ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
AES-100 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period and upon...
AES-100 User’s Guide Interference Statements and Warnings Interference Statement: This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference. (2) This device must accept any interference received, including interference that may cause undesired operations.
AES-100 User’s Guide Customer Support If you have questions about your ZyXEL product or desire assistance, contact ZyXEL Communications Corporation offices worldwide, in one of the following ways: Contacting Customer Support When you contact your customer support representative, have the following information ready: ♦...
Interference Statements and Warnings ..............................iv Customer Support ......................................v List of Figures........................................x List of Tables........................................x Preface..........................................xii Chapter 1 Getting to Know the AES-100.............................1-1 1.1 Features .............................1-1 1.2 Benefits.............................. 1-3 1.2.1 MTU Application ........................1-3 1.2.2 ISP Application ...........................1-4 1.2.3 Compact Design for Limited Space....................1-4 1.2.4 Scalable Platform for Future Expansion..................1-4...
Page 9
8.4.4 Trap Flush Command........................8-5 8.4.5 Trap List Command ........................8-5 Chapter 9 Configuration Backup/Restore............................9-1 9.1 Configuration Files of the AES-100 .......................9-1 9.2 Control Files Used In TFTP Operation ....................9-1 9.3 Configuration Backup ..........................9-2 9.4 Configuration Restore..........................9-2 Chapter 10 Firmware Upload .................................10-1 10.1...
Page 10
Figure 1-2 ISP Application.....................................1-4 Figure 2-1 AES-100 Front Panel ...................................2-2 Figure 2-2 AES-100 Rear Panel AC Power Version ..........................2-3 Figure 2-3 AES-100 Rear Panel DC Power Version ..........................2-3 Figure 2-4 Connecting the Power Cord to the AES -100 and a Power Source..................2-4 Figure 6-1 Default VLAN Settings ................................6-2...
Page 11
AES-100 User’s Guide Table 11-8 Troubleshooting the SNMP Server ............................11-3 Table 11-9 Troubleshooting Telnet................................11-4 Table of Contents...
AES-100 User’s Guide Preface Congratulations on your purchase of the AES-100 ADSL-Ethernet Switch. This preface introduces you to the AES-100 and discusses the organization and conventions of this user’s guide. It also provides information on other related documentation. About the AES-100 The AES-100 is an ADSL (Asymmetrical Digital Subscriber Line) to Ethernet switch.
The integrated splitters eliminate the need to use external splitters to separate voice-band and ADSL signals. 10 Mbps Ethernet Port This 10 Mbps Ethernet port connects the AES-100 to an Ethernet network. With Ethernet as the backbone, you can create a network that provides ADSL service to hundreds of subscribers.
Page 14
SNMP manageable • Text-based management locally via console port and remotely via telnet • TFTP (Trivial File Transfer Protocol) for transferring firmware and configuration files Security • Password protection for system management • Port-based VLAN Getting to Know the AES-100...
A tenant connects a computer to the phone line in a unit using an ADSL modem. The other end of the phone line is connected to a port on the AES-100. The AES-100 aggregates the traffic from the tenants to the Ethernet port and forwards it to a router.
ISP Application The AES-100 can also be used by an Internet Service Provider (ISP) as an IP DSLAM. The AES-100 terminates all of the ADSL ATM circuits and converts the traffic to IP packets. All IP traffic goes directly to the ISP’s internal Ethernet network, before being routed to the Internet.
This chapter gives a brief introduction to the AES-100 hardware. Unpacking the AES-100 Before installing, check to see that all the components of the AES-100 are included in the package. Additional Installation Requirements In addition to the contents of the package, you need the following hardware and software components before you install and use your product: •...
For the initial configuration, you need to use terminal emulator software on a computer and connect it to the AES- 100 through the console port. Connect the male 9-pin end of the console cable to the console port of the AES-100.
ADSL Port Connections The line from the user carries both the ADSL and the voice signals. For each line, the AES-100 has a built-in splitter that separates the high frequency ADSL signal from the voice band signal and feeds the ADSL signal to the AES-100, while the voice band signal is diverted to the CO port.
AES-100 User’s Guide Connect the female end of the power cord to the power receptacle on the rear panel of your AES-100 (just to the right of the warning sticker) as seen next. Connect the other end of the cord to a power outlet. Make sure that no objects obstruct the airflow of the fans (located on the side of the unit).
This section describes the general software configuration of the AES-100 through the command line interface. Command Line Interface The AES-100 uses text command lines as the user interface for software configuration. Before discussing the details of configuration, the rules of the commands are listed below. 1. The command keywords are in regular font.
AES-100 User’s Guide Command Structure The system uses a two-level command structure. The commands related to one subsystem are grouped under a primary command of that subsystem, e.g., to configure the ADSL parameters, you must first ente r the ADSL subsystem by entering the command.
You must use this config save command to save any configurations that you make, otherwise the AES-100 will return to its default settings when it is restarted. 3.4.7 Exit Command...
The ADSL (Asymmetrical Digital Subscriber Line) subsystem allows you to configure and monitor the ADSL ports. ADSL Standards The AES-100 supports both the G.lite and the G.dmt standards. G.lite is intended to minimize the cost for the consumer market. Table 4-1 ADSL Standards...
AES-100 User’s Guide Enable/Disable State: disabled Maximum upstream speed: 512 Kbps Maximum downstream speed: 2048 Kbps Operational mode: auto ADSL Commands 4.4.1 Config Save Command Syntax: config save command saves the ADSL configuration into nonvolatile memory. config save 4.4.2 Disable Port Command Syntax: disable port <port number>...
AES-100 User’s Guide 4.4.4 Enable Port Command Syntax: enable port <port number> where <port number> = port number, from 1 to 8 command forcibly enables the specified ADSL port. enable port The factory default of all ports is disabled. A port must be enabled before data transmission can occur.
AES-100 User’s Guide Total Transceiver Output Power Current ATUR Information: Country code 0 Provider Code 01020304 Capabilities: g.dmt POTS overlap (Annex A) The results contain the operating modes, interleave delay, parity byte assignment, parity bytes per codeword, symbols per codeword and interleave depth. Current ATUR Information contains data acquired from the ATU-R (stands for ADSL Termination Unit –...
AES-100 User’s Guide fe_loss_seconds/ne_loss_seconds : 0/0 fe_fec_seconds/ne_fec_seconds : 0/0 fast_trains fast_trains_fail These counts contain line performance data that has been accumulated since the system started. In the list above the definitions of near end/far end will always be relative to the ATU-C. Downstream (ds) refers to data from the ATU-C and upstream (us) refers to data from the ATU-R.
66 Kbps, the actual speed will not be over 64Kbps. The mode parameter specifies the standard that this port is allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line.
ADSL ports. Note that the upstream speed must be less than or equal to the downstream speed. The mode parameter specifies the standard that the ports are allowed. When set to auto, the AES-100 follows whatever mode is set on the other end of the line.
The Ethernet subsystem allows you to configure and monitor the 10 Mbps Ethernet port. 10 Mbps Ethernet The AES-100 supports 10 Mbps Ethernet. In a 10 Mbps Ethernet, the duplex mode can be half duplex or full duplex. The Ethernet port uses the pre-configured duplex mode setting when making a connection, thus requiring you to check the setting of the peer Ethernet port in order to connect.
Page 36
AES-100 User’s Guide 10 Mbps Ethernet Port Configuration...
Bridge Port Numbers The bridge subsystem of the AES-100 defines its own numbering convention for ports. The bridge has a total of nine ports; bridge port 1 stands for Ethernet port, bridge port 2 stands for ADSL port 1, bridge port 3 stands for ADSL port 2, and so on.
Bridge port 9 (ADSL port 8) allowed to bridge port 1 (Ethernet port) only It is recommended that you do not alter these settings, or the AES-100 may not work correctly. The default VLAN settings allow each ADSL port to communicate back and forth with only the Ethernet port, and not with other ADSL ports.
AES-100 User’s Guide command sets or shows the aging out timer period of the filtering database. It is recommended filterage that you use the default setting. If the time interval is reduced to a setting that is too short, it could increase broadcast traffic and reduce the available bandwidth.
Page 40
AES-100 User’s Guide command sets or displays the port-based VLAN configuration. portfilter An example is shown next. 192.168.1.1 > bridge 192.168.1.1 bridge> portfilter Port 1 (edd): Port 2 (bun/port=atm:0/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 3 (bun/port=atm:1/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 4 (bun/port=atm:2/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 5 (bun/port=atm:3/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33): Port 6 (bun/port=atm:4/rfc1483=true/txvpi=0/txvci=33/rxvpi=0/rxvci=33):...
AES-100 User’s Guide The following figures illustrate the above example. Notice that ports 2 (ADSL port 1) and 3 (ADSL port 2) are able to communicate with each other, as well as with the Ethernet. All of the other ports will only be able to communicate with the Ethernet port.
AES-100 User’s Guide Figure 6-4 Example of Modified VLAN Port 3 This figure illustrates the fact that port 1 (the Ethernet port) is linked to ports 2 (ADSL port 1) and 3 (ADSL port 2). Ports 2 (ADSL port1) and 3 (ADSL port 2) are also linked to each other.
Line 2 clears the old parameters of the AES-100. Line 3 adds the new IP address for the AES-100. The system will automatically compute the subnet mask when the system is restarted. If you want to specify a subnet manually, add the following two commands before line 4: 3.1 192.168.1.1 ip>...
AES-100 User’s Guide Line 7 tells the system to restart, in order to make the IP address configuration take effect. The AES-100 does not need to be restarted after configuration of other items. For example, if you want the AES-100 to have 172.21.100.1 as the IP address, 255.255.255.0 for the subnet mask and 172.21.100.254 for the default gateway, you may use the following command sequence:...
AES-100 User’s Guide 7.2.2 Ping Command Syntax: ping <host> [<ttl> [<size>]] This is an IP facility to check for network functionality by sending an echo request to another IP host and waiting for the reply. The parameter specifies the IP address of the target. The optional...
Management by Telnet After you have set up the IP parameters and connected the AES-100 to the network, you can manage it remotely with telnet. You can use any telnet client that you find convenient. The configuration procedures with telnet are exactly the same as those using the direct connection via the console port.
An SNMP managed network consists of two main component types: agents and a manager. An agent is a management software module that resides in a managed device (the AES-100). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the station through which network administrators perform network management functions.
This command shows the allowed access. SNMP Trap Configuration The AES-100 uses the SNMP trapping facility to proactively report unusual events to one or more trap servers. To configure the trap parameters, use the commands in the SNMP subsystem. After configuring the SNMP...
Page 50
AES-100 User’s Guide ♦ coldStart Trap (defined in RFC-1215) : This trap is sent at system start-up. ♦ authenticationFailure Trap (defined in RFC-1215) : This trap is sent if a request arrives with an invalid community string. ♦ linkUp Trap (defined in RFC-1215) : This trap is sent when an ADSL port is up.
Trap Add Command Syntax: trap add <community> <IP addr> [<port>] where The password used by the AES-100 to authenticate itself to the trap server. <community> = The IP address of the trap server. <IP addr> = The optional port parameter is for specifying the UDP port number on the [<Port>] =...
AES-100 unusable. Configuration Files of the AES-100 The AES-100 uses configuration files to store the user’s settings, so they can be applied the next time the A ES- 100 is booted. The AES-100 has the following seven important configuration files: The configuration file for ADSL ports.
AES-100 User’s Guide Configuration Backup You can backup all or some configuration files from the AES-100 to your computer. For example, to backup the configuration of ADSL ports and IP settings, the procedure on your computer is as follows: Connect to the AES-100 with your favorite TFTP client. The command is generally Step 1.
Page 55
AES-100 User’s Guide tftp> put initadsl tftp> put resolve tftp> put tftpupdt.end where The file that contains the SNMP write community string (password). tftplock.key = An empty file (with no content). Marks the beginning of the restore tftpupdt.beg = process, used only in restoration.
The AES-100 has two ways to update firmware; one is done through BOOTP/TFTP and the other uses TFTP. The differences between these two methods are as follows: ♦ Update timing: A BOOTP/TFTP update is done when the AES-100 is restarted, while a TFTP update is done during operation.
AES-100 User’s Guide Connect your AES-100’s console port to a computer’s serial port with an RS-232 cable. Step 2. Run any terminal emulation program, e.g., Windows’ built-in HyperTerminal, with the following Step 3. parameters: VT100 terminal emulation 9600 bps No parity, 8 data bits, 1 stop bit No flow control Run BootpTftp.exe, to bring up the following window.
Click the New button to create a MAC address entry. The Input Box window will pop up as shown next. Step 5. Input the MAC address of the AES-100 and then click OK. You can find the MAC address of the AES- Step 6.
To update the firmware, first download it from the ZyXEL web site and store it on your computer. You can use any TFTP client to connect to the AES-100. The procedure for TFTP update is similar to the procedure for restoring configuration.
(refer to the Default Settings in the ADSL Configuration chapter of this User’s Guide). Also make sure that it is using RFC-1483 encapsulation, bridge mode and LLC- based multiplexing. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
STEPS CORRECTIVE ACTION Unplug the phone wire coming from the USER port of the AES-100 and connect the user’s ADSL modem or router directly to the USER port of the AES-100 using a different telephone wire. If the ADSL LED stays on, check for a problem with the building’s phone wire.
STEPS CORRECTIVE ACTION Refer to Data Transmission in this chapter to make sure that the user is able to transmit to the AES-100. Make sure the gateway’s IP address is the same as the one configured in the user’s computer.
AES-100. If you are attempting to telnet from the Ethernet side of the AES-100, check the Ethernet cable. Make sure that the device type of the AES-100’s IP address is set to bridge (refer to the Setting IP Address section).
Need help?
Do you have a question about the AES-100 and is the answer not in the manual?
Questions and answers