Furukawa LW3008C User manual

LW3008C
GPON OLT system
User Manual

Contents
1. Introduction .......................................................................................17
1.1 Audience ............................................................................................. 17
1.2 Document Structure ............................................................................ 17
1.3 Document Convention......................................................................... 18
1.4 Document Notation.............................................................................. 18
1.5 Virus Protection................................................................................... 19
2System Overview ..............................................................................20
2.1 System Features ................................................................................. 21
3Command Line Interface (CLI) .........................................................24
3.1 Configuration Mode ............................................................................. 24
3.1.1 Privileged EXEC View Mode...................................................................... 25
3.1.2 Privileged EXEC Enable Mode .................................................................. 25
3.1.3 Global Configuration Mode ........................................................................ 26
3.1.4 Rule Configuration Mode ........................................................................... 26
3.1.5 DHCP Pool Configuration Mode ................................................................ 28
3.1.6 DHCP Option 82 Configuration Mode ........................................................ 28
3.1.7 RMON Configuration Mode........................................................................ 29
3.1.8 VRRP Configuration Mode......................................................................... 29
3.1.9 Bridge Configuration Mode ........................................................................ 30
3.1.10 Interface Configuration Mode..................................................................... 30
3.1.11 Router Configuration Mode........................................................................ 31
3.1.12 Route-Map Configuration Mode................................................................. 31
3.1.13 GPON Configuration Mode ........................................................................ 32
3.2 Configuration Mode Overview ............................................................. 34
3.3 Useful Tips .......................................................................................... 34
3.3.1 Listing Available Command........................................................................ 35
3.3.2 Calling Command History .......................................................................... 37
3.3.3 Using Abbreviation ..................................................................................... 38
3.3.4 Calling Commands Execution List ............................................................. 38
3.3.5 Using No Command................................................................................... 39
3.3.6 Using Show Command .............................................................................. 39
3.3.7Using Command of Privileged EXEC Enable Mode .................................. 39
3.3.8 Exit Current Command Mode .................................................................... 39
4System Connection and IP Address................................................41
4.1 System Connection ............................................................................. 41
4.1.1 System Login ............................................................................................. 42
4.1.2 Changing Login Password ......................................................................... 42
4.1.3 Password for Privileged EXEC Enable Mode ............................................ 43
4.1.4 Auto Log-out............................................................................................... 44
4.1.5 Management for System Account .............................................................. 44
4.1.6 Limiting Number of Users........................................................................... 48

4.1.7 Limiting the Number of Login Attempts ...................................................... 48
4.1.8 Telnet Access ............................................................................................. 49
4.1.9 Disconnect Telnet User .............................................................................. 49
4.1.10 System Logout ........................................................................................... 49
4.2 System Rebooting............................................................................... 51
4.2.1 Maunal System Rebooting ......................................................................... 51
4.2.2 Auto Reset Configuration ........................................................................... 51
4.3 Configuring Interface ........................................................................... 54
4.3.1 Enabling Interface ...................................................................................... 54
4.3.2Assigning IP Address to Network Interface................................................ 55
4.3.3 Static Route and Default Gateway............................................................. 55
4.3.4 Interface Description .................................................................................. 56
4.3.5 Displaying Interface.................................................................................... 57
4.3.6 Interface Identifier ...................................................................................... 57
4.3.7 Enabling Interface Overlapping.................................................................. 57
4.4 Assigning an IPv6 Address.................................................................. 59
4.4.1 Enabling Interface ...................................................................................... 61
4.4.2 Assigning IPv6 Address to Network Interface ............................................ 61
4.4.3 Assigning Link Local Address to Network Interface................................... 63
4.4.4 Static Route and Default Gateway............................................................. 63
4.4.5 Enabling IPv6 Processing .......................................................................... 64
4.4.6 IPv6 Interface Mode ................................................................................... 65
4.4.7 Displaying Interface.................................................................................... 65
4.5Secure Shell (SSH) ............................................................................. 66
4.5.1 SSH Server ................................................................................................ 66
4.5.2 SSH Client.................................................................................................. 67
4.6 802.1x Authentication .......................................................................... 69
4.6.1 802.1x Authentication................................................................................. 70
4.6.2 802.1x Re-Authentication........................................................................... 73
4.6.3 Initializing Authentication Status ................................................................ 75
4.6.4 Restoring Default Value ............................................................................. 75
4.6.5 Displaying 802.1x Configuration ................................................................ 75
4.6.6 802.1x User Authentication Statistics......................................................... 75
4.6.7 Sample Configuration................................................................................. 75
4.7 System Authentication......................................................................... 77
4.7.1 Authentication Method ............................................................................... 77
4.7.2 Authentication Interface ............................................................................. 77
4.7.3 Primary Authentication Method .................................................................. 77
4.7.4 Automated Blocking of IP Host .................................................................. 78
4.7.5 RADIUS Server .......................................................................................... 79
4.7.6 TACACS+ Server ....................................................................................... 80
4.7.7 Accounting Mode ....................................................................................... 81
4.7.8 Displaying System Authentication.............................................................. 82
5Port Configuration ............................................................................83
5.1 Port Basic............................................................................................ 83
5.1.1 Port Configuration ...................................................................................... 83
5.2 Ethernet Port Configuration ................................................................. 83
5.2.1 Enabling Ethernet Port ............................................................................... 83

