Sign In
Upload
Manuals
Brands
Dasan Networks Manuals
Network Hardware
V5812G
Dasan Networks V5812G GPON OLT System Manuals
Manuals and User Guides for Dasan Networks V5812G GPON OLT System. We have
1
Dasan Networks V5812G GPON OLT System manual available for free PDF download: User Manual
Dasan Networks V5812G User Manual (565 pages)
GPON OLT system
Brand:
Dasan Networks
| Category:
Network Hardware
| Size: 8.49 MB
Table of Contents
Table of Contents
4
1 Introduction
25
Audience
25
Document Structure
25
Tab. 1.1 Overview of Chapters
25
Document Convention
26
Document Notation
26
Tab. 1.2 Command Notation of Guide Book
26
Virus Protection
27
GPL/LGPL Warranty and Liability Exclusion
27
2 System Overview
29
Fig. 2.1 V5812G
29
System Features
30
3 Command Line Interface (CLI)
33
Configuration Mode
33
Privileged EXEC View Mode
34
Privileged EXEC Enable Mode
34
Tab. 3.1 Main Command of Privileged EXEC View Mode
34
Tab. 3.2 Main Command of Privileged EXEC Enable Mode
34
Global Configuration Mode
35
Bridge Configuration Mode
35
Tab. 3.3 Main Command of Global Configuration Mode
35
DHCP Pool Configuration Mode
36
DHCP Option Configuration Mode
36
Tab. 3.4 Main Command of Bridge Configuration Mode
36
Tab. 3.5 Main Command of DHCP Pool Configuration Mode
36
DHCP Option 82 Configuration Mode
37
Interface Configuration Mode
37
Tab. 3.6 Main Command of DHCP Option Configuration Mode
37
Tab. 3.7 Main Command of DHCP Option 82 Configuration Mode
37
Rule Configuration Mode
38
RMON Configuration Mode
38
Tab. 3.8 Main Command of Interface Configuration Mode
38
Tab. 3.9 Main Command of Rule Configuration Mode
38
Router Configuration Mode
39
Route-Map Configuration Mode
39
Tab. 3.10 Main Command of RMON Configuration Mode
39
Tab. 3.11 Main Command of Router Configuration Mode
39
GPON Configuration Mode
40
GPON-OLT Configuration Mode
40
ONU Profile Configuration Mode
40
Tab. 3.12 Main Command of Route-Map Configuration Mode
40
Tab. 3.13 Main Command of GPON-OLT Configuration Mode
40
Configuration Mode Overview
41
Fig. 3.1 Overview of Configuration Mode
41
Tab. 3.14 Main Command of ONU Profile Configuration Mode
41
Useful Tips
42
Listing Available Command
42
Calling Command History
44
Using Abbreviation
45
Tab. 3.15 Command Abbreviation
45
Using Command of Privileged EXEC Enable Mode
46
Exit Current Command Mode
46
4 System Connection and IP Address
47
System Connection
47
System Login
47
Password for Privileged EXEC Enable Mode
48
Changing Login Password
49
Management for System Account
49
Creating System Account
49
Security Level
50
Limiting Number of Users
54
Auto Log-Out
54
Telnet Access
54
System Rebooting
55
Manual System Rebooting
55
Auto Reset Configuration
56
CPU Load
56
Memory
56
Network Connection
57
System Authentication
59
Authentication Method
59
Authentication Interface
59
Primary Authentication Method
60
RADIUS Server
60
RADIUS Server for System Authentication
60
RADIUS Server Priority
60
Frequency of Retransmit
61
Timeout of Authentication Request
61
TACACS+ Server
61
TACACS+ Server for System Authentication
61
TACACS+ Server Priority
61
Additional TACACS+ Configuration
62
Timeout of Authentication Request
62
Accounting Mode
63
Displaying System Authentication
63
Configuring Interface
64
Enabling Interface
64
Assigning IP Address to Network Interface
65
Static Route and Default Gateway
65
Interface Description
66
Displaying Interface
67
Secure Shell (SSH)
68
SSH Server
68
Disconnecting SSH Client
68
Displaying On-Line SSH Client
