Sign In
Upload
Manuals
Brands
DASAN Manuals
Network Hardware
V5824G
DASAN V5824G Manuals
Manuals and User Guides for DASAN V5824G. We have
2
DASAN V5824G manuals available for free PDF download: User Manual
DASAN V5824G User Manual (629 pages)
GPON OLT system
Brand:
DASAN
| Category:
Network Hardware
| Size: 7.81 MB
Table of Contents
Summary of Changes
3
Table of Contents
4
1 Introduction
27
Audience
27
Document Structure
27
Tab. 1.1 Overview of Chapters
27
Document Convention
28
Document Notation
28
Tab. 1.2 Command Notation of Guide Book
28
Virus Protection
29
GPL/LGPL Warranty and Liability Exclusion
29
2 System Overview
31
Fig. 2.1 Front View of the V5824G
31
System Features
32
3 Command Line Interface (CLI)
35
Configuration Mode
35
Privileged EXEC View Mode
36
Privileged EXEC Enable Mode
36
Tab. 3.1 Main Command of Privileged EXEC View Mode
36
Tab. 3.2 Main Command of Privileged EXEC Enable Mode
36
Global Configuration Mode
37
Bridge Configuration Mode
37
Tab. 3.3 Main Command of Global Configuration Mode
37
DHCP Pool Configuration Mode
38
DHCP Option Configuration Mode
38
Tab. 3.4 Main Command of Bridge Configuration Mode
38
Tab. 3.5 Main Command of DHCP Pool Configuration Mode
38
DHCP Option 82 Configuration Mode
39
Interface Configuration Mode
39
Tab. 3.6 Main Command of DHCP Option Configuration Mode
39
Tab. 3.7 Main Command of DHCP Option 82 Configuration Mode
39
Rule Configuration Mode
40
RMON Configuration Mode
40
Tab. 3.8 Main Command of Interface Configuration Mode
40
Tab. 3.9 Main Command of Rule Configuration Mode
40
Router Configuration Mode
41
Route-Map Configuration Mode
41
Tab. 3.10 Main Command of RMON Configuration Mode
41
Tab. 3.11 Main Command of Router Configuration Mode
41
GPON Configuration Mode
42
GPON-OLT Configuration Mode
42
ONU Profile Configuration Mode
42
Tab. 3.12 Main Command of Route-Map Configuration Mode
42
Tab. 3.13 Main Command of GPON-OLT Configuration Mode
42
Configuration Mode Overview
43
Fig. 3.1 Overview of Configuration Mode
43
Tab. 3.14 Main Command of ONU Profile Configuration Mode
43
Useful Tips
44
Listing Available Command
44
Calling Command History
46
Using Abbreviation
47
Tab. 3.15 Command Abbreviation
47
Using Command of Privileged EXEC Enable Mode
48
Exit Current Command Mode
48
The Command Execution Limit
48
4 System Connection and IP Address
49
System Connection
49
System Login
49
Password for Privileged EXEC Enable Mode
50
Changing Login Password
51
Management for System Account
51
Creating System Account
51
Security Level
52
Limiting Number of Users
55
Auto Log-Out
56
Telnet Access
56
System Rebooting
57
Manual System Rebooting
57
System Rebooting Scheduler
58
Auto Reset Configuration
58
CPU Load
59
Memory
59
System Authentication
60
Authentication Method
60
Authentication Interface
60
Primary Authentication Method
61
RADIUS Server
61
RADIUS Server for System Authentication
61
RADIUS Server Priority
61
Frequency of Retransmit
62
Timeout of Authentication Request
62
TACACS+ Server
62
TACACS+ Server for System Authentication
62
TACACS+ Server Priority
62
Additional TACACS+ Configuration
63
Timeout of Authentication Request
63
Accounting Mode
64
Displaying System Authentication
64
Configuring Interface
65
Enabling Interface
65
Assigning IP Address to Network Interface
66
Static Route and Default Gateway
66
Interface Description
67
Displaying Interface
68
Enabling Interface Overlapping
68
Secure Shell (SSH)
69
SSH Server
69
Disconnecting SSH Client
69
Displaying On-Line SSH Client
69
Enabling SSH Server
69
Assigning Specific Authentication Key
70
Displaying Connection History of SSH Client
70
SSH Client
70
Login to SSH Server
70
Authentication Key
71
Secured File Copy
71
Authentication
72
Fig. 4.1 Process of 802.1X Authentication
72
Authentication
73
Enabling 802.1X
73
RADIUS Server
73
Fig. 4.2 Multiple Authentication Servers
73
Authentication Mode
74
Authentication Port
75
Force Authorization
75
Interval for Retransmitting Request/Identity Packet
75
Interval of Authentication
75
Number of Requests to RADIUS Server
76
Enabling 802.1X Re-Authentication
76
Interval of Request to RADIUS Server
76
Re-Authentication
76
Interval of Re-Authentication
77
Interval of Requesting Re-Authentication
77
Re-Authentication
77
802.1X User Authentication Statistics
78
Displaying 802.1X Configuration
78
Initializing Authentication Status
78
Restoring Default Value
78
Sample Configuration
78
5 Port Configuration
80
Port Basic
80
Selecting Port Type
80
Ethernet Port Configuration
80
Enabling Ethernet Port
80
Auto-Negotiation
81
Transmit Rate
81
Duplex Mode
82
Flow Control
82
Port Description
82
L2 Port Bridge
83
Traffic Statistics
83
Packet Statistics
83
CPU Statistics
84
Protocol Statistics
85
Port Information
86
Port Mirroring
87
Fig. 5.1 Port Mirroring
87
6 System Environment
90
Environment Configuration
90
Host Name
90
Time and Date
90
Time Zone
91
Network Time Protocol (NTP)
92
Tab. 6.1 World Time Zone
92
Simple Network Time Protocol (SNTP)
93
Terminal Configuration
94
Login Banner
94
DNS Server
95
Fan Operation
96
Enabling FTP/TFTP Connection
96
Disabling Daemon Operation
97
FTP Bind Address
97
System Threshold
98
CPU Load
98
Port Traffic
98
Fan Operation
99
System Temperature
99
System Memory
100
System/Sfp Module Operation
100
Enabling DMI Module
101
Configuration Management
102
Displaying System Configuration
102
Auto-Saving
103
System Configuration File
103
Writing System Configuration
103
Core Dump File
105
Restoring Default Configuration
105
System Management
106
Network Connection
106
Tab. 6.2 Options for Ping for Multiple IP Addresses
107
IP ICMP Source Routing
108
Fig. 6.1 Ping Test for Network Status
108
Tracing Packet Route
109
Fig. 6.2 IP Source Routing
109
Displaying User Connecting to System
110
Tab. 6.3 Options for Tracing Packet Route
110
MAC Table
111
System Running Time
111
System Information
111
System Memory Information
112
CPU Packet Management
112
CPU Packet Limit
112
Running Process
112
Displaying Installed os
113
Displaying System Software
113
Default os
114
Forwarding Information Base (FIB) Table
114
Switch Status
114
Network Service Module (NSM) Daemon Debugging
115
System Boot Information
115
Tech Support Information
115
7 Network Management
117
Simple Network Management Protocol (SNMP)
117
SNMP Service
117
SNMP Community
118
SNMP Agent Administrator
118
Assigning IP Address of SNMP Agent
119
SNMP Com2Sec
120
SNMP Group
120
SNMP View Record
121
Permission to Access SNMP View Record
121
SNMP Version 3 User
122
SNMP Trap
122
SNMP Trap Mode
122
SNMP Trap Host
123
SNMP Trap in Event Mode
123
Displaying SNMP Trap
125
SNMP Trap Message Logging and Threshold
126
SNMP Alarm
127
Alarm Notify Activity
127
Alarm Severity Criterion
127
Default Alarm Severity
127
Generic Alarm Severity
128
Displaying SNMP Alarm
129
SNMP Message Logging
129
Displaying SNMP Configuration
130
Disabling SNMP
130
Link Layer Discovery Protocol (LLDP)
131
LLDP Operation
131
Enabling LLDP
131
LLDP Operation Type
131
Basic TLV
131
LLDP Message
132
Reinitiating Delay
132
Displaying LLDP Configuration
133
Remote Monitoring (RMON)
134
RMON History
134
Activating RMON History
135
Interval of Sample Inquiry
135
Number of Sample Data
135
Source Port of Statistical Data
135
Subject of RMON History
135
Deleting Configuration of RMON History
136
Displaying RMON History
136
RMON Alarm
136
Absolute and Delta Comparison
137
Object of Sample Inquiry
137
Subject of RMON Alarm
137
Upper Bound of Threshold
137
Lower Bound of Threshold
138
Standard of the First Alarm
138
Activating RMON Alarm