5.2.2 Auto-Negotiation ........................................................................................ 84
5.2.3 Transmit Rate............................................................................................. 84
5.2.4 Duplex Mode .............................................................................................. 85
5.2.5 Network Service Port ................................................................................. 85
5.2.6 Flow Control ............................................................................................... 85
5.2.7 Port Description.......................................................................................... 86
5.2.8 L2 Port Bridge ............................................................................................ 86
5.2.9 Port Crossover ........................................................................................... 86
5.2.10 Traffic Statistics .......................................................................................... 88
5.2.11 Port Information.......................................................................................... 89
5.2.12 Port Debounce Timer ................................................................................. 89
5.3 Port Mirroring ...................................................................................... 90
6System Environment ........................................................................92
6.1 Environment Configuration .................................................................. 92
6.1.1 Host Name ................................................................................................. 92
6.1.2 Time and Date............................................................................................ 92
6.1.3 Time Zone .................................................................................................. 93
6.1.4 Network Time Protocol (NTP) .................................................................... 93
6.1.5 Simple Network Time Protocol (SNTP)...................................................... 95
6.1.6 Terminal Configuration ............................................................................... 96
6.1.7 DNS Server ................................................................................................ 97
6.1.8 Login Banner .............................................................................................. 97
6.1.9 Fan Operation ............................................................................................ 98
6.1.10 Disabling Daemon Operation ..................................................................... 98
6.1.11 Enabling FTP Connection .......................................................................... 99
6.1.12 FTP Bind Address ...................................................................................... 99
6.1.13 Enabling DMI Module................................................................................. 99
6.1.14 System Threshold .................................................................................... 100
6.1.15 Software Watchdog Configuration ........................................................... 104
6.2 Configuration Management ............................................................... 105
6.2.1 Displaying System Configuration ............................................................. 105
6.2.2 Writing System Configuration................................................................... 105
6.2.3 Auto-Saving.............................................................................................. 106
6.2.4 Restoring Default Configuration............................................................... 106
6.2.5 System Configuration File ........................................................................ 106
6.2.6 Secured File Copy.................................................................................... 107
6.2.7Display Backup File.................................................................................. 108
6.2.8 Display Backup File.................................................................................. 108
6.2.9 Core Dump File ........................................................................................ 108
6.3 System Management ........................................................................ 110
6.3.1 Network Connection..................................................................................110
6.3.2 IP ICMP Source Routing ...........................................................................112
6.3.3 Tracing Packet Route................................................................................113
6.3.4 Displaying User Connecting to System.....................................................114
6.3.5 MAC Table.................................................................................................114
6.3.6 MAC Count................................................................................................114
6.3.7 System Running Time...............................................................................115
6.3.8 System Information ...................................................................................115
6.3.9 System Memory Information .....................................................................115

6.3.10 Debugging Information..............................................................................115
6.3.11 CPU Packet Management.........................................................................116
6.3.12 Running Process...................................................................................... 120
6.3.13 Displaying System Software .................................................................... 121
6.3.14 Displaying Installed OS ............................................................................ 121
6.3.15 Default OS................................................................................................ 121
6.3.16 Switch Status ........................................................................................... 122
6.3.17 Forwarding Information Base (FIB) Table ................................................ 122
6.3.18 Tech Support Information ......................................................................... 123
6.3.19 System Boot Information.......................................................................... 123
6.3.20 Network Service Module (NSM) Daemon Debugging ............................. 123
7Network Management .....................................................................125
7.1 Simple Network Management Protocol (SNMP) ................................ 125
7.1.1 SNMP Service .......................................................................................... 125
7.1.2 SNMP Community.................................................................................... 125
7.1.3 SNMP Agent Administrator....................................................................... 126
7.1.4 Assigning IP Address of SNMP Agent ..................................................... 127
7.1.5 SNMP Com2sec....................................................................................... 127
7.1.6 SNMP Group ............................................................................................ 128
7.1.7 SNMP View Record.................................................................................. 128
7.1.8 Permission to Access SNMP View Record .............................................. 129
7.1.9 SNMP Version 3 User .............................................................................. 129
7.1.10 SNMP Trap............................................................................................... 130
7.1.11 SNMP Alarm............................................................................................. 133
7.1.12 SNMP Message Logging ......................................................................... 138
7.1.13 Disabling SNMP ....................................................................................... 139
7.1.14 Displaying SNMP Configuration............................................................... 139
7.2 EFM OAM ......................................................................................... 140
7.2.1 Enabling EFM OAM ................................................................................. 140
7.2.2OAM Link Monitoring................................................................................ 140
7.2.3 EFM OAM Mode ...................................................................................... 141
7.2.4 OAM Loopback ........................................................................................ 141
7.2.5 OAM Unidirection ..................................................................................... 142
7.2.6Displaying EFM OAM Configuration ........................................................ 142
7.3 Link Layer Discovery Protocol (LLDP) ............................................... 143
7.3.1 LLDP Operation ....................................................................................... 143
7.3.2 Enabling LLDP ......................................................................................... 143
7.3.3 LLDP Operation Type............................................................................... 143
7.3.4 Basic TLV ................................................................................................. 144
7.3.5 LLDP Message......................................................................................... 144
7.3.6 Reinitiating Delay ..................................................................................... 144
7.3.7 LLDP-MED Network Policy ...................................................................... 145
7.3.8 Displaying LLDP Configuration ................................................................ 147
7.4 Remote Monitoring (RMON).............................................................. 148
7.4.1 RMON History .......................................................................................... 148
7.4.2 RMON Alarm ............................................................................................ 150
7.4.3 RMON Event ............................................................................................ 153
7.5 Syslog ............................................................................................... 155
7.5.1 Syslog Output Level ................................................................................. 155