68
Enabling SSH Server
68
Assigning Specific Authentication Key
69
Displaying Connection History of SSH Client
69
SSH Client
69
Login to SSH Server
69
Secured File Copy
69
Authentication Key
70
Authentication
71
Fig. 4.1 Process of 802.1X Authentication
71
Authentication
72
Enabling 802.1X
72
RADIUS Server
72
Fig. 4.2 Multiple Authentication Servers
72
Authentication Mode
73
Authentication Port
74
Force Authorization
74
Interval for Retransmitting Request/Identity Packet
74
Number of Requests to RADIUS Server
74
Interval of Request to RADIUS Server
75
Re-Authentication
75
Enabling 802.1X Re-Authentication
75
Interval of Re-Authentication
76
Interval of Requesting Re-Authentication
76
Re-Authentication
76
Displaying 802.1X Configuration
77
Initializing Authentication Status
77
Restoring Default Value
77
User Authentication Statistics
77
Sample Configuration
78
5 Port Configuration
79
Port Basic
79
Selecting Port Type
79
Ethernet Port Configuration
79
Enabling Ethernet Port
79
Auto-Negotiation
80
Transmit Rate
80
Duplex Mode
81
Flow Control
81
Port Description
81
Traffic Statistics
82
CPU Statistics
82
Packet Statistics
82
Protocol Statistics
84
Port Information
84
Port Mirroring
85
Fig. 5.1 Port Mirroring
85
6 System Environment
87
Environment Configuration
87
Host Name
87
Time and Date
87
Time Zone
88
Tab. 6.1 World Time Zone
88
Network Time Protocol (NTP)
89
Simple Network Time Protocol (SNTP)
89
Terminal Configuration
91
Login Banner
91
DNS Server
91
Fan Operation
92
Disabling Daemon Operation
92
FTP Server
93
FTP Bind Address
93
System Threshold
94
CPU Load
94
Port Traffic
94
Fan Operation
95
System Memory
96
System Temperature
96
System/Sfp Module Operation
96
Enabling DDM
97
Configuration Management
98
Displaying System Configuration
98
Writing System Configuration
98
Auto-Saving
99
System Configuration File
99
Restoring Default Configuration
100
Core Dump File
101
System Management
102
Network Connection
102
Tab. 6.2 Options for Ping for Multiple IP Addresses
103
IP ICMP Source Routing
104
Fig. 6.1 Ping Test for Network Status
104
Tracing Packet Route
105
Fig. 6.2 IP Source Routing
105
Displaying User Connecting to System
106
Tab. 6.3 Options for Tracing Packet Route
106
MAC Table
107
System Running Time
107
System Information
107
System Memory Information
108
CPU Packet Limit
108
Running Process
108
Displaying System Software
109
Displaying Installed os
109
Default os
109
Switch Status
110
Tech Support Information
110
System Boot Information
110
Network Service Module (NSM) Daemon Debugging
111
7 Network Management
112
Simple Network Management Protocol (SNMP)
112
SNMP Community
112
Information of SNMP Agent
113
SNMP Com2Sec
114
SNMP Group
114
SNMP View Record
115
Permission to Access SNMP View Record
115
SNMP Version 3 User
116
SNMP Trap
116
SNMP Trap Mode
116
Enabling SNMP Trap
117
SNMP Trap Host
117
Disabling SNMP Trap
119
Displaying SNMP Trap
119
SNMP Alarm
120
Alarm Notify Activity
120
Alarm Severity Criterion
120
Default Alarm Severity
121
Generic Alarm Severity
121
ADVA Alarm Severity
123
Displaying SNMP Alarm
124
STP Guard Alarm Severity
124
Displaying SNMP Configuration
124
Disabling SNMP
125
Operation, Administration and Maintenance (OAM)
125
Fig. 7.1 EFM OAM Deployment Scenario
125
Enabling OAM
126
OAM Link Monitoring
127
EFM OAM Mode
128
OAM Loopback
128
OAM Unidirection
129
Displaying EFM OAM Configuration
129
Link Layer Discovery Protocol (LLDP)
130
Basic TLV
130
Enabling LLDP
130
LLDP Operation
130
