Dasan Networks V5812G User manual

V5812G
GPON OLT system
User Manual

UMN:CLI User Manual
V5812G
2
※Copyright 2011 ⓒDASAN Networks, Inc.
Issued by Technical Documentation Team
Korea
Technical modifications possible.
Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

User Manual UMN:CLI
V5812G
3
Contents of Update
Issue No. 1
Chapter/Section
Contents
All
Initial release
Issue History
Issue
Number
Date
Update
01
May. 2011
Initial release (NOS version 4.80)

UMN:CLI User Manual
V5812G
4
Contents
1Introduction.......................................................................................25
1.1 Audience............................................................................................... 25
1.2 Document Structure.............................................................................. 25
1.3 Document Convention.......................................................................... 26
1.4 Document Notation............................................................................... 26
1.5 Virus Protection.................................................................................... 27
1.6 GPL/LGPL Warranty and Liability Exclusion ........................................ 27
2System Overview ..............................................................................29
2.1 System Features .................................................................................. 30
3Command Line Interface (CLI) .........................................................33
3.1 Configuration Mode.............................................................................. 33
3.1.1 Privileged EXEC View Mode...................................................................... 34
3.1.2 Privileged EXEC Enable Mode.................................................................. 34
3.1.3 Global Configuration Mode ........................................................................ 35
3.1.4 Bridge Configuration Mode ........................................................................ 35
3.1.5 DHCP Pool Configuration Mode ................................................................ 36
3.1.6 DHCP Option Configuration Mode............................................................. 36
3.1.7 DHCP Option 82 Configuration Mode........................................................ 37
3.1.8 Interface Configuration Mode..................................................................... 37
3.1.9 Rule Configuration Mode ........................................................................... 38
3.1.10 RMON Configuration Mode........................................................................ 38
3.1.11 Router Configuration Mode........................................................................ 39
3.1.12 Route-Map Configuration Mode................................................................. 39
3.1.13 GPON Configuration Mode........................................................................ 40
3.1.13.1 GPON-OLT Configuration Mode....................................................................40
3.1.13.2 ONU Profile Configuration Mode ...................................................................40
3.2 Configuration Mode Overview .............................................................. 41
3.3 Useful Tips............................................................................................ 42
3.3.1 Listing Available Command........................................................................ 42
3.3.2 Calling Command History .......................................................................... 44
3.3.3 Using Abbreviation..................................................................................... 45
3.3.4 Using Command of Privileged EXEC Enable Mode.................................. 46
3.3.5 Exit Current Command Mode .................................................................... 46
4System Connection and IP Address................................................47
4.1 System Connection .............................................................................. 47
4.1.1 System Login ............................................................................................. 47
4.1.2 Password for Privileged EXEC Enable Mode............................................ 48
4.1.3 Changing Login Password......................................................................... 49
4.1.4 Management for System Account.............................................................. 49
4.1.4.1 Creating System Account...............................................................................49
4.1.4.2 Security Level................................................................................................50
4.1.5 Limiting Number of Users........................................................................... 54
4.1.6 Auto Log-out............................................................................................... 54
4.1.7 Telnet Access ............................................................................................. 54
4.1.8 System Rebooting...................................................................................... 55

User Manual UMN:CLI
V5812G
5
4.1.8.1 Manual System Rebooting.............................................................................55
4.1.9 Auto Reset Configuration............................................................................56
4.1.9.1 CPU Load ......................................................................................................56
4.1.9.2 Memory..........................................................................................................56
4.1.9.3 Network Connection.......................................................................................57
4.2 System Authentication ..........................................................................59
4.2.1 Authentication Method................................................................................59
4.2.2 Authentication Interface..............................................................................59
4.2.3 Primary Authentication Method...................................................................60
4.2.4 RADIUS Server...........................................................................................60
4.2.4.1 RADIUS Server for SystemAuthentication ....................................................60
4.2.4.2 RADIUS Server Priority..................................................................................60
4.2.4.3 Timeout of Authentication Request ................................................................61
4.2.4.4 Frequency of Retransmit................................................................................61
4.2.5 TACACS+ Server........................................................................................61
4.2.5.1 TACACS+ Server for System Authentication..................................................61
4.2.5.2 TACACS+ Server Priority...............................................................................61
4.2.5.3 Timeout of Authentication Request ................................................................62
4.2.5.4 Additional TACACS+ Configuration................................................................62
4.2.6 Accounting Mode........................................................................................63
4.2.7 Displaying System Authentication...............................................................63
4.3 Configuring Interface.............................................................................64
4.3.1 Enabling Interface.......................................................................................64
4.3.2 Assigning IPAddress to Network Interface.................................................65
4.3.3 Static Route and Default Gateway..............................................................65
4.3.4 Interface Description...................................................................................66
4.3.5 Displaying Interface ....................................................................................67
4.4 Secure Shell (SSH)...............................................................................68
4.4.1 SSH Server.................................................................................................68
4.4.1.1 Enabling SSH Server.....................................................................................68
4.4.1.2 Displaying On-line SSH Client........................................................................68
4.4.1.3 Disconnecting SSH Client..............................................................................68
4.4.1.4 Assigning Specific Authentication Key............................................................69
4.4.1.5 Displaying Connection History of SSH Client.................................................69
4.4.2 SSH Client...................................................................................................69
4.4.2.1 Login to SSH Server ......................................................................................69
4.4.2.2 Secured File Copy..........................................................................................69
4.4.2.3 Authentication Key.........................................................................................70
4.5 802.1x Authentication............................................................................71
4.5.1 802.1x Authentication..................................................................................72
4.5.1.1 Enabling 802.1x .............................................................................................72
4.5.1.2 RADIUS Server..............................................................................................72
4.5.1.3 Authentication Mode ......................................................................................73
4.5.1.4 Authentication Port.........................................................................................74
4.5.1.5 Force Authorization........................................................................................74
4.5.1.6 Interval for Retransmitting Request/Identity Packet .......................................74
4.5.1.7 Number of Requests to RADIUS Server........................................................74
4.5.1.8 Interval of Request to RADIUS Server...........................................................75
4.5.2 802.1x Re-Authentication............................................................................75
4.5.2.1 Enabling 802.1x Re-Authentication................................................................75

UMN:CLI User Manual
V5812G
6
4.5.2.2 Interval of Re-Authentication..........................................................................76
4.5.2.3 Interval of Requesting Re-Authentication ......................................................76
4.5.2.4 802.1x Re-Authentication ..............................................................................76
4.5.3 Initializing Authentication Status................................................................. 77
4.5.4 Restoring Default Value ............................................................................. 77
4.5.5 Displaying 802.1x Configuration................................................................ 77
4.5.6 802.1x User Authentication Statistics......................................................... 77
4.5.7 Sample Configuration................................................................................. 78
5Port Configuration ............................................................................79
5.1 Port Basic............................................................................................. 79
5.1.1 Selecting Port Type.................................................................................... 79
5.2 Ethernet Port Configuration.................................................................. 79
5.2.1 Enabling Ethernet Port............................................................................... 79
5.2.2 Auto-Negotiation ........................................................................................ 80
5.2.3 Transmit Rate............................................................................................. 80
5.2.4 Duplex Mode.............................................................................................. 81
5.2.5 Flow Control............................................................................................... 81
5.2.6 Port Description.......................................................................................... 81
5.2.7 Traffic Statistics.......................................................................................... 82
5.2.7.1 Packet Statistics.............................................................................................82
5.2.7.2 CPU Statistics................................................................................................82
5.2.7.3 Protocol Statistics ..........................................................................................84
5.2.8 Port Information.......................................................................................... 84
5.3 Port Mirroring........................................................................................ 85
6System Environment ........................................................................87
6.1 Environment Configuration................................................................... 87
6.1.1 Host Name................................................................................................. 87
6.1.2 Time and Date............................................................................................ 87
6.1.3 Time Zone.................................................................................................. 88
6.1.4 Network Time Protocol (NTP) .................................................................... 89
6.1.5 Simple Network Time Protocol (SNTP)...................................................... 89
6.1.6 Terminal Configuration............................................................................... 91
6.1.7 Login Banner.............................................................................................. 91
6.1.8 DNS Server................................................................................................ 91
6.1.9 Fan Operation............................................................................................ 92
6.1.10 Disabling Daemon Operation..................................................................... 92
6.1.11 FTP Server................................................................................................. 93
6.1.12 FTP Bind Address ...................................................................................... 93
6.1.13 System Threshold...................................................................................... 94
6.1.13.1 CPU Load......................................................................................................94
6.1.13.2 Port Traffic .....................................................................................................94
6.1.13.3 Fan Operation................................................................................................95
6.1.13.4 System Temperature......................................................................................96
6.1.13.5 System Memory.............................................................................................96
6.1.13.6 System/SFP Module Operation .....................................................................96
6.1.14 Enabling DDM............................................................................................ 97
6.2 Configuration Management.................................................................. 98
6.2.1 Displaying System Configuration............................................................... 98

User Manual UMN:CLI
V5812G
7
6.2.2 Writing System Configuration .....................................................................98
6.2.3 Auto-Saving.................................................................................................99
6.2.4 System Configuration File...........................................................................99
6.2.5 Restoring Default Configuration................................................................100
6.2.6 Core Dump File.........................................................................................101
6.3 System Management..........................................................................102
6.3.1 Network Connection..................................................................................102
6.3.2 IP ICMP Source Routing...........................................................................104
6.3.3 Tracing Packet Route................................................................................105
6.3.4 Displaying User Connecting to System ....................................................106
6.3.5 MAC Table.................................................................................................107
6.3.6 System Running Time...............................................................................107
6.3.7 System Information...................................................................................107
6.3.8 System Memory Information.....................................................................108
6.3.9 CPU Packet Limit......................................................................................108
6.3.10 Running Process.......................................................................................108
6.3.11 Displaying System Software.....................................................................109
6.3.12 Displaying Installed OS.............................................................................109
6.3.13 Default OS.................................................................................................109
6.3.14 Switch Status.............................................................................................110
6.3.15 Tech Support Information..........................................................................110
6.3.16 System Boot Information...........................................................................110
6.3.17 Network Service Module (NSM) Daemon Debugging..............................111
7Network Management..................................................................... 112
7.1 Simple Network Management Protocol (SNMP)................................. 112
7.1.1 SNMP Community.....................................................................................112
7.1.2 Information of SNMP Agent ......................................................................113
7.1.3 SNMP Com2sec........................................................................................114
7.1.4 SNMP Group.............................................................................................114
7.1.5 SNMP View Record ..................................................................................115
7.1.6 Permission toAccess SNMP View Record...............................................115
7.1.7 SNMP Version 3 User...............................................................................116
7.1.8 SNMP Trap................................................................................................116
7.1.8.1 SNMP Trap Mode.........................................................................................116
7.1.8.2 SNMP Trap Host..........................................................................................117
7.1.8.3 Enabling SNMP Trap....................................................................................117
7.1.8.4 Disabling SNMP Trap...................................................................................119
7.1.8.5 Displaying SNMP Trap.................................................................................119
7.1.9 SNMPAlarm..............................................................................................120
7.1.9.1 Alarm Notify Activity .....................................................................................120
7.1.9.2 Alarm Severity Criterion ...............................................................................120
7.1.9.3 Default Alarm Severity..................................................................................121
7.1.9.4 Generic Alarm Severity ................................................................................121
7.1.9.5 ADVAAlarm Severity....................................................................................123
7.1.9.6 STP Guard Alarm Severity...........................................................................124
7.1.9.7 Displaying SNMPAlarm...............................................................................124
7.1.10 Displaying SNMP Configuration................................................................124
7.1.11 Disabling SNMP........................................................................................125
7.2 Operation, Administration and Maintenance (OAM) ...........................125

UMN:CLI User Manual
V5812G
8
7.2.1 Enabling OAM.......................................................................................... 126
7.2.2 OAM Link Monitoring................................................................................ 127
7.2.3 EFM OAM Mode ...................................................................................... 128
7.2.4 OAM Loopback ........................................................................................ 128
7.2.5 OAM Unidirection..................................................................................... 129
7.2.6 Displaying EFM OAM Configuration........................................................ 129
7.3 Link Layer Discovery Protocol (LLDP)................................................ 130
7.3.1 LLDP Operation ....................................................................................... 130
7.3.2 Enabling LLDP......................................................................................... 130
7.3.3 LLDP Operation Type............................................................................... 130
7.3.4 Basic TLV................................................................................................. 130
7.3.5 LLDP Message......................................................................................... 131
7.3.6 Reinitiating Delay..................................................................................... 131
7.3.7 Displaying LLDP Configuration................................................................ 132
7.4 Remote Monitoring (RMON)............................................................... 133
7.4.1 RMON History.......................................................................................... 133
7.4.1.1 Source Port of Statistical Data.....................................................................134
7.4.1.2 Subject of RMON History.............................................................................134
7.4.1.3 Number of Sample Data ..............................................................................134
7.4.1.4 Interval of Sample Inquiry............................................................................134
7.4.1.5 Activating RMON History.............................................................................134
7.4.1.6 Deleting Configuration of RMON History .....................................................135
7.4.1.7 Displaying RMON History............................................................................135
7.4.2 RMON Alarm............................................................................................ 135
7.4.2.1 Subject of RMON Alarm...............................................................................136
7.4.2.2 Object of Sample Inquiry..............................................................................136
7.4.2.3 Absolute and Delta Comparison ..................................................................136
7.4.2.4 Upper Bound of Threshold...........................................................................136
7.4.2.5 Lower Bound of Threshold...........................................................................137
7.4.2.6 Standard of the First Alarm ..........................................................................137
7.4.2.7 Interval of Sample Inquiry............................................................................138
7.4.2.8 Activating RMON Alarm...............................................................................138
7.4.2.9 Deleting Configuration of RMON Alarm .......................................................138
7.4.3 RMON Event............................................................................................ 138
7.4.3.1 Event Community ........................................................................................139
7.4.3.2 Event Description.........................................................................................139
7.4.3.3 Subject of RMON Event...............................................................................139
7.4.3.4 Event Type...................................................................................................139
7.4.3.5 Activating RMON Event...............................................................................140
7.4.3.6 Deleting Configuration of RMON Event .......................................................140
7.5 Syslog................................................................................................. 141
7.5.1 Syslog Output Level................................................................................. 141
7.5.2 Facility Code ............................................................................................ 143
7.5.3 Syslog Bind Address ................................................................................ 144
7.5.4 Debug Message for Remote Terminal ..................................................... 144
7.5.5 Disabling Syslog....................................................................................... 144
7.5.6 Displaying Syslog Message..................................................................... 145
7.5.7 Displaying Syslog Configuration.............................................................. 145
7.6 Rule and QoS..................................................................................... 146
7.6.1 How to Operate QoS................................................................................ 147

User Manual UMN:CLI
V5812G
9
7.6.2 Packet Classification.................................................................................148
7.6.2.1 Flow Mode ...................................................................................................149
7.6.2.2 Flow Creation...............................................................................................149
7.6.2.3 Configuring Flow..........................................................................................150
7.6.2.4 Applying and modifying Flow........................................................................152
7.6.2.5 Class Creation..............................................................................................152
7.6.3 Packet Conditioning..................................................................................153
7.6.3.1 Policer Creation............................................................................................153
7.6.3.2 Packet Counter ............................................................................................154
7.6.3.3 Rate-limit......................................................................................................154
7.6.3.4 Applying and modifying Policer....................................................................154
7.6.4 Rule Action................................................................................................155
7.6.4.1 Policy Creation.............................................................................................155
7.6.4.2 Metering.......................................................................................................156
7.6.4.3 Policy Priority ...............................................................................................162
7.6.4.4 Policy Action.................................................................................................162
7.6.4.5 Setting CoS and ToS values.........................................................................163
7.6.4.6 Attaching a Policy to an interface.................................................................163
7.6.4.7 Applying and Modifying Policy......................................................................164
7.6.5 Displaying Rule.........................................................................................164
7.6.6 Admin Rule................................................................................................165
7.6.6.1 Creating Admin Flow for packet classification..............................................165
7.6.6.2 Configuring Admin Flow ...............................................................................166
7.6.6.3 Applying and modifying Admin Flow.............................................................167
7.6.6.4 Class Creation..............................................................................................167
7.6.7 Admin Rule Action.....................................................................................168
7.6.7.1 Admin Policy Creation..................................................................................168
7.6.7.2 Admin Policy Priority....................................................................................169
7.6.7.3 Admin Policy Action......................................................................................169
7.6.7.4 Applying and Modifying Admin Policy...........................................................170
7.6.8 Displaying Admin Rule..............................................................................170
7.6.9 Scheduling ................................................................................................171
7.6.9.1 Scheduling mode .........................................................................................173
7.6.9.2 Weight and Quantum ...................................................................................173
7.6.9.3 Maximum and Minimum Bandwidth .............................................................174
7.6.9.4 Limiting traffic and buffer..............................................................................174
7.6.9.5 The Traffic of Queue ....................................................................................175
7.6.9.6 Displaying QoS ............................................................................................175
7.7 NetBIOS Filtering................................................................................176
7.8 Martian Filtering..................................................................................177
7.9 Max Host.............................................................................................178
7.10 Port Security .......................................................................................179
7.10.1 Port Security on Port.................................................................................179
7.10.2 Port Security Aging ...................................................................................180
7.10.3 Displaying Port Security............................................................................181
7.11 Outband Management Port Security...................................................181
7.12 MAC Table ..........................................................................................181
7.13 MAC Filtering......................................................................................183
7.13.1 Default MAC Filter Policy..........................................................................183

UMN:CLI User Manual
V5812G
10
7.13.2 Configuring MAC Filter Policy.................................................................. 183
7.13.3 Listing MAC Filter Policy.......................................................................... 184
7.13.4 Displaying MAC Filter Policy.................................................................... 184
7.14 Address Resolution Protocol (ARP) ................................................... 185
7.14.1 ARP Table ................................................................................................ 185
7.14.1.1 Registering ARP Table.................................................................................185
7.14.1.2 ARP Log Interval..........................................................................................186
7.14.1.3 Displaying ARP Table...................................................................................186
7.14.2 ARPAlias ................................................................................................. 186
7.14.3 ARP Inspection......................................................................................... 187
7.14.3.1 ARPAccess List ..........................................................................................188
7.14.3.2 Enabling ARP Inspection Filtering................................................................190
7.14.3.3 ARPAddress Validation...............................................................................190
7.14.3.4 ARP Inspection on Trust Port.......................................................................191
7.14.3.5 ARP Inspection Log-buffer...........................................................................191
7.14.3.6 Displaying ARP Inspection...........................................................................192
7.14.4 Gratuitous ARP ........................................................................................ 193
7.14.5 Proxy ARP................................................................................................ 193
7.15 ICMP Message Control ...................................................................... 195
7.15.1 Blocking Echo Reply Message ................................................................ 195
7.15.2 Interval for Transmit ICMP Message........................................................ 196
7.16 TCP Flag Control................................................................................ 197
7.16.1 RST Configuration.................................................................................... 197
7.16.2 SYN Configuration ................................................................................... 198
7.17 Packet Dump...................................................................................... 198
7.17.1 Packet Dump by Protocol......................................................................... 198
7.17.2 Packet Dump with Option......................................................................... 199
7.17.3 Debug Packet Dump................................................................................ 200
7.17.4 Displaying Dump Packets........................................................................ 200
7.17.5 Dump File................................................................................................. 200
7.18 Access List ......................................................................................... 202
7.18.1 Standard Access List................................................................................ 203
7.18.2 Extended Access List............................................................................... 204
7.18.3 Named Access List................................................................................... 206
7.18.4 Access List Range ................................................................................... 207
7.18.5 Displaying Access List Entries ................................................................. 208
8System Main Functions..................................................................209
8.1 Virtual Local Area Network (VLAN) .................................................... 209
8.1.1 Port-based VLAN..................................................................................... 210
8.1.1.1 Creating VLAN............................................................................................. 211
8.1.1.2 Specifying PVID........................................................................................... 211
8.1.1.3 Adding Port to VLAN.................................................................................... 211
8.1.1.4 Deleting VLAN............................................................................................. 211
8.1.2 Protocol-based VLAN............................................................................... 212
8.1.3 MAC-based VLAN.................................................................................... 212
8.1.4 Subnet-based VLAN ................................................................................ 213
8.1.5 Tagged VLAN........................................................................................... 213
8.1.6 VLAN Description..................................................................................... 214
8.1.7 VLAN Precedence.................................................................................... 215

User Manual UMN:CLI
V5812G
11
8.1.8 Displaying VLAN Information....................................................................215
8.1.9 QinQ..........................................................................................................215
8.1.9.1 Double Tagging Operation............................................................................216
8.1.9.2 Double Tagging Configuration......................................................................217
8.1.9.3 TPID Configuration.......................................................................................217
8.1.10 Layer 2 Isolation........................................................................................218
8.1.10.1 Port Isolation................................................................................................218
8.1.10.2 Shared VLAN...............................................................................................219
8.1.11 VLAN Translation......................................................................................221
8.1.12 Sample Configuration ...............................................................................221
8.2 Link Aggregation (LAG).......................................................................224
8.2.1 Port Trunk..................................................................................................224
8.2.1.1 Configuring Port Trunk.................................................................................224
8.2.1.2 Disabling Port Trunk.....................................................................................225
8.2.1.3 Displaying Port Trunk...................................................................................225
8.2.2 Link Aggregation Control Protocol (LACP) ...............................................225
8.2.2.1 Configuring LACP ........................................................................................226
8.2.2.2 Distribution Mode.........................................................................................226
8.2.2.3 Operation Mode ...........................................................................................227
8.2.2.4 Priority of Switch ..........................................................................................228
8.2.2.5 Manual Aggregation.....................................................................................228
8.2.2.6 BPDU Transmission Rate ............................................................................229
8.2.2.7 Administrational Key ....................................................................................229
8.2.2.8 Port Priority ..................................................................................................229
8.2.2.9 Displaying LACP Configuration....................................................................230
8.3 Spanning-Tree Protocol (STP)............................................................231
8.3.1 STP Operation ..........................................................................................232
8.3.2 RSTP Operation........................................................................................235
8.3.3 MSTP Operation .......................................................................................240
8.3.4 Configuring STP/RSTP/MSTP/PVSTP/PVRSTP Mode (Required) .........242
8.3.5 Configuring STP/RSTP/MSTP..................................................................242
8.3.5.1 Activating STP/RSTP/MSTP........................................................................242
8.3.5.2 Root Switch..................................................................................................242
8.3.5.3 Path-cost......................................................................................................243
8.3.5.4 Port-priority...................................................................................................244
8.3.5.5 MST Region.................................................................................................244
8.3.5.6 MSTP Protocol.............................................................................................245
8.3.5.7 Point-to-point MAC Parameters ...................................................................245
8.3.5.8 Edge Ports ...................................................................................................246
8.3.5.9 Displaying Configuration ..............................................................................246
8.3.6 Configuring PVSTP/PVRSTP ...................................................................247
8.3.6.1 Activating PVSTP/PVRSTP..........................................................................248
8.3.6.2 Root Switch..................................................................................................249
8.3.6.3 Path-cost......................................................................................................249
8.3.6.4 Port-priority...................................................................................................249
8.3.7 Root Guard................................................................................................249
8.3.8 Restarting Protocol Migration....................................................................250
8.3.9 BPDU Configuration..................................................................................251
8.3.9.1 Hello Time....................................................................................................251
8.3.9.2 Forward Delay..............................................................................................252

UMN:CLI User Manual
V5812G
12
8.3.9.3 Max Age.......................................................................................................252
8.3.9.4 BPDU Hop...................................................................................................252
8.3.9.5 BPDU Filter..................................................................................................253
8.3.9.6 BPDU Guard................................................................................................253
8.3.9.7 Displaying BPDU Configuration...................................................................254
8.3.10 Sample Configuration............................................................................... 254
8.4 Ethernet Ring Protection (ERP).......................................................... 257
8.4.1 ERP Mechanism ...................................................................................... 257
8.4.2 Loss of Test Packet (LOTP)..................................................................... 261
8.4.3 ERP Shared Link...................................................................................... 261
8.4.4 Configuring ERP Domian......................................................................... 262
8.4.4.1 ERP Domain................................................................................................262
8.4.4.2 ERP Domain Description.............................................................................262
8.4.4.3 Node Mode..................................................................................................262
8.4.4.4 Primary and Secondary Port........................................................................262
8.4.5 Protected Activation ................................................................................. 263
8.4.6 Primary/Secondary Port State.................................................................. 263
8.4.7 Learning Disable Time ............................................................................. 263
8.4.8 Wait-to-Restore Time ............................................................................... 264
8.4.9 Test Packet Interval.................................................................................. 264
8.4.10 ERP Ring Priority ..................................................................................... 265
8.4.11 LOTP Hold Off Time................................................................................. 265
8.4.12 ERP Trap.................................................................................................. 266
8.4.13 Registering ERP MAC.............................................................................. 266
8.4.14 Private VLAN with ERP............................................................................ 266
8.4.15 Displaying ERP Configuration.................................................................. 267
8.5 Loop Detection ................................................................................... 268
8.6 Dynamic Host Configuration Protocol (DHCP)................................... 270
8.6.1 DHCP Server............................................................................................ 271
8.6.1.1 DHCP Pool Creation....................................................................................272
8.6.1.2 DHCP Subnet..............................................................................................272
8.6.1.3 Range of IPAddress....................................................................................272
8.6.1.4 Default Gateway..........................................................................................273
8.6.1.5 IP Lease Time..............................................................................................273
8.6.1.6 DNS Server..................................................................................................274
8.6.1.7 Manual Binding............................................................................................274
8.6.1.8 Domain Name..............................................................................................275
8.6.1.9 DHCP Server Option....................................................................................275
8.6.1.10 Static Mapping.............................................................................................275
8.6.1.11 Recognition of DHCP Client.........................................................................276
8.6.1.12 IPAddress Validation...................................................................................276
8.6.1.13 Authorized ARP ...........................................................................................276
8.6.1.14 Prohibition of 1:N IPAddress Assignment....................................................277
8.6.1.15 Ignoring BOOTP Request............................................................................278
8.6.1.16 DHCP Packet Statistics................................................................................278
8.6.1.17 Setting DHCP Pool Size ..............................................................................279
8.6.1.18 Displaying DHCP Pool Configuration...........................................................279
8.6.2 DHCPAddress Allocation with Option 82 ................................................ 280
8.6.2.1 DHCP Class Capability................................................................................280
8.6.2.2 DHCP Class Creation..................................................................................280

User Manual UMN:CLI
V5812G
13
8.6.2.3 Relay Agent Information Pattern ..................................................................280
8.6.2.4 Associating DHCP Class..............................................................................281
8.6.2.5 Range of IPAddress for DHCP Class..........................................................281
8.6.3 DHCP Lease Database.............................................................................282
8.6.3.1 DHCP Database Agent.................................................................................282
8.6.3.2 Displaying DHCP Lease Status....................................................................282
8.6.3.3 Deleting DHCP Lease Database..................................................................283
8.6.4 DHCP Relay Agent ...................................................................................283
8.6.4.1 DHCP Helper Address..................................................................................284
8.6.4.2 Smart Relay Agent Forwarding ....................................................................284
8.6.4.3 DHCP Server ID Option ...............................................................................285
8.6.4.4 DHCP Relay Statistics..................................................................................285
8.6.5 DHCP Option ............................................................................................286
8.6.5.1 Entering DHCP Option Mode.......................................................................286
8.6.5.2 Configuring DHCP Option Format................................................................287
8.6.5.3 Deleting DHCP Option Format.....................................................................287
8.6.5.4 Displaying DHCP option...............................................................................287
8.6.6 DHCP Option 82 .......................................................................................288
8.6.6.1 Enabling DHCP Option 82............................................................................289
8.6.6.2 Option 82 Sub-Option ..................................................................................289
8.6.6.3 Option 82 Reforwarding Policy.....................................................................290
8.6.6.4 Option 82 Trust Policy..................................................................................291
8.6.7 DHCP Snooping........................................................................................291
8.6.7.1 Enabling DHCP Snooping............................................................................292
8.6.7.2 DHCP Trust State.........................................................................................292
8.6.7.3 DHCP Filter on Trust Port.............................................................................293
8.6.7.4 DHCP Rate Limit..........................................................................................293
8.6.7.5 DHCP Lease Limit........................................................................................294
8.6.7.6 Source MAC Address Verification ................................................................295
8.6.7.7 Static DHCP Snooping Binding....................................................................295
8.6.7.8 DHCP Snooping Database Agent ................................................................295
8.6.7.9 ARP Inspection Start Time ...........................................................................296
8.6.7.10 DHCP Snooping with Option82....................................................................296
8.6.7.11 DHCP Snooping Option ...............................................................................297
8.6.7.12 Displaying DHCP Snooping Configuration...................................................298
8.6.8 IP Source Guard .......................................................................................298
8.6.8.1 Enabling IP Source Guard............................................................................299
8.6.8.2 Static IP Source Binding...............................................................................300
8.6.8.3 Displaying IP Source Guard Configuration...................................................300
8.6.9 DHCP Client..............................................................................................300
8.6.9.1 Enabling DHCP Client..................................................................................300
8.6.9.2 DHCP Client ID ............................................................................................300
8.6.9.3 DHCP Class ID ............................................................................................301
8.6.9.4 Host Name...................................................................................................301
8.6.9.5 IP Lease Time..............................................................................................301
8.6.9.6 Requesting Option .......................................................................................301
8.6.9.7 Forcing Release or Renewal of DHCP Lease..............................................301
8.6.9.8 Displaying DHCP Client Configuration.........................................................302
8.6.10 DHCP Filtering..........................................................................................302
8.6.10.1 DHCP Packet Filtering .................................................................................302
8.6.10.2 DHCP Server Packet Filtering......................................................................303

UMN:CLI User Manual
V5812G
14
8.6.11 Debugging DHCP..................................................................................... 304
8.7 Virtual Router Redundancy Protocol (VRRP)..................................... 305
8.7.1 Configuring VRRP.................................................................................... 306
8.7.1.1 Associated IPAddress.................................................................................306
8.7.1.2 Access to Associated IP Address.................................................................306
8.7.1.3 Master Router and Backup Router ..............................................................306
8.7.1.4 VRRP Track Function ..................................................................................309
8.7.1.5 Authentication Password ............................................................................. 311
8.7.1.6 Preempt....................................................................................................... 311
8.7.2 VRRP Monitoring and Management ........................................................ 312
8.7.2.1 Displaying VRRP Protocol Information ........................................................312
8.7.2.2 VRRP Statistics............................................................................................312
8.7.2.3 VRRP Debug...............................................................................................313
8.8 Single IP Management ....................................................................... 314
8.8.1 Switch Group............................................................................................ 314
8.8.2 Designating Master and Slave Switch ..................................................... 315
8.8.3 Disabling Cascading ................................................................................ 315
8.8.4 Displaying Cascading Status ................................................................... 315
8.8.5 Accessing to Slave Switch from Master Switch....................................... 316
8.8.6 Sample Configuration............................................................................... 316
8.9 Rate Limit ........................................................................................... 318
8.10 Flood Guard........................................................................................ 319
8.10.1 MAC Flood Guard.................................................................................... 319
8.10.2 CPU Flood Guard..................................................................................... 320
8.10.3 System Flood Guard................................................................................ 320
8.11 PPS Control........................................................................................ 322
8.12 Storm Control...................................................................................... 323
8.13 Jumbo Frame Capacity ...................................................................... 323
8.14 Bandwidth........................................................................................... 324
8.15 Maximum Transmission Unit (MTU) ................................................... 324
8.16 Blocking Packet Forwarding............................................................... 324
9IP Multicast ......................................................................................325
9.1 Multicast Group Membership.............................................................. 327
9.1.1 IGMP Basic .............................................................................................. 327
9.1.1.1 IGMP Version...............................................................................................328
9.1.1.2 Querier‘s Robustness Variable ....................................................................328
9.1.1.3 Clearing IGMP Entry....................................................................................328
9.1.1.4 IGMP Debug................................................................................................329
9.1.2 IGMP Version 2........................................................................................ 329
9.1.2.1 IGMP Static Join ..........................................................................................330
9.1.2.2 IGMPAccess Control...................................................................................332
9.1.2.3 IGMP Querier Configuration ........................................................................332
9.1.2.4 IGMP Immediate Leave...............................................................................334
9.1.3 IGMP Version 3........................................................................................ 335
9.1.4 Displaying IGMP Information ................................................................... 336
9.2 Multicast Functions............................................................................. 337
9.2.1 Multicast Forwarding Database................................................................ 337
9.2.1.1 Blocking Unknown Multicast Traffic .............................................................337

User Manual UMN:CLI
V5812G
15
9.2.1.2 Forwarding Entry Aging................................................................................338
9.2.1.3 Displaying McFDB Information.....................................................................338
9.2.2 IGMP Snooping Basic...............................................................................339
9.2.2.1 Enabling IGMP Snooping.............................................................................340
9.2.2.2 IGMP Snooping Version...............................................................................340
9.2.2.3 IGMP Snooping Robustness Value..............................................................341
9.2.3 IGMPv2 Snooping.....................................................................................341
9.2.3.1 IGMP Snooping Querier Configuration.........................................................341
9.2.3.2 IGMP Snooping Last Member Query Interval...............................................343
9.2.3.3 IGMP Snooping Immediate Leave ...............................................................344
9.2.3.4 IGMP Snooping Report Suppression ...........................................................345
9.2.3.5 IGMP Snooping S-Query Report Agency.....................................................345
9.2.3.6 Explicit Host Tracking...................................................................................346
9.2.3.7 Multicast Router Port Configuration .............................................................347
9.2.3.8 TCN Multicast Flooding................................................................................349
9.2.4 IGMPv3 Snooping.....................................................................................351
9.2.5 Displaying IGMP Snooping Information....................................................351
9.2.6 Multicast VLAN Registration (MVR)..........................................................353
9.2.6.1 Enabling MVR..............................................................................................353
9.2.6.2 MVR Group..................................................................................................353
9.2.6.3 Source/Receiver Port...................................................................................354
9.2.6.4 MVR Helper Address....................................................................................354
9.2.6.5 Displaying MVR Configuration .....................................................................354
9.2.7 IGMP Filtering and Throttling....................................................................355
9.2.7.1 IGMP Filtering..............................................................................................355
9.2.7.2 IGMP Throttling............................................................................................357
9.2.7.3 Displaying IGMP Filtering and Throttling......................................................357
9.2.8 IGMP Proxy...............................................................................................358
9.2.8.1 Designating Downstream Interface..............................................................358
9.2.8.2 Designating Upstream Interface...................................................................358
9.2.8.3 Configuring Upstream Interface Mode .........................................................359
9.2.8.4 IGMP-Proxy IF Flap Discredit.......................................................................359
9.2.8.5 Disabling Verification of Source IP of IGMP Packets....................................361
9.2.8.6 Specifying IGMP Report/Leave‘s Source IP Address ...................................361
9.2.8.7 Querying with Real Querirer‘s Source IP Address........................................362
9.2.8.8 Displaying IGMP Proxy Information .............................................................362
9.2.9 IGMP State Limit.......................................................................................362
9.2.10 Multicast-Source Trust Port.......................................................................363
9.3 Multicast Routing ................................................................................364
9.3.1 Multicast Routing ......................................................................................364
9.3.1.1 Enabling Multicast Routing...........................................................................364
9.3.1.2 TTL Threshold..............................................................................................364
9.3.1.3 ECMP Load Splitting....................................................................................365
9.3.1.4 MRIB Entry Limit..........................................................................................365
9.3.1.5 Displaying MRIB Entry.................................................................................366
9.3.1.6 Displaying MRIB Statistics ...........................................................................367
9.3.1.7 Displaying MFIB Information........................................................................367
9.3.1.8 MRIB Debug.................................................................................................368
9.3.2 PIM Basic..................................................................................................368
9.3.2.1 PIM Mode.....................................................................................................369
9.3.2.2 DR Priority....................................................................................................369

UMN:CLI User Manual
V5812G
16
9.3.2.3 Neighbor Filtering ........................................................................................370
9.3.2.4 PIM Join/Prune Message Group Filtering....................................................371
9.3.2.5 PIM Hello Message......................................................................................371
9.3.2.6 PIM Join/Prune Interval ...............................................................................372
9.3.2.7 PIM VIF Flap Discredit.................................................................................372
9.3.2.8 PIM Static Join.............................................................................................373
9.3.2.9 Displaying PIM Information..........................................................................373
9.3.3 PIM-SM .................................................................................................... 374
9.3.3.1 Rendezvous Point........................................................................................376
9.3.3.2 Bootstrap Router..........................................................................................378
9.3.3.3 Source Registration.....................................................................................379
9.3.3.4 SPT Switchover ...........................................................................................381
9.3.3.5 Cisco‘s Router Interoperability .....................................................................382
9.3.3.6 PIM Debug...................................................................................................383
9.3.4 Source Specific Multicast (SSM).............................................................. 384
9.3.4.1 PIM-SSM .....................................................................................................384
9.3.4.2 Static SSM Mapping ....................................................................................385
10 IP Routing Protocol.........................................................................387
10.1 Border Gateway Protocol (BGP) ........................................................ 387
10.1.1 Basic Configuration.................................................................................. 388
10.1.1.1 Configuration Type of BGP ..........................................................................388
10.1.1.2 Enabling BGP Routing.................................................................................388
10.1.1.3 Disabling BGP Routing................................................................................389
10.1.2 Advanced Configuration........................................................................... 389
10.1.2.1 Summary of Path.........................................................................................389
10.1.2.2 Automatic Summarization of Path................................................................390
10.1.2.3 BGP Next-Hop Address Tracking.................................................................390
10.1.2.4 Local Preference..........................................................................................391
10.1.2.5 Multi-Exit Discriminator (MED).....................................................................391
10.1.2.6 Choosing Best Path.....................................................................................392
10.1.2.7 Graceful Restart...........................................................................................393
10.1.3 Administrative Distance for BGP.............................................................. 394
10.1.4 IPAddress Family.................................................................................... 395
10.1.5 BGP Neighbor.......................................................................................... 395
10.1.5.1 Default Route...............................................................................................395
10.1.5.2 Peer Group..................................................................................................396
10.1.5.3 Route Map...................................................................................................397
10.1.5.4 Force Shutdown...........................................................................................397
10.1.5.5 Changing the Nexthop Information..............................................................397
10.1.5.6 Neighbor Password .....................................................................................398
10.1.5.7 Neighbor Description ...................................................................................398
10.1.5.8 Source of Routing Updates..........................................................................398
10.1.5.9 Updates for Inbound Soft Reconfiguration...................................................399
10.1.6 BGP Timers.............................................................................................. 399
10.1.7 Route Flap Dampening............................................................................ 399
10.1.8 BGP Session Reset ................................................................................. 401
10.1.8.1 Session Reset of All Peers...........................................................................401
10.1.8.2 Session Reset of Peers within Particular AS................................................402
10.1.8.3 Session Reset of Specific Route..................................................................403
10.1.8.4 Session Reset of External Peer...................................................................403

User Manual UMN:CLI
V5812G
17
10.1.8.5 Session Reset of Peer Group.......................................................................404
10.1.9 Displaying and Managing BGP.................................................................405
10.1.9.1 BGP Neighbor..............................................................................................405
10.1.9.2 Logging Neighbor Changes .........................................................................406
10.1.9.3 Checking the BGP Network Route...............................................................406
10.1.9.4 Sending SNMP Trap ....................................................................................406
10.1.10BGP Debug...............................................................................................407
10.2 Open Shortest Path First (OSPF).......................................................408
10.2.1 Enabling OSPF.........................................................................................408
10.2.2 ABR Type Configuration ...........................................................................410
10.2.3 Compatibility Support................................................................................410
10.2.4 OSPF Interface.........................................................................................410
10.2.4.1 Authentication Type......................................................................................410
10.2.4.2 Authentication Key.......................................................................................411
10.2.4.3 Interface Cost...............................................................................................412
10.2.4.4 Blocking Transmission of Route Information Database................................412
10.2.4.5 Routing Protocol Interval..............................................................................413
10.2.4.6 OSPF Maximum Transmission Unit (MTU) ..................................................414
10.2.4.7 OSPF Priority...............................................................................................415
10.2.4.8 OSPF Network Type ....................................................................................415
10.2.5 Non-Broadcast Network............................................................................416
10.2.6 OSPF Area................................................................................................417
10.2.6.1 Area Authentication......................................................................................417
10.2.6.2 Default Cost of Area.....................................................................................417
10.2.6.3 Blocking the Transmission of Routing Information Between Area................418
10.2.6.4 Not So Stubby Area (NSSA).........................................................................419
10.2.6.5 Area Range..................................................................................................422
10.2.6.6 Shortcut Area ...............................................................................................422
10.2.6.7 Stub Area .....................................................................................................423
10.2.6.8 Maximum Area.............................................................................................423
10.2.6.9 Virtual Link ...................................................................................................423
10.2.7 Default Metric............................................................................................426
10.2.8 Graceful Restart Support..........................................................................426
10.2.9 Opaque-LSASupport................................................................................427
10.2.10Default Route............................................................................................428
10.2.11 Finding Period...........................................................................................429
10.2.12External Routes to OSPF Network...........................................................429
10.2.13OSPF Distance .........................................................................................431
10.2.14Host Route................................................................................................431
10.2.15Passive Interface ......................................................................................432
10.2.16Blocking Routing Information....................................................................432
10.2.17Summary Routing Information..................................................................433
10.2.18OSPF Monitoring and Management.........................................................433
10.2.18.1 Displaying OSPF Protocol Information.........................................................433
10.2.18.2 Sending SNMP Trap ....................................................................................435
10.2.18.3 Logging Neighbor Changes .........................................................................435
10.2.18.4 Limiting Number of Database.......................................................................436
10.2.18.5 Maximum Process of LSA............................................................................436
10.2.19OSPF Debug.............................................................................................437
10.3 Routing Information Protocol (RIP).....................................................439

UMN:CLI User Manual
V5812G
18
10.3.1 Enabling RIP............................................................................................ 439
10.3.2 RIP Neighbor Router................................................................................ 440
10.3.3 RIP Version .............................................................................................. 441
10.3.4 Creating available Static Route only for RIP............................................ 442
10.3.5 Redistributing Routing Information........................................................... 442
10.3.6 Metrics for Redistributed Routes.............................................................. 444
10.3.7 Administrative Distance............................................................................ 444
10.3.8 Originating Default Information................................................................ 445
10.3.9 Routing Information Filtering.................................................................... 445
10.3.9.1 Filtering Access List and Prefix List .............................................................445
10.3.9.2 Disabling the transmission to Interface........................................................446
10.3.9.3 Offset List.....................................................................................................446
10.3.10Maximum Number of RIP Routes ............................................................ 447
10.3.11 RIP Network Timer................................................................................... 447
10.3.12Split Horizon............................................................................................. 447
10.3.13Authentication Key................................................................................... 448
10.3.14Restarting RIP.......................................................................................... 449
10.3.15UDP Buffer Size of RIP............................................................................ 449
10.3.16Monitoring and Managing RIP ................................................................. 449
10.3.16.1 Displaying RIP Protocol Information ............................................................450
10.3.16.2 Displaying Debugging Information...............................................................450
11 GPON Configuration.......................................................................452
11.1 OLT Management............................................................................... 454
11.1.1 Opening OLT Mode.................................................................................. 454
11.1.1.1 OLT Description...........................................................................................455
11.1.1.2 Activating OLT .............................................................................................455
11.1.2 Downstream Encryption........................................................................... 455
11.1.3 OLT Bandwidth......................................................................................... 456
11.1.3.1 Upstream Bandwidth....................................................................................456
11.1.3.2 Bandwidth Scheduler...................................................................................456
11.1.4 OLT Optical Transceiver Parameter......................................................... 457
11.1.5 Auto ONU Fault Detection........................................................................ 457
11.1.6 Maximal Distance between OLT and ONU (ONT)................................... 458
11.1.7 Forward Error Correction (FEC) Mode..................................................... 458
11.1.8 MAC Aging Time ...................................................................................... 459
11.1.9 OLT Link Down Detection ........................................................................ 459
11.1.10 Maximum Number of ONU....................................................................... 460
11.1.11 OLT Anti-Spoofing .................................................................................... 460
11.1.12 Displaying OLT Information...................................................................... 461
11.1.12.1 OLT Traffic Statistics....................................................................................461
11.1.12.2 MAC Address...............................................................................................463
11.1.12.3 OLT Slot Information....................................................................................463
11.1.12.4 GPON Daemon Memory Usage ..................................................................463
11.1.12.5 OLT Rx Power..............................................................................................464
11.2 ONU Management.............................................................................. 465
11.2.1 ONU Registration..................................................................................... 465
11.2.1.1 Activating/deactivating ONU........................................................................465
11.2.1.2 Serial Number-based ONU (ONT) Registration...........................................465
11.2.1.3 Manual ONU (ONT) Registration Mode.......................................................466
11.2.1.4 ONU Registration Mode...............................................................................466

User Manual UMN:CLI
V5812G
19
11.2.1.5 Changing ONU Registration Mode...............................................................467
11.2.1.6 ONU Description..........................................................................................467
11.2.2 Assigning IP address ................................................................................467
11.2.3 Activating Administration for UNI ..............................................................468
11.2.4 ONU Reset................................................................................................468
11.2.5 Forward Error Correction (FEC) Mode .....................................................468
11.2.6 Loopback...................................................................................................469
11.2.7 ONU Laser Down......................................................................................469
11.2.8 Source MAC address Monitoring..............................................................470
11.2.9 POTS Interface Configuration...................................................................471
11.2.10 ONU Firmware Upgrade...........................................................................472
11.2.10.1 Manual Upgrade (1).....................................................................................472
11.2.10.2 Manual Upgrade (2).....................................................................................474
11.2.10.3 Auto Upgrade...............................................................................................476
11.2.11 Displaying ONU Information .....................................................................482
11.3 ONU Profile.........................................................................................485
11.3.1 Creating ONU Profile................................................................................485
11.3.2 Configuring ONU Profile ...........................................................................486
11.3.2.1 RX Optical Power Threshold........................................................................486
11.3.2.2 Rogue ONU..................................................................................................486
11.3.2.3 Card Type Configuration ..............................................................................487
11.3.2.4 Applying Traffic & PM Profile........................................................................488
11.3.3 Overwriting Traffic Profile Configuration ...................................................488
11.3.3.1 VLAN Configurations....................................................................................489
11.3.3.2 Max Host......................................................................................................489
11.3.3.3 Rate Limit.....................................................................................................489
11.3.3.4 IGMP Group List ..........................................................................................490
11.3.3.5 Activating Administration for Ethernet UNI ...................................................490
11.3.3.6 Mapping between T-CONT ID and DBAprofile ............................................490
11.3.4 Saving Profile............................................................................................490
11.3.5 Applying ONU Profile................................................................................491
11.3.6 Checking ONU Profile Configuration........................................................491
11.3.7 Displaying ONU profile..............................................................................491
11.4 DBA Profile..........................................................................................493
11.4.1 Creating DBA Profile.................................................................................493
11.4.2 Configuring DBA Profile ............................................................................493
11.4.3 Saving DBA Profile....................................................................................494
11.4.4 Displaying DBA Profile..............................................................................494
11.5 Traffic Profile.......................................................................................495
11.5.1 Creating Traffic Profile ..............................................................................495
11.5.2 Creating a Mapper....................................................................................496
11.5.3 MAC Bridge Service Profile......................................................................497
11.5.3.1 Max Host......................................................................................................497
11.5.3.2 MAC Learning..............................................................................................497
11.5.3.3 Multicast Interworking Termination Point......................................................497
11.5.3.4 ANI Port Configuration.................................................................................498
11.5.3.5 UNI Port Configuration.................................................................................498
11.5.3.6 IP-host Service Link.....................................................................................501
11.5.3.7 TDM Service Link.........................................................................................501
11.5.4 T-CONT Mode...........................................................................................502

UMN:CLI User Manual
V5812G
20
11.5.4.1 GEM Port Configuration...............................................................................503
11.5.4.2 Displaying T-CONT Information...................................................................503
11.5.5 IP Host Service Configuration.................................................................. 503
11.5.5.1 IP Address ...................................................................................................504
11.5.5.2 DNS.............................................................................................................504
11.5.5.3 VLAN Tagging Operating.............................................................................504
11.5.5.4 VLAN Tagging Filtering................................................................................505
11.5.5.5 VoIP Service Link.........................................................................................505
11.5.5.6 TDM Service Link ........................................................................................505
11.5.6 VoIP Service Configuration (POTS UNI).................................................. 506
11.5.6.1 VoIP Service Management Mode ................................................................506
11.5.6.2 OMCI Managed VoIP...................................................................................507
11.5.6.3 IP-path Managed VoIP.................................................................................507
11.5.6.4 POTS UNI Configuration..............................................................................508
11.5.6.5 UDP/TOS Configuration...............................................................................509
11.5.7 TDM Service Configuration (CES UNI).................................................... 510
11.5.7.1 Expected Circuit Pack Type.........................................................................510
11.5.7.2 Framing Structure........................................................................................510
11.5.7.3 Encoding...................................................................................................... 511
11.5.7.4 Line Length.................................................................................................. 511
11.5.7.5 DS1 Mode....................................................................................................512
11.5.7.6 Line Type.....................................................................................................512
11.5.7.7 TDM Service Configuration..........................................................................512
11.5.7.8 Displaying TDM Pseudowire Information.....................................................513
11.5.8 Saving Traffic Profile................................................................................ 514
11.5.9 Adding/Applying Traffic Profile................................................................. 514
11.5.10 Displaying Traffic Profile Information ....................................................... 515
11.5.11 Sample Configuration............................................................................... 515
11.6 VoIP Profile......................................................................................... 516
11.6.1 OMCI Management Configuration........................................................... 516
11.6.1.1 Creating VoIP Profile....................................................................................516
11.6.1.2 VoIP Media Configuration............................................................................517
11.6.1.3 Voice Service Configuration.........................................................................517
11.6.1.4 RTP Configuration .......................................................................................518
11.6.1.5 Signalling Code............................................................................................519
11.6.1.6 DTMF Digit Configuration ............................................................................520
11.6.1.7 Hook Flash Time Configuration....................................................................520
11.6.2 OMCI-based SIP Configuration ............................................................... 520
11.6.2.1 SIP Agent Configuration...............................................................................521
11.6.2.2 VoIPApplication Service..............................................................................523
11.6.2.3 VoIP Feature Access Codes ........................................................................524
11.6.2.4 SIP User Data..............................................................................................525
11.6.2.5 Network Dial Plan........................................................................................526
11.6.3 Saving VoIP Profile .................................................................................. 527
11.6.4 Displaying VoIP Information..................................................................... 527
11.6.5 Sample Configuration............................................................................... 528
11.7 TDM Pseudowire Profile..................................................................... 529
11.7.1 Creating TDM Pseudowire Profile............................................................ 529
11.7.2 Basic Service Type................................................................................... 530
11.7.3 Signalling.................................................................................................. 530
Table of contents
Popular Network Hardware manuals by other brands

Devolo
Devolo Magic WiFi mini Ek manual

Symantec
Symantec S450 Series Safety and compliance guide

Clavister
Clavister Eagle E5 Getting started guide

Cutler-Hammer
Cutler-Hammer SV9000 user manual

Sans Digital
Sans Digital ELITENAS EN104L+(B) Quick installation guide

Panasonic
Panasonic Transistors 2SC4562G Specifications