tftpupdt.beg = process, used only in restoration.
  • Page 57: Chapter 10 Firmware Upload

    The AES-100 has two ways to update firmware; one is done through BOOTP/TFTP and the other uses TFTP. The differences between these two methods are as follows: ♦ Update timing: A BOOTP/TFTP update is done when the AES-100 is restarted, while a TFTP update is done during operation.
  • Page 58: Figure 10-1 Bootp/Tftp Server

    AES-100 User’s Guide Connect your AES-100’s console port to a computer’s serial port with an RS-232 cable. Step 2. Run any terminal emulation program, e.g., Windows’ built-in HyperTerminal, with the following Step 3. parameters: VT100 terminal emulation 9600 bps No parity, 8 data bits, 1 stop bit No flow control Run BootpTftp.exe, to bring up the following window.
  • Page 59: Figure 10-2 Input Mac

    Click the New button to create a MAC address entry. The Input Box window will pop up as shown next. Step 5. Input the MAC address of the AES-100 and then click OK. You can find the MAC address of the AES- Step 6.
  • Page 60: Figure 10-3 Database Edit Dialog

    Choose Normal Bootp to enable normal BOOTP/TFTP functions. Step 8. Figure 10-4 Enable BOOTP/TFTP Restart the AES-100 and press any key within three seconds to get the following console window: Step 9. SDRAM Testing . . . AES-100 Boot Loader, Feb 7 2001 12:06:03 Copyright ©...
  • Page 61: Tftp Firmware Update On The Aes-100

    To update the firmware, first download it from the ZyXEL web site and store it on your computer. You can use any TFTP client to connect to the AES-100. The procedure for TFTP update is similar to the procedure for restoring configuration.
  • Page 63: Chapter 11 Troubleshooting

    (refer to the Default Settings in the ADSL Configuration chapter of this User’s Guide). Also make sure that it is using RFC-1483 encapsulation, bridge mode and LLC- based multiplexing. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
  • Page 64: Adsl Led(S) Turn On And Off

    STEPS CORRECTIVE ACTION Unplug the phone wire coming from the USER port of the AES-100 and connect the user’s ADSL modem or router directly to the USER port of the AES-100 using a different telephone wire. If the ADSL LED stays on, check for a problem with the building’s phone wire.
  • Page 65: Password

    STEPS CORRECTIVE ACTION Refer to Data Transmission in this chapter to make sure that the user is able to transmit to the AES-100. Make sure the gateway’s IP address is the same as the one configured in the user’s computer.
  • Page 66: Telnet

    AES-100. If you are attempting to telnet from the Ethernet side of the AES-100, check the Ethernet cable. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
  • Page 67: Index

    AES-100 User’s Guide Index Connections AC INPUT ................2-4 ADSL Port ................2-3 Access Flush Command............8-3 Contacting Customer Support ..........v Access List Command ............8-3 Copyright ..................ii Actual Speed ................4-1 Customer Support ..............v ADSL Configuration ............. 4-1 ADSL standards ..........4-1, 5-1, 6-2, 6-3 Declaration of Conformity............
  • Page 68 AES-100 User’s Guide General IP Commands......7-2, 9-1, 9-2, 10-1, 10-5 GetNext ................8-2, 8-3 parity byte assignment ............4-4 glite ..................4-6, 4-7 parity bytes per codeword............. 4-4 Passwd Command ..............3-2 Help Facility................3-2 Password.................. 8-2 Ping Command............... 7-2 interleave delay ............... 4-4 Port -Based VLAN..............
  • Page 69 AES-100 User’s Guide Statistics Command ............... 7-2 upstream (us) ................4-5 Syntax Conventions ..............xi Uptime Command ..............3-2 System Commands..............3-2 USER port ................2-3 Telnet ..................8-1 Vendor ID ................4-4 Terminal Emulation............2-1, 3-1 Version Command............3-2, 7-3 TFTP ................10-1, 10-5 Version Number ..............4-4 TFTP ..................

Table of Contents