Dasan V5824G User manual

V5824G
GPON OLT system
User Manual

UMN:CLI User Manual
V5824G
2
※Copyright 2014 ⓒDASAN Networks, Inc.
Issued by Technical Documentation Team
Korea
Technical modifications possible.
Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

User Manual UMN:CLI
V5824G
3
Summary of Changes
Initial Issue
Contents of update:
Chapter/Section
Contents
All
Initial release
Issue History
Issue
Number
Date
Update
01
March. 2014
Initial release (NOS version 1.03 #0011)

UMN:CLI User Manual
V5824G
4
Contents
1Introduction.......................................................................................27
1.1 Audience.............................................................................................27
1.2 Document Structure.............................................................................27
1.3 Document Convention.........................................................................28
1.4 Document Notation..............................................................................28
1.5 Virus Protection...................................................................................29
1.6 GPL/LGPLWarranty and Liability Exclusion........................................29
2System Overview ..............................................................................31
2.1 System Features.................................................................................32
3Command Line Interface (CLI).........................................................35
3.1 Configuration Mode.............................................................................35
3.1.1 Privileged EXEC View Mode...................................................................... 36
3.1.2 Privileged EXEC Enable Mode .................................................................. 36
3.1.3 Global Configuration Mode ........................................................................ 37
3.1.4 Bridge Configuration Mode ........................................................................ 37
3.1.5 DHCP Pool Configuration Mode ................................................................ 38
3.1.6 DHCP Option Configuration Mode............................................................. 38
3.1.7 DHCP Option 82 Configuration Mode........................................................ 39
3.1.8 Interface Configuration Mode..................................................................... 39
3.1.9 Rule Configuration Mode ........................................................................... 40
3.1.10 RMON Configuration Mode........................................................................ 40
3.1.11 Router Configuration Mode........................................................................ 41
3.1.12 Route-Map Configuration Mode................................................................. 41
3.1.13 GPON Configuration Mode........................................................................ 42
3.1.13.1 GPON-OLT Configuration Mode....................................................................42
3.1.13.2 ONU Profile Configuration Mode ...................................................................42
3.2 Configuration Mode Overview.............................................................43
3.3 Useful Tips ..........................................................................................44
3.3.1 Listing Available Command........................................................................ 44
3.3.2 Calling Command History .......................................................................... 46
3.3.3 Using Abbreviation ..................................................................................... 47
3.3.4 Using Command of Privileged EXEC Enable Mode .................................. 48
3.3.5 Exit Current Command Mode .................................................................... 48
3.3.6 The Command Execution Limit.................................................................. 48
4System Connection and IP Address................................................49
4.1 System Connection.............................................................................49
4.1.1 System Login ............................................................................................. 49
4.1.2 Password for Privileged EXEC Enable Mode............................................ 50
4.1.3 Changing Login Password......................................................................... 51
4.1.4 Management for System Account.............................................................. 51
4.1.4.1 Creating System Account...............................................................................51
4.1.4.2 Security Level................................................................................................52
4.1.5 Limiting Number of Users........................................................................... 55
4.1.6 Auto Log-out............................................................................................... 56
4.1.7 Telnet Access............................................................................................. 56

User Manual UMN:CLI
V5824G
5
4.1.8 System Rebooting.......................................................................................57
4.1.8.1 Manual System Rebooting.............................................................................57
4.1.8.2 System Rebooting Scheduler.........................................................................58
4.1.9 Auto Reset Configuration............................................................................58
4.1.9.1 CPU Load.......................................................................................................59
4.1.9.2 Memory..........................................................................................................59
4.2 System Authentication.........................................................................60
4.2.1 Authentication Method ................................................................................60
4.2.2 Authentication Interface ..............................................................................60
4.2.3 PrimaryAuthentication Method...................................................................61
4.2.4 RADIUS Server...........................................................................................61
4.2.4.1 RADIUS Server for System Authentication ....................................................61
4.2.4.2 RADIUS Server Priority..................................................................................61
4.2.4.3 Timeout of Authentication Request.................................................................62
4.2.4.4 Frequency of Retransmit................................................................................62
4.2.5 TACACS+ Server........................................................................................62
4.2.5.1 TACACS+ Server for System Authentication..................................................62
4.2.5.2 TACACS+ Server Priority...............................................................................62
4.2.5.3 Timeout of Authentication Request.................................................................63
4.2.5.4 Additional TACACS+ Configuration................................................................63
4.2.6 Accounting Mode ........................................................................................64
4.2.7 Displaying System Authentication...............................................................64
4.3 Configuring Interface ...........................................................................65
4.3.1 Enabling Interface.......................................................................................65
4.3.2 Assigning IP Address to Network Interface.................................................66
4.3.3 Static Route and Default Gateway..............................................................66
4.3.4 Interface Description...................................................................................67
4.3.5 Displaying Interface ....................................................................................68
4.3.6 Enabling Interface Overlapping ..................................................................68
4.4 Secure Shell (SSH)..............................................................................69
4.4.1 SSH Server.................................................................................................69
4.4.1.1 Enabling SSH Server.....................................................................................69
4.4.1.2 Displaying On-line SSH Client........................................................................69
4.4.1.3 Disconnecting SSH Client..............................................................................69
4.4.1.4 Assigning Specific Authentication Key............................................................70
4.4.1.5 Displaying Connection History of SSH Client.................................................70
4.4.2 SSH Client...................................................................................................70
4.4.2.1 Login to SSH Server ......................................................................................70
4.4.2.2 Secured File Copy..........................................................................................71
4.4.2.3 Authentication Key.........................................................................................71
4.5 802.1x Authentication ..........................................................................72
4.5.1 802.1x Authentication..................................................................................73
4.5.1.1 Enabling 802.1x .............................................................................................73
4.5.1.2 RADIUS Server..............................................................................................73
4.5.1.3 Authentication Mode ......................................................................................74
4.5.1.4 Authentication Port.........................................................................................75
4.5.1.5 Force Authorization ........................................................................................75
4.5.1.6 Interval for Retransmitting Request/Identity Packet .......................................75
4.5.1.7 Interval of Authentication................................................................................75
4.5.1.8 Number of Requests to RADIUS Server ........................................................76

UMN:CLI User Manual
V5824G
6
4.5.1.9 Interval of Request to RADIUS Server...........................................................76
4.5.2 802.1x Re-Authentication........................................................................... 76
4.5.2.1 Enabling 802.1x Re-Authentication................................................................76
4.5.2.2 Interval of Re-Authentication..........................................................................77
4.5.2.3 Interval of Requesting Re-Authentication ......................................................77
4.5.2.4 802.1x Re-Authentication...............................................................................77
4.5.3 Initializing Authentication Status................................................................. 78
4.5.4 Restoring Default Value ............................................................................. 78
4.5.5 Displaying 802.1x Configuration ................................................................ 78
4.5.6 802.1x User Authentication Statistics......................................................... 78
4.5.7 Sample Configuration................................................................................. 78
5Port Configuration ............................................................................80
5.1 Port Basic............................................................................................80
5.1.1 Selecting Port Type.................................................................................... 80
5.2 Ethernet Port Configuration.................................................................80
5.2.1 Enabling Ethernet Port............................................................................... 80
5.2.2 Auto-Negotiation ........................................................................................ 81
5.2.3 Transmit Rate............................................................................................. 81
5.2.4 Duplex Mode.............................................................................................. 82
5.2.5 Flow Control............................................................................................... 82
5.2.6 Port Description.......................................................................................... 82
5.2.7 L2 Port Bridge ............................................................................................ 83
5.2.8 Traffic Statistics .......................................................................................... 83
5.2.8.1 Packet Statistics.............................................................................................83
5.2.8.2 CPU Statistics................................................................................................84
5.2.8.3 Protocol Statistics ..........................................................................................85
5.2.9 Port Information.......................................................................................... 86
5.3 Port Mirroring ......................................................................................87
6System Environment ........................................................................90
6.1 Environment Configuration..................................................................90
6.1.1 Host Name ................................................................................................. 90
6.1.2 Time and Date............................................................................................ 90
6.1.3 Time Zone.................................................................................................. 91
6.1.4 Network Time Protocol (NTP) .................................................................... 92
6.1.5 Simple Network Time Protocol (SNTP)...................................................... 93
6.1.6 Terminal Configuration............................................................................... 94
6.1.7 Login Banner.............................................................................................. 94
6.1.8 DNS Server................................................................................................ 95
6.1.9 Fan Operation ............................................................................................ 96
6.1.10 Enabling FTP/TFTP Connection................................................................ 96
6.1.11 Disabling Daemon Operation..................................................................... 97
6.1.12 FTP Bind Address ...................................................................................... 97
6.1.13 System Threshold ...................................................................................... 98
6.1.13.1 CPU Load......................................................................................................98
6.1.13.2 Port Traffic .....................................................................................................98
6.1.13.3 Fan Operation................................................................................................99
6.1.13.4 System Temperature......................................................................................99
6.1.13.5 System Memory...........................................................................................100

User Manual UMN:CLI
V5824G
7
6.1.13.6 System/SFP Module Operation....................................................................100
6.1.14 Enabling DMI Module................................................................................101
6.2 Configuration Management................................................................102
6.2.1 Displaying System Configuration..............................................................102
6.2.2 Writing System Configuration ...................................................................103
6.2.3 Auto-Saving...............................................................................................103
6.2.4 System Configuration File.........................................................................103
6.2.5 Restoring Default Configuration................................................................105
6.2.6 Core Dump File.........................................................................................105
6.3 System Management.........................................................................106
6.3.1 Network Connection..................................................................................106
6.3.2 IP ICMP Source Routing...........................................................................108
6.3.3 Tracing Packet Route................................................................................109
6.3.4 Displaying User Connecting to System ....................................................110
6.3.5 MAC Table.................................................................................................111
6.3.6 System Running Time...............................................................................111
6.3.7 System Information...................................................................................111
6.3.8 System Memory Information.....................................................................112
6.3.9 CPU Packet Management ........................................................................112
6.3.9.1 CPU Packet Limit.........................................................................................112
6.3.10 Running Process.......................................................................................112
6.3.11 Displaying System Software.....................................................................113
6.3.12 Displaying Installed OS.............................................................................113
6.3.13 Default OS.................................................................................................114
6.3.14 Switch Status.............................................................................................114
6.3.15 Forwarding Information Base (FIB) Table.................................................114
6.3.16 Tech Support Information..........................................................................115
6.3.17 System Boot Information...........................................................................115
6.3.18 Network Service Module (NSM) Daemon Debugging ..............................115
7Network Management..................................................................... 117
7.1 Simple Network Management Protocol (SNMP) ................................117
7.1.1 SNMP Service...........................................................................................117
7.1.2 SNMP Community.....................................................................................118
7.1.3 SNMP Agent Administrator .......................................................................118
7.1.4 Assigning IP Address of SNMPAgent ......................................................119
7.1.5 SNMP Com2sec........................................................................................120
7.1.6 SNMP Group.............................................................................................120
7.1.7 SNMP View Record ..................................................................................121
7.1.8 Permission to Access SNMP View Record...............................................121
7.1.9 SNMP Version 3 User...............................................................................122
7.1.10 SNMP Trap................................................................................................122
7.1.10.1 SNMP Trap Mode.........................................................................................122
7.1.10.2 SNMP Trap Host..........................................................................................123
7.1.10.3 SNMP Trap in Event Mode...........................................................................123
7.1.10.4 Displaying SNMP Trap.................................................................................125
7.1.10.5 SNMP Trap Message Logging and Threshold..............................................126
7.1.11 SNMPAlarm..............................................................................................127
7.1.11.1 Alarm Notify Activity .....................................................................................127
7.1.11.2 Alarm Severity Criterion ...............................................................................127

UMN:CLI User Manual
V5824G
8
7.1.11.3 Default Alarm Severity .................................................................................127
7.1.11.4 Generic Alarm Severity................................................................................128
7.1.11.5 Displaying SNMP Alarm...............................................................................129
7.1.12 SNMP Message Logging ......................................................................... 129
7.1.13 Displaying SNMP Configuration............................................................... 130
7.1.14 Disabling SNMP....................................................................................... 130
7.2 Link Layer Discovery Protocol (LLDP)...............................................131
7.2.1 LLDP Operation ....................................................................................... 131
7.2.2 Enabling LLDP ......................................................................................... 131
7.2.3 LLDP Operation Type............................................................................... 131
7.2.4 Basic TLV................................................................................................. 131
7.2.5 LLDP Message......................................................................................... 132
7.2.6 Reinitiating Delay..................................................................................... 132
7.2.7 Displaying LLDP Configuration................................................................ 133
7.3 Remote Monitoring (RMON)..............................................................134
7.3.1 RMON History.......................................................................................... 134
7.3.1.1 Source Port of Statistical Data.....................................................................135
7.3.1.2 Subject of RMON History.............................................................................135
7.3.1.3 Number of Sample Data ..............................................................................135
7.3.1.4 Interval of Sample Inquiry............................................................................135
7.3.1.5 Activating RMON History.............................................................................135
7.3.1.6 Deleting Configuration of RMON History .....................................................136
7.3.1.7 Displaying RMON History............................................................................136
7.3.2 RMON Alarm............................................................................................ 136
7.3.2.1 Subject of RMON Alarm...............................................................................137
7.3.2.2 Object of Sample Inquiry..............................................................................137
7.3.2.3 Absolute and Delta Comparison ..................................................................137
7.3.2.4 Upper Bound of Threshold...........................................................................137
7.3.2.5 Lower Bound of Threshold...........................................................................138
7.3.2.6 Standard of the First Alarm ..........................................................................138
7.3.2.7 Interval of Sample Inquiry............................................................................139
7.3.2.8 Activating RMON Alarm...............................................................................139
7.3.2.9 Deleting Configuration of RMON Alarm .......................................................139
7.3.3 RMON Event............................................................................................ 139
7.3.3.1 Event Community ........................................................................................140
7.3.3.2 Event Description.........................................................................................140
7.3.3.3 Subject of RMON Event...............................................................................140
7.3.3.4 Event Type...................................................................................................140
7.3.3.5 Activating RMON Event...............................................................................141
7.3.3.6 Deleting Configuration of RMON Event .......................................................141
7.4 Syslog...............................................................................................142
7.4.1 Syslog Output Level................................................................................. 142
7.4.2 Facility Code ............................................................................................ 144
7.4.3 Syslog Bind Address ................................................................................ 145
7.4.4 Debug Message for Remote Terminal ..................................................... 145
7.4.5 Disabling Syslog....................................................................................... 145
7.4.6 Displaying Syslog Message..................................................................... 145
7.4.7 Displaying Syslog Configuration .............................................................. 146
7.5 Rule and QoS....................................................................................147
7.5.1 How to Operate QoS................................................................................ 148

User Manual UMN:CLI
V5824G
9
7.5.2 Packet Classification.................................................................................150
7.5.2.1 Flow Creation...............................................................................................150
7.5.2.2 Configuring Flow..........................................................................................151
7.5.2.3 Applying and modifying Flow........................................................................153
7.5.2.4 Class Creation..............................................................................................154
7.5.3 Packet Conditioning..................................................................................154
7.5.3.1 Policer Creation............................................................................................154
7.5.3.2 Packet Counter ............................................................................................155
7.5.3.3 Rate-limit......................................................................................................156
7.5.3.4 Applying and modifying Policer....................................................................156
7.5.4 Rule Action................................................................................................156
7.5.4.1 Policy Creation.............................................................................................156
7.5.4.2 Metering.......................................................................................................158
7.5.4.3 Policy Priority ...............................................................................................164
7.5.4.4 Policy Action.................................................................................................164
7.5.4.5 Setting CoS and ToS values.........................................................................165
7.5.4.6 Attaching a Policy to an interface.................................................................165
7.5.4.7 Applying and Modifying Policy......................................................................166
7.5.5 Displaying Rule.........................................................................................166
7.5.6 Admin Rule................................................................................................167
7.5.6.1 Creating Admin Flow for packet classification ..............................................167
7.5.6.2 Configuring Admin Flow ...............................................................................168
7.5.6.3 Applying and modifying Admin Flow.............................................................169
7.5.6.4 Class Creation..............................................................................................169
7.5.7 Admin Rule Action.....................................................................................170
7.5.7.1 Admin Policy Creation..................................................................................170
7.5.7.2 Admin Policy Priority....................................................................................171
7.5.7.3 Admin Policy Action......................................................................................171
7.5.7.4 Applying and Modifying Admin Policy...........................................................172
7.5.8 Displaying Admin Rule..............................................................................172
7.5.9 Scheduling ................................................................................................173
7.5.9.1 Scheduling mode .........................................................................................175
7.5.9.2 Weight and Quantum...................................................................................175
7.5.9.3 Maximum and Minimum Bandwidth .............................................................176
7.5.9.4 Limiting traffic and buffer..............................................................................176
7.5.9.5 DSCP-to-CoS Mapping................................................................................176
7.5.9.6 The Traffic of Queue.....................................................................................177
7.5.9.7 Displaying QoS ............................................................................................177
7.6 NetBIOS Filtering...............................................................................178
7.7 Martian Filtering.................................................................................179
7.8 Max Host ...........................................................................................180
7.9 Port Security......................................................................................181
7.9.1 Port Security on Port.................................................................................181
7.9.2 Port Security Aging ...................................................................................182
7.9.3 Displaying Port Security............................................................................183
7.10 Outband Management Port Security..................................................183
7.11 MAC Table.........................................................................................183
7.12 MAC Filtering.....................................................................................185
7.12.1 Default MAC Filter Policy..........................................................................185

UMN:CLI User Manual
V5824G
10
7.12.2 Configuring MAC Filter Policy.................................................................. 185
7.12.3 Listing MAC Filter Policy.......................................................................... 186
7.12.4 Displaying MAC Filter Policy.................................................................... 186
7.13 Address Resolution Protocol (ARP)...................................................187
7.13.1 ARP Table ................................................................................................ 187
7.13.1.1 Registering ARP Table.................................................................................187
7.13.1.2 Displaying ARP Table...................................................................................188
7.13.2 ARP Alias ................................................................................................. 188
7.13.3 ARP Inspection ........................................................................................ 189
7.13.3.1 ARP Access List ..........................................................................................189
7.13.3.2 Enabling ARP Inspection Filtering................................................................192
7.13.3.3 ARP Address Validation...............................................................................192
7.13.3.4 ARP Inspection on Trust Port.......................................................................193
7.13.3.5 ARP Inspection Log-buffer...........................................................................193
7.13.3.6 Displaying ARP Inspection...........................................................................194
7.13.4 Gratuitous ARP ........................................................................................ 195
7.13.5 Proxy ARP................................................................................................ 195
7.14 ICMP Message Control .....................................................................196
7.14.1 Blocking Echo Reply Message ................................................................ 197
7.14.2 Interval for Transmit ICMP Message........................................................ 197
7.14.3 ICMP Destination Unreachable Message................................................ 199
7.14.4 ICMP Redirect Message .......................................................................... 199
7.15 TCP Flag Control...............................................................................200
7.15.1 RST Configuration.................................................................................... 200
7.15.2 SYN Configuration ................................................................................... 200
7.16 The Utilization on L3 table.................................................................200
7.17 Packet Dump.....................................................................................201
7.17.1 Packet Dump by Protocol......................................................................... 201
7.17.2 Packet Dump with Option......................................................................... 201
7.17.3 Debug Packet Dump................................................................................ 203
7.17.4 Displaying Dump Packets........................................................................ 203
7.17.5 Dump File................................................................................................. 203
7.18 Access List........................................................................................204
7.18.1 Standard Access List................................................................................ 205
7.18.2 Extended Access List............................................................................... 206
7.18.3 Named Access List................................................................................... 208
7.18.4 Access List Range ................................................................................... 209
7.18.5 Displaying Access List Entries ................................................................. 210
8System Main Functions..................................................................211
8.1 Virtual Local Area Network (VLAN).................................................... 211
8.1.1 Port-based VLAN ..................................................................................... 212
8.1.1.1 Creating VLAN.............................................................................................213
8.1.1.2 Specifying PVID...........................................................................................213
8.1.1.3 Adding Port to VLAN....................................................................................213
8.1.1.4 Deleting VLAN.............................................................................................214
8.1.2 Protocol-based VLAN............................................................................... 214
8.1.3 MAC-based VLAN.................................................................................... 215
8.1.4 Subnet-based VLAN ................................................................................ 215

User Manual UMN:CLI
V5824G
11
8.1.5 Tagged VLAN............................................................................................216
8.1.6 VLAN Description......................................................................................217
8.1.7 VLAN Precedence ....................................................................................217
8.1.8 Displaying VLAN Information....................................................................217
8.1.9 QinQ VLAN Mapping ................................................................................218
8.1.9.1 TPID Configuration.......................................................................................219
8.1.9.2 One-to-One VLAN Mapping between S-VID and C-VID ..............................219
8.1.9.3 One-to-Two VLAN Mapping between S-VID and C-VID...............................220
8.1.9.4 Two-to-One VLAN Mapping between S-VID and C-VID...............................221
8.1.9.5 Two-to-Two VLAN Mapping between S-VID and C-VID...............................222
8.1.9.6 Double Tagging Operation............................................................................222
8.1.9.7 Double Tagging Configuration......................................................................223
8.1.9.8 Inner Tag Configuration................................................................................224
8.1.9.9 Displaying VLAN Mapping and Translation..................................................224
8.1.10 Layer 2 Isolation........................................................................................224
8.1.10.1 Port Isolation................................................................................................225
8.1.10.2 Shared VLAN...............................................................................................225
8.1.11 Sample Configuration ...............................................................................227
8.2 Link Aggregation (LAG)......................................................................230
8.2.1 Port Trunk..................................................................................................230
8.2.1.1 Configuring Port Trunk .................................................................................231
8.2.1.2 Disabling Port Trunk.....................................................................................231
8.2.1.3 Displaying Port Trunk...................................................................................232
8.2.2 Link Aggregation Control Protocol (LACP) ...............................................232
8.2.2.1 Configuring LACP ........................................................................................232
8.2.2.2 Distribution Mode.........................................................................................233
8.2.2.3 Operation Mode ...........................................................................................234
8.2.2.4 Priority of Switch ..........................................................................................234
8.2.2.5 Manual Aggregation.....................................................................................235
8.2.2.6 BPDU Transmission Rate.............................................................................235
8.2.2.7 Administrational Key ....................................................................................235
8.2.2.8 Port Priority ..................................................................................................236
8.2.2.9 Displaying LACP Configuration....................................................................236
8.3 Spanning Tree Protocol (STP) ...........................................................237
8.3.1 STP Operation ..........................................................................................238
8.3.1.1 Root Switch..................................................................................................238
8.3.1.2 Designated Switch .......................................................................................238
8.3.1.3 Designated Port and Root Port ....................................................................239
8.3.1.4 Port Priority ..................................................................................................240
8.3.2 RSTP Operation........................................................................................242
8.3.2.1 Port States....................................................................................................242
8.3.2.2 BPDU Policy.................................................................................................242
8.3.2.3 Rapid Network Convergence .......................................................................243
8.3.2.4 Compatibility with 802.1d .............................................................................246
8.3.3 MSTP Operation .......................................................................................246
8.3.3.1 MSTP...........................................................................................................247
8.3.4 STP Mode .................................................................................................249
8.3.5 STP Basic Configuration...........................................................................249
8.3.5.1 Path-cost Method.........................................................................................249
8.3.5.2 Edge Ports ...................................................................................................251

UMN:CLI User Manual
V5824G
12
8.3.5.3 BPDU Transmit hold count...........................................................................251
8.3.5.4 Port Priority..................................................................................................252
8.3.5.5 Link Type .....................................................................................................252
8.3.5.6 Enabling STP configuration on the Port.......................................................252
8.3.5.7 Displaying Configuration..............................................................................253
8.3.6 Configuring MSTP.................................................................................... 253
8.3.6.1 MST Region.................................................................................................254
8.3.6.2 Enabling MSTP configuration ......................................................................255
8.3.6.3 Root Switch..................................................................................................256
8.3.6.4 Path-cost......................................................................................................256
8.3.6.5 Port Priority..................................................................................................256
8.3.6.6 Displaying Configuration..............................................................................257
8.3.7 Configuring PVSTP.................................................................................. 258
8.3.7.1 Enabling PVSTP..........................................................................................258
8.3.7.2 Root Switch..................................................................................................259
8.3.7.3 Path-cost......................................................................................................259
8.3.7.4 Port Priority..................................................................................................260
8.3.7.5 Displaying Configuration..............................................................................260
8.3.8 Root Guard............................................................................................... 261
8.3.9 Loop Guard .............................................................................................. 262
8.3.10 Topology Change Detection..................................................................... 262
8.3.11 Restarting Protocol Migration................................................................... 263
8.3.12 Loop Back Detection................................................................................ 263
8.3.13 BPDU Configuration................................................................................. 264
8.3.13.1 Hello Time....................................................................................................265
8.3.13.2 Forward Delay Time.....................................................................................265
8.3.13.3 MaxAge.......................................................................................................266
8.3.13.4 BPDU Hop Count.........................................................................................266
8.3.13.5 BPDU Filtering.............................................................................................266
8.3.13.6 BPDU Guard................................................................................................267
8.3.14 Sample Configuration............................................................................... 269
8.4 Loop Detection..................................................................................271
8.5 Dynamic Host Configuration Protocol (DHCP)...................................273
8.5.1 DHCP Server............................................................................................ 274
8.5.1.1 DHCP Pool Creation....................................................................................275
8.5.1.2 DHCP Subnet..............................................................................................275
8.5.1.3 Range of IPAddress....................................................................................275
8.5.1.4 Default Gateway..........................................................................................276
8.5.1.5 IP Lease Time..............................................................................................276
8.5.1.6 DNS Server..................................................................................................277
8.5.1.7 Manual Binding............................................................................................277
8.5.1.8 Domain Name..............................................................................................278
8.5.1.9 DHCP Server Option....................................................................................278
8.5.1.10 Static Mapping.............................................................................................278
8.5.1.11 Recognition of DHCP Client.........................................................................279
8.5.1.12 IP Address Validation...................................................................................279
8.5.1.13 Authorized ARP ...........................................................................................280
8.5.1.14 Prohibition of 1:N IPAddress Assignment....................................................280
8.5.1.15 Ignoring BOOTP Request............................................................................281
8.5.1.16 DHCP Packet Statistics................................................................................281
8.5.1.17 Setting DHCP Pool Size ..............................................................................282

User Manual UMN:CLI
V5824G
13
8.5.1.18 Displaying DHCP Pool Configuration...........................................................282
8.5.2 DHCP Address Allocation with Option 82 .................................................282
8.5.2.1 DHCP Class Capability ................................................................................283
8.5.2.2 DHCP Class Creation...................................................................................283
8.5.2.3 Relay Agent Information Pattern ..................................................................283
8.5.2.4 Associating DHCP Class..............................................................................284
8.5.2.5 Range of IPAddress for DHCP Class..........................................................284
8.5.3 DHCP Lease Database.............................................................................284
8.5.3.1 DHCP Database Agent.................................................................................284
8.5.3.2 Displaying DHCP Lease Status....................................................................285
8.5.3.3 Deleting DHCP Lease Database..................................................................285
8.5.4 DHCP Relay Agent....................................................................................286
8.5.4.1 DHCP Helper Address..................................................................................286
8.5.4.2 Smart Relay Agent Forwarding ....................................................................287
8.5.4.3 DHCP Server ID Option ...............................................................................288
8.5.4.4 DHCP Relay Statistics..................................................................................288
8.5.5 DHCP Option ............................................................................................289
8.5.5.1 Entering DHCP Option Mode.......................................................................289
8.5.5.2 Configuring DHCP Option Format................................................................290
8.5.5.3 Deleting DHCP Option Format.....................................................................290
8.5.5.4 Displaying DHCP option...............................................................................291
8.5.5.5 Different DHCP option Code Configurations ................................................291
8.5.6 DHCP Option 82 .......................................................................................292
8.5.6.1 Enabling DHCP Option 82............................................................................293
8.5.6.2 Option 82 Sub-Option ..................................................................................293
8.5.6.3 Option 82 Reforwarding Policy.....................................................................294
8.5.6.4 Option 82 Trust Policy..................................................................................295
8.5.7 DHCP Snooping........................................................................................296
8.5.7.1 Enabling DHCP Snooping............................................................................296
8.5.7.2 DHCP Trust State.........................................................................................296
8.5.7.3 DHCP Filter on Trust Port.............................................................................297
8.5.7.4 DHCP Rate Limit..........................................................................................297
8.5.7.5 DHCP Lease Limit........................................................................................298
8.5.7.6 Source MAC Address Verification ................................................................298
8.5.7.7 Static DHCP Snooping Binding ....................................................................299
8.5.7.8 DHCP Snooping Database Agent.................................................................299
8.5.7.9 ARP Inspection Start Time ...........................................................................300
8.5.7.10 DHCP Snooping with Option82....................................................................300
8.5.7.11 DHCP Snooping Option ...............................................................................301
8.5.7.12 Displaying DHCP Snooping Configuration...................................................302
8.5.8 IP Source Guard .......................................................................................303
8.5.8.1 Enabling IP Source Guard............................................................................303
8.5.8.2 Static IP Source Binding...............................................................................304
8.5.8.3 Displaying IP Source Guard Configuration...................................................304
8.5.9 DHCP Client..............................................................................................305
8.5.9.1 Enabling DHCP Client..................................................................................305
8.5.9.2 DHCP Client ID ............................................................................................305
8.5.9.3 DHCP Class ID ............................................................................................305
8.5.9.4 Host Name...................................................................................................305
8.5.9.5 IP Lease Time..............................................................................................306
8.5.9.6 Requesting Option .......................................................................................306

UMN:CLI User Manual
V5824G
14
8.5.9.7 Forcing Release or Renewal of DHCP Lease..............................................306
8.5.9.8 Displaying DHCP Client Configuration.........................................................306
8.5.10 DHCP Filtering ......................................................................................... 307
8.5.10.1 DHCP Packet Filtering.................................................................................307
8.5.10.2 DHCP Server Packet Filtering .....................................................................307
8.5.11 Debugging DHCP..................................................................................... 308
8.6 Virtual Router Redundancy Protocol (VRRP) ....................................309
8.6.1 Configuring VRRP.................................................................................... 310
8.6.1.1 Associated IP Address.................................................................................310
8.6.1.2 Access to Associated IP Address.................................................................310
8.6.1.3 Master Router and Backup Router ..............................................................310
8.6.1.4 VRRP Track Function ..................................................................................313
8.6.1.5 Authentication Password .............................................................................315
8.6.1.6 Preempt.......................................................................................................315
8.6.2 VRRP Monitoring and Management ........................................................ 316
8.6.2.1 Displaying VRRP Protocol Information ........................................................316
8.6.2.2 VRRP Statistics............................................................................................316
8.6.2.3 VRRP Debug...............................................................................................317
8.7 Rate Limit..........................................................................................318
8.8 Flood Guard......................................................................................319
8.8.1 MAC Flood Guard .................................................................................... 319
8.8.2 CPU Flood Guard..................................................................................... 320
8.8.3 System Flood Guard................................................................................ 321
8.8.4 Attack Guard ............................................................................................ 322
8.8.5 Error Guard .............................................................................................. 323
8.9 PPS Control ......................................................................................324
8.10 Storm Control....................................................................................324
8.11 Jumbo Frame Capacity .....................................................................325
8.12 Bandwidth .........................................................................................326
8.13 Maximum Transmission Unit (MTU) ..................................................326
8.14 Blocking Packet Forwarding..............................................................326
9IP Multicast ......................................................................................327
9.1 Multicast Group Membership.............................................................330
9.1.1 IGMP Basic .............................................................................................. 330
9.1.1.1 IGMP Version...............................................................................................331
9.1.1.2 Querier’s Robustness Variable ....................................................................331
9.1.1.3 Clearing IGMP Entry....................................................................................331
9.1.1.4 IGMP Debug................................................................................................332
9.1.2 IGMP Version 2........................................................................................ 332
9.1.2.1 IGMP Static Join..........................................................................................333
9.1.2.2 IGMP Access Control...................................................................................335
9.1.2.3 IGMP Querier Configuration ........................................................................335
9.1.2.4 IGMP Immediate Leave...............................................................................337
9.1.3 IGMP Version 3........................................................................................ 338
9.1.4 Displaying IGMP Information ................................................................... 339
9.2 Multicast Functions............................................................................340
9.2.1 Multicast Forwarding Database................................................................ 340
9.2.1.1 Blocking Unknown Multicast Traffic..............................................................340

User Manual UMN:CLI
V5824G
15
9.2.1.2 Forwarding Entry Aging................................................................................341
9.2.1.3 Displaying McFDB Information.....................................................................341
9.2.2 IGMP Snooping Basic...............................................................................342
9.2.2.1 Enabling IGMP Snooping.............................................................................343
9.2.2.2 IGMP Snooping Version...............................................................................343
9.2.2.3 IGMP Snooping Robustness Value..............................................................344
9.2.3 IGMPv2 Snooping.....................................................................................344
9.2.3.1 IGMP Snooping Querier Configuration.........................................................344
9.2.3.2 IGMP Snooping Last Member Query Interval...............................................346
9.2.3.3 IGMP Snooping Immediate Leave ...............................................................347
9.2.3.4 IGMP Snooping Report Suppression ...........................................................348
9.2.3.5 IGMP Snooping S-Query Report Agency.....................................................348
9.2.3.6 Explicit Host Tracking...................................................................................349
9.2.3.7 Multicast Router Port Configuration .............................................................350
9.2.3.8 TCN Multicast Flooding................................................................................352
9.2.4 IGMPv3 Snooping.....................................................................................354
9.2.5 Displaying IGMP Snooping Information....................................................355
9.2.6 Multicast VLAN Registration (MVR)..........................................................356
9.2.6.1 Enabling MVR..............................................................................................356
9.2.6.2 MVR Group..................................................................................................356
9.2.6.3 Source/Receiver Port...................................................................................357
9.2.6.4 MVR Helper Address....................................................................................357
9.2.6.5 Displaying MVR Configuration .....................................................................357
9.2.7 IGMP Filtering and Throttling....................................................................358
9.2.7.1 IGMP Filtering..............................................................................................358
9.2.7.2 IGMP Throttling............................................................................................360
9.2.7.3 Displaying IGMP Filtering and Throttling......................................................360
9.2.8 IGMP Proxy...............................................................................................361
9.2.8.1 Designating Downstream Interface..............................................................361
9.2.8.2 Designating Upstream Interface...................................................................361
9.2.8.3 Configuring Upstream Interface Mode..........................................................362
9.2.8.4 IGMP-Proxy IF Flap Discredit.......................................................................362
9.2.8.5 Disabling Verification of Source IP of IGMP Packets....................................364
9.2.8.6 Specifying IGMP Report/Leave’s Source IP Address ...................................364
9.2.8.7 Querying with Real Querirer’s Source IP Address........................................365
9.2.8.8 Displaying IGMP Proxy Information .............................................................365
9.2.9 IGMP State Limit.......................................................................................365
9.2.10 Multicast-Source Trust Port.......................................................................366
9.3 Multicast Routing...............................................................................367
9.3.1 Multicast Routing ......................................................................................367
9.3.1.1 Enabling Multicast Routing...........................................................................367
9.3.1.2 TTL Threshold..............................................................................................367
9.3.1.3 ECMP Load Splitting ....................................................................................368
9.3.1.4 MRIB Entry Limit..........................................................................................369
9.3.1.5 Displaying MRIB Entry .................................................................................369
9.3.1.6 Displaying MRIB Statistics............................................................................370
9.3.1.7 Displaying MFIB Information........................................................................371
9.3.1.8 MRIB Debug.................................................................................................371
9.3.2 PIM Basic..................................................................................................372
9.3.2.1 PIM Mode.....................................................................................................373
9.3.2.2 DR Priority....................................................................................................373

UMN:CLI User Manual
V5824G
16
9.3.2.3 Neighbor Filtering ........................................................................................374
9.3.2.4 PIM Join/Prune Message Group Filtering....................................................374
9.3.2.5 PIM Hello Message......................................................................................374
9.3.2.6 PIM Join/Prune Interval ...............................................................................375
9.3.2.7 PIM VIF Flap Discredit.................................................................................375
9.3.2.8 PIM Static Join.............................................................................................376
9.3.2.9 Displaying PIM Information..........................................................................377
9.3.3 PIM-SM .................................................................................................... 377
9.3.3.1 Rendezvous Point........................................................................................379
9.3.3.2 Bootstrap Router..........................................................................................381
9.3.3.3 Source Registration .....................................................................................382
9.3.3.4 SPT Switchover ...........................................................................................384
9.3.3.5 Cisco’s Router Interoperability .....................................................................385
9.3.3.6 PIM Debug...................................................................................................387
9.3.4 Source Specific Multicast (SSM).............................................................. 388
9.3.4.1 PIM-SSM .....................................................................................................388
9.3.4.2 Static SSM Mapping ....................................................................................388
10 IP Routing Protocol.........................................................................390
10.1 Border Gateway Protocol (BGP)........................................................390
10.1.1 Basic Configuration.................................................................................. 391
10.1.1.1 Configuration Type of BGP..........................................................................391
10.1.1.2 Enabling BGP Routing.................................................................................392
10.1.1.3 Router ID .....................................................................................................393
10.1.1.4 Registering BGP Neighbor...........................................................................393
10.1.1.5 Maximum Path.............................................................................................393
10.1.1.6 BGP Aggregation.........................................................................................393
10.1.1.7 BGP Path Selection.....................................................................................394
10.1.2 Advanced Configuration........................................................................... 394
10.1.2.1 Summary of Path.........................................................................................394
10.1.2.2 Automatic Summarization of Path................................................................395
10.1.2.3 BGP Next-Hop Address Tracking.................................................................395
10.1.2.4 Local Preference..........................................................................................396
10.1.2.5 Multi-Exit Discriminator (MED).....................................................................396
10.1.2.6 Choosing Best Path.....................................................................................397
10.1.2.7 Graceful Restart...........................................................................................398
10.1.3 Administrative Distance for BGP.............................................................. 399
10.1.4 IPAddress Family.................................................................................... 400
10.1.5 BGP Neighbor.......................................................................................... 400
10.1.5.1 Default Route...............................................................................................400
10.1.5.2 Peer Group..................................................................................................401
10.1.5.3 Route Map...................................................................................................402
10.1.5.4 Force Shutdown...........................................................................................402
10.1.5.5 Changing the Nexthop Information..............................................................402
10.1.5.6 Neighbor Password .....................................................................................403
10.1.5.7 Neighbor Description ...................................................................................403
10.1.5.8 Source of Routing Updates..........................................................................403
10.1.5.9 Updates for Inbound Soft Reconfiguration...................................................404
10.1.6 BGP Community List................................................................................ 404
10.1.7 BGP Timers.............................................................................................. 407
10.1.8 External Routes to BGP Network............................................................. 407

User Manual UMN:CLI
V5824G
17
10.1.9 Route Flap Dampening.............................................................................408
10.1.10BGP Session Reset ..................................................................................409
10.1.10.1 Session Reset of All Peers...........................................................................410
10.1.10.2 Session Reset of Peers within Particular AS................................................410
10.1.10.3 Session Reset of Specific Route..................................................................411
10.1.10.4 Session Reset of External Peer ...................................................................412
10.1.10.5 Session Reset of Peer Group.......................................................................412
10.1.11 BGP AS-path Access List..........................................................................413
10.1.13BGP Monitoring and Management............................................................417
10.1.13.1 Displaying BGP Information.........................................................................417
10.1.13.2 BGP Neighbor..............................................................................................418
10.1.13.3 Logging Neighbor Changes..........................................................................418
10.1.13.4 Checking the BGP Network Route...............................................................419
10.1.13.5 Sending SNMP Trap.....................................................................................419
10.1.14BGP Debug...............................................................................................419
10.2 Open Shortest Path First (OSPF) ......................................................420
10.2.1 Enabling OSPF .........................................................................................420
10.2.2 ABR Type Configuration ...........................................................................422
10.2.3 Compatibility Support................................................................................422
10.2.4 OSPF Interface .........................................................................................422
10.2.4.1 Authentication Type......................................................................................422
10.2.4.2 Authentication Key.......................................................................................423
10.2.4.3 Interface Cost...............................................................................................424
10.2.4.4 Blocking Transmission of Route Information Database................................424
10.2.4.5 Routing Protocol Interval..............................................................................425
10.2.4.6 OSPF Resynchronization Timeout...............................................................426
10.2.4.7 OSPF Maximum Transmission Unit (MTU) ..................................................427
10.2.4.8 OSPF Priority...............................................................................................427
10.2.4.9 OSPF Network Type.....................................................................................428
10.2.4.10 Disabling OSPF Packet Processing.............................................................428
10.2.5 Non-Broadcast Network............................................................................429
10.2.6 OSPF Area................................................................................................429
10.2.6.1 Area Authentication......................................................................................430
10.2.6.2 Default Cost of Area.....................................................................................430
10.2.6.3 Blocking the Transmission of Routing Information Between Area................430
10.2.6.4 Not So Stubby Area (NSSA).........................................................................431
10.2.6.5 Area Range..................................................................................................434
10.2.6.6 Shortcut Area ...............................................................................................435
10.2.6.7 Stub Area .....................................................................................................435
10.2.6.8 Maximum Area.............................................................................................436
10.2.6.9 Virtual Link ...................................................................................................436
10.2.7 Default Metric............................................................................................438
10.2.8 Graceful Restart Support ..........................................................................438
10.2.9 Opaque-LSA Support................................................................................440
10.2.10Default Route............................................................................................441
10.2.11 ECMP Route Hashing...............................................................................442
10.2.12Finding Period...........................................................................................442
10.2.13External Routes to OSPF Network ...........................................................443
10.2.14OSPF Distance .........................................................................................444
10.2.15Host Route................................................................................................445
10.2.16Passive Interface ......................................................................................445

UMN:CLI User Manual
V5824G
18
10.2.17Blocking Routing Information................................................................... 446
10.2.18Summary Routing Information ................................................................. 446
10.2.19OSPF Monitoring and Management ........................................................ 447
10.2.19.1 Displaying OSPF Protocol Information ........................................................447
10.2.19.2 Sending SNMP Trap....................................................................................449
10.2.19.3 Logging Neighbor Changes.........................................................................449
10.2.19.4 Limiting Number of Database ......................................................................449
10.2.19.5 Maximum Process of LSA............................................................................449
10.2.20OSPF Debug............................................................................................ 450
10.3 Routing Information Protocol (RIP)....................................................452
10.3.1 Enabling RIP ............................................................................................ 452
10.3.2 RIP Neighbor Router................................................................................ 453
10.3.3 RIP Version .............................................................................................. 454
10.3.4 Creating available Static Route only for RIP............................................ 455
10.3.5 Redistributing Routing Information........................................................... 456
10.3.6 Metrics for Redistributed Routes.............................................................. 456
10.3.7 Administrative Distance............................................................................ 457
10.3.8 Originating Default Information ................................................................ 457
10.3.9 Routing Information Filtering.................................................................... 458
10.3.9.1 Filtering Access List and Prefix List .............................................................458
10.3.9.2 Disabling the transmission to Interface........................................................459
10.3.9.3 Offset List.....................................................................................................459
10.3.10Maximum Number of RIP Routes ............................................................ 459
10.3.11 RIP Network Timer................................................................................... 459
10.3.12Split Horizon............................................................................................. 460
10.3.13Authentication Key................................................................................... 461
10.3.14Restarting RIP.......................................................................................... 462
10.3.15UDP Buffer Size of RIP............................................................................ 462
10.3.16Monitoring and Managing RIP ................................................................. 462
10.3.16.1 Displaying RIP Protocol Information ............................................................462
10.3.16.2 Displaying Debugging Information...............................................................463
10.4 Configuring Route Map .....................................................................464
11 GPON Configuration.......................................................................468
11.1 OLT Management..............................................................................470
11.1.1 Opening OLT Mode.................................................................................. 470
11.1.1.1 OLT Description...........................................................................................471
11.1.1.2 Activating OLT .............................................................................................471
11.1.2 Downstream Encryption........................................................................... 471
11.1.3 OLT Bandwidth......................................................................................... 472
11.1.3.1 Upstream Bandwidth....................................................................................472
11.1.3.2 Bandwidth Scheduler...................................................................................472
11.1.4 OLT Optical Transceiver Parameter......................................................... 473
11.1.5 Auto ONU Fault Detection........................................................................ 473
11.1.6 Maximal Distance between OLT and ONU (ONT)................................... 474
11.1.7 Forward Error Correction (FEC) Mode..................................................... 474
11.1.8 MAC Aging Time ...................................................................................... 475
11.1.9 OLT Link Down Detection ........................................................................ 475
11.1.10 Maximum Number of ONU....................................................................... 476
11.1.11 OLT Anti-Spoofing .................................................................................... 476

User Manual UMN:CLI
V5824G
19
11.1.12 ONU RX-Power Update............................................................................477
11.1.13 Configurations for RF Return Packet Forwarding.....................................477
11.1.14 Downstream Traffic Control ......................................................................478
11.1.15 Multicast/Broadcast GEM Port Separation ...............................................481
11.1.16 Configuring Port/TCONT Threshold..........................................................482
11.1.17 ONU Deactivation Monitoring ...................................................................482
11.1.18 OLT Bit Error Ratio (BER).........................................................................484
11.1.19 PLOAM Message......................................................................................484
11.1.20 Displaying OLT Information.......................................................................485
11.1.20.1 OLT Traffic Statistics.....................................................................................486
11.1.20.2 MAC Address...............................................................................................487
11.1.20.3 GPON Daemon Memory Usage...................................................................487
11.2 ONU Management.............................................................................488
11.2.1 ONU Registration......................................................................................488
11.2.1.1 Activating/deactivating ONU.........................................................................488
11.2.1.2 ONU Registration Method............................................................................488
11.2.1.3 Manual ONU (ONT) Registration Mode .......................................................490
11.2.1.4 ONU Registration Mode...............................................................................490
11.2.1.5 Changing ONU Registration Mode...............................................................491
11.2.1.6 ONU Description..........................................................................................491
11.2.1.7 ONU Connectivity via Ping Test ...................................................................491
11.2.2 Assigning IP address ................................................................................491
11.2.3 Activating Administration for UNI ..............................................................492
11.2.4 Forward Error Correction (FEC) Mode .....................................................492
11.2.5 Loopback...................................................................................................493
11.2.6 ONU Laser Down......................................................................................493
11.2.7 Source MAC address Monitoring..............................................................494
11.2.8 ONU MAC address Filtering .....................................................................495
11.2.9 POTS Interface Configuration...................................................................496
11.2.10 VoIP MGC Configuration...........................................................................497
11.2.10.1 Message ID Configuration............................................................................497
11.2.10.2 ONT Termination ID Configuration ...............................................................497
11.2.11 ONU Port Configuration............................................................................498
11.2.11.1 UNI Ethernet Port Configuration...................................................................498
11.2.11.2 ANI RF Video Port Configuration .................................................................498
11.2.11.3 Displaying Multicast Counter Information.....................................................499
11.2.12 ONU Loop Detect Configuration...............................................................499
11.2.13 ONU Inactive Aging-time...........................................................................499
11.2.14 ONU Reset................................................................................................500
11.2.15 ONU Password Type Configuration..........................................................500
11.2.16 Diagnostic Monitoring for ONU’s Optical Transceiver...............................500
11.2.17 ONU System Account ...............................................................................501
11.2.18 ONU Authentication from RADIUS Server................................................502
11.2.19 ONU Firmware Upgrade ...........................................................................505
11.2.19.1 Manual Upgrade (1) .....................................................................................505
11.2.19.2 Manual Upgrade (2) .....................................................................................507
11.2.19.3 Auto Upgrade...............................................................................................509
11.2.20 Displaying ONU Information .....................................................................514
11.2.21 ONU’s Basic Configurations via OLT ........................................................516
11.2.21.1 Upgrade of ONT...........................................................................................517
11.2.21.2 Pre-settings for Traffic Profile (Step1) ..........................................................517

UMN:CLI User Manual
V5824G
20
11.2.21.3 Traffic Profile Configuration (Step2).............................................................519
11.2.21.4 ONU Profile & IP Host Configuration (Step3)...............................................521
11.3 ONU Profile.......................................................................................524
11.3.1 Creating ONU Profile ............................................................................... 524
11.3.2 Configuring ONU Profile........................................................................... 525
11.3.2.1 RX Optical Power Threshold........................................................................525
11.3.2.2 Rogue ONU.................................................................................................525
11.3.2.3 Card Type Configuration..............................................................................526
11.3.2.4 Loop Detect Configuration...........................................................................526
11.3.2.5 ONU Threshold............................................................................................527
11.3.2.6 TR-069 Management...................................................................................528
11.3.2.7 Uplink MAC learning....................................................................................528
11.3.2.8 GPON Optic Module Threshold of ONU......................................................529
11.3.2.9 Applying Traffic & PM Profile .......................................................................530
11.3.3 Overwriting Traffic Profile Configuration .................................................. 530
11.3.3.1 VLAN Configurations ...................................................................................531
11.3.3.2 Max Host......................................................................................................531
11.3.3.3 Rate Limit.....................................................................................................531
11.3.3.4 IGMP Group List..........................................................................................532
11.3.3.5 Activating Administration for Ethernet UNI...................................................532
11.3.3.6 Mapping between T-CONT ID and DBA profile............................................532
11.3.4 Saving Profile........................................................................................... 532
11.3.5 Applying ONU Profile............................................................................... 533
11.3.6 Checking ONU Profile Configuration ....................................................... 533
11.3.7 Displaying ONU profile............................................................................. 534
11.4 Traffic Profile.....................................................................................534
11.4.1 Creating Traffic Profile.............................................................................. 535
11.4.2 Creating a Mapper ................................................................................... 535
11.4.3 MAC Bridge Service Profile ..................................................................... 537
11.4.3.1 Max Host......................................................................................................537
11.4.3.2 MAC Learning..............................................................................................538
11.4.3.3 Multicast Interworking Termination Point......................................................538
11.4.3.4 ANI Port Configuration.................................................................................538
11.4.3.5 UNI Port Configuration.................................................................................540
11.4.3.6 IP-host Service Link.....................................................................................543
11.4.3.7 TDM Service Link ........................................................................................544
11.4.4 T-CONT Mode.......................................................................................... 545
11.4.4.1 GEM Port Configuration...............................................................................546
11.4.4.2 Configuration of Weight on WRR Scheduling ..............................................546
11.4.4.3 DBA Profile Association ...............................................................................546
11.4.4.4 Displaying T-CONT Information...................................................................547
11.4.5 IP Host Service Configuration.................................................................. 547
11.4.5.1 IP Address ...................................................................................................547
11.4.5.2 DNS.............................................................................................................547
11.4.5.3 VLAN Tagging Operating.............................................................................548
11.4.5.4 VLAN Tagging Filtering................................................................................548
11.4.5.5 Extended VLAN Tagging Operation Profile Association...............................549
11.4.5.6 VoIP Service Link.........................................................................................549
11.4.5.7 TDM Service Link ........................................................................................549
11.4.6 VoIP Service Configuration (POTS UNI).................................................. 550
Other manuals for V5824G
1
Table of contents
Other Dasan Network Hardware manuals
Popular Network Hardware manuals by other brands

Huawei
Huawei OptiX OSN 8800 T64 Quick installation guide

Vacron
Vacron VDH-NK160 Hardware manual

Avocent
Avocent MergePoint 5200 Specification sheet

Paradyne
Paradyne ACCULINK 3151 CSU Quick reference guide

Bosch
Bosch DIVAR IP 6000 (2U) Quick installation guide

Northern Telecom
Northern Telecom Meridian 1 PC Console Interface Unit installation guide

Lantronix
Lantronix SISPM1040-582-LRT quick start guide

Riverbed
Riverbed SteelCentral NetProfiler 4270 Series Upgrade and Maintenance Guide

Texas Instruments
Texas Instruments TMDSSK3358 user guide

Tandberg Data
Tandberg Data RDX QuikStor installation guide

Devolo
Devolo Giga Bridge manual

Avanis
Avanis KS-116 installation guide