7.5.2 Facility Code ............................................................................................ 158
7.5.3 Syslog Bind Address ................................................................................ 158
7.5.4 Syslog Remote-timestamp....................................................................... 158
7.5.5 Debug Message for Remote Terminal ..................................................... 159
7.5.6 Disabling Syslog....................................................................................... 159
7.5.7 Syslog Local Message Configuration....................................................... 159
7.5.8 Displaying Syslog Status.......................................................................... 160
7.6 Rule and QoS.................................................................................... 161
7.6.1 How to Operate QoS................................................................................ 162
7.6.2 Packet Classification ................................................................................ 163
7.6.3 Packet Conditioning ................................................................................. 168
7.6.4 Rule Action ............................................................................................... 170
7.6.5 Displaying Rule ........................................................................................ 180
7.6.6 Admin Rule............................................................................................... 180
7.6.7 Admin Rule Action.................................................................................... 183
7.6.8 Displaying Admin Rule ............................................................................. 186
7.6.9 Scheduling ............................................................................................... 187
7.7 NetBIOS Filtering .............................................................................. 191
7.8 Martian Filtering ................................................................................ 192
7.9 MAC Filtering .................................................................................... 193
7.9.1 Default MAC Filter Policy ......................................................................... 193
7.9.2 Configuring MAC Filter Policy .................................................................. 193
7.9.3 Listing MAC Filter Policy .......................................................................... 194
7.9.4 Displaying MAC Filter Policy .................................................................... 194
7.10 Outband Management Port Security ................................................. 195
7.11 Max Host........................................................................................... 195
7.11.1 Max-new-host........................................................................................... 195
7.12 MAC Table......................................................................................... 197
7.13 Address Resolution Protocol (ARP)................................................... 199
7.13.1 ARP Table ................................................................................................ 199
7.13.2 ARP Request Message Interval ............................................................... 200
7.13.3 ARP Alias ................................................................................................. 201
7.13.4 ARP Inspection ........................................................................................ 202
7.13.5 Proxy ARP................................................................................................ 208
7.13.6 Gratuitous ARP ........................................................................................ 210
7.14 IPv6 Neighbor Discovery(ND) ........................................................... 211
7.14.1 Stateful Auto Configuration .......................................................................211
7.14.2 Configuring IPv6 Prefix ............................................................................ 212
7.14.3 Interval of RA Messages .......................................................................... 212
7.14.4 RA Destination Configuration ................................................................... 213
7.14.5 Router’s Lifetime ...................................................................................... 213
7.14.6 Reachable Time ....................................................................................... 213
7.14.7 RA Suppression ....................................................................................... 214
7.14.8 Hop Limit .................................................................................................. 214
7.14.9 Retrans-time............................................................................................. 214
7.14.10 ND Duplicate Address Detection (DAD)................................................... 215
7.14.11 Static IPv6 Neighbor Entry....................................................................... 215
7.14.12 Setting the Stale Timer............................................................................. 215
7.14.13 IPv6 Neighbor Discovery (ND) Inspection ............................................... 216

7.14.14 ND Alias ................................................................................................... 221
7.14.15 Displaying Neighbor Discovery ................................................................ 222
7.15 ICMP Message Control ..................................................................... 223
7.15.1 Blocking Echo Reply Message ................................................................ 223
7.15.2 Interval for Transmit ICMP Message........................................................ 224
7.15.3 ICMP Destination Unreachable Message ................................................ 225
7.15.4 ICMP Redirect Message .......................................................................... 226
7.16 TCP Flag Control............................................................................... 227
7.16.1 RST Configuration.................................................................................... 227
7.16.2 SYN Configuration ................................................................................... 227
7.16.3 SYN Guard Bandwidth ............................................................................. 227
7.17 The Utilization on L3 table................................................................. 227
7.18 Packet Dump..................................................................................... 229
7.18.1 Packet Dump by Protocol......................................................................... 229
7.18.2 Packet Dump with Option......................................................................... 229
7.18.3 Debug Packet Dump................................................................................ 230
7.19 Displaying Dump Packets.................................................................. 232
7.19.1 Dump File................................................................................................. 232
7.20 Port Security...................................................................................... 233
7.20.1 Port Security on Port ................................................................................ 233
7.20.2 Port Security Aging................................................................................... 234
7.20.3 Displaying Port Security ........................................................................... 235
8System Main Functions ..................................................................236
8.1 Virtual Local Area Network (VLAN).................................................... 236
8.1.1 Port-based VLAN ..................................................................................... 237
8.1.2 Protocol-based VLAN............................................................................... 239
8.1.3 MAC-based VLAN.................................................................................... 240
8.1.4 Subnet-based VLAN ................................................................................ 240
8.1.5 VLAN Precedence.................................................................................... 241
8.1.6 QinQ VLAN Mapping................................................................................ 242
8.1.7VLAN Description..................................................................................... 243
8.1.8 VLAN Eline ............................................................................................... 244
8.1.9 Tagged VLAN ........................................................................................... 244
8.1.10 Displaying VLAN Information ................................................................... 245
8.1.11 Layer 2 Isolation....................................................................................... 245
8.1.12 Sample Configuration............................................................................... 248
8.2 Link Aggregation (LAG) ..................................................................... 251
8.2.1 Port Trunk................................................................................................. 251
8.2.2 Link Aggregation Control Protocol (LACP)............................................... 252
8.3 Spanning Tree Protocol (STP)........................................................... 257
8.3.1 STP Operation ......................................................................................... 258
8.3.2 RSTP Operation ....................................................................................... 262
8.3.3 MSTP Operation ...................................................................................... 266
8.3.4 STP Mode ................................................................................................ 269
8.3.5 STP Basic Configuration .......................................................................... 269
8.3.6 Configuring MSTP.................................................................................... 272
8.3.7Configuring PVSTP .................................................................................. 276
8.3.8 BPDU Configuration................................................................................. 278

8.3.9 Root Guard............................................................................................... 282
8.3.10 Topology Change Detection..................................................................... 283
8.3.11 Restarting Protocol Migration................................................................... 284
8.3.12 Loop Back Detection ................................................................................ 284
8.3.13 Sample Configuration............................................................................... 285
8.4 Loop Detection .................................................................................. 288
8.5 Single IP Management ...................................................................... 290
8.5.1 Accessing to Slave Switch from Master Switch ....................................... 290
8.5.2 Sample Configuration............................................................................... 291
8.6 Rate Limit.......................................................................................... 293
8.7 Flood Guard ...................................................................................... 294
8.7.1 MAC Flood Guard .................................................................................... 294
8.7.2 CPU Flood Guard..................................................................................... 295
8.7.3 System Flood Guard ................................................................................ 296
8.7.4 Port-Flood-Guard ..................................................................................... 297
8.8 Virtual Router Redundancy Protocol (VRRP) .................................... 299
8.8.1 Configuring VRRP.................................................................................... 300
8.8.2VRRP Monitoring and Management ........................................................ 306
8.9 Bandwidth ......................................................................................... 307
8.10 Dynamic Host Configuration Protocol (DHCP)................................... 308
8.10.1 DHCP Server............................................................................................ 309
8.10.2 DHCP Address Allocation with Option 82 ................................................ 317
8.10.3 DHCP Lease Database............................................................................ 319
8.10.4 DHCP Relay Agent................................................................................... 320
8.10.5 DHCP Option............................................................................................ 323
8.10.6 DHCP Option 82 ...................................................................................... 328
8.10.7 DHCP Client ............................................................................................. 331
8.10.8 DHCP Snooping ....................................................................................... 333
8.10.9 IP Source Guard ...................................................................................... 340
8.10.10 Debugging DHCP..................................................................................... 342
8.10.11 DHCP Filtering ......................................................................................... 342
8.11 Dynamic Host Configuration Protocol (DHCP) for IPv6 ..................... 345
8.11.1 DHCPv6 Server........................................................................................ 350
8.11.2 DHCPv6 Snooping ................................................................................... 354
8.11.3 DHCPv6 Relay Agent............................................................................... 357
8.11.4 DHCPv6 Option........................................................................................ 358
8.11.5 Debugging DHCPv6................................................................................. 360
8.12 Storm Control .................................................................................... 361
8.13 Jumbo Frame Capacity ..................................................................... 361
8.14 Blocking Packet Forwarding .............................................................. 361
8.15 Maximum Transmission Unit (MTU) .................................................. 362
8.16 Configuring PPPoE Tag Option Format ............................................. 363
8.16.1 PPPoE Vendor Tag Option....................................................................... 363
8.16.2 PPPoE Vendor Tag Filtering..................................................................... 365
8.16.3 PPPoE Debug .......................................................................................... 366
9IP Multicast ......................................................................................367
9.1 Multicast Group Membership............................................................. 369

9.1.1 IGMP Basic .............................................................................................. 370
9.1.2 IGMP Version 2 ........................................................................................ 372
9.1.3 IGMP Version 3 ........................................................................................ 377
9.1.4 Displaying IGMP Information ................................................................... 378
9.2 Multicast Functions............................................................................ 380
9.2.1 Multicast Forwarding Database ............................................................... 380
9.2.2 IGMP Snooping Basic .............................................................................. 381
9.2.3 IGMPv2 Snooping .................................................................................... 384
9.2.4 IGMPv3 Snooping .................................................................................... 393
9.2.5 Displaying IGMP Snooping Information ................................................... 394
9.2.6 Multicast VLAN Registration (MVR)......................................................... 395
9.2.7 IGMP Filtering and Throttling ................................................................... 397
9.2.8 IGMP Proxy .............................................................................................. 400
9.2.9 IGMP State Limit ...................................................................................... 404
9.2.10 Multicast-Source Trust Port...................................................................... 405
9.3 Multicast Routing............................................................................... 406
9.3.1 Multicast Routing...................................................................................... 406
9.3.2PIM Basic ................................................................................................. 410
9.3.3 PIM-SM .................................................................................................... 416
9.3.4 Source Specific Multicast (SSM).............................................................. 425
9.4 IPv6 Multicast.................................................................................... 428
9.4.1 Multicast Listener Discovery (MLD) ......................................................... 428
9.4.2 IPv6 Multicast Functions .......................................................................... 436
10 IP Routing Protocol.........................................................................446
10.1 Border Gateway Protocol (BGP)........................................................ 446
10.1.1 Basic Configuration .................................................................................. 447
10.1.2 Synchronization........................................................................................ 449
10.1.3 Network Aggregation................................................................................ 450
10.1.4 Router-Reflector....................................................................................... 450
10.1.5 Confederation........................................................................................... 451
10.1.6 Advanced Configuration........................................................................... 452
10.1.7 IP Address Family .................................................................................... 455
10.1.8 Route Dampening .................................................................................... 456
10.1.9 BGP Session Reset ................................................................................. 457
10.1.10 Graceful Restart ....................................................................................... 461
10.1.11 BGP Neighbor .......................................................................................... 462
10.1.12 BGP Monitoring and Management........................................................... 465
10.2 Open Shortest Path First (OSPF) ...................................................... 468
10.2.1 Enabling OSPF ........................................................................................ 468
10.2.2 ABR Type Configuration........................................................................... 469
10.2.3 Compatibility Support ............................................................................... 470
10.2.4 OSPF Interface ........................................................................................ 470
10.2.5 Non-Broadcast Network ........................................................................... 475
10.2.6 OSPF Area ............................................................................................... 476
10.2.7 Default Metric ........................................................................................... 483
10.2.8 Graceful Restart Support ......................................................................... 484
10.2.9 Opaque-LSA Support ............................................................................... 485
10.2.10 Default Route ........................................................................................... 485
10.2.11ECMP Route Hashing .............................................................................. 487

10.2.12 External Routes to OSPF Network .......................................................... 487
10.2.13 OSPF Distance ........................................................................................ 489
10.2.14 Host Route ............................................................................................... 490
10.2.15 Passive Interface...................................................................................... 490
10.2.16 Blocking Routing Information ................................................................... 490
10.2.17 Summary Routing Information ................................................................. 491
10.2.18 OSPF Monitoring and Management ........................................................ 491
10.2.19 OSPF Debug............................................................................................ 494
10.3 Configuring Route Map ..................................................................... 496
11 GPON Configuration .......................................................................500
11.1 OLT Management.............................................................................. 502
11.1.1 Opening OLT Mode .................................................................................. 502
11.1.2 Maximal Distance between OLT and ONU (ONT) ................................... 503
11.1.3 OLT Bandwidth......................................................................................... 503
11.1.4 Downstream Encryption ........................................................................... 504
11.1.5 OLT Optical Transceiver Parameter......................................................... 505
11.1.6 Auto ONU Fault Detection........................................................................ 505
11.1.7 Forward Error Correction (FEC) Mode..................................................... 506
11.1.8 MAC Aging Time ...................................................................................... 506
11.1.9 OLT Link Down Detection ........................................................................ 506
11.1.10 Source MAC address Monitoring ............................................................. 507
11.1.11 ONU MAC Address Filtering .................................................................... 508
11.1.12 VLAN Filtering .......................................................................................... 509
11.1.13 Downstream Traffic Control...................................................................... 510
11.1.14 Dynamic to Static GEM Port .................................................................... 512
11.1.15 Dynamic to Static Tcont............................................................................ 512
11.1.16 Multicast/Broadcast GEM Port Separation .............................................. 513
11.1.17 Configuring Port/TCONT Threshold......................................................... 513
11.1.18 ONU RX-Power Update ........................................................................... 514
11.1.19 Configuration for RF Return Packet Forwarding...................................... 515
11.1.20 Network Connection................................................................................. 515
11.1.21 ONU CoS Remarking............................................................................... 516
11.1.22 OLT Anti-Spoofing .................................................................................... 516
11.1.23 ONU Deactivation Monitoring .................................................................. 517
11.1.24 OLT Bit Error Ratio (BER) ........................................................................ 519
11.1.25 OMCC Monitoring .................................................................................... 519
11.1.26 PLOAM Messages ................................................................................... 520
11.1.27 Transceiver Type Configuration ............................................................... 521
11.1.28 Displaying OLT Information...................................................................... 521
11.2 ONU Management ............................................................................ 525
11.2.1 ONU Registration ..................................................................................... 525
11.2.2 Assigning IP address ............................................................................... 530
11.2.3 Activating Administration for UNI ............................................................. 531
11.2.4 Loopback.................................................................................................. 531
11.2.5 ONU Firmware Upgrade .......................................................................... 532
11.2.6 Diagnostic Monitoring for ONU’s Optical Transceiver.............................. 541
11.2.7 PPPoE Configuration ............................................................................... 541
11.2.8 Max Host .................................................................................................. 542
11.2.9 Max Frame ............................................................................................... 542

11.2.10 Maximum Multicast Bandwidth ................................................................ 542
11.2.11 ONU Rate Limit Configuration ................................................................. 543
11.2.12 Statistics GEM Configuraiton ................................................................... 544
11.2.13 ONU Authentication from RADIUS Server ............................................... 544
11.2.14 CFM OAM for ONU Management............................................................ 547
11.2.15 Displaying ONU Information .................................................................... 551
11.2.16 ONU Reset............................................................................................... 554
11.2.17 ONU Static Gem Port............................................................................... 554
11.2.18 ONU Static Tcont...................................................................................... 555
11.2.19 ONU Laser Down ..................................................................................... 555
11.2.20 Forward Error Correction (FEC) Mode..................................................... 556
11.2.21 POTS Interface Configuration.................................................................. 556
11.2.22 VoIP MGC Configuration.......................................................................... 557
11.2.23 ONU Port Configuration ........................................................................... 558
11.2.24 ONU Loop Detect Configuration .............................................................. 559
11.2.25 ONU Inactive Aging-time.......................................................................... 560
11.2.26 ONU Password Type Configuration ......................................................... 560
11.2.27 ONU System Account .............................................................................. 561
11.2.28 ONU DBA Profile...................................................................................... 561
11.3 ONU Profile....................................................................................... 562
11.3.1 Creating ONU Profile ............................................................................... 562
11.3.2 Configuring ONU Profile........................................................................... 563
11.3.3 Saving Profile ........................................................................................... 574
11.3.4 Applying ONU Profile ............................................................................... 574
11.3.5 Checking ONU Profile Configuration ....................................................... 574
11.3.6 Assigning IP Host of SNMP Agent ........................................................... 575
11.3.7 SNMP Trap Host ...................................................................................... 575
11.3.8 Displaying ONU Profile ............................................................................ 575
11.4 DBA Profile........................................................................................ 576
11.4.1 Creating DBA Profile ................................................................................ 576
11.4.2 Configuring DBA Profile ........................................................................... 576
11.4.3 Saving DBA Profile................................................................................... 577
11.4.4 Displaying DBA Profile ............................................................................. 577
11.5 Traffic Profile ..................................................................................... 578
11.5.1 Creating Traffic Profile.............................................................................. 578
11.5.2 Creating a Mapper ................................................................................... 579
11.5.3 MAC Bridge Service Profile ..................................................................... 579
11.5.4 T-CONT Mode.......................................................................................... 583
11.5.5 IP Host Service Configuration .................................................................. 584
11.5.6 Creating PM Profile .................................................................................. 587
11.5.7 Collecting ONU Traffic Statistics .............................................................. 588
11.5.8 Saving PM Profile..................................................................................... 588
11.5.9 Displaying PM Profile Information............................................................ 588
11.5.10 Displaying ONU Traffic Statistics ............................................................. 588
11.6 Multicast Profile................................................................................. 590
11.6.1 Creating Multicast Profile ......................................................................... 590
11.6.2 IGMP Configurations ................................................................................ 590
11.6.3 Saving Multicast Profile............................................................................ 591
11.6.4 Applying Multicast Profile ......................................................................... 592
11.6.5 Multicast Access List ................................................................................ 592

11.6.6 Displaying Multicast Information .............................................................. 594
11.7 Rate-limit Profile................................................................................ 595
11.7.1 Creating Rate-limit Profile ........................................................................ 595
11.7.2 Configuring Rate-limit Profile ................................................................... 595
11.7.3 Saving Rate-limit Profile........................................................................... 596
11.7.4 Applying Rate-limit Profile ........................................................................ 596
11.7.5 Displaying Rate-limit Profile ..................................................................... 596
11.8 ONU Service Profile .......................................................................... 598
11.8.2 VoIP Service Configuration (POTS UNI).................................................. 599
11.8.3 TDM Service Configuration (CES UNI).................................................... 603
11.8.4 Management Mode .................................................................................. 606
11.8.5 Configuring Rate-limit............................................................................... 607
11.8.6 Video Return Path Mode.......................................................................... 607
11.8.7 Creating a GEM Port Network CTP ......................................................... 608
11.8.8 Saving Traffic Profile ................................................................................ 609
11.8.9 Adding/Applying Traffic Profile ................................................................. 609
11.8.10 Displaying Traffic Profile Information ....................................................... 610
11.9 Extended VLAN Tagging Operation Profile........................................ 611
11.9.1 Received Frame VLAN Tagging Operation Table Configuration...............611
11.9.2 TPID Configuration................................................................................... 617
11.9.3 Downstream Mode Configuration ............................................................ 617
11.9.4 Saving Profile ........................................................................................... 617
11.9.5 Displaying Extended VLAN Tagging Operation Profile ............................ 618
11.10VoIP Profile ....................................................................................... 619
11.10.1 OMCI Management Configuration ........................................................... 619
11.10.2 OMCI-based SIP Configuration................................................................ 624
11.10.3 OMCI-based MGC Configuration............................................................. 632
11.10.4 Saving VoIP Profile .................................................................................. 634
11.10.5 Displaying VoIP Information ..................................................................... 634
11.10.6 Overwriting ONU Extended VLAN Tagging Operation............................. 634
11.11 TDM Pseudowire Profile.................................................................... 636
11.11.1 Creating TDM Pseudowire Profile............................................................ 636
11.11.2 Basic Service Type................................................................................... 636
11.11.3 Signalling.................................................................................................. 637
11.11.4 Payload Size ............................................................................................ 637
11.11.5 Payload Encapsulation Delay .................................................................. 637
11.11.6 Timing Mode............................................................................................. 638
11.11.7 RTP Pseudowire Parameter .................................................................... 638
11.11.8 Pseudowire Maintenance Configuration .................................................. 640
11.11.9 Saving TDM Pseudowire Profile .............................................................. 640
11.11.10 Displaying TDM Pseudowire Information ....................................... 640
11.12Pseudowire Maintenance Profile ....................................................... 641
11.12.1 Creating Pseudowire Maintenance Profile............................................... 641
11.12.2 Jitter Buffer Maximum Depth.................................................................... 641
11.12.3 Jitter Buffer Desireed Depth..................................................................... 642
11.12.4 Fill Policy .................................................................................................. 642
11.12.5 Alarm-related Policy ................................................................................. 642
11.12.6 L-bit/R-bit Receive/Transmit Policy .......................................................... 643
11.12.7 SES Threshold ......................................................................................... 644

11.12.8Saving Pseudowire Maintenance Profile ................................................. 644
11.12.9 Displaying Pseudowire Maintenance Information.................................... 644
11.13PM Profile ......................................................................................... 645
11.13.1 Creating PM Profile .................................................................................. 645
11.13.2 Collecting ONU Traffic Statistics .............................................................. 646
11.13.3 Saving PM Profile..................................................................................... 646
11.13.4 Displaying PM Profile Information............................................................ 646
11.13.5 Displaying ONU Traffic Statistics ............................................................. 646
11.14Multicast Profile................................................................................. 647
11.14.1 Creating Multicast Profile ......................................................................... 648
11.14.2 IGMP Configurations ................................................................................ 648
11.14.3 Saving Multicast Profile............................................................................ 649
11.14.4 Applying Multicast Profile ......................................................................... 649
11.14.5 Multicast Access List ................................................................................ 650
11.14.6 Displaying Multicast Information .............................................................. 652
11.15Rate-limit Profile................................................................................ 653
11.15.1 Creating Rate-limit Profile ........................................................................ 653
11.15.2 Configuring Rate-limit Profile ................................................................... 653
11.15.3 Saving Rate-limit Profile........................................................................... 654
11.15.4 Applying Rate-limit Profile ........................................................................ 654
11.15.5 Displaying Rate-limit Profile ..................................................................... 654
11.16ONU Service Profile .......................................................................... 656
11.17GPON Debug .................................................................................... 657
11.18Sample Configuration........................................................................ 658
12 System Software Upgrade..............................................................662
12.1 General Upgrade............................................................................... 662
12.2 Boot Mode Upgrade .......................................................................... 663
12.3 FTP Upgrade..................................................................................... 666
12.4 ONU Upgrade ................................................................................... 667
12.4.1 Manual Upgrade....................................................................................... 668
12.4.2 Auto Upgrade ........................................................................................... 669
12.4.3 Upgrade Time-out Configuration.............................................................. 670
12.4.4 Upgrade Maximum Count Configuration.................................................. 671
13 Abbreviations ..................................................................................672
Issue History.........................................................................................676

Illustrations
Fig. 2.1 Front View of the LW3008C .......................................................................... 20
Fig. 3.1 Overview of Configuration Mode ................................................................... 34
Fig. 4.1 Process of 802.1x Authentication .................................................................. 69
Fig. 4.2 Multiple Authentication Servers ..................................................................... 70
Fig. 5.1 Port Mirroring................................................................................................. 90
Fig. 6.1 Ping Test for Network Status ........................................................................112
Fig. 6.2 IP Source Routing ........................................................................................112
Fig. 7.1 Procedure of QoS operation........................................................................ 162
Fig. 7.2 Structure of Rule ......................................................................................... 163
Fig. 7.3 Token Bucket Meter..................................................................................... 172
Fig. 7.4 Behavior of srTCM (1) ................................................................................. 173
Fig. 7.5 Behavior of srTCM (2) ................................................................................. 173
Fig. 7.6 Bahavior of srTCM (3) ................................................................................. 174
Fig. 7.7 Behavior of trTCM (1).................................................................................. 175
Fig. 7.8 Behavior of trTCM (2).................................................................................. 175
Fig. 7.9 Behavior of trTCM (3).................................................................................. 176
Fig. 7.10 Strict Priority Queuing ................................................................................. 187
Fig. 7.11 Deficit Round Robin .................................................................................... 188
Fig. 7.12 Weighted Round Robin ............................................................................... 188
Fig. 7.13 NetBIOS Filtering ........................................................................................ 191
Fig. 7.14 Proxy ARP ................................................................................................... 209
Fig. 7.15 ICMP Message Structure ............................................................................ 223
Fig. 8.1 Port-based VLAN ........................................................................................ 237
Fig. 8.2 Subnet-based VLAN.................................................................................... 241
Fig. 8.3 Example of QinQ Configuration................................................................... 242
Fig. 8.4 QinQ Frame................................................................................................. 242
Fig. 8.5 Outgoing Packets under Layer 2 Shared VLAN Environment .................... 247
Fig. 8.6 Incoming Packets under Layer 2 Shared VLAN Environment (1)............... 247
Fig. 8.7 Incoming Packets under Layer 2 Shared VLAN Environment (2)............... 248
Fig. 8.8 Link Aggregation.......................................................................................... 251
Fig. 8.9 Example of Loop ......................................................................................... 257
Fig. 8.10 Principle of Spanning Tree Protocol............................................................ 257
Fig. 8.11 Root Switch ................................................................................................. 258
Fig. 8.12 Designated Switch....................................................................................... 259
Fig. 8.13 Port Priority.................................................................................................. 260
Fig. 8.14 Port States................................................................................................... 260
Fig. 8.15 Alternate Port and Backup port ................................................................... 262
Fig. 8.16 Example of Receiving Low BPDU ............................................................... 263
Fig. 8.17 Convergence of 802.1d Network................................................................. 263
Fig. 8.18 Network Convergence of 802.1w (1)........................................................... 264
Fig. 8.19 Network Convergence of 802.1w (2)........................................................... 264
Fig. 8.20 Network Convergece of 802.1w (3)............................................................. 265
Fig. 8.21 Compatibility with 802.1d (1) ....................................................................... 265
Fig. 8.22 Compatibility with 802.1d (2) ....................................................................... 266
Fig. 8.23 CST and IST of MSTP (1) ........................................................................... 267
Fig. 8.24 CST and IST of MSTP (2) ........................................................................... 268
Fig. 8.25 Example of PVSTP...................................................................................... 276
Fig. 8.26 Root Guard .................................................................................................. 283
Fig. 8.27 Example of Layer 2 Network Design in RSTP Environment ....................... 286

Fig. 8.28 Example of Layer 2 Network Design in MSTP Environment....................... 287
Fig. 8.29 Example of Cascading ................................................................................ 290
Fig. 8.30 Example of Cascading Configuration.......................................................... 291
Fig. 8.31 Rate Limit and Flood Guard ........................................................................ 294
Fig. 8.32 VRRP Operation.......................................................................................... 299
Fig. 8.33 VRRP Track................................................................................................. 304
Fig. 8.34 DHCP Service Structure.............................................................................. 308
Fig. 8.35 Example of DHCP Relay Agent................................................................... 321
Fig. 8.36 DHCP Format .............................................................................................. 324
Fig. 8.37 DHCP Format Configuration ....................................................................... 324
Fig. 8.38 DHCP Option 82 Operation......................................................................... 329
Fig. 8.39 DHCP Server Packet Filtering..................................................................... 344
Fig. 8.40 Basic DHCPv6 Message Format................................................................. 347
Fig. 8.41 General Shared Relay Message Format..................................................... 348
Fig. 8.42 An Example of Prefix Delegation ................................................................ 348
Fig. 8.43 The LW3008C with IGMP Snooping............................................................ 367
Fig. 8.44 The LW3008C with PIM-SM ........................................................................ 368
Fig. 8.45 The Switch with IGMP Snooping and PIM-SM............................................ 368
Fig. 8.46 IGMP Snooping ........................................................................................... 382
Fig. 8.47 Multicast Equal Cost Multipath (ECMP) ...................................................... 407
Fig. 8.48 Rendezvous Point Tree ............................................................................... 416
Fig. 8.49 Shortest Path Tree ...................................................................................... 417
Fig. 8.50 MLDv1 Message Format ............................................................................. 430
Fig. 8.51 MLDv2 Query Message Format .................................................................. 431
Fig. 11.1 Example of GPON Network......................................................................... 500
Fig. 11.2 CLI Structure of GPON Configuration Mode ............................................... 501
Fig. 11.3 ONU Profile ................................................................................................. 562
Fig. 11.4 Traffic Profile................................................................................................ 578
Fig. 11.5 Priority of T-CONT types ............................................................................. 583
Fig. 11.6 VoIP Service Architecture............................................................................ 600
Fig. 11.7 Received Frame Layout .............................................................................. 612

Tables
Tab. 1.1 Overview of Chapters.................................................................................... 17
Tab. 1.2 Command Notation of Guide Book ............................................................... 18
Tab. 3.1 Main Command of Privileged EXEC View Mode .......................................... 25
Tab. 3.2 Main Command of Privileged EXEC Enable Mode ....................................... 25
Tab. 3.3 Main Command of Global Configuration Mode ............................................. 26
Tab. 3.4 Main Command of Flow Configuration Mode................................................ 27
Tab. 3.5 Main Command of Policer Configuration Mode ............................................ 27
Tab. 3.6 Main Command of Policy Configuration Mode.............................................. 27
Tab. 3.7 Main Command of DHCP Pool Configuration Mode ..................................... 28
Tab. 3.8 Main Command of DHCP Option 82 Configuration Mode............................. 29
Tab. 3.9 Main Command of RMON Configuration Mode ............................................ 29
Tab. 3.10 Main Command of VRRP Configuration Mode ............................................. 30
Tab. 3.11 Main Command of Bridge Configuration Mode ............................................. 30
Tab. 3.12 Main Command of Interface Configuration Mode ......................................... 31
Tab. 3.13 Main Command of Router Configuration Mode............................................. 31
Tab. 3.14 Main Command of Route-map Configuration Mode ..................................... 32
Tab. 3.15 Main Command of GPON Configuration Mode............................................. 32
Tab. 3.16 Main Command of GPON-OLT Configuration Mode..................................... 32
Tab. 3.17 Main Command of ONU Profile Configuration Mode .................................... 33
Tab. 3.18 Command Abbreviation ................................................................................. 38
Tab. 5.1 Main Features of Ethernet Port ..................................................................... 83
Tab. 6.1 World Time Zone ........................................................................................... 93
Tab. 6.2 Options for Ping (Cont.)................................................................................110
Tab. 6.3 Options for Ping for Multiple IP Addresses................................................... 111
Tab. 6.4 Options for Tracing Packet Route ................................................................113
Tab. 7.1 ICMP Message Type ................................................................................... 223
Tab. 7.2 Mask Calculation of Default Value............................................................... 225
Tab. 7.3 Options for Packet Dump ............................................................................ 230
Tab. 8.1 Advantages and Disadvantages of Tagged VLAN ...................................... 244
Tab. 8.2 STP Path-cost (short).................................................................................. 270
Tab. 8.3 RSTP Path-cost (long) ................................................................................ 270
Tab. 8.4 DHCPv6 Message Types ............................................................................ 346
Tab. 8.5 DHCPv6 UDP port....................................................................................... 349
Tab. 8.6 DHCPv6 Address ........................................................................................ 349
Tab. 11.1 RADIUS Authentication Message Type....................................................... 546

17
1. Introduction
1.1 Audience
This manual is intended for LW3008C multi-platform GPON OLT system operators and
maintenance personnel for providers of Gigabit passive optical network (GPON) and
Ethernet services. This manual assumes that you are familiar with the following:
•Ethernet networking technology and standards
•Internet topologies and protocols
•GPON technology and standards
•Usage and functions of graphical user interfaces.
1.2 Document Structure
Tab. 1.1 briefly describes the structure of this document.
Chapter Description
1 Introduction Introduces the overall information of the document.
2 System Overview Introduces the LW3008C system. It also lists the features of the
system.
3 Command Line Interface (CLI) Describes how to use the Command Line Interface (CLI).
4 System Connection and IP Address Describes how to manage the system account and IP address.
5 Port Configuration Describes how to configure the Ethernet ports.
6 System Environment Describes how to configure the system env
ironment and
management functions.
7 Network Management Describes how to configure the network management functions.
8 System Main Functions Describes how to configure the system main functions.
9 IP Multicast Describes how to configure the IP multicast functions.
10 IP Routing Protocol Describes how to configure the IP routing protocols.
11GPON Configuration Describes how to configure the GPON functions.
12 System Software Upgrade Describes how to upgrade the system software.
13 Abbreviations Lists all abbreviations and acronyms which appear in this document.
Tab. 1.1 Overview of Chapters

18
1.3 Document Convention
This guide uses the following conventions to convey instructions and information.
Information
This information symbol provides useful information when using commands to configure and
means reader take note. Notes contain helpful suggestions or references.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury or
broke the equipment. Before you work on any equipment, be aware of the hazards involved
with electrical circuitry and be familiar with standard practices for preventing accidents by
making quick guide based on this guide.
1.4 Document Notation
The following table shows commands used in guide book. Please be aware of each
command to use them correctly.
Notation Description
a Commands you should use as is.
NAME, PROFILE, VALUE, … Variables for which you supply values.
PORTS For entry this variable, see Section 5.1.
[ ] Commands or variables that appear within square brackets [ ] are
optional.
< > Range of number that you can use.
{ } A choice of required keywords appears in braces { }. You must select
one.
| Optional variables are separated by vertical bars |.
Tab. 1.2 Command Notation of Guide Book
i
!

19
1.5 Virus Protection
To prevent a virus infection you may not use any software other than that which is released
for the Operating System (OS based on Basis Access Integrator), Local Craft Terminal (LCT)
and transmission system.
Even when exchanging data via network or external data media(e.g. floppy disks) there is a
possibility of infecting your system with a virus. The occurrence of a virus in your system may
lead to a loss of data and breakdown of functionality.
The operator is responsible for protecting against viruses, and for carrying out repair
procedures when the system is infected.
You have to do the following:
•You have to check every data media (used data media as well as new ones) for virus
before reading data from it.
•You must ensure that a current valid virus scanning program is always available. This
program has to be supplied with regular updates by a certified software.
•It is recommended that you make periodic checks against viruses in your OS.
•At the LCT it is recommended to integrate the virus scanning program into the startup
sequence.
!
!

20
2 System Overview
The Gigabit passive optical network (GPON) is the ideal solution for the bottleneck of
Ethernet in the first mile, providing voice, data, and video solutions.
The LW3008C is a compact sized GPON Optical Line Terminal (OLT) that is comprised of
8 GPON interfaces and 4 optical 10GbE uplink ports on the front panel. 10GbE interfaces
can be used as uplink towards the core network and these interfaces can be used either to
cascade other switches or connect to a collocated DSLAM. The MGMT and console
interface is located on the most left of the front panel with embedded LED for LNK/ACT
and TX/RX indication respectively. They are for use of equipment management via remote
access or CLI.
For GPON, the PON layer is terminated on the interface unit and translated to Ethernet
uplink to be transported through an Ethernet/IP environment. For improved system
reliability, it adopts the design of redundancy architecture with dual power supplies.
The power feeding of the LW3008C is provided by Power Supply Unit (PSU). Dual PSUs
can be installed to guarantee constant system running. If power A fails, the system can be
automatically switched to the other power B and normal operations of the system are not
affected.
Fig. 2.1 shows the product view of the LW3008C.
Fig. 2.1 Front View of the LW3008C
Table of contents
Popular Network Hardware manuals by other brands

Alcatel
Alcatel 1677 SONET Link Maintenance and Trouble Clearing

CommScope
CommScope FOSC-OC-6 installation instructions

CoreTigo
CoreTigo TigoBridge A1 user manual

Allnet
Allnet ALL-MC116SV-VDSL2 user manual

Altai Technologies
Altai Technologies A8 installation guide

Teldat
Teldat 5Ge-Rail installation manual

Matrix Switch Corporation
Matrix Switch Corporation MSC-CP4X4E product manual

Bosch
Bosch VIP X1600 Module Installation and operating manual

INNOSILICON
INNOSILICON A9-ZMASTER user manual

Iomega
Iomega StorCenter ix12 user guide

Connect Tech
Connect Tech Xtreme/GPU user guide

NetApp
NetApp StorageGRID 11.5 Hardware installation and maintenance guide