LLDP Operation Type
130
LLDP Message
131
Reinitiating Delay
131
Displaying LLDP Configuration
132
Remote Monitoring (RMON)
133
RMON History
133
Activating RMON History
134
Interval of Sample Inquiry
134
Number of Sample Data
134
Source Port of Statistical Data
134
Subject of RMON History
134
Deleting Configuration of RMON History
135
Displaying RMON History
135
RMON Alarm
135
Absolute and Delta Comparison
136
Object of Sample Inquiry
136
Subject of RMON Alarm
136
Upper Bound of Threshold
136
Lower Bound of Threshold
137
Standard of the First Alarm
137
Activating RMON Alarm
138
Deleting Configuration of RMON Alarm
138
Interval of Sample Inquiry
138
RMON Event
138
Event Community
139
Event Description
139
Event Type
139
Subject of RMON Event
139
Activating RMON Event
140
Deleting Configuration of RMON Event
140
Syslog
141
Syslog Output Level
141
Facility Code
143
Debug Message for Remote Terminal
144
Disabling Syslog
144
Syslog Bind Address
144
Displaying Syslog Configuration
145
Displaying Syslog Message
145
Rule and Qos
146
How to Operate Qos
147
Fig. 7.2 Procedure of Qos Operation
147
Packet Classification
148
Fig. 7.3 Structure of Rule
148
Flow Mode
149
Flow Creation
149
Configuring Flow
150
Applying and Modifying Flow
152
Class Creation
152
Packet Conditioning
153
Policer Creation
153
Applying and Modifying Policer
154
Packet Counter
154
Rate-Limit
154
Rule Action
155
Policy Creation
155
Metering
156
Fig. 7.4 Token Bucket Meter
157
Fig. 7.5 Behavior of Srtcm (1)
158
Fig. 7.6 Behavior of Srtcm (2)
158
Fig. 7.7 Bahavior of Srtcm (3)
159
Fig. 7.8 Behavior of Trtcm (1)
160
Fig. 7.9 Behavior of Trtcm (2)
160
Fig. 7.10 Behavior of Trtcm (3)
161
Policy Priority
162
Policy Action
162
Setting Cos and Tos Values
163
Attaching a Policy to an Interface
163
Applying and Modifying Policy
164
Displaying Rule
164
Admin Rule
165
Creating Admin Flow for Packet Classification
165
Configuring Admin Flow
166
Applying and Modifying Admin Flow
167
Class Creation
167
Admin Rule Action
168
Admin Policy Creation
168
Admin Policy Action
169
Admin Policy Priority
169
Applying and Modifying Admin Policy
170
Displaying Admin Rule
170
Scheduling
171
Fig. 7.11 Strict Priority Queuing
171
Fig. 7.12 Deficit Round Robin
172
Fig. 7.13 Weighted Round Robin
172
Scheduling Mode
173
Weight and Quantum
173
Maximum and Minimum Bandwidth
174
Limiting Traffic and Buffer
174
The Traffic of Queue
175
Displaying Qos
175
Netbios Filtering
176
Fig. 7.14 Netbios Filtering
176
Martian Filtering
177
Max Host
178
Port Security
179
Port Security on Port
179
Port Security Aging
180
Displaying Port Security
181
Outband Management Port Security
181
MAC Table
181
MAC Filtering
183
Default MAC Filter Policy
183
Configuring MAC Filter Policy
183
Displaying MAC Filter Policy
184
Listing MAC Filter Policy
184
Address Resolution Protocol (ARP)
185
ARP Table
185
Registering ARP Table
185
ARP Alias
186
ARP Log Interval
186
Displaying ARP Table
186
ARP Inspection
187
ARP Access List
188
ARP Address Validation
190
Enabling ARP Inspection Filtering
190
ARP Inspection Log-Buffer
191
ARP Inspection on Trust Port
191
Displaying ARP Inspection
192
Gratuitous ARP
193
Proxy ARP
193
Fig. 7.15 Proxy ARP
194
ICMP Message Control
195
Blocking Echo Reply Message
195
Fig. 7.16 ICMP Message Structure
195
Tab. 7.1 ICMP Message Type
195
Interval for Transmit ICMP Message
196
TCP Flag Control
197
RST Configuration
197
Tab. 7.2 Mask Calculation of Default Value
197
SYN Configuration
198
Packet Dump
198