139
Deleting Configuration of RMON Alarm
139
Interval of Sample Inquiry
139
RMON Event
139
Event Community
140
Event Description
140
Event Type
140
Subject of RMON Event
140
Activating RMON Event
141
Deleting Configuration of RMON Event
141
Syslog
142
Syslog Output Level
142
Facility Code
144
Syslog Bind Address
145
Debug Message for Remote Terminal
145
Disabling Syslog
145
Displaying Syslog Message
145
Displaying Syslog Configuration
146
Rule and Qos
147
How to Operate Qos
148
Fig. 7.1 Procedure of Qos Operation
148
Fig. 7.2 Structure of Rule
149
Packet Classification
150
Flow Creation
150
Configuring Flow
151
Applying and Modifying Flow
153
Tab. 7.1 DSCP Values
153
Class Creation
154
Packet Conditioning
154
Policer Creation
154
Packet Counter
155
Applying and Modifying Policer
156
Rate-Limit
156
Rule Action
156
Policy Creation
156
Metering
158
Fig. 7.3 Token Bucket Meter
158
Fig. 7.4 Behavior of Srtcm (1)
159
Fig. 7.5 Behavior of Srtcm (2)
160
Fig. 7.6 Bahavior of Srtcm (3)
160
Fig. 7.7 Behavior of Trtcm (1)
161
Fig. 7.8 Behavior of Trtcm (2)
162
Fig. 7.9 Behavior of Trtcm (3)
162
Policy Priority
164
Policy Action
164
Setting Cos and Tos Values
165
Attaching a Policy to an Interface
165
Applying and Modifying Policy
166
Displaying Rule
166
Admin Rule
167
Creating Admin Flow for Packet Classification
167
Configuring Admin Flow
168
Applying and Modifying Admin Flow
169
Class Creation
169
Admin Rule Action
170
Admin Policy Creation
170
Admin Policy Action
171
Admin Policy Priority
171
Applying and Modifying Admin Policy
172
Displaying Admin Rule
172
Scheduling
173
Fig. 7.10 Strict Priority Queuing
173
Fig. 7.11 Deficit Round Robin
174
Fig. 7.12 Weighted Round Robin
174
Scheduling Mode
175
Weight and Quantum
175
Maximum and Minimum Bandwidth
176
Limiting Traffic and Buffer
176
DSCP-To-Cos Mapping
176
The Traffic of Queue
177
Displaying Qos
177
Netbios Filtering
178
Fig. 7.13 Netbios Filtering
178
Martian Filtering
179
Max Host
180
Port Security
181
Port Security on Port
181
Port Security Aging
182
Displaying Port Security
183
Outband Management Port Security
183
MAC Table
183
MAC Filtering
185
Default MAC Filter Policy
185
Configuring MAC Filter Policy
185
Displaying MAC Filter Policy
186
Listing MAC Filter Policy
186
Address Resolution Protocol (ARP)
187
ARP Table
187
Registering ARP Table
187
ARP Alias
188
Displaying ARP Table
188
ARP Access List
189
ARP Inspection
189
ARP Address Validation
192
Enabling ARP Inspection Filtering
192
ARP Inspection Log-Buffer
193
ARP Inspection on Trust Port
193
Displaying ARP Inspection
194
Gratuitous ARP
195
Proxy ARP
195
Fig. 7.14 Proxy ARP
195
ICMP Message Control
196
Tab. 7.2 ICMP Message Type
196
Blocking Echo Reply Message
197
Interval for Transmit ICMP Message
197
Fig. 7.15 ICMP Message Structure
197
Tab. 7.3 Mask Calculation of Default Value
198
ICMP Destination Unreachable Message
199
ICMP Redirect Message
199
TCP Flag Control
200
RST Configuration
200
SYN Configuration
200
The Utilization on L3 Table
200
Packet Dump
201
Packet Dump by Protocol
201
Packet Dump with Option
201
Debug Packet Dump
203
Displaying Dump Packets
203
Dump File
203
Access List
204
Standard Access List
205
Tab. 7.4 Examples of Wildcard Masking
205
Extended Access List
206
Named Access List
208
Access List Range
209
Displaying Access List Entries
210
8 System Main Functions
211
Virtual Local Area Network (VLAN)
211
Port-Based VLAN
212
Fig. 8.1 Port-Based VLAN
212
Creating VLAN
213
Specifying PVID
213
Adding Port to VLAN
213
Deleting VLAN
214
Protocol-Based VLAN
214
MAC-Based VLAN
215
Subnet-Based VLAN
215
Fig. 8.2 Subnet-Based VLAN
215
Tagged VLAN
216
Tab. 8.1 Advantages and Disadvantages of Tagged VLAN
216
VLAN Description
217
VLAN Precedence
217
Displaying VLAN Information
217
Qinq VLAN Mapping
218
Fig. 8.3 Example of Qinq Configuration
218
Fig. 8.4 Qinq Frame
218
TPID Configuration
219
One-To-One VLAN Mapping between S-VID and C-VID
219
One-To-Two VLAN Mapping between S-VID and C-VID
220
Two-To-One VLAN Mapping between S-VID and C-VID
221
Two-To-Two VLAN Mapping between S-VID and C-VID
222
Double Tagging Operation
222
Double Tagging Configuration
223
Inner Tag Configuration
224
Displaying VLAN Mapping and Translation
224
Layer 2 Isolation
224
Port Isolation
225
Shared VLAN
225
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment
226
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1)
226
Sample Configuration
227
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2)
227
Link Aggregation (LAG)
230
Port Trunk
230
Fig. 8.8 Link Aggregation
230
Configuring Port Trunk
231
Disabling Port Trunk
231
Displaying Port Trunk
232
Link Aggregation Control Protocol (LACP)
232
Configuring LACP
232
Distribution Mode
233
Operation Mode
234
Priority of Switch
234
Administrational Key
235
BPDU Transmission Rate
235
Manual Aggregation
235
Displaying LACP Configuration
236
Port Priority
236
Spanning Tree Protocol (STP)
237
Fig. 8.9 Example of Loop
237
Fig. 8.10 Principle of Spanning Tree Protocol
237
STP Operation
238
Designated Switch
238
Root Switch
238
Fig. 8.11 Root Switch
238
Designated Port and Root Port
239
Fig. 8.12 Designated Switch
239
Port Priority
240
Fig. 8.13 Port Priority
240
Fig. 8.14 Port States
240
RSTP Operation
242
BPDU Policy
242
Port States
242
Fig. 8.15 Alternate Port and Backup Port
242
Rapid Network Convergence
243
Fig. 8.16 Example of Receiving Low BPDU
243
Fig. 8.17 Convergence of 802.1D Network
244
Fig. 8.18 Network Convergence of 802.1W (1)
244
Fig. 8.19 Network Convergence of 802.1W (2)
245
Fig. 8.20 Network Convergece of 802.1W (3)
245
Compatibility with 802.1D
246
MSTP Operation
246
Fig. 8.21 Compatibility with 802.1D (1)
246
Fig. 8.22 Compatibility with 802.1D (2)
246
Mstp
247
Fig. 8.23 CST and ist of MSTP (1)
247
Fig. 8.24 CST and ist of MSTP (2)
248
STP Mode
249
STP Basic Configuration
249
Path-Cost Method
249
Tab. 8.2 STP Path-Cost (Short)
250
Tab. 8.3 RSTP Path-Cost (Long)
250
Edge Ports
251
BPDU Transmit Hold Count
251
Enabling STP Configuration on the Port
252
Link Type
252
Port Priority
252
Configuring MSTP
253
Displaying Configuration
253
MST Region
254
Enabling MSTP Configuration
255
Path-Cost
256
Port Priority
256
Root Switch
256
Displaying Configuration
257
Configuring PVSTP
258
Enabling PVSTP
258
Fig. 8.25 Example of PVSTP
258
Root Switch
259
Path-Cost
259
Port Priority
260
Displaying Configuration
260
Root Guard
261
Fig. 8.26 Root Guard
261
Loop Guard
262
Topology Change Detection
262
Restarting Protocol Migration
263
Loop Back Detection
263
BPDU Configuration
264
Forward Delay Time
265
Hello Time
265
BPDU Filtering
266
BPDU Hop Count
266
Max Age
266
BPDU Guard
267
Sample Configuration
269
Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment
269
Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment
270
Loop Detection
271
Dynamic Host Configuration Protocol (DHCP)
273
Fig. 8.29 DHCP Service Structure
273
DHCP Server
274
DHCP Pool Creation
275
DHCP Subnet
275
Range of IP Address
275
Default Gateway
276
IP Lease Time
276
DNS Server
277
Manual Binding
277
DHCP Server Option
278
Domain Name
278
Static Mapping
278
IP Address Validation
279
Recognition of DHCP Client
279
Authorized ARP
280
Prohibition of 1:N IP Address Assignment
280
DHCP Packet Statistics
281
Ignoring BOOTP Request
281
Setting DHCP Pool Size
282
Displaying DHCP Pool Configuration
282
DHCP Address Allocation with Option 82
282
DHCP Class Capability
283
DHCP Class Creation
283
Relay Agent Information Pattern
283
Associating DHCP Class
284
Range of IP Address for DHCP Class
284
DHCP Lease Database
284
DHCP Database Agent
284
Displaying DHCP Lease Status
285
Deleting DHCP Lease Database
285
DHCP Relay Agent
286
DHCP Helper Address
286
Fig. 8.30 Example of DHCP Relay Agent
286
Smart Relay Agent Forwarding
287
DHCP Server ID Option
288
DHCP Relay Statistics
288
DHCP Option
289
Entering DHCP Option Mode
289
Configuring DHCP Option Format
290
Deleting DHCP Option Format
290
Displaying DHCP Option
291
Different DHCP Option Code Configurations
291
DHCP Option 82
292
Enabling DHCP Option 82
293
Option 82 Sub-Option
293
Fig. 8.31 DHCP Option 82 Operation
293
Option 82 Reforwarding Policy
294
Option 82 Trust Policy
295
DHCP Snooping
296
Enabling DHCP Snooping
296
DHCP Trust State
296
DHCP Filter on Trust Port
297
DHCP Rate Limit
297
DHCP Lease Limit
298
Source MAC Address Verification
298
Static DHCP Snooping Binding
299
DHCP Snooping Database Agent
299
ARP Inspection Start Time
300
DHCP Snooping with Option82
300
DHCP Snooping Option
301
Displaying DHCP Snooping Configuration
302
IP Source Guard
303
Enabling IP Source Guard
303
Static IP Source Binding
304
Displaying IP Source Guard Configuration
304
DHCP Client
305
Enabling DHCP Client
305
DHCP Client ID
305
DHCP Class ID
305
Host Name
305
IP Lease Time
306
Requesting Option
306
Displaying DHCP Client Configuration
306
Forcing Release or Renewal of DHCP Lease
306
DHCP Filtering
307
DHCP Packet Filtering
307
DHCP Server Packet Filtering
307
Debugging DHCP
308
Fig. 8.32 DHCP Server Packet Filtering
308
Virtual Router Redundancy Protocol (VRRP)
309
Fig. 8.33 VRRP Operation
309
Configuring VRRP
310
Access to Associated IP Address
310
Associated IP Address
310
Master Router and Backup Router
310
VRRP Track Function
313
Fig. 8.34 VRRP Track
314
Authentication Password
315
Preempt
315
VRRP Monitoring and Management
316
Displaying VRRP Protocol Information
316
VRRP Statistics
316
VRRP Debug
317
Rate Limit
318
Flood Guard
319
MAC Flood Guard
319
Fig. 8.35 Rate Limit and Flood Guard
319
CPU Flood Guard
320
System Flood Guard
321
Attack Guard
322
Error Guard
323
PPS Control
324
Storm Control
324
Jumbo Frame Capacity
325
Bandwidth
326
Maximum Transmission Unit (MTU)
326
Blocking Packet Forwarding
326
Advertisement
Dasan V5824G User Manual (831 pages)
GPON OLT system
Brand:
Dasan
| Category:
Network Hardware
| Size: 9.51 MB
Table of Contents
Table of Contents
9
Illustrations
34
1 Introduction
37
Audience
37
Document Structure
37
Tab. 1.1 Overview of Chapters
37
Document Convention
38
Document Notation
38
Tab. 1.2 Command Notation of Guide Book
38
Virus Protection
39
GPL/LGPL Warranty and Liability Exclusion
39
2 System Overview
41
Fig. 2.1 Front View of the V5824G
41
System Features
42
3 Command Line Interface (CLI)
45
Configuration Mode
45
Privileged EXEC Enable Mode
46
Privileged EXEC View Mode
46
Tab. 3.1 Main Command of Privileged EXEC View Mode
46
Tab. 3.2 Main Command of Privileged EXEC Enable Mode
46
Bridge Configuration Mode
47
Global Configuration Mode
47
Tab. 3.3 Main Command of Global Configuration Mode
47
DHCP Option Configuration Mode
48
DHCP Pool Configuration Mode
48
Tab. 3.4 Main Command of Bridge Configuration Mode
48
Tab. 3.5 Main Command of DHCP Pool Configuration Mode
48
DHCP Option 82 Configuration Mode
49
Interface Configuration Mode
49
Tab. 3.6 Main Command of DHCP Option Configuration Mode
49
Tab. 3.7 Main Command of DHCP Option 82 Configuration Mode
49
RMON Configuration Mode
50
Rule Configuration Mode
50
Tab. 3.8 Main Command of Interface Configuration Mode
50
Tab. 3.9 Main Command of Rule Configuration Mode
50
Route-Map Configuration Mode
51
Router Configuration Mode
51
Tab. 3.10 Main Command of RMON Configuration Mode
51
Tab. 3.11 Main Command of Router Configuration Mode
51
GPON Configuration Mode
52
GPON-OLT Configuration Mode
52
ONU Profile Configuration Mode
52
Tab. 3.12 Main Command of Route-Map Configuration Mode
52
Tab. 3.13 Main Command of GPON-OLT Configuration Mode
52
Configuration Mode Overview
53
Fig. 3.1 Overview of Configuration Mode
53
Tab. 3.14 Main Command of ONU Profile Configuration Mode
53
Useful Tips
54
Listing Available Command
54
Calling Command History
56
Exit Current Command Mode
58
Using Abbreviation
58
Using Command of Privileged EXEC Enable Mode
58
Tab. 3.15 Command Abbreviation
58
The Command Execution Limit
59
4 System Connection and IP Address
60
System Connection
60
Password for Privileged EXEC Enable Mode
60
System Login
60
Changing Login Password
61
Login Password Recovery Process
62
Creating System Account
63
Management for System Account
63
Security Level
64
Limiting Number of Users
67
Limiting the Number of Login Attempts
68
Auto Log-Out
68
Telnet Access
69
System Rebooting
70
Manual System Rebooting
70
System Rebooting Scheduler
70
Auto Reset Configuration
71
CPU Load
71
Memory
72
System Authentication
73
Authentication Interface
73
Authentication Method
73
Automated Blocking of IP Host
74
Primary Authentication Method
74
Frequency of Retransmit
75
RADIUS Server
75
RADIUS Server for System Authentication
75
RADIUS Server Priority
75
Timeout of Authentication Request
75
Additional TACACS+ Configuration
76
TACACS+ Server
76
TACACS+ Server for System Authentication
76
TACACS+ Server Priority
76
Timeout of Authentication Request
76
Accounting Mode
77
Displaying System Authentication
78
Configuring Interface
79
Assigning IP Address to Network Interface
79
Enabling Interface
79
Static Route and Default Gateway
80
Interface Description
81
Displaying Interface
82
Enabling Interface Overlapping
82
Interface Identifier
82
Assigning an Ipv6 Address
84
Fig. 4.1 Structure of Ipv6 Header
84
Tab. 4.1 Overview of Ipv6 Header Fields
85
Enabling Interface
86
Assigning Ipv6 Address to Network Interface
87
Assigning Link Local Address to Network Interface
88
Static Route and Default Gateway
89
Enabling Ipv6 Processing
90
Ipv6 Interface Mode
90
Displaying Ipv6 Interface
91
Secure Shell (SSH)
92
Assigning Specific Authentication Key
92
Disconnecting SSH Client
92
Displaying On-Line SSH Client
92
Enabling SSH Server
92
SSH Server
92
Authentication Key
93
Displaying Connection History of SSH Client
93
Login to SSH Server
93
Secured File Copy
93
SSH Client
93
Authentication
95
Fig. 4.2 Process of 802.1X Authentication
95
Enabling 802.1X
96
Fig. 4.3 Multiple Authentication Servers
96
RADIUS Server
96
Authentication Mode
97
Authentication Port
98
Force Authorization
98
Interval for Retransmitting Request/Identity Packet
98
Interval of Authentication
98
Enabling 802.1X Re-Authentication
99
Interval of Request to RADIUS Server
99
Number of Requests to RADIUS Server
99
Re-Authentication
99
802.1X Re-Authentication
100
Interval of Re-Authentication
100
Interval of Requesting Re-Authentication
100
Displaying 802.1X Configuration
101
Initializing Authentication Status
101
Restoring Default Value
101
User Authentication Statistics
101
Sample Configuration
102
5 Port Configuration
103
Port Basic
103
Selecting Port Type
103
Ethernet Port Configuration
103
Enabling Ethernet Port
103
Auto-Negotiation
104
Duplex Mode
104
Transmit Rate
104
Flow Control
105
L2 Port Bridge
105
Network Service Port
105
Port Description
105
Port Crossover
106
Traffic Statistics
106
CPU Statistics
107
Packet Statistics
107
Protocol Statistics
108
Port Debounce Timer
109
Port Information
109
Port Mirroring
110
Fig. 5.1 Port Mirroring
110
6 System Environment
113
Environment Configuration
113
Host Name
113
Time and Date
113
Time Zone
114
Network Time Protocol (NTP)
115
Configuring NTP Server
115
Tab. 6.1 World Time Zone
115
Configuring NTP Authentication
116
Simple Network Time Protocol (SNTP)
117
Terminal Configuration
118
Login Banner
118
DNS Server
119
Fan Operation
120
Enabling FTP/TFTP Connection
120
Disabling Daemon Operation
120
FTP Bind Address
121
System Threshold
122
CPU Load
122
Port Traffic
122
Fan Operation
123
System Temperature
123
System Memory
124
System/Sfp Module Operation
124
Enabling DMI Module
125
Configuration Management
126
Displaying System Configuration
126
Writing System Configuration
126
Auto-Saving
127
System Configuration File
127
Restoring Default Configuration
128
Core Dump File
129
System Management
130
Network Connection
130
Tab. 6.2 Options for Ping for Multiple IP Addresses
131
Fig. 6.1 Ping Test for Network Status
132
Fig. 6.2 IP Source Routing
132
IP ICMP Source Routing
132
Tab. 6.3 Options for Tracing Packet Route
133
Tracing Packet Route
133
Displaying User Connecting to System
134
MAC Table
134
MAC Count
135
System Information
135
System Memory Information
135
System Running Time
135
Debugging Information
136
CPU Packet Filtering
137
CPU Packet Limit
137
CPU Packet Management
137
Displaying System Software
140
Running Process
140
Default os
141
Displaying Installed os
141
Forwarding Information Base (FIB) Table
141
Switch Status
141
System Boot Information
142
Tech Support Information
142
Network Service Module (NSM) Daemon Debugging
143
7 Network Management
144
Simple Network Management Protocol (SNMP)
144
SNMP Community
144
SNMP Service
144
SNMP Agent Administrator
145
Assigning IP Address of SNMP Agent
146
SNMP Com2Sec
146
SNMP Group
147
SNMP View Record
147
Permission to Access SNMP View Record
148
SNMP Version 3 User
148
Configuring SNMP Target
149
SNMP Engine ID
149
Snmpv3 Notification
149
SNMP Notification Type
150
SNMP Trap
152
SNMP Trap Host
152
SNMP Trap Mode
152
Enabling SNMP Trap
153
Displaying SNMP Trap
155
Alarm Notify Activity
156
SNMP Alarm
156
SNMP Trap Message Logging and Threshold
156
Alarm Severity Criterion
157
Default Alarm Severity
157
Generic Alarm Severity
157
Displaying SNMP Alarm
159
SNMP Message Logging
159
Disabling SNMP
160
Displaying SNMP Configuration
160
Link Layer Discovery Protocol (LLDP)
161
Basic TLV
161
Enabling LLDP
161
LLDP Operation
161
LLDP Operation Type
161
LLDP Message
162
Reinitiating Delay
162
Displaying LLDP Configuration
163
Remote Monitoring (RMON)
164
RMON History
164
Activating RMON History
165
Interval of Sample Inquiry
165
Number of Sample Data
165
Source Port of Statistical Data
165
Subject of RMON History
165
Deleting Configuration of RMON History
166
Displaying RMON History
166
RMON Alarm
166
Absolute and Delta Comparison
167
Object of Sample Inquiry
167
Subject of RMON Alarm
167
Upper Bound of Threshold
167
Lower Bound of Threshold
168
Standard of the First Alarm
168
Activating RMON Alarm
169
Deleting Configuration of RMON Alarm
169
Interval of Sample Inquiry
169
RMON Event
169
Event Community
170
Event Description
170
Event Type
170
Subject of RMON Event
170
Activating RMON Event
171
Deleting Configuration of RMON Event
171
Simple RMON Event Configuration
171
Syslog
173
Syslog Output Level
173
Facility Code
175
Debug Message for Remote Terminal
176
Disabling Syslog
176
Syslog Bind Address
176
Displaying Syslog Status
177
Syslog Local Message Configuration
177
Rule and Qos
178
Fig. 7.1 Procedure of Qos Operation
179
How to Operate Qos
179
Fig. 7.2 Structure of Rule
180
Packet Classification
180
Configuring Flow
181
Flow Creation
181
Applying and Modifying Flow
185
Class Creation
185
Packet Conditioning
185
Packet Counter
186
Policer Creation
186
Applying and Modifying Policer
187
Policy Creation
187
Rate-Limit
187
Rule Action
187
Fig. 7.3 Token Bucket Meter
189
Metering
189
Fig. 7.4 Behavior of Srtcm (1)
190
Fig. 7.5 Behavior of Srtcm (2)
191
Fig. 7.6 Bahavior of Srtcm (3)
191
Fig. 7.7 Behavior of Trtcm (1)
192
Fig. 7.8 Behavior of Trtcm (2)
193
Fig. 7.9 Behavior of Trtcm (3)
193
Policy Priority
194
Policy Action
195
Attaching a Policy to an Interface
196
Setting Cos and Tos Values
196
Applying and Modifying Policy
197
Displaying Rule
197
Admin Rule
198
Creating Admin Flow for Packet Classification
198
Configuring Admin Flow
199
Applying and Modifying Admin Flow
200
Admin Policy Creation
201
Admin Rule Action
201
Class Creation
201
Fig. 7.10 Strict Priority Queuing
205
Fig. 7.11 Deficit Round Robin
206
Fig. 7.12 Weighted Round Robin
206
Fig. 7.13 Netbios Filtering
214
Fig. 7.14 Proxy ARP
232
Fig. 7.15 ICMP Message Structure
247
Tab. 7.1 ICMP Message Type
247
Tab. 7.2 Mask Calculation of Default Value
249
Tab. 7.3 Examples of Wildcard Masking
256
Fig. 8.1 Port-Based VLAN
276
Fig. 8.2 Subnet-Based VLAN
279
Tab. 8.1 Advantages and Disadvantages of Tagged VLAN
281
Fig. 8.3 Example of Qinq Configuration
282
Fig. 8.4 Qinq Frame
282
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment
290
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1)
290
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2)
291
Fig. 8.8 Link Aggregation
294
Fig. 8.9 Example of Loop
301
Fig. 8.10 Principle of Spanning Tree Protocol
301
Fig. 8.11 Root Switch
302
Fig. 8.12 Designated Switch
303
Fig. 8.13 Port Priority
304
Fig. 8.14 Port States
304
Fig. 8.15 Alternate Port and Backup Port
306
Fig. 8.16 Example of Receiving Low BPDU
307
Fig. 8.17 Convergence of 802.1D Network
307
Fig. 8.18 Network Convergence of 802.1W (1)
308
Fig. 8.19 Network Convergence of 802.1W (2)
308
Fig. 8.20 Network Convergece of 802.1W (3)
309
Fig. 8.21 Compatibility with 802.1D (1)
309
Fig. 8.22 Compatibility with 802.1D (2)
310
Fig. 8.23 CST and ist of MSTP (1)
311
Fig. 8.24 CST and ist of MSTP (2)
312
Tab. 8.2 STP Path-Cost (Short)
314
Tab. 8.3 RSTP Path-Cost (Long)
314
Fig. 8.25 Example of PVSTP
322
Fig. 8.26 Root Guard
325
Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment
333
Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment
334
Fig. 8.29 DHCP Service Structure
337
Fig. 8.30 Example of DHCP Relay Agent
349
Fig. 8.31 DHCP Option 82 Operation
357
Fig. 8.32 DHCP Server Packet Filtering
372
Tab. 8.4 Dhcpv6 Message Types
375
Fig. 8.33 Basic Dhcpv6 Message Format
376
Fig. 8.34 General Shared Relay Message Format
377
Fig. 8.35 an Example of Prefix Delegation
377
Tab. 8.5 Dhcpv6 UDP Port
378
Tab. 8.6 Dhcpv6 Address
378
Fig. 8.36 VRRP Operation
397
Fig. 8.37 VRRP Track
402
Fig. 8.38 Rate Limit and Flood Guard
407
Tab. 8.5 Priority-PGID Mapping
420
Fig. 9.1 the V5824G with IGMP Snooping
422
Fig. 9.2 the V5824G with PIM-SM
423
Fig. 9.3 the Switch with IGMP Snooping and PIM-SM
423
Fig. 9.4 IGMP Snooping
437
Fig. 9.5 Multicast Equal Cost Multipath (ECMP)
463
Fig. 9.6 Rendezvous Point Tree
473
Fig. 9.7 Shortest Path Tree
474
Fig. 10.1 Mldv1 Message Format
487
Fig. 10.2 Mldv2 Query Message Format
488
Fig. 10.3 Multicast Equal Cost Multipath (ECMP)
504
Fig. 10.4 Rendezvous Point Tree
508
Fig. 10.5 Shortest Path Tree
509
Fig. 11.1 Virtual Routing Concept
635
Fig. 12.1 Example of GPON Network
647
Fig. 12.2 CLI Structure of GPON Configuration Mode
648
Tab. 12.1 RADIUS Authentication Message Type
688
Fig. 12.3 PON Structure Sample Scheme for Voip and Internet Connection of ONT
707
Fig. 12.4 ONU Profile
716
Fig. 12.5 Traffic Profile
731
Tab. 12.2 Protocol Types for MAC Filtering
736
Fig. 12.6 Priority of T-CONT Types
742
Fig. 12.7 Voip Service Architecture
748
Fig. 12.8 Received Frame Layout
762
Advertisement
Related Products
Dasan V5808
Dasan V8102
DASAN Categories
Headsets
Network Hardware
Receiver
Network Router
Server
More DASAN Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL