Gpon Olt Cli User Manual: Release Date 2021-4-25
Gpon Olt Cli User Manual: Release Date 2021-4-25
USER MANUAL
Version V2.1
1
CONTENTS
1. Access OLT............................................................................................................11
2. Command Line Interface.......................................................................................14
2.1 Abstract..........................................................................................................14
2.2 CLI Configuration Mode.................................................................................14
2.3 CLI Specialities................................................................................................15
2.3.1 Online Help..............................................................................................15
2.3.2 Display Specialities..................................................................................20
2.3.3 History Commands..................................................................................20
2.3.4 Error Messages........................................................................................21
2.3.5 Edit Specialities........................................................................................22
3. OLT Management Configuration..........................................................................24
3.1 Configure Outband Management..................................................................24
3.1.1 Enter AUX Port Configuration Mode.......................................................24
3.1.2 Outband Management IP address..........................................................24
3.1.3 Outband Management IPv6 Address......................................................25
3.1.4 Show AUX Port Information....................................................................26
3.2 Configure Inband Management.....................................................................26
3.3 Configure Manangement Gateway................................................................27
3.4 Configure DNS................................................................................................29
4. Port Configuration................................................................................................30
4.1 Port Configuration..........................................................................................30
4.1.1 Enter Port Configuration Mode...............................................................30
4.1.2 Enable /Disable Port................................................................................30
4.1.3 Configure Port Description......................................................................31
4.1.4 Configure Port Duplex Mode..................................................................32
4.1.5 Configure Port Speed..............................................................................33
4.1.6 Configure Port Rate Limitation................................................................34
4.1.7 Configure Port VLAN Mode.....................................................................35
4.1.8 Configure Hybrid Port VLAN....................................................................36
2
4.1.9 Configure Trunk Port VLAN.....................................................................37
4.1.10 Configure Port PVID................................................................................38
4.1.11 Configure Access Port VLAN....................................................................39
4.1.12 Configure Port Flow Control....................................................................40
4.1.13 Configure Port Broadcast Suppression...................................................40
4.1.14 Configure Port Multicast Suppression....................................................41
4.1.15 Configure Port Unknown Unicast Suppression.......................................42
4.1.16 Configure Port Isolation..........................................................................43
4.1.17 Configure Port Loopback.........................................................................44
4.1.18 Configure Port Loopback Detection........................................................45
4.1.19 Configure Port Jumboframe....................................................................46
4.1.20 Show Port Statistics.................................................................................47
4.1.21 Clean Port Statistics.................................................................................48
4.1.22 Show Interface Configurations................................................................48
4.2 Example..........................................................................................................50
5. Port Aggregation Configuration............................................................................52
5.1 Introduction...................................................................................................52
5.2 Port Aggregation Configuration.....................................................................52
5.2.1 Create Static Aggregation Group............................................................52
5.2.2 Configure Load Balancing Policy of Group..............................................53
5.2.3 Configure Member Port of Group...........................................................54
6. VLAN Configuration...............................................................................................56
6.1 VLAN Configuration........................................................................................56
6.1.1 Create/Delete VLAN................................................................................56
6.1.2 Configure/Delete VLAN Description........................................................57
6.1.3 Configure/Delete IP Address and Mask of VLAN....................................58
6.2 Show VLAN Information.................................................................................59
7. VLAN Translation/QinQ.........................................................................................61
7.1 Configure VLAN Translation/QinQ.................................................................61
7.2 Example..........................................................................................................62
8. ARP Proxy..............................................................................................................63
3
9. MAC Address Configuration..................................................................................64
9.1 Overview........................................................................................................64
9.2 Configure MAC Address.................................................................................65
9.2.1 Configure MAC address Table.................................................................65
9.2.2 Configure MAC Address Aging Time.......................................................66
9.2.3 Clean MAC Address Table.......................................................................66
9.2.4 Configure Maximum Learnt MAC Enties of Port.....................................67
9.3 Show MAC Address Table..............................................................................67
9.3.1 Show MAC Address Table.......................................................................67
9.3.2 Show MAC Address Aging Time..............................................................68
10. Configure Port Mirroring......................................................................................69
10.1 Configure Mirroring Destination Port.........................................................69
10.2 Configure Mirroring Source Port................................................................69
10.3 Delete Port Mirroring.................................................................................70
11. IGMP Configuration..............................................................................................72
11.1 IGMP Snooping...........................................................................................72
11.1.1 Enable/Disable IGMP Snooping..............................................................72
11.1.2 Configure Multicast Data Forwarding Mode..........................................72
11.1.3 Configure Port Multicast VLAN...............................................................73
11.1.4 Configure Multicast Router Port.............................................................74
11.1.5 Configure Static Multicast.......................................................................75
11.1.6 Configure Fast Leave...............................................................................75
11.1.7 Configure Multicast Group Limit.............................................................76
11.1.8 Configure Parameters of Special Query..................................................77
11.1.9 Configure Parameters of General Query................................................78
11.1.10 Configure Source IP of Query..................................................................78
11.1.11 Configure Multicast Member Aging Time...............................................79
11.1.12 Show Multicast Gourp Information........................................................80
11.1.13 Configure Multcast on PON....................................................................80
11.2 Example......................................................................................................81
12. ACL Configuration.................................................................................................84
4
12.1 Overview.....................................................................................................84
12.2 ACL Confiuration.........................................................................................85
12.2.1 IP Standard ACL.......................................................................................85
12.2.2 IP Extended ACL......................................................................................86
12.2.3 ACL Based on MAC Address....................................................................87
12.2.4 ACL Based on Port Binding......................................................................89
12.2.5 ACL Based on QoS...................................................................................90
12.2.6 ACL Rule Apply to Port............................................................................92
12.3 Example......................................................................................................93
13. QoS Configuration.................................................................................................95
13.1 Configure Queue Scheduling Mode............................................................95
13.2 Configure Queue Mapping.........................................................................96
14. STP Configuration..................................................................................................98
14.1 STP Default Settings....................................................................................98
14.2 Cofigure STP................................................................................................98
14.2.1 Enable STP Function................................................................................99
14.2.2 Enable Port STP.....................................................................................100
14.2.3 Configure Bridge Priority.......................................................................100
14.2.4 Configure Forward Delay......................................................................101
14.2.5 Configure Hello Time.............................................................................103
14.2.6 Configure Max Aging Time....................................................................104
14.2.7 Configure Priority of Designated Port...................................................105
14.2.8 Configure Path Cost of Designated Port...............................................106
14.2.9 Configure Edge Port..............................................................................107
14.2.10 Configure Point to Point Mode.............................................................108
14.3 Show STP Information..............................................................................109
15. DHCP Management Configuration.....................................................................110
15.1 Configure DHCP Server.............................................................................110
15.2 Configure DHCP Relay...............................................................................111
15.3 Configure DHCP Snooping........................................................................113
16. L3 Route Configuration.......................................................................................119
5
16.1 L3 Route Configuration.............................................................................119
16.1.1 Hardware Router Table.........................................................................119
16.1.2 Static Route...........................................................................................119
16.1.3 Key Chain...............................................................................................120
16.2 RIP.............................................................................................................121
16.2.1 RIP Overview.........................................................................................121
16.2.2 RIP Configuration..................................................................................122
16.2.3 RIP Configuration Example....................................................................131
16.3 OSPF..........................................................................................................138
16.3.1 OSPF Overview......................................................................................138
16.3.2 OSPF Configuration...............................................................................139
16.3.3 OSPF Configuration Example.................................................................150
16.4 Manipulate Routing Updates...................................................................158
16.4.1 Route IP List...........................................................................................158
16.4.2 Route Redistribution.............................................................................164
16.4.3 Distribution List Control Routing Updates............................................168
16.4.4 Routing Maps to Control Routing Updates...........................................177
16.4.5 Prefix Lists to Filter Routing..................................................................183
17 IPv6......................................................................................................................186
17.2 VLAN IPv6 Address....................................................................................186
17.3 IPv6 Static Neighbour...............................................................................187
17.4 IPv6 SLAAC................................................................................................188
17.4.1 IPv6 SLAAC Work Processes..................................................................189
17.4.2 IPv6 SLAAC Configuration......................................................................190
17.4.3 Example(pending).................................................................................195
17.5 DHCPv6.....................................................................................................195
17.5.1 DHCPv6 Overview.................................................................................195
17.5.2 DHCPv6 Server......................................................................................198
17.5.3 DHCPv6 Relay........................................................................................207
17.6 IPv6 Route.................................................................................................212
17.6.1 IPv6 Static Route Configuration............................................................212
6
17.6.2 View IPv6 Hardware Routing Information............................................213
17.7 IPv6 Connectivity Test..............................................................................214
18 PON Management..............................................................................................215
18.2 Show PON Port Info and Optical Power...................................................215
18.2.1 Show Pon Port Statistics........................................................................215
18.2.2 Show PON Port Optical Power..............................................................215
18.2.3 Show ONU Optical Transceiver.............................................................216
18.3 PON Port Configuration............................................................................216
18.3.1 Enable/Disable PON..............................................................................216
17.1 ONU auto-learn configuration..................................................................218
19 ONU Management..............................................................................................219
19.2 ONU Basic Configuration..........................................................................219
19.2.1 Show Auto-find ONU.............................................................................219
19.2.2 ONU Automatic Authorize....................................................................219
19.2.3 Show ONU Authorized Info...................................................................220
19.2.4 Show ONU Authorized Detail-info........................................................220
19.2.5 Activate|Deactivate ONU......................................................................221
19.2.6 ONU Authorization................................................................................221
19.2.7 Configure ONU Description String........................................................222
19.3 ONU Remote Configuration......................................................................223
19.3.1 Show ONU SFP Info...............................................................................223
19.3.2 Upgrade ONU........................................................................................223
19.3.3 Auto-upgrade ONU................................................................................225
19.3.4 Reboot ONU..........................................................................................225
19.3.5 TCONT Configuration............................................................................226
19.3.6 GEMPORT Configuration.......................................................................227
19.3.7 ONU Service Configuration...................................................................228
19.3.8 Service-port Configuration....................................................................229
19.3.9 ONU UNI Configuration.........................................................................231
19.3.10 ONU FEC Configuration.........................................................................233
19.3.11 Show ONU Service.................................................................................233
7
19.3.12 Show ONU Capability............................................................................233
19.4 ONU Remote Port Configuration..............................................................234
19.4.1 ONU Port Enable|Disable......................................................................234
19.4.2 ONU Port Autonegotiation....................................................................234
19.4.3 ONU Port Flow Control Configuration..................................................235
19.4.4 Multicast VLAN Configuration...............................................................235
19.4.5 Configure ONU Iphost...........................................................................236
19.4.6 ONU Port Multicast Tag-strip Configuration.........................................237
19.4.7 Example for SFU....................................................................................237
19.4.8 Example for HGU...................................................................................239
19.5 Rogue-onu Configuration.........................................................................242
19.5.1 Rogue-onu-detect.................................................................................242
19.5.2 Rogue-onu status..................................................................................243
20 ONU Template Management..............................................................................244
20.2 Summary of ONU Template.....................................................................244
20.3 ONU Template Configuration...................................................................245
20.4 DBA Template Configuation.....................................................................246
20.5 Traffic Template Configuation..................................................................248
20.6 Line Template Configuation.....................................................................249
20.7 Service Template Configuation.................................................................253
20.8 Alarm Threshold Template Configuration................................................255
20.9 Show/Delete Profile Configuration..........................................................256
21 ONU Auto-learn Configuration...........................................................................257
21.2 ONU Auto-learn........................................................................................257
21.3 Enable Auto-learn.....................................................................................258
22 System Management..........................................................................................259
22.2 Configuration Management.....................................................................259
22.2.1 Save Configurations...............................................................................259
22.2.2 Erase Configurations.............................................................................259
22.2.3 Show Startup Configurations................................................................260
22.2.4 Show Running Configurations...............................................................260
8
22.2.5 Upload/Download Configuration File...................................................260
22.3 Check System Information........................................................................261
22.3.1 Check System Running Information......................................................261
22.3.2 Check Version Information....................................................................261
22.3.3 Check System Running Time.................................................................262
22.4 System Basic Configurations.....................................................................262
22.4.1 Configure System Name........................................................................262
22.4.2 Configure Terminal Display Attribute...................................................263
22.4.3 Configure Terminal Time-out Value......................................................263
22.5 System Basic Operations..........................................................................264
22.5.1 Upgrade System....................................................................................264
22.5.2 Network Connectivity Test....................................................................265
22.5.3 Reboot System......................................................................................265
22.5.4 Telnet.....................................................................................................265
22.5.5 Configure RTC System Time..................................................................266
22.5.6 NTP Client..............................................................................................266
22.5.7 Timezone Configuration........................................................................267
22.5.8 Fan Control............................................................................................267
22.6 Debug Information...................................................................................268
22.6.1 Enable/Disable CPU Debug Information...............................................268
22.6.2 Enable/Disable Functional Module Debug Information.......................269
23 User Management..............................................................................................270
23.2 User Privilege............................................................................................270
23.3 Default User..............................................................................................270
23.4 Add User Account.....................................................................................270
23.5 Show User Account List............................................................................271
23.6 Delete User Account.................................................................................271
23.7 Modify Password......................................................................................271
24 SNMP Configuration...........................................................................................273
24.2 SNMP Introduction...................................................................................273
24.3 SNMP Version and MIB............................................................................273
9
24.4 SNMP Configuration.................................................................................275
24.4.1 Configure Community...........................................................................275
24.4.2 Configure Trap Server Address.............................................................275
24.4.3 Configure Contact Information.............................................................276
24.4.4 Configure Location Information............................................................277
25 Alarm and Event Management...........................................................................278
25.2 Alarm and Event Introduction..................................................................278
25.3 Alarm Management..................................................................................278
25.3.1 System Alarms.......................................................................................279
25.3.2 PON Alarms...........................................................................................281
25.3.3 ONU Alarms...........................................................................................283
25.4 Event Management..................................................................................285
25.4.1 System Events.......................................................................................286
25.4.2 PON Events............................................................................................287
25.4.3 ONU Events...........................................................................................287
26 System Log..........................................................................................................289
26.2 System Log Introduction...........................................................................289
26.2.1 Log Type................................................................................................289
26.2.2 System Log Level...................................................................................290
26.3 Configure System Log...............................................................................291
26.3.1 Show System Log...................................................................................291
26.3.2 Clear System Log...................................................................................291
26.3.3 Configure System Log Server................................................................292
26.3.4 Configure Save Level of System Log......................................................292
26.3.5 Save System Log to Flash......................................................................293
26.3.6 Clear System Log in Flash......................................................................293
26.3.7 Upload System Log................................................................................293
10
1. Access OLT
You can access OLT by CLI (Command Line Interface) via console cable or
telnet. This charpter introduces how to access OLT CLI via console cable.
console cable.
2. Run secureCRT or other simulation tools such as Putty in the PC, and
Baudrate: 115200
Data bits: 8
Parity: none
Stop bits: 1
11
COM port properties
Login: admin
Password: Xpon@Olt9417#
gpon-olt> enable
Password: Xpon@Olt9417
gpon-olt#
2.1 Abstract
connection.
command.
Privileged mode
13
Interface configuration mode
Command Command
CLI mode Specialty Prompt
to enter to exit
Show
configuration
Privileged
s and execute gpon-olt# exit
mode
system
commands
Global Configure
gpon-olt configure
configurati system exit
(config)# terminal
on mode parameters
Completely help
14
Partly help
You can get some help information of CLI with the help above.
(1) Input “?” to get all commands and illustrations at any configuration
mode.
gpon-olt (config)#
ip IP information
characteristics.
syslog Specific system log save level,which syslog level not less
terminal
(2) Input “?” behind a command, it will display all key words and
(4) Input a character string end with “?”, it will display all key words that
gpon-olt (config)# e
(5) Input a command and a character string end with “?”, it will display
(6) Input a character string end with “Tab”, it will display completely key
Operation function
19
that executed before. Users can use direction key to invoke history
Display previous
Visit previous Up direction key “↑” or
command if there is
command <Ctrl+P>
early history command.
will come out error message. The following table shows some frequent
errors.
No this command
20
Command incomplete Command is not complete
CLI provides basic edit function. Every command supports maxum 256
operation function
21
help.
another row.
22
3. OLT Management Configuration
IP.
Command Function
configuration mode.
Command Function
23
Step 1 config terminal Enter global
configuration mode.
management IP to
default.
configuration mode.
management IP.
Command Function
configuration mode.
24
Step 2 interface aux Enter AUX port
configuration mode.
addressand prefix
AUX port.
configuration mode.
cofniguraiton.
Command Function
configuration mode.
information.
25
3.2 Configure Inband Management
uplink port.
Command Function
configuration mode.
configuration mode.
configuration mode.
vlan_id range is 1 -
4094.
and mask.
mask.
26
configuration mode.
When OLT management IP and management server are not in the same
Command Function
configuration mode.
gateway.
gateway.
gateway configuration.
27
3.4 Configure DNS
Command Function
configuration mode.
gateway.
28
4. Port Configuration
Command Function
mode.
You can use these commands to enable or disable port. The ports are
enabled by default. If you want a port not to transfer data, you can
shutdown it.
29
Command Function
mode.
configuration mode.
slot/port} configurations.
description by default.
Command Function
30
mode.
description.
configuration mode.
slot/port} configurations.
Duplex includes full duplex and half duplex. When it works at full duplex,
port can transmit and receive data at the same time; when it works at
half duplex, port can only transmit or receive data at the same time. The
Command Function
31
Step 1 configure terminal Enter global configuration
mode.
mode.
default.
mode.
slot/port} configurations.
When port speed mode is auto, the actual speed of port is determined
auto by default.
Command Function
32
Step 1 configure terminal Enter global configuration
mode.
10000|auto }
default.
mode.
slot/port} configurations.
Command Function
mode.
33
Step 2 interface {interface_type Enter interface
integral multiple of
64kbps.
configurations.
mode.
slot/port} configurations.
Each port has three VLAN mode, access, trunk and hybrid.
Access mode is usually used for port that connects with PC or other
terminals, only one VLAN can be set up. Trunk mode is usually used for
port that connects with switch; one or more VLAN can be set up. Hybrid
mode can be used for port that connects with PC or switch. Default
34
VLAN mode is hybrid.
Command Function
mode.
mode.
trunk | hybrid}
default.
mode.
slot/port} configurations.
Notice:
All VLAN configurations will lose when you change port VLAN mode.
35
4.1.8 Configure Hybrid Port VLAN
Hybrid port can belong to several VLAN. It can be used to connect with
Command Function
mode.
slot/port} mode.
vlan_id
mode.
configurations.
slot/port}
36
Notice:
You must configure PVID for the port that if it is configured untagged
Command Function
slot/port}
vlan_id
mode.
configurations.
37
slot/port}
Notice:
If PVID of trunk mode port is the same as VLAN ID, the VLAN will add to
Only under hybrid mode and trunk mode can set up PVID.
Command Function
configuration mode.
PVID to default.
configuration mode.
38
Step 5 show interface {interface_type Show interface
slot/port} configurations.
Only one untagged mode VLAN can be set to access port. Port’s PVID is
Command Function
mode.
configuration mode.
VLAN.
default.
configuration mode.
Command Function
mode.
slot/port} mode.
mode.
slot/port}
40
4.1.13 Configure Port Broadcast Suppression
Command Function
configuration mode.
configuration mode.
suppression.
1000000, it should be
integral multiple of
64kbps.
suppression.
mode.
slot/port} configurations.
41
Step 6 write Save configurations.
Command Function
configuration mode.
configuration mode.
suppression.
1000000, it should be
integral multiple of
64kbps.
suppression.
mode.
Command Function
mode.
configuration mode.
unicast suppression.
it should be integral
multiple of 64kbps.
suppression.
mode.
With this function, customers can add ports to a same isolation group so
that these ports can be isolated among L2 and L3 steams. This will
Command Function
mode.
configuration mode.
group.
isolation group.
configuration mode.
Command Function
mode.
configuration mode.
outside] loopback.
loopback.
data loopback.
configuration mode.
45
Notice:
Command Function
mode.
detection.
detection.
detection status.
configuration mode.
Command Function
mode.
configuration mode.
transmission.
supports transmitting
supports transmitting
frame.
transmission.
configuration mode.
47
4.1.20 Show Port Statistics
Command Function
mode.
configuration mode.
configuration mode.
Command Function
configuration mode.
slot/port}
48
Step 3 clean statistics Clean port statistics.
Operation Command
slot/port}
49
Current link speed: 1000Mbps, Current link mode: half-duplex
Port priority: 0
PVID: 1
4.2 Example
1. Requirement
Uplink port 1 of OLT connects to switch, port mode is trunk. It can pass
through VLAN 20 and VLAN 100, add VLAN tag 123 to untagged streams.
2. Framework
51
3. Steps
gpon-olt (config-if-ge0/1) #
52
5. Port Aggregation Configuration
5.1 Introduction
In an aggregation group, member ports must have the same speed, the
configurations contain:
(1) STP configurations such as STP status, link properties (e.g. p2p port),
(4) Port link type such as trunk mode, hybrid mode and access mode.
value.
53
5.2 Port Aggregation Configuration
altogether in every group and at most 4 ports will come into being
channel group.
Command Function
configuration mode.
aggregation group.
aggregation group.
group configuration.
54
both source and destination MAC, source IP, destination IP, both source
MAC.
Command Function
configuration mode.
configurations.
Command Function
configuration mode.
configuration mode.
55
Step 3b no channel-group <1-4> Delete current port
group.
mode.
configurations.
56
6. VLAN Configuration
Create/delete VLAN
Command Function
configuration mode.
VLAN interface
configuration mode.
to 4094.
57
Step 2b no vlan vlan_id Delete specific VLAN.
configuration mode.
configurations.
means display
information of specific
VLAN.
existed VLAN.
Command Function
configuration mode.
58
Step 2 interface vlan vlan_id Create VLAN or enter
VLAN infterface
configuration mode.
to 4094.
description.
description.
configuration mode.
information.
Notice:
Command Function
59
Step 1 config terminal Enter global
configuration mode.
configuration mode.
to 4094.
mask of VLAN.
configuration mode.
members.
Operation Command
60
Show VLAN port members show interface vlan vlan-id
Example:
Vlan ID : 100
Name : vlan100
Notice:
By default, It have one vlan on system ,do not delete and edit.
Vlan ID :1
Name : vlan1
Tagged Ports :
ge0/8
gpon0/8
61
7. VLAN Translation/QinQ
Command Function
mode.
mode.
62
interface {interface_type translation/QinQ
slot/port} configurations.
7.2 Example
0/1
(2)QinQ function
400, priority is 4.
63
gpon-olt (config)#show vlan vlan-mapping interface gigabitethernet
0/2
64
8. ARP Proxy
Command Function
configuration mode.
to vlan interface
65
9. MAC Address Configuration
9.1 Overview
address table. MAC address table contains MAC addresses that connect
with the device, ports, VLAN, type and aging status. Dynamic MAC
that: if port A receives a message, device will analyze the source MAC
table, device will update it; if not, device will add this new address to the
table.
For the messages whose destination MAC address can be found in MAC
destination device will respond. The device will add new MAC to the
table. Then, messages with this destination MAC will be forwarded via
the new table. However, when messages still can’t find its destination by
66
unreachable.
You can add static MAC address entries, delete MAC address entries or
Command Function
configuration mode.
interface_type slot/port
xxxx:xxxx:xxxx entry.
67
table.
table.
There is aging time in device. If device doesn’t receive any message from
other devices in aging time, it will delete the MAC address from MAC
table. But for static MAC in the table, aging time is not effective.
Command Function
configuration mode.
1000000s.
Default is 300s.
agingtime
68
Step 4 write Save configurations.
Command Function
configuration mode.
table.
Command Function
mode.
configuration mode.
69
Step 4 exit Exit to global
configuration mode.
Command Function
configuration mode.
Ethernet port.
address table.
70
the following table shows.
Command Function
configuration mode.
71
10. Configure Port Mirroring
Command Function
configuration mode.
configurations.
72
10.2 Configure Mirroring Source Port
Mirroring source port is the port we want to monitor. Data that pass
Command Function
configuration mode.
data.
tx means transmitted
data.
configurations.
73
10.3 Delete Port Mirroring
Command Function
configuration mode.
slot/port}
configurations.
Example:
gigabitethernet 0/1
74
11. IGMP Configuration
command.
Command Function
configuration mode.
configuration configurations.
75
11.1.2 Configure Multicast Data Forwarding Mode
Command Function
mode.
forwarding mode.
vlan-id mode { flood | forward
| strict-forward}
After add VLAN to the port, you should also configure multicast VLAN for
Command Function
configuration mode.
76
slot/port} configuration mode.
vlan_id VLAN.
configuration mode.
vlan
Command Function
configuration mode.
77
vlan-id interface {interface_type router port.
slot/port}
slot/port}
Command Function
configuration mode.
interface-id
78
configuration configurations.
Command Function
configuration mode.
configuration mode.
leave
configuration mode.
information information.
79
11.1.7 Configure Multicast Group Limit
Command Function
configuration mode.
configuration mode.
group limitation.
limitation to default.
configuration mode.
information information.
80
query as the following table shows.
Command Function
configuration mode.
is 1s.
configuration configurations.
Command Function
configuration mode.
81
Step 2a ip igmp snooping general-query- Enable or disable
Default is disable.
configuration configurations.
Command Function
configuration mode.
is 1.1.1.1.
configuration configurations.
82
11.1.11 Configure Multicast Member Aging Time
If the port doesn’t receive any report message from member in aging
Command Function
configuration mode.
defaultis260s.
configuration configurations.
If there is member join a group, you can use the following commands to
Command Function
83
Step 1 configure terminal Enter global
configuration mode.
id | all] information.
Command Function
configuration mode
11.2 Example
including multicast VLAN, multicast router port and ONU LAN port, etc.
1. Requirement
84
Snooping, configure multicast VLAN, multicast router port, and so on.
2. Framework
3. Steps
(1)Create VLAN
100 tagged
gpon-olt(config-pon-0/1)# exit
gigabitethernet 0/1
igmp trap-to-cpu
def_vlan 100
onu_1/1/2:1 vport 1
87
12. ACL Configuration
12.1 Overview
with the rules the data packages can be filtered. ACL can achieve this
IP Standard ACL.
IP Extended ACL.
88
IP Standard ACL 0-999 1000
IP Standard ACL.
IP Extended ACL.
Command Function
89
mode.
mode.
access-list-number is ACL
index. range:0-999.
mode.
number | all]
90
12.2.2 IP Extended ACL
Command Function
mode.
mode.
access-list-number is ACL
index. range:1000-1999.
mode.
91
Step 5 show access-list [access-list- Show ACL configurations.
number | all ]
Command Function
mode.
mode.
access-list-number is ACL
index. range:2000-2999.
<xx:xx:xx:xx:xx:xx> {[dest]
<xx:xx:xx:xx:xx:xx>
92
Step 3b no access-list access-list-index Delete ACL
mode.
number | all]
Command Function
mode.
mode.
access-list-number is ACL
index. range:5000-5999;
93
vlan | cos | ethernet-type | src- Deny:Do not permit data
dest-ip:destination IP
address
tos-dscp:IP priority
src-mac:source MAC
address
dest-mac:destination MAC
address
vlan:VLAN IAD
cos:802.1p priority
ethernet-type:ethernet
type
dest-port:Layer 4
destination port
94
mode.
Command Function
mode.
mode.
access-list-number is ACL
index. range:6000-6999.
95
tos-dscp: IP priority
address
address
vlan: VLAN ID
cos:802.1p priority
ethernet-type: Ethernet
type
dest-port:Layer 4
destination port
mode.
96
12.2.6 ACL Rule Apply to Port
Command Function
mode.
number in
number in
mode.
number
12.3 Example
97
PON1 denies packets which source IP is 192.168.100.10 passing through.
192.168.100.10 255.255.255.255
gpon-olt(config-bsn-acl-5000)# exit
through.
gpon-olt(config)#access-list 2000
0800 ffff
gpon-olt(config-eth-acl-2000)#exit
b8:97:5a:72:37:8d ff:ff:ff:ff:ff:ff
gpon-olt(config-eth-acl-2001) # exit
gpon-olt(config-pon-0/1)#exit
98
99
13. QoS Configuration
Command Function
configuration mode.
scheduling mode.
Queuex is weight of
By default, weights of
100
4, 4, 8, 8.
If it is set to be 0, the
queue.
By default, weights of
4, 4, 8, 8.
configurations.
Command Function
configuration mode.
101
Step 2 queue-scheduler tc priority queue Configure mapping
respectively.
mapping
102
14. STP Configuration
Gigabit Ethernet :4
Ethernet :100
Hello time 2s
Mode RSTP
103
Enable device’s STP function.
Command Function
mode.
function.
disabled.
104
function.
In order to work flexibly, you can disable some specific ports’ STP
function.
Command Function
configuration mode.
configuration mode.
function.
function.
configuration mode.
105
{interface_type slot/port} configurations.
tree.
Command Function
configuration mode.
Priority range is
0~65535, default is
32768.
configurations.
106
14.2.4 Configure Forward Delay
network. Construction of spanning tree will be changed too. But the new
STP PDU can’t go the rounds of network. In this case, a temporary loop
will come out if the new root port and designated port forward data
state, the new STP PDU have gone the rounds of network, then root port
Command Function
configuration mode.
bridge-priority range is
configurations.
107
Step 4 write Save configurations.
Forward Delay has something to do with that how big the network is.
Generally, the bigger the network, the longer forward delay should be
redundant path; while it is too big, network will take more time to
about this.
Notice:
Hello time, forward delay and maximum age are time parameters of root
time can ensure a device find link failure in time and not occupy more
network resource. If hello time is too big, device will be in mistake for
spanning tree. While if too small, network device sends repeated STP
108
PDU frequently. This will increase device’s load and waste network
resource.
Command Function
configuration mode.
time.
1~10, default is 2.
configurations.
discarded.
109
Command Function
configuration mode.
of device.
default is 20.
configurations.
equal conditions, the higher priority port will be selected as root port.
Generally, the priority value is smaller, the port has higher priority. If all
ports’ priority value are the same, their priority decided by their port
index.
Command Function
110
configuration mode.
configuration mode.
designated port.
default is 128.
configuration mode.
Path Cost is related to the speed of the link connected to the port. On
the STP switch, a port can be configured with different path costs.
Command Function
mode.
111
Step 2 interface {interface_type slot/port} Enter interface
configuration mode.
designated port.
configuration mode.
The port which connects with terminal host is Edge Port. In process of
status derectly so that it can reduce transfer time. Because RSTP can’t
detect whether the port is edge port or not, if the port doesn’t connect
with switch, you’d better configure it as edge port. But when the port
112
following table shows.
Command Function
configuration mode.
configuration mode.
edge port.
port to default.
configuration mode.
Point to point mode is usually the link which connects with switches. For
the ports connected with the point-to-point link, upon some port role
113
forwarding delay.
Command Function
mode.
to point port.
configured as point to
point ports.
configuration mode.
114
14.3 Show STP Information
Command Function
port.
115
15. DHCP Management Configuration
Command Function
mode.
function
116
Step 2f dhcp-server interface vlan <1- Add the VLAN to the DHCP
server successful,need to
IP address)
leasetime
configuration
IP address
config
Because the DHCP receiving need to broadcast, so the server and the
client should be in the same network.The DHCP relay can save this issue
Command Function
117
Step 1 config terminal Enter global configuration
mode.
interface configuration
vlan_id(1-4094);
mode
configuration。
config
Command Function
mode.
118
<groupname> group,and enter group
configuration mode.
group.
configuration mode
VLAN interface
configuration
vlan_id(1-4094);
<groupname> 。
<groupname> group。
mode
configuration.
config
119
15.3 Configure DHCP Snooping
To prevent the DHCP message attacking and protect you network to get a
Command Function
mode.
Snoopin.(DHCP Snooping
disable)
enable,can not open
relay)
vlan list
list
4095>…
120
mode.
configuration configuration。
config
Command Function
mode.
Snooping option82.
option (enable|disable)
option82,drop、keep
strategy (drop|keep|
and replace.
replease)
mode.
configuration configuration.
121
Step 6 copy running-config startup- Save configuration.
config
Command Function
mode.
binding list.
HHHH:HHHH:HHHH vlan <1-
<60-1000000>
HHHH:HHHH:HHHH
list.can delete
static|dynamic)
all、static、dynamic .
122
time <1-3600> aging time and delete time.
mode
configuration configuration.
config
Command Function
mode.
configuration
slot/port}
untrust in default.
circuit-id value.
circuit-id string <string>
123
Step 3c no dhcp-snooping information Delete the option82 circuit-
id value.
remote-id string <string>
limit by default.
configuration mode
packetreceiving speed
disable.
124
Step 5b dhcp-snooping errdisable Configure the time when
getting down
configuration configuration.
config
125
16. L3 Route Configuration
Command Function
configuration mode.
routing information.
routing information.
information
126
maximum 512 static route rules.
Command Function
configuration mode.
A.B.C.D
by a routing protocol. Not all protocols can use key management. The
need to define a keychain that identifies the keys that belong to the
keychain. Each key has its own key identifier, which is stored locally. The
key identifier and the combination associated with the message uniquely
127
identify the use of the authentication algorithm and the MD5
authentication package is sent, no matter how many valid keys exist. The
software checks key figures from lowest to highest order and uses the
Command Function
configuration mode.
configuration mode.
identifier,key_number
range 0- 2147483647。
authentication key.
configuration mode.
128
To remove the key chain entry, use the command no key chain;To
delete a key identifier, use the command no key;To delete the key, use
16.2 RIP
must pass to reach the destination. RIP considers that the path with the
lowest number of hops is the optimal path, and the maximum number of
129
16.2.2.1 RIP Basic Configuration
To configure RIP, you enable RIP routing for a network and optionally
configure RIP:
Command Function
configuration mode.
router configuration
mode.
multiple network
130
commands. RIP routing
received through
networks.
which to exchange
routing information.
(normally a broadcast
protocol) to reach
nonbroadcast networks.
131
name) (in|out) metric<0- offset list to routing
metrics to routes
an interface.
timers are 0 to
4294967295 seconds.
•update—Time
between sending
132
routing updates. The
default is 30 seconds.
•invalid—Time after
which a route is
•holddown—Time
before a route is
•flush—Amount of time
133
seconds.
1.
interface commands ip
version 1 | 2 | 1 2} to
134
and receiving on
interfaces.
and static.
protocol distance.
Default 120.
EXEC mode.
timer, filter
list,version,interface
135
information.
information.
If you want to disable RIP routing, use the command no router rip in
If you want to cancel the interface RIP process, you can use the
If you want to restore the default timer value, you can use the command
RIP version 1 does not support authentication. If you are sending and
interface. The key chain determines the set of keys that can be used on
136
RIP authentication is enabled: plain text and MD5. The default is plain
text.
authentication on an interface:
Command Function
configuration mode.
configuration mode,
interface to configure.
authentication (the
authentication.
137
Step 4a ip rip authentication key-chain< Enable RIP
text.
EXEC mode.
timer, filter
list,version,interface
information.
information.
138
To restore clear text authentication, use the command no ip rip
configuration.
broken.
Command Function
configuration mode.
139
configuration mode,
interface to configure.
Default enable.
EXEC mode.
timer, filter
list,version,interface
information.
information.
configuration command.
Command Function
140
configuration mode.
configuration mode,
interface to configure.
2) v2 or v1 and v2.
or v1 and v2.
EXEC mode.
timer, filter
list,version,interface
information.
information.
141
16.2.3 RIP Configuration Example
1. Networking requirements
between any two nodes, and the network size is relatively small. Need
equipment
maintenance workload.
user networks.
2. Networking topology
Configuration:
142
Switch A :VLAN 1 192.168.1.1, VLAN 2 192.168.2.1
interface vlan 1
ip address 192.168.1.1/24
exit
interface vlan 2
ip address 192.168.2.1/24
exit
network 192.168.1.0/24
network 192.168.2.0/24
/**********************************************************
interface vlan 1
ip address 192.168.1.2/24
exit
interface vlan 11
143
ip address 192.168.11.2/24
exit
router rip
network 192.168.11.0/24
network 192.168.1.0/24
/**********************************************************
Switch C:
interface vlan 1
ip address 192.168.21.3/24
exit
interface vlan 2
ip address 192.168.2.3/24
exit
144
switchport access vlan 21
router rip
network 192.168.21.0/24
network 192.168.2.0/24
Switch A:
configure terminal
interface vlan 1
ip adderss 192.168.1.1/24
exit
interface vlan 2
ip adderss 192.168.2.1/24
exit
router rip
145
offset-list 5 in 3 vlan 1 //offset-list check the entry notification
192.168.1.0/24
networke 192.168.2.0/24
Switch B:
configure terminal
interface vlan 1
ip adderss 192.168.1.2/24
interface vlan 3
ip adderss 192.168.3.1/24
exit
router rip
networke 192.168.1.0/24
networke 192.168.3.0/24
A,it show the route table 192.168.3.0 metric is 4, If not set offset-list,the
metric is 2.
146
16.2.3.3 RIPv2 Authentication
topology as above.
configure terminal
exit
exit
interface vlan 1
interface vlan 2
the result:
147
It will show route table 192.168.2.0, not show route table 192.168.23.0.
If Swith A and Switch B are not the same authentication mode, they
16.3 OSPF
148
be divided into areas for management, and the routing information
mode.
Enabling OSPF requires that you create an OSPF routing process, specify
Command Function
149
Step 1 configure terminal Enter global
configuration mode.
configuration mode.
router id.
or an IP address.
EXEC mode.
configuration command.
Command Function
150
Step 1 configure terminal Enter global
configuration mode.
configuration mode,
interface to configure.
interface.
number of seconds
advertisement
transmissions. The
range is 1 to 65535
seconds.
estimated number of
151
sending a link state
range is 1 to 65535
second.
The default is 1.
number of seconds
sent on an OSPF
nodes on a network.
10 seconds.
152
Step 8 ip ospf dead-interval seconds (Optional) Set the
nodes on a network.
password to be used by
auth_key
neighboring OSPF
keyboard-entered
characters up to 8 bytes
in length. All
neighboring routers on
153
the same network must
password to exchange
OSPF information.
authentication.
md5 key
•keyid—An identifier
from 1 to 255.
•key—An alphanumeric
password of up to 16
bytes.
authentication.
authentication.
digest
EXEC mode.
interface information.
name]
154
16.3.2.3 Configure OSPF Area Parameters
areas (NSSAs). Stub areas are areas into which information on external
routes is not sent. Instead, the area border router (ABR) generates a
default external route into the stub area for destinations outside the
autonomous system (AS). An NSSA does not flood all LSAs from the core
into the area, but can import AS external routes within the area by
redistribution.
numbers are contiguous, you can use the area range router
parameters:
Command Function
configuration mode.
155
Step 2 router ospf Enable OSPF routing,
configuration mode.
password-based
protection against
unauthorized access to
decimal value or an IP
address.
authentication on the
message-digest
area.
no-summary keyword
stub area.
156
Step 6 area area-id nssa[no-summary] (Optional) Defines an
area as a not-so-stubby-
of these keywords:
•no-summary—Select
EXEC mode.
config information.
157
information related to
specific router.
default route even if it has a default route. When the default route in
advertise the default route to the entire OSPF autonomous domain. The
default ASE LSA (Type 5 LSA) and advertises it to the entire OSPF
autonomous domain.
Command Function
configuration mode.
mode.
158
{[always]}*1 {[metric] <0-
configuration mode.
Command Function
configuration
mode.
information
originate]
related to the
show ip ospf database[router] [adv-router
OSPF
database.
[ip-address]]
originate]
159
[ip-address]]
originate]
[ip-address]]
originate]
router [ip-address]]
originate]
[ip-address]]
information
related to the
OSPF route.
160
Step 4 show ip ospf interface[interface-name] Display OSPF-
related
interface
information.
interface
neighbor
information.
2. Networking topology
3. Configuration
192.168.2.1/24
161
interface vlan 1
ip address 192.168.1.1/24
exit
interface vlan 2
ip address 192.168.2.1/24
exit
Enable ospf , and configure these two network segments to run the
ospf protocol.
router ospf
router-id 1.1.1.1
2. Networking topology
3. Configuration
163
192.168.3.2/24,area 2 and 192.168.5.1/24, area 2。
OSPF area.
Test result
Refer to OSPF intra-area route test and OSPF inter-area route test.
Test process
164
test to reconnect 192.168.4.0/24 of Switch C
Test result:
Check whether the time of deleting and adding the 192.168.4.0 network
configuration.
2.Networking Topology
3.Configuration
Switch B:
router ospf
area 2 stub
165
Switch D:
router ospf
area 2 stub
Test result:
routing table of Switch D adds the default route to the original route
2.Networking topology
3.Configuration
166
Switch B learn route aggregation in area 2.
Switch B:
Switch C
ip address 10.1.1.1/24
ip address 10.1.2.1/24
router ospf
4.Test result
167
Switch A O 172.16.1.0 [110/2] via 192.168.2.2, 00:00:02,
Vlan2
168
10.0.0.0/16 is subnetted, 1 subnets
Access lists are typically used to control user data flow, but access lists do
not affect the data flow generated by the current router. There is an
implicit deny any statement at the end. Access-List lists are available in
169
1. The standard index has a value range of 1-99, 1300-1999, and only
and destination ip
Command Function
configuration mode.
<wildcard_mask> access_list_index
source IP address or
mask;
IP access based on a
single source IP
170
address;
address;
any} 2000-2699,
address;
171
based on any source IP
address;
EXEC mode.
information
Prefix lists are similar to access lists, and the benefits of prefix lists
prefix list requires matching the routing prefix to the prefix listed in the
prefix list, just as matching the access list.When there is a match, use
routing.
172
serial number when deleting a configuration item.
The Prefix-List is identified by the Prefix List name, which can contain
as one of the table items satisfies the condition, this means that the
Prefix-List filter (which does not enter the match of the next table item)
is passed.
Command Function
mode.
173
The range of le_value is 0-
32;
satisfy:
mode.
summary] information.
To remove the prefix list and all its entries, use the commsnd no IP
prefix-list prefix_list_name .
The keywords ge and le are optional and are used to specify the range of
prefix lengths to match, which must satisfy the condition: length < ge-
174
1. IP prefix-list 2 permit 2.2.2.2.0/24 /(match the first 24 bits: 2.2.*,
the seed metric values for all redistribution routes. Specify the seed
metric values in a redistribute, for which you can use the option metric
175
Manage distance.When using routing redistribution, it may occasionally
a priority.
system.The only exception is the OSPF E2 routing, which keeps the initial
system.
value, otherwise the rerouting route will not be notified.In OSPF, the
used to make a specific interface can't accept that sends hello packets,
interface at the same time, also can notice of these interfaces are
routing.
Command Function
configuration mode.
configuration mode
177
static|ospf) {metric <0-16>}*1 redistribution, including
static routing
information to rip
protocol.Let rip be
published.
interface
{A.B.C.D}*1
information
Command Function
configuration mode.
178
Step 3 distance <1-255> Set the administrative
redistribution routes
information to rip
{A.B.C.D}*1 interface
information
Example:
179
Configuration Result
Vlan2
distance vector routing protocols, such as RIP and EIGRP.Like the OSPF
180
link state routing protocol, the IN direction (which affects local routing
tables but is present IN LSDB), the OUT direction does not work.But local
interface.
filtered, so that the local routing routing table of the distribution list is
changed, and when the local router updates the routing information to
Command Function
181
configuration mode..
configuration mode
information
Initially, R3 was able to learn the three loopback routes of R1, as well as
182
Of course, in - oriented distribution lists can have the same effect in R3.
So, first of all, R2's own routing table will change, and 3.0's routing will
be filtered out, and R3, the downstream RIP router, won't learn 3.0.
Note that for a link-state routing protocol such as OSPF, the messages
LSAs, and the distribution list cannot filter LSAs. Therefore, to deploy the
distribution list in the link state protocol, you need to be aware of:
In the in direction, the distribution list can only filter the route when the
183
LSA is received locally. When the route is generated, the router's own
routing table that implements the distribution list will be affected by the
distribution list (but the local LSDB still has the LSA), and The router still
sends the LSAs in the LSADB to the neighbors. Therefore, the locally
In the outbound direction, the distribution list can only work on the
ASBR that performs the route redistribution action, and can only work on
distribution list can work normally in this case, but if it is not a local
For example, redistribute directly into OSPF on R1, and use the outbound
distribution list to filter out the 1.1.1.0 external route. However, R1 re-
184
Command Function
configuration mode..
information
introduce these three exterior routing and then out the direction of the
distribution list, will be deployed on R1, and have effect on the three
routing.
185
R1 (config - the router) # redistribute connected subnets
After the above configuration is implemented, R1 will filter out the 3.0
routing.
between protocols
Case 1
R2 is configured as follows:
What this command means here is that only 1.1.1.0 is allowed out of the
reroute from the RIP routing protocol (to the OSPF protocol, there is no
Case 2
Open loopback interface 2.2.2.2/24 on R2, R2 reissues RIP into OSPF and
// there are only 1.1.1.0 routes in R3, that is, the command redistribute -
list 1 out here works for all routes injected from outside into the OSPF,
Case 3
Open loopback interface 2.2.2.2/24 on R2, R2 reissues RIP into OSPF and
// that is, the routing other than 1.1.1.0 that was re-published from RIP
was blocked and the local direct connection port was republished
187
Configuration example 3:
Configuration Result
0.0.0.1
188
16.4.4 Routing Maps to Control Routing Updates
Route Map can be used for route redistribution and policy routing, and is
often used in BGP. Policy routing is actually a complex static route. The
forwarded to the specified next hop route. Policy routing can provide
The Switch can run multiple routing protocols simultaneously, which can
the action that will be taken if the route update satisfies the conditions
189
independent feature, some matching and setting Route Map
match. If there is no command set, nothing is done except for the match.
Like the access list, there is an implicit deny any statement at the end of
the route map. The result of this statement depends on the purpose of
Command Function
configuration mode.
map configuration
mode.
access_list_number is 1-
190
access-list, and 100-199
extended access-list.
prefix-list.
prefix_list_name
the access_list_number
standard access-list,
191
Step 8 match metric metric_value Matching the specified
routing metrics,
metric_value ranges
from 0-4294967295.
tag_value range is 1-
4294967295.
metric_value ranges
from 0-4294967295.
redistributed routing.
redistributed routing.
forwarding.
192
EXEC mode.
information
Command Function
configuration mode.
193
information
For example
Configuration Result
192.168.6.0/24 0
192.168.7.0/24 ethv0.1
194
! 2)switch c execute:redistribute
! tag: 0
! via 192.168.1.1,
! via 192.168.1.1,
ethv0.1
Methods of OSPF filtering LSA: area filter-list prefix; only those three
195
types of LSA produced from the ABR can be filtered.
Command Function
configuration mode.
configuration mode.
region.
EXEC mode.
collects and calculates "three LSA classes injected from R2 into area0".So
196
ip prefix-list 100 permit 0.0.0.0/0 le 32
router ospf
The above command means that the prefix list filter is executed when
three classes of LSA are injected from other regions into the area0
region.If it's area1 filter-list prefix 100 out, this command means to
perform the prefix filter when injecting 3 classes of LSA from area1 into
Note that when we deploy on ABR filtering scheme of this three kinds of
LSA, able to filter only those generated from the three kinds of ABR LSA,
192.168.12.0 routing of these three kind of LSA are produced from R2, so
197
17 IPv6
Command Function
mode.
configuration
vlan_id range:1~4094
interface automatically
parameter, is used to
198
link-local bit of IPv6 address according
mode.
information.
The neighbor items are the neighbor information of the device in the link
199
the neighbor request message NS and the neighbor advertisement
The device identifies a static neighbor item uniquely based on the IPv6
Command Function
mode.
table.
200
17.4 IPv6 SLAAC
An IPv6 address consists of two parts: prefix and interface ID. A big
feature of IPv6 is that it supports plug and play. IPv6 address stateless
when a node is connected to an IPv6 link, it can discover the local router,
obtain the neighbor router information and the prefix of the network,
The device can obtain the IPv6 address prefix which carried in the RA
128-bit IPv6 address. By default, the RA message is sent once every 600s.
The device can also send an RS (router solicit, ICMPv6 Type = 133)
connected to, such as the MTU of the link and the hop limit.
201
17.4.1 IPv6 SLAAC Work Processes
(1) When the node starts up, it sends a request to the router through RS
The prefix information option includes not only the prefix information of
IPv6 address but also the preferred lifetime and valid lifetime of the
prefix. After receiving the periodical RA message, the node will update
the preferred lifetime and valid lifetime of the prefix based on the
message.
(3) The node configures IPv6 address and other information of the
deleted.
202
17.4.2 IPv6 SLAAC Configuration
203
Command Function
Step 1 configure terminal Enter global configuration mode.
Step 2 interface vlan vlan_id Enter VLAN interface
configuration. vlan_id range: 1-
4094.
Step 3 no ipv6 nd suppress-ra Disable RA message suppression.
The interface sends RA messages
periodically (default 600S). By
default, RA message suppression
is enabled.
ipv6 nd suppress-ra Enable RA message suppression.
Setp 4a ipv6 nd ra-interval <1- Configure the interval for sending
1800> RA messages in second. The
minimum value is 1s and the
maximum value is 1800s. The
default is 600s.
Step 4b ipv6 nd ra-interval Configure the interval for sending
msec <70-1800000> RA messages in millisecond. The
minimum value is 70ms and the
maximum value is 1800000ms.
The default is 600000ms.
Step 5 ipv6 nd ra-lifetime <0- Configure the lifetime of the RA
9000> message. The minimum value is 0s
and the maximum value is 9000s.
The default is 1800s.
Step 6 ipv6 nd reachable-time Specify the reachability interval of
<1-3600000> a new neighbor. It is used to
detect neighbors that are
unreachable in the neighbor
discovery table. The minimum
value is 1s and the maximum
value is 3600000s. The default is
0s.
Step 7 ipv6 nd home-agent- The set/unset flag in IPv6 router
config-flag advertisement message is used to
indicate to the host that the
router acts as a home agent and
includes the home agent option. It
is not set by default.
Step 8 ipv6 nd home-agent- When the local proxy
preference <0-65535> configuration flag is set, this value
indicates the host proxy
preference. The default value 0
indicates the lowest priority.
Step 9 ipv6 nd home-agent-204 When the local proxy
lifetime <0-65520> configuration flag is set, this value
indicates the host agent lifetime.
The default value is 0.
17.4.3 Example(pending)
17.5 DHCPv6
designed for IPv6 addressing schemes that assigns IPv6 prefixes, IPv6
advantages:
Not only IPv6 addresses, but also IPv6 prefixes can be assigned to
network.
Better control of address allocation. Not only can DHCPv6 record the
In addition to the IPv6 prefix and IPv6 address, it can also assign
205
network configuration parameters such as DNS server and domain
three roles:
A DHCPv6 server can not only assign an IPv6 address to a DHCPv6 client,
but also assign an IPv6 prefix to it. As shown in figure 1, after the DHCPv6
server assigns an IPv6 prefix to the DHCPv6 client, the DHCPv6 client
206
based on the prefix.
DHCPv6 relay: The DHCPv6 client communicates with the DHCPv6 server
other network configuration parameters. If the server and the client are
not on the same link, you need to forward packets through the DHCPv6
relay. This prevents the DHCPv6 server from being deployed on each link.
The server uses the DUID (DHCP Unique Identifier) to identify different
clients, and the client uses the DUID to identify the server. The contents
of the client and server DUID are carried in the Client Identifier and
Server Identifier options in the DHCPv6 message. The format of the two
distinguish between the Client Identifier and the Server Identifier option.
The minimum length is 12 bytes (96 bits) and the maximum length is 20
bytes (160 bits). The actual length depends on its type. The server
compares the DUID to its database and sends the configuration data
Command Function
207
configuration mode.
configuration.
(1) The DHCPv6 client carries the Rapid Commit option in the sent Solicit
message, indicating that the client wants the server to quickly assign an
208
address/prefix and network configuration parameters to it;
(2) If the DHCPv6 server supports the fast allocation process, it directly
does not support the fast assignment process, the client is assigned an
parameters to it.
209
the DHCPv6 server replies to the message,
assigned to it.
parameters
client.
The IPv6 address/prefix assigned to the client by the DHCPv6 server has
a certain lease term. The rental period is determined by the valid life
period (Valid Lifetime). After the lease time of the address/prefix reaches
210
the valid lifetime, the DHCPv6 client can no longer use the
needs to be updated.
Lifetime), the DHCPv6 client unicasts the Renew message to the DHCPv6
lease. If the client can continue to use the address/prefix, the DHCPv6
client that the address/prefix lease has been successfully updated; if the
responds with a Reply packet that failed to renew, notifying the client
211
Figure 5:Update address/prefix lease by rebind
As shown in Figure 5, if Renew is sent to update the lease at T1, but the
response packet from the DHCPv6 server is not received, the DHCPv6
client will send all DHCPv6 to T2 (recommended value is 0.8 times of the
requests to update the lease. If the client can continue to use the
message, informing the DHCPv6 client that the address/prefix lease has
the client, The DHCPv6 server responds to the Reply packet with the
renewal failure, notifying the client that the new lease cannot be
obtained. If the DHCPv6 client does not receive the response packet
from the server, the client stops using the address/prefix after the valid
lifetime expires.
212
parameters to clients that already have an IPv6 address/prefix. This
After the DHCPv6 client successfully obtains an IPv6 address through the
address/prefix.
configuration is as follows:
server in multicast mode. The packet carries the Option Request option
213
allocates network configuration parameters to the client and sends a
(3) The client provides the information provided in the Reply packet.
ignored. If multiple Reply packets are received, the client selects the first
Command Function
configuration mode.
address pool.
214
[lifetime <60-4294967295| lifetime.
infinite> <60-4294967295|
infinite>]
4294967295|infinite> <60-
4294967295|infinite>]
name.
215
Step 12 sip address <X:X::X:X> Configure the SIP server
IPv6 address.
domain name.
configuration mode.
VLAN interface
configuration.
vlan_id(1-4094);
segment on the
interface.
configuration mode.
216
Step 20 show ipv6 dhcp pool View DHCPv6 address
pool information..
interface
binding information of
pool.
17.5.2.5 Example(pending)
relay, the DHCPv6 client and the DHCPv6 server are processed in the
217
same way as when the DHCPv6 relay is not processed.
(2) After receiving the request, the DHCPv6 relay encapsulates the
relay-forward packet in the relay message option and sends the relay-
(3) The DHCPv6 server parses the client's request from the relay-
forward packet, selects the IPv6 address and other parameters for the
(4) The DHCPv6 relay resolves the response from the server to the
DHCPv6 client from the relay-reply packet. The DHCPv6 client performs
218
17.5.3.2 DHCPv6 Relay Configuration
Command Function
configuration mode.
VLAN interface
configuration
vlan_id(1-4094);
service.
configuration mode.
219
interface.
configuration mode.
option 38 option
function
VLAN interface
configuration.vlan_id(1-
4094);
option37.
220
related options.
configuration mode.
Command Function
configuration mode.
function
VLAN interface
configuration.vlan_id(1-
4094);
221
option38.
related options.
configuration mode.
17.5.3.5 Example(pending)
After the network fails or the topology changes, the configuration must
222
are similar to IPv4 static routes and are suitable for some IPv6 networks
The IPv6 default route is the route used when the router does not find a
matching IPv6 routing entry. There are two ways to generate IPv6 default
routes:
length is 0).
Command Function
configuration mode.
<X:X::X:X>
<X:X::X:X>
223
Step 4 show ipv6 route Show current routing
configuration
Command Function
configuration mode.
subnet routing
information.
host routing
information.
information.
for IPv6.
Command Function
224
Step 1 configure terminal Enter global
configuration mode.
interface.
225
18 PON Management
Command Function
configuration mode.
configuration mode.
statistics.
parameters decide whether the optical module can work normal or not.
226
Begin at privileged configuration mode, show PON port optical module
Command Function
configuration mode.
configuration mode.
parameters.
Command Function
configuration mode.
configuration mode.
power transceiver
227
18.3 PON Port Configuration
Command Function
configuration mode.
configuration mode.
228
17.1 ONU auto-learn configuration
Command Function
configuration mode.
configuration mode.
if not select.
this PON port. The OLT will check whether there is equipment ID in the
229
19 ONU Management
Command Function
configuration mode.
configuration mode.
230
Command Function
configuration mode.
configuration mode.
Command Function
configuration mode.
configuration mode.
info
231
19.2.4 Show ONU Authorized Detail-info
Command Function
configuration mode.
configuration mode.
Command Function
configuration mode.
configuration mode.
232
Step 3a onu [all|<1-128] [activate| Activate/deactivate
Command Function
configuration mode.
configuration mode.
<onu_profile_name> [hpw|
loid+hpw|loid+pw|loid|pw|
sn+hpw|sn+pw|sn]
Command Function
233
configuration mode.
configuration mode.
to ONU.
Command Function
configuration mode.
configuration mode.
configuration mode.
TFTP server.
update ONU.
upgrader info
firmware info
Notice:
1. DO NOT turn power off when updating. After finishing update, OLT will
235
inform ONU if updated successfully and reset ONU with the new
firmware.
2. After ONU updated and restarted, OLT will send commit command to
status.
OLT will compared equipment id with onu info, if they are consistent,
Command Function
configuration mode.
236
address
config]
Command Function
configuration mode.
configuration mode.
configuration mode.
configuration mode.
<string>}*1 created.
Command Function
configuration mode.
configuration mode.
<dba_name>
queue-map-id <0-3>
{[downstream|bidirection]}*1
configuration
239
19.3.7 ONU Service Configuration
Command Function
configuration mode.
configuration mode.
{[cos] <cos_list>}*1
{[iphost] <1-255>}*1
<service_name>
240
19.3.8 Service-port Configuration
Command Function
configuration mode.
configuration mode.
transparent
{[new_scos] <0-7>}*1
241
Step 3d onu <1-128> service-port <1-128> Configure the vlan
{[new_scos] <0-7>}*1
242
7>}*1 {[svlan] <1-4094>}*1
{[new_scos] <0-7>}*1
128>
Command Function
configuration mode.
configuration mode.
243
Step 3b onu <1-128> portvlan [eth|wifi| Configure the UNI mode
veip] <1-32> [mode] [tag] vlan <1- is access and bind a vlan
7>}*1
Command Function
244
Step 1 configure terminal Enter global
configuration mode.
configuration mode.
Command Function
configuration mode.
configuration mode.
128>} *1
Command Function
245
Step 1 configure terminal Enter global
configuration mode.
configuration mode.
Command Function
configuration mode.
configuration mode.
[disable|enable]}*1
Command Function
246
Step 1 configure terminal Enter global
configuration mode.
configuration mode.
[auto|full-10|full-100|full-1000| autonegotiation
half-10|half-100]}*1
Command Function
configuration mode.
configuration mode.
{[pause-time] <0-65535>}*1
247
19.4.4 Multicast VLAN Configuration
Command Function
configuration mode.
configuration mode.
<vlanList>]
Command Function
configuration mode.
configuration mode.
248
<desc> descible
[dhcp]
{<A.B.C.D>}*1
dns <A.B.C.D>}*1
configuration
Command Function
configuration mode.
configuration mode.
<1-32> tag-strip
249
Step 3b no onu <1-128> mvlan [tag-strip] Delete the configuration
eth <1-32>
1GE ONU with vlan 100. Uplink DBA mode: assured 10M, maximum
Port eth 1
Commit
Exit
Exit
Exit
250
Interface gpon 0/1
Vlan 100
Exit
4FE ONU with vlan 41 and vlan 46. Uplink DBA mode: assured 10M,
maximum 20M. Gemport 1 with downlink 20M. vlan 46 is for tr069 , DBA
mode: fixed 2M
251
1. Create a onu profile with 1 veip port
Port veip 1
Commit
Exit
Exit
Exit
Exit
Vlan 41
Exit
Vlan 46
Exit
253
6. Login to onu webinterface, create two WAN connection,one is
We called this rogue ONT which does not follow the assigned
1) The long Lighting rogue ont: ONT is lighting (glowing at any moment).
19.5.1 Rogue-onu-detect
Command Function
configuration mode.
<1-8>
Command Function
configuration mode.
255
20 ONU Template Management
1.Create a template
<string>}*1
<string>}*1
modify …
exit
256
Interface gpon slot/port
{name <string>}*1
The ONU template is used for onu authorization, and each ONU must sp
ecify only one ONU template when authorizated. The ONU template spe
cifies the capability of this ONU.
Command Function
configuration mode.
Step 2 profile onu {id <1-32767>}*1 {name Create or enter the onu
before.
gemport.
257
255> support max switch and
flow
127>}*1 t/veip
enter “commit”can
Step 5 exit
parameters cannot be modified, all onu when create the default binding
258
Fix<=assure<=max.
Command Function
configuration mode.
<string>}*1 profile
fixed
assured
259
{[priority] <1-4>}*1 {[weight] <1- maximum
1000>}*1
{[weight] <1-1000>}*1
rate
Command Function
260
configuration mode.
1023>}*1 selectable.
Command Function
configuration mode.
<string>}*1 profile
{[dba] <string>}*1
{[gemport_name]
261
<gemport_name>}*1 {[portid]
default, is enable
downstream <dba_name>
{[cos] <cos_list>}*1
vlan
262
4094>}*1 transparent
<0-7>}*1
263
Step 6f service-port <1-128> gemport <1- Configure the vlan
[enable|disable] port
<desc> description
128>
vlan
264
configuration
Command Function
configuration mode.
<string>}*1 profile
265
{def_pri <0-7>}*1
7>}*1
to untag mode
Step 4b no mvlan [tag-strip] eth <1-32> Delete the the lan port
to untag mode
description
dhcp mode
<A.B.C.D> {second-dns
<A.B.C.D>}*1
266
configuration
table shows.
Command Function
configuration mode.
{name <string>}*1
sf and sd
27~-8> rx-optical
tx-optical
configuration
267
20.9 Show/Delete Profile Configuration
Command Function
configuration mode.
id <1-32767>
268
269
21 ONU Auto-learn Configuration
Command Function
configuration mode.
profile|srv-profile|alarm-profile) setting
<equipid>
alarm-profile]}*1
270
21.3 Enable Auto-learn
Command Function
configuration mode.
configuration
271
22 System Management
After modified the configurations, you should same them so that these
configurations can take effect next time it restarts. Use the following
Command Function
configuration mode.
If you need to reset to factory default, you can use the following
reboot automatically.
Command Function
272
configuration mode.
saved.
Command Function
configuration mode.
Command Function
configuration mode.
configurations.
273
22.2.5 Upload/Download Configuration File
Command Function
configuration mode.
Command Function
274
show sys mem Show system memory
so on.
Command Function
configuration mode.
Use the following command to show system running time after turned
power on.
Command Function
configuration mode.
275
time.
will take effect immediately. You will see it in command prompt prefix.
Command Function
configuration mode.
alphabet.
276
attribure as the followingtable shows.
Command Function
configuration mode.
number.
Command Function
configuration mode.
timeout
timeout to default
timeout
277
22.5 System Basic Operations
Command Function
configuration mode.
<A.B.C.D> header.
Command Function
configuration mode.
278
22.5.3 Reboot System
Command Function
configuration mode.
22.5.4 Telnet
You can telent to system via outband or inband management IP. The
Command Function
default.
279
default.
Command Function
configuration mode.
Step 2 time set year <2000-2099> month Configure the RTC clock
Device will update the time auto when you enable the NTP
Command Function
configuration mode.
280
Step 3 no ntp server Disable the NTP server
Command Function
configuration mode.
Command Function
configuration mode.
of the fan
281
mode
configuration and
current equipment
temperature
information.
Command Function
configuration mode.
packets.
packets.
282
22.6.2 Enable/Disable Functional Module Debug Information
debug information.
Command Function
configuration mode.
283
23 User Management
There are two privileges for user, administrator user and normal user.
Normal user is a read-only user, only can view system information but
too. Default user can’t be deleted, modified, but you can modify its
password.
Command Function
configuration mode.
284
password login-password
user is a normal
normal enable-password enable-
privilege user.
password}
Command Function
configuration mode.
Command Function
configuration mode.
Every user can modify its own password while administrator user can
285
modify other users’ password. Modify password as the following table
shows.
Command Function
configuration mode.
<CR> password.
abc please.
New Password:
Confirm Password:
New Password:
Confirm Password:
286
24 SNMP Configuration
functions, especially fits small, fast and low cost conditions. It is based on
There are two parts of SNMP, NMS (Network Management Station) and
agent. NMS is a station that runs client program, and agent is a server
and SetRequest messages to agent. Then agent will execute read or write
command and respond to NMS. Agent also sends trap messages to NMS
287
24.3 SNMP Version and MIB
The set of objects is like a tree, which the node stands for management
GPON OLT supports SNMP V1, V2C and V3. Common MIB shows in the
following table.
MIB
MIB content Refer to
attribute
288
RMON MIB RFC2819
MIB
Ethernet MIB RFC2665
VLAN MIB
Private
Device management
MIB
Interface management
Command Function
configuration mode.
community
configuration
configuration mode to
289
return to the privileged
user configuration
mode
Configure Trap the target host address as the following table shows.
Command Function
configuration mode.
Step 2b no snmp-server host < A.B.C.D > Delete trap target host
function
configuration
Command Function
configuration mode.
value
configuration.
291
Command Function
configuration mode
value
location configuration.
292
25 Alarm and Event Management
If you enable alarm report, it will trigger alarm events when system
will be saved in a buffer; you can execute some commands such as show
Alarms include fault alarm and recovery alarm. Fault alarm will not
Corresponding level in system log are alerts, critical, major and warnings.
293
Alarm type includes device alarm, communication alarm and disposing
alarm.
deregister, PON register failed, PON los, ONU deregister, illegal ONU
conflication, ONU link los, ONU dying gasp, ONU link fault, ONU link
294
threshold.
download-file-
Download file failed enable
failed
Command Function
configuration mode.
cpu-usage-high|mem-usage-high} report.
disable
threshold.
clear-value: clear
threshold.
295
Step 2c alarm {fan|port-updown|port- Enable or disable system
deregister}{enable|disable}
configurations.
Get rid of the issue caused by PON port or fiber by monitoring PON
alarms, ensure PON works well. The following table shows PON alarm
list.
Command Function
configuration mode.
pon-txbias-low|pon-vcc-high|
pon-vcc-low|pon-temp-high|
disable}
configurations.
Configure PON port alarm as the following table shows. Before this, you
must enable global PON alarm. By default, global PON alarm is enabled,
the alarms will be record in system log.
297
Command Function
configuration mode.
configuration mode.
tx_bias_high|tx_bias_low|
temp_low} disable
threshold.
configuration configurations.
298
25.3.3 ONU Alarms
ONU alarms also can help administrator to get rid of some ONU fault.
299
Command Function
configuration mode.
auth-failed| onu-mac-conflict|
onu-loid-conflict| onu-critical-
event|onu-dying-gasp| onu-link-
fault|onu-link-event| onu-event-
notific} {enable|disable}
configurations.
event.
300
successful and so on.
Command Function
configuration mode.
301
event report.
configurations.
Get rid of the issue caused by PON port or fiber by monitoring PON
events, ensure PON works well. The following table shows PON event
list.
Command Function
configuration mode.
configurations.
302
25.4.3 ONU Events
ONU events also can help administrator to get rid of some ONU fault.
Command Function
configuration mode.
onu-auth-success|onu-deauth-
success} {enable|disable}
configuration.
303
304
26 System Log
System log is mainly used to record running condition and user operant
log comes from all the running module of system. Log system gather,
manage, save and display the information. It can be shown in the deivce
when you need to debug or check system status, and also can be sent to
Alarm log
Alarm log mainly records the information from alarm module. Critical
305
alarm, major alarm, minor alarm and warning are corresponding with
Event log
Event log mainly records the information from event module. Critical
event, major event, minor event and warning are corresponding with
Operation log
Operation log mainly records the informations from CLI and SNMP.
Debug log
7:emergencie
Abnormal log
s
Alarm/event log(urgent)
6:alerts
Abnormal log
306
Abnormal log
Alarm/event log(minor)
4:major
Abnormal log
Alarm/event log(warning)
3:warnings
Abnormal log
1:information
Operation log
al
Command Function
configuration mode.
alert|emerg}]
307
26.3.2 Clear System Log
Command Function
configuration mode.
alert|emerg}]
Command Function
configuration mode.
configuration.
configuration.
308
26.3.4 Configure Save Level of System Log
Command Function
configuration mode.
flash.
Command Function
configuration mode.
Command Function
configuration mode.
309
Step 2 clear syslog flash Clear system log in flash.
Command Function
configuration mode.
310