Packet Dump by Protocol
198
Packet Dump with Option
199
Debug Packet Dump
200
Displaying Dump Packets
200
Dump File
200
Access List
202
Standard Access List
203
Tab. 7.3 Examples of Wildcard Masking
203
Extended Access List
204
Named Access List
206
Access List Range
207
Displaying Access List Entries
208
8 System Main Functions
209
Virtual Local Area Network (VLAN)
209
Port-Based VLAN
210
Fig. 8.1 Port-Based VLAN
210
Creating VLAN
211
Specifying PVID
211
Adding Port to VLAN
211
Deleting VLAN
211
Protocol-Based VLAN
212
MAC-Based VLAN
212
Subnet-Based VLAN
213
Tagged VLAN
213
Fig. 8.2 Subnet-Based VLAN
213
VLAN Description
214
Tab. 8.1 Advantages and Disadvantages of Tagged VLAN
214
VLAN Precedence
215
Displaying VLAN Information
215
Qinq
215
Fig. 8.3 Example of Qinq Configuration
215
Double Tagging Operation
216
Fig. 8.4 Qinq Frame
216
Double Tagging Configuration
217
TPID Configuration
217
Layer 2 Isolation
218
Port Isolation
218
Shared VLAN
219
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment
219
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1)
220
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2)
220
VLAN Translation
221
Sample Configuration
221
Link Aggregation (LAG)
224
Port Trunk
224
Configuring Port Trunk
224
Fig. 8.8 Link Aggregation
224
Disabling Port Trunk
225
Displaying Port Trunk
225
Link Aggregation Control Protocol (LACP)
225
Configuring LACP
226
Distribution Mode
226
Operation Mode
227
Manual Aggregation
228
Priority of Switch
228
Administrational Key
229
BPDU Transmission Rate
229
Port Priority
229
Displaying LACP Configuration
230
Spanning-Tree Protocol (STP)
231
Fig. 8.9 Example of Loop
231
Fig. 8.10 Principle of Spanning Tree Protocol
231
STP Operation
232
Fig. 8.11 Root Switch
232
Fig. 8.12 Designated Switch
233
Fig. 8.13 Port Priority
234
Fig. 8.14 Port State
234
RSTP Operation
235
Fig. 8.15 Alternate Port and Backup Port
236
Fig. 8.16 Example of Receiving Low BPDU
237
Fig. 8.17 Network Convergence of 802.1D
237
Fig. 8.18 Network Convergence of 802.1W (1)
238
Fig. 8.19 Network Convergence of 802.1W (2)
238
Fig. 8.20 Network Convergence of 802.1W (3)
239
Fig. 8.21 Compatibility with 802.1D (1)
239
MSTP Operation
240
Fig. 8.22 Compatibility with 802.1D (2)
240
Fig. 8.23 CST and ist of MSTP (1)
241
Fig. 8.24 CST and ist of MSTP (2)
241
Configuring STP/RSTP/MSTP/PVSTP/PVRSTP Mode (Required)
242
Configuring STP/RSTP/MSTP
242
Activating STP/RSTP/MSTP
242
Root Switch
242
Path-Cost
243
Tab. 8.2 STP Path-Cost
243
Tab. 8.3 RSTP Path-Cost
243
Port-Priority
244
MST Region
244
MSTP Protocol
245
Point-To-Point MAC Parameters
245
Edge Ports
246
Displaying Configuration
246
Configuring PVSTP/PVRSTP
247
Activating PVSTP/PVRSTP
248
Fig. 8.25 Example of PVSTP
248
Root Switch
249
Path-Cost
249
Port-Priority
249
Root Guard
249
Restarting Protocol Migration
250
Fig. 8.26 Root Guard
250
BPDU Configuration
251
Hello Time
251
BPDU Hop
252
Forward Delay
252
Max Age
252
BPDU Filter
253
BPDU Guard
253
Displaying BPDU Configuration
254
Sample Configuration
254
Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment
255
Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment
256
Ethernet Ring Protection (ERP)
257
ERP Mechanism
257
Fig. 8.29 ERP Operation in Case of Link Failure
259
Fig. 8.30 Ring Protection
259
Fig. 8.31 Link Failure Recovery
260
Fig. 8.32 Ring Recovery
260
Loss of Test Packet (LOTP)
261
ERP Shared Link
261
Fig. 8.33 Shared Link
261
Configuring ERP Domian
262
ERP Domain
262
ERP Domain Description
262
Node Mode
262
Primary and Secondary Port
262
Learning Disable Time
263
Primary/Secondary Port State
263
Protected Activation
263
Test Packet Interval
264
Wait-To-Restore Time
264
ERP Ring Priority
265
LOTP Hold off Time
265
ERP Trap
266
Private VLAN with ERP
266
Registering ERP MAC
266
Displaying ERP Configuration
267
Loop Detection
268
Dynamic Host Configuration Protocol (DHCP)
270
Fig. 8.34 DHCP Service Structure
270
DHCP Server
271
DHCP Pool Creation
272
DHCP Subnet
272
Range of IP Address
272
Default Gateway
273
IP Lease Time
273
DNS Server
274
Manual Binding
274
DHCP Server Option
275
Domain Name
275
Static Mapping
275
Authorized ARP
276
IP Address Validation
276
Recognition of DHCP Client
276
Prohibition of 1:N IP Address Assignment
277
DHCP Packet Statistics
278
Ignoring BOOTP Request
278
Displaying DHCP Pool Configuration
279
Setting DHCP Pool Size
279
DHCP Address Allocation with Option 82
280
DHCP Class Capability
280
DHCP Class Creation
280
Relay Agent Information Pattern
280
Associating DHCP Class
281
Range of IP Address for DHCP Class
281
DHCP Lease Database
282
DHCP Database Agent
282
Displaying DHCP Lease Status
282
Deleting DHCP Lease Database
283
DHCP Relay Agent
283
Fig. 8.35 Example of DHCP Relay Agent
283
DHCP Helper Address
284
Smart Relay Agent Forwarding
284
DHCP Server ID Option
285
DHCP Relay Statistics
285
DHCP Option
286
Entering DHCP Option Mode
286
Configuring DHCP Option Format
287
Deleting DHCP Option Format
287
Displaying DHCP Option
287
DHCP Option 82
288
Enabling DHCP Option 82
289
Option 82 Sub-Option
289
Fig. 8.36 DHCP Option 82 Operation
289
Option 82 Reforwarding Policy
290
Option 82 Trust Policy
291
DHCP Snooping
291
Enabling DHCP Snooping
292
DHCP Trust State
292
DHCP Filter on Trust Port
293
DHCP Rate Limit
293
DHCP Lease Limit
294
Source MAC Address Verification
295
Static DHCP Snooping Binding
295
DHCP Snooping Database Agent
295
ARP Inspection Start Time
296
DHCP Snooping with Option82
296
DHCP Snooping Option
297
Displaying DHCP Snooping Configuration
298
IP Source Guard
298
Enabling IP Source Guard
299
Static IP Source Binding
300
Displaying IP Source Guard Configuration
300
DHCP Client
300
Enabling DHCP Client
300
DHCP Client ID
300
DHCP Class ID
301
Host Name
301
IP Lease Time
301
Requesting Option
301
Forcing Release or Renewal of DHCP Lease
301
Displaying DHCP Client Configuration
302
DHCP Filtering
302
DHCP Packet Filtering
302
DHCP Server Packet Filtering
303
Fig. 8.37 DHCP Server Packet Filtering
303
Debugging DHCP
304
Virtual Router Redundancy Protocol (VRRP)
305
Fig. 8.38 VRRP Operation
305
Configuring VRRP
306
Access to Associated IP Address
306
Associated IP Address
306
Master Router and Backup Router
306
VRRP Track Function
309
Fig. 8.39 VRRP Track
310
Authentication Password
311
Preempt
311
VRRP Monitoring and Management
312
Displaying VRRP Protocol Information
312
VRRP Statistics
312
VRRP Debug
313
Single IP Management
314
Switch Group
314
Fig. 8.40 Example of Cascading
314
Designating Master and Slave Switch
315
Disabling Cascading
315
Displaying Cascading Status
315
Accessing to Slave Switch from Master Switch
316
Sample Configuration
316
Rate Limit
318
Flood Guard
319
MAC Flood Guard
319
Fig. 8.41 Rate Limit and Flood Guard
319
CPU Flood Guard
320
System Flood Guard
320
PPS Control
322
Storm Control
323
Jumbo Frame Capacity
323
Bandwidth
324
Maximum Transmission Unit (MTU)
324
Blocking Packet Forwarding
324
9 IP Multicast
325
Fig. 9.1 the V5812G with IGMP Snooping
325
Fig. 9.2 the V5812G with PIM-SM
326
Fig. 9.3 the Switch with IGMP Snooping and PIM-SM
326
Multicast Group Membership
327
IGMP Basic
327
Clearing IGMP Entry
328
IGMP Version
328
Querier's Robustness Variable
328
IGMP Debug
329
IGMP Version 2
329
IGMP Static Join
330
IGMP Access Control
332
IGMP Querier Configuration
332
IGMP Immediate Leave
334
IGMP Version 3
335
Displaying IGMP Information
336
Multicast Functions
337
Blocking Unknown Multicast Traffic
337
Multicast Forwarding Database
337
Displaying Mcfdb Information
338
Forwarding Entry Aging
338
IGMP Snooping Basic
339
Fig. 9.4 IGMP Snooping
339
Enabling IGMP Snooping
340
IGMP Snooping Version
340
IGMP Snooping Robustness Value
341
Igmpv2 Snooping
341
IGMP Snooping Querier Configuration
341
IGMP Snooping Last Member Query Interval
343
IGMP Snooping Immediate Leave
344
IGMP Snooping Report Suppression
345
IGMP Snooping S-Query Report Agency
345
Explicit Host Tracking
346
Multicast Router Port Configuration
347
TCN Multicast Flooding
349
Igmpv3 Snooping
351
Displaying IGMP Snooping Information
351
Multicast VLAN Registration (MVR)
353
Enabling MVR
353
MVR Group
353
Displaying MVR Configuration
354
MVR Helper Address
354
Source/Receiver Port
354
IGMP Filtering and Throttling
355
IGMP Filtering
355
Displaying IGMP Filtering and Throttling
357
IGMP Throttling
357
IGMP Proxy
358
Designating Downstream Interface
358
Designating Upstream Interface
358
Configuring Upstream Interface Mode
359
IGMP-Proxy if Flap Discredit
359
Disabling Verification of Source IP of IGMP Packets
361
Specifying IGMP Report/Leave's Source IP Address
361
Displaying IGMP Proxy Information
362
Querying with Real Querirer's Source IP Address
362
IGMP State Limit
362
Multicast-Source Trust Port
363
Multicast Routing
364
Enabling Multicast Routing
364
TTL Threshold
364
ECMP Load Splitting
365
MRIB Entry Limit
365
Fig. 9.5 Multicast Equal Cost Multipath (ECMP)
365
Displaying MRIB Entry
366
Displaying MRIB Statistics
367
Displaying MFIB Information
367
MRIB Debug
368
PIM Basic
368
DR Priority
369
PIM Mode
369
Neighbor Filtering
370
PIM Hello Message
371
PIM Join/Prune Message Group Filtering
371
PIM Join/Prune Interval
372
PIM VIF Flap Discredit
372
Displaying PIM Information
373
PIM Static Join
373
Pim-Sm
374
Fig. 9.6 Rendezvous Point Tree
374
Fig. 9.7 Shortest Path Tree
375
Rendezvous Point
376
Bootstrap Router
378
Source Registration
379
SPT Switchover
381
Cisco's Router Interoperability
382
PIM Debug
383
Source Specific Multicast (SSM)
384
Pim-Ssm
384
Static SSM Mapping
385
10 IP Routing Protocol
387
Border Gateway Protocol (BGP)
387
Basic Configuration
388
Configuration Type of BGP
388
Enabling BGP Routing
388
Disabling BGP Routing
389
Advanced Configuration
389
Summary of Path
389
Automatic Summarization of Path
390
BGP Next-Hop Address Tracking
390
Local Preference
391
Multi-Exit Discriminator (MED)
391
Choosing Best Path
392
Graceful Restart
393
Administrative Distance for BGP
394
IP Address Family
395
BGP Neighbor
395
Default Route
395
Peer Group
396
Changing the Nexthop Information
397
Force Shutdown
397
Route Map
397
Neighbor Description
398
Neighbor Password
398
Source of Routing Updates
398
Updates for Inbound Soft Reconfiguration
399
BGP Timers
399
Route Flap Dampening
399
BGP Session Reset
401
Session Reset of All Peers
401
Session Reset of Peers Within Particular as
402
Session Reset of External Peer
403
Session Reset of Specific Route
403
Session Reset of Peer Group
404
Displaying and Managing BGP
405
BGP Neighbor
405
Logging Neighbor Changes
406
Checking the BGP Network Route
406
Sending SNMP Trap
406
BGP Debug
407
Open Shortest Path First (OSPF)
408
Enabling OSPF
408
ABR Type Configuration
410
Compatibility Support
410
OSPF Interface
410
Authentication Type
410
Authentication Key
411
Blocking Transmission of Route Information Database
412
Interface Cost
412
Routing Protocol Interval
413
OSPF Maximum Transmission Unit (MTU)
414
OSPF Network Type
415
OSPF Priority
415
Non-Broadcast Network
416
OSPF Area
417
Area Authentication
417
Default Cost of Area
417
Blocking the Transmission of Routing Information between Area
418
Not so Stubby Area (NSSA)
419
Area Range
422
Shortcut Area
422
Maximum Area
423
Stub Area
423
Virtual Link
423
Default Metric
426
Graceful Restart Support
426
Opaque-LSA Support
427
Default Route
428
Finding Period
429
External Routes to OSPF Network
429
OSPF Distance
431
Host Route
431
Passive Interface
432
Blocking Routing Information
432
Summary Routing Information
433
OSPF Monitoring and Management
433
Displaying OSPF Protocol Information
433
Logging Neighbor Changes
435
Sending SNMP Trap
435
Limiting Number of Database
436
Maximum Process of LSA
436
OSPF Debug
437
Routing Information Protocol (RIP)
439
Enabling RIP
439
RIP Neighbor Router
440
RIP Version
441
Creating Available Static Route Only for RIP
442
Redistributing Routing Information
442
Metrics for Redistributed Routes
444
Administrative Distance
444
Originating Default Information
445
Routing Information Filtering
445
Filtering Access List and Prefix List
445
Disabling the Transmission to Interface
446
Offset List
446
Maximum Number of RIP Routes
447
RIP Network Timer
447
Split Horizon
447
Authentication Key
448
Monitoring and Managing RIP
449
Restarting RIP
449
UDP Buffer Size of RIP
449
Displaying Debugging Information
450
Displaying RIP Protocol Information
450
11 GPON Configuration
452
Fig. 11.1 Example of GPON Network
452
Fig. 11.2 CLI Structure of GPON Configuration Mode
453
OLT Management
454
Opening OLT Mode
454
Activating OLT
455
Downstream Encryption
455
OLT Description
455
Bandwidth Scheduler
456
OLT Bandwidth
456
Upstream Bandwidth
456
Auto ONU Fault Detection
457
OLT Optical Transceiver Parameter
457
Forward Error Correction (FEC) Mode
458
Maximal Distance between OLT and ONU (ONT)
458
MAC Aging Time
459
OLT Link down Detection
459
Maximum Number of ONU
460
OLT Anti-Spoofing
460
Displaying OLT Information
461
OLT Traffic Statistics
461
GPON Daemon Memory Usage
463
MAC Address
463
OLT Slot Information
463
OLT Rx Power
464
ONU Management
465
Activating/Deactivating ONU
465
ONU Registration
465
Serial Number-Based ONU (ONT) Registration
465
Manual ONU (ONT) Registration Mode
466
ONU Registration Mode
466
Changing ONU Registration Mode
467
ONU Description
467
Assigning IP Address
467
Activating Administration for UNI
468
ONU Reset
468
Forward Error Correction (FEC) Mode
468
Loopback
469
ONU Laser down
469
Source MAC Address Monitoring
470
POTS Interface Configuration
471
ONU Firmware Upgrade
472
Manual Upgrade (1)
472
Manual Upgrade (2)
474
Auto Upgrade
476
Displaying ONU Information
482
ONU Profile
485
Creating ONU Profile
485
Fig. 11.3 ONU Profile
485
Configuring ONU Profile
486
Rogue ONU
486
RX Optical Power Threshold
486
Card Type Configuration
487
Applying Traffic & PM Profile
488
Overwriting Traffic Profile Configuration
488
Max Host
489
Rate Limit
489
VLAN Configurations
489
Activating Administration for Ethernet UNI
490
IGMP Group List
490
Mapping between T-CONT ID and DBA Profile
490
Saving Profile
490
Applying ONU Profile
491
Checking ONU Profile Configuration
491
Displaying ONU Profile
491
DBA Profile
493
Creating DBA Profile
493
Configuring DBA Profile
493
Saving DBA Profile
494
Displaying DBA Profile
494
Traffic Profile
495
Creating Traffic Profile
495
Fig. 11.4 Traffic Profile
495
Creating a Mapper
496
MAC Bridge Service Profile
497
MAC Learning
497
Max Host
497
Multicast Interworking Termination Point
497
ANI Port Configuration
498
UNI Port Configuration
498
IP-Host Service Link
501
TDM Service Link
501
T-CONT Mode
502
Fig. 11.5 Priority of T-CONT Types
502
GEM Port Configuration
503
Displaying T-CONT Information
503
IP Host Service Configuration
503
Dns
504
IP Address
504
VLAN Tagging Operating
504
TDM Service Link
505
VLAN Tagging Filtering
505
Voip Service Link
505
Voip Service Configuration (POTS UNI)
506
Voip Service Management Mode
506
Fig. 11.6 Voip Service Architecture
506
OMCI Managed Voip
507
IP-Path Managed Voip
507
POTS UNI Configuration
508
UDP/TOS Configuration
509
TDM Service Configuration (CES UNI)
510
Expected Circuit Pack Type
510
Framing Structure
510
Encoding
511
Line Length
511
DS1 Mode
512
Line Type
512
TDM Service Configuration
512
Displaying TDM Pseudowire Information
513
Adding/Applying Traffic Profile
514
Saving Traffic Profile
514
Displaying Traffic Profile Information
515
Sample Configuration
515
Voip Profile
516
Creating Voip Profile
516
OMCI Management Configuration
516
Voice Service Configuration
517
Voip Media Configuration
517
RTP Configuration
518
Signalling Code
519
DTMF Digit Configuration
520
Hook Flash Time Configuration
520
OMCI-Based SIP Configuration
520
SIP Agent Configuration
521
Voip Application Service
523
Voip Feature Access Codes
524
SIP User Data
525
Network Dial Plan
526
Displaying Voip Information
527
Saving Voip Profile
527
Sample Configuration
528
TDM Pseudowire Profile
529
Creating TDM Pseudowire Profile
529
Basic Service Type
530
Payload Size
530
Signalling
530
Payload Encapsulation Delay
531
RTP Pseudowire Parameter
531
Timing Mode
531
Clock Reference
532
RTP Payload Type
532
RTP Time Stamp Mode
532
Pseudowire Maintenance Configuration
533
RTP Synchronization Source
533
Saving TDM Pseudowire Profile
533
Displaying TDM Pseudowire Information
534
Pseudowire Maintenance Profile
535
Creating Pseudowire Maintenance Profile
535
Jitter Buffer Maximum Depth
535
Fill Policy
536
Jitter Buffer Desired Depth
536
Alarm-Related Policy
537
L-Bit/R-Bit Receive/Transmit Policy
538
SES Threshold
538
Displaying Pseudowire Maintenance Information
539
Saving Pseudowire Maintenance Profile
539
Performance Monitoring (PM) Profile
540
Collecting ONU Traffic Statistics
540
Creating PM Profile
540
Displaying ONU Traffic Statistics
542
Displaying PM Profile Information
542
Saving PM Profile
542
Sample Configuration
543
Multicast Profile
543
Creating Multicast Profile
543
IGMP Configurations
544
Applying Multicast Profile
545
Saving Multicast Profile
545
Displaying Multicast Information
546
ONU Service Profile
547
GPON Debug
548
Sample Configuration
549
12 System Software Upgrade
553
General Upgrade
553
Boot Mode Upgrade
554
FTP Upgrade
557
ONU Upgrade
559
Manual Upgrade
559
Auto Upgrade
560
13 Abbreviations
562
Advertisement
Advertisement
Related Products
Dasan Networks Categories
Network Hardware
Touch terminals
More Dasan Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL