Professional Documents
Culture Documents
Epon Olt Webadministration User Manual: Software Version:Epon - Firmware - I - V3.0.0 - Rel
Epon Olt Webadministration User Manual: Software Version:Epon - Firmware - I - V3.0.0 - Rel
com
Software version:epon_firmware_I_V3.0.0_Rel
Version date Description
V3.0.0 2020.05.05
content
1.1describe
pass throughOLTConnect to the network with an external port.OLTThe default out-of-band management address is192.168.100.1, please set the computer
network segment to the same network segment as in-band192.168.100.XXX(E.g:192.168.100.100), only after setting can be managed through out-of-bandOLT.
1.2Log in
enterOLTofIPaddress:
As shown in the figure below, choose Chinese as the language, and enter the user name and password to log in:
illustrate:
1.The default username is super accountroot, the user password isadmin, which is the same as the login command line; 2.The same user
can log in to the web page and the command line at the same time;
3.The page timeout exit is five minutes, if there is no operation within five minutes, the page will automatically exit; 4.The
default Chinese language can be set via the command line"web-lang en”.
1.3Login status
1
After logging in, you will see the following page:
PONThe status of the port and the upper link port is displayed here.PONhow many mouth will showONUregistration, how manyONU online
and how manyONUOffline; the uplink port information will display the port management status and link connection status at a glance.
2
2 TOPOpicture
The figure below showsPONThe status of the mouth: (the red font indicates the offline status)
1.right mouse clickPONport icon for quick access to advanced settings -PONManagement - Upstream bandwidth configuration,
2.right mouse clickONUicon for quick access to advanced settings -ONUAdministration - basic information, port
3
3.Move the mouse cursor toPONicon to automatically display the online status of the port, how manyONUonline, how many
ONU offline.
4.Move the mouse cursor toONUicon to automatically display the stationONUThe name,MACAddress, online status, authentication status.
5.Search through the gray box in the upper right corner of the interfaceONUname orONU MACAddress can quickly find the corresponding ONU.
① Partial or full length can be entered arbitrarilyMACAddress or name, the number of search results is shown in the figure below, click the
black arrows up and down to quickly view eachONUstate, while the correspondingONUThe icon automatically flashes five times.
4
② foundONUA layer of light blue is wrapped around the icon. Click refresh/reset to reset the icon state.
③ Click Save as Picture to display the current topology map state in a new tab page of the browser. (The original topology map interface
cannot be right-clicked)
5
3 ONUslist
6
3.clickONUThe block list goes toPONmanage--ONUBlock list page
4.Can be managed in batchesONU,can deleteONUor addONUto the block list when clicking on
7
5.Move the mouse cursor to the configuration to automatically display the following interface:
8
4 VLANsmanage
The following figureVLANmanagement showsVLANThe member ports of the list include labeled ports (tagged),
1.createVLAN:enterVLAN ID, select the label (tagged port) or without labels (untagged port). If you
want to create aVLAN, enter the sameVLAN IDcan be; if you want to create a continuous multipleVLAN, you
2.deleteVLANThe same is true, you can choose to delete a single or delete a continuousVLAN ID
9
10
5advanced settings
5.1Operating status
The picture below shows theOLTsystem information, hardware status, system uptime
5.2System Management
5.2.1Device management
1.rebootOLT
2.backupOLTconfigure
3. importOLTconfigure
4.reset
5. save configuration
11
5.2.2Diagnostic tools
supportpingdomain name
12
5.2.3Network Interface
The default remote management interface is the out-of-band interface (NMSport) and with inner port (upper port)
1.Configure the default route (the default route must exist in the network segment that exists in the band or out of band)
2. DNS
13
4.In-band management (before adding in-band management, create the correspondingVLAN)
5.2.4Upgrade management
5.2.5time management
14
1.Configure time zone
2.configureOLTsystem time
5.2.6Serve(SSH/SNMP)
If you want a higher level of security connection, you can passSSHLogin command line:
1. FRPC
FRPIt is a high-performance reverse proxy application that can be used for intranet penetration. This device supports configuration asFRPClient,
users can build their own server for remote management. Type only supportshttpprotocol.
15
2. SNMPconfigure
3. SH Access
First, you need to add a public key to the server.
Notice: you need to create aOPENSSHpublic key in the format, its type needs to belegacy, key typeRSA create.
SecureCRT:
PuttygenKey generator:
16
① Fill in the public key aboveOLT
17
Now you can log in with username and password.
5.2.7Alarm list
5.2.8User Management
In the user management menu, you can add, delete users, and modify user passwords
increase user:
18
root(root) cannot be deleted
To modify the user password, you can only modify the password of your own login account.
19
delete specified user
5.3 PONmanage
20
5.3.3 PONset up
5.3.3.1 PONAuthentication
This function can be configuredPONAuthentication type and authentication mode of the port
twenty one
Modify the authentication mode to supportMAC,LOID,LOID+PASSWORD,Hybrid
5.3.3.2 P2P
This configuration can be setP2PWhether to open. If enabledP2P,butPONmiddleONUcan communicate with each other. The
twenty two
5.3.3.3rogueONUdetect
IncreaseLOID
deleteLOID
twenty three
5.3.5 ONUBulk upgrade
twenty four
Choose what needs to be upgradedONU
Next, select the upgrade file, upgrade type and what you want to upgradePONmouth, click to confirm,OLTwill start the batch
25
5.3.6 PONOptical diagnosis
3.readONUOptical diagnostic information, you need to manually refresh to get itONUOptical power data
26
5.3.7Batch configuration
Notice: This configuration is a private protocol and only supports our companyONU!
1. ONUportVLAN
27
3.WANconnected, showingPONall under the mouthONUofwanConnection Status
Add toWANconnect
28
If you delete the newly addedWANconnection, waiting30s
5.4 ONUmanage
29
2.rebootONU
3.unregisterONU
4.Changefec mode
5.refreshONUOptical diagnostic data
6. ONUUpgrade management
Operate as follows, select the upgrade file and click OK, theONUwill enter the upgrade state
7.CheckONUAlarm information
30
5.4.2 ONUport configuration
1.can be based on port number andONU IDChoose what you want to configureONU
31
3.Configure portsVLAN
1.configureONUmulticast mode
32
2.configureONUMulticast Quick Leave
33
3.configureONUMaximum Multicast Group: Only inONUThe multicast mode isigmp-snoopingconfigurable, whenONUmulticast mode from
igmp-snoopingWhen switching to other modes, the configuration will be restored to the default value, which is64. First need to
Next you can configureONUMaximum number of multicast groups, max255(CTCThe standard defines the maximum value, depending on the
specific ONUsupport)
4.Configure MulticastVLANMode: The configuration determinesONUWhether the multicast service flow forwarded by the port carriesVLAN
Label,untagTo peel off the label,tagIn order not to peel off the label,translateto convertVLANlabels, configurable up to8Group
34
configureONUmulticastVLANmode istagoruntag:
configureONUmulticastVLANFor switching modes, up to8GroupVLANconvert(CTCThe standard defines the maximum value, depending on
the specificONUsupport)
35
5.configureONUmulticastVLAN. only atONUThe multicast mode isigmp-snoopingconfigurable, whenONUmulticast mode fromigmp-
snoopingWhen switching to other modes, multicastVLANwill be cleared. Each port can be configured with up to8multicastVLAN(
36
5.4.4 ONUStatistics
37
5.5Port management
5.5.1port information
5.5.2port statistics
38
5.5.3port configuration
1.You can switch the port number to get different port information
2.Configure the basic information of sentence segmentation, for example: configureMTUor default
3.Configure storm suppression toPPSIn units, broadcast, multicast and unicast storm suppression can be configured,0Indicates that the storm suppression
5.5.4portVLAN
39
1.set portVLANTypes of
Ports can be configured hereVLANforhybrid,accessandtrunkmode, then you can also configure the port default
VLAN
40
2.can be added at this portVLANand selectvlanmark or go mark mode.
41
3.add portVLANconvert
4.add portQinQ
42
Configuration is also supportedCVLANScope:
5.5.5Loop detection
This function needs to detect the loop on the user side in order to deal with the loop in the networking and prevent the loop from
affecting the service. After the loop detection function on the user side is enabled, the system automatically detects the loop on the user
side. When a loop is detected, it will stop the loop and issue an alarm.
PONThe loop detection function is enabled by default, and the loop detection processing conditions are as follows:
(1)when the sameONUA loop occurs on the port or downlink device, due toONUThe port loop detection function is enabled by default
43
(2)the same onePONmouth is differentONUA loop occurs between whenP2PWhen the feature is off (off by default),
Only the loop alarm is issued, not theONUjoin the blacklist; whenP2PWhen the function is turned on, a loop alarm will be issued and a loop will
(3)differentPONunder the mouthONUA loop occurs whenPONWhen the port isolation function is turned on (on by default),
Only the loop alarm is issued, not theONUjoin the blacklist; whenPONPort isolation is off and two loops occur PONdefault of
mouthVLANAt the same time, a loop alarm will be issued and one loop will occur at the same time.ONUadd to blacklist.
Notice:
1->PONLoop detection blacklistedONU, the configuration is saved without automatic blacklist removal or manual recovery mode, after
restarting the device, theONUIt will be permanently on the blacklist, and you need to manually remove the blacklist.
2->In manual authentication mode, after loop detection is added to the blacklist, manual authentication is required before going online again.
(1)Loop detection state: the default is disabled state, optional configuration is enabled, after configurationPONLoop detection function
take effect;
(2)Loop Detection Interval: This parameter is configuredPONLoop detection packet sending interval, by default5second hair
(3)Loop Detection Recovery Mode: This parameter is configured when a loop occursONUWhether to automatically recover after being added to the blacklist
Removing the blacklist, the default is automatic recovery mode, and manual recovery mode is optional;
(4)Auto recovery time: This parameter is only in loop detection recovery modeAutotakes effect when the default30automatic recovery in seconds
complex;
44
(5)Manual recovery: This configuration is only available when the loop detection recovery mode isManualcan be configured when, after configurationONUwill be from black
List removed.
The loop detection function of the uplink port is enabled by default. The loop detection processing conditions are as follows:
(1)When the spanning tree protocol is enabled, the loop detection of the uplink port does not take effect, only when the spanning tree protocol is disabled
(2)A loop occurs on the same uplink port, directlyLink Downthe uplink port;
(3)A loop occurs on different uplink ports, whenPVIDWhen not, a loop alarm occurs, and noLink Downport; when
PVIDWhen the same, a loop alarm occurs at the same timeLink Downone of the ports.
45
(1)Loop detection status: the default is enabled status, the optional configuration is disabled, after the configuration, the loop detection function of the uplink port
failed;
(2)Loop Detection Interval: This parameter is used to configure the interval for sending loop detection packets on the uplink port. By default,5second hair
(3)Loop detection recovery mode: This parameter is configured when a loop occurs on the portLink DownWhether to automatically restore after
Link Up, the default is automatic recovery mode, optional manual recovery mode;
(4)Auto recovery time: This parameter is only in loop detection recovery modeAutotakes effect when the default30automatic recovery in seconds
complex;
(5)Manual recovery: This configuration is only available when the loop detection recovery mode isManualcan be configured when, after configurationLink Down
46
5.5.6Port isolation
47
1.configureMACAddress aging time
3.clearMACaddress
48
Optionally delete based on port number:
49
4. MACAddress query
5.7Protocol management
5.7.1 RSTP
50
After the setting is successful, you can see the following configuration results:
Port configuration:
51
5.7.2 IGMP
2.configureIGMP snoopingparameter:
1> Protocol policy: The policy for whether multicast protocol packets outside the multicast program library can pass through. By default, it ispass. Quick Away:
2> When Quick Away is enabled, the device receivesigmpThe leave message will immediately disconnect the multicast service; when fast leave is not enabled,
when the device does not receive the message within the maximum response time of general group query/maximum response time of specific group query
igmpThe multicast service flow will be disconnected only after adding group packets. Default is disabled. Multicast member aging time: when the device does
3> not receive any data within the aging timeigmpIf a group message is added, the user is considered to be offline, and the multicast service flow of the user is
52
3.configureIGMP proxyparameter
3> Robustness coefficient: This command can be used when the user wants to adjust the robustness coefficient according to the
stability of the network. After setting, the system uses this robustness coefficient to confirm the aging time of multicast users.
The robustness factor is a factor set to enhance the robustness of the system. It directly affects the aging time of multicast
users and the number of times that general group query packets are sent. If a subnet may lose packets, the robustness factor
should be increased to ensure the stability of multicast users. Default is2. Maximum response time for general group query:
4> After the general group query message is sent, all online users will respond within the response timereportmessage, by
default10Second. Universal Group Inquiry Interval: When the device is inproxyIn this mode, the device will send a general
5> group query packet at each general group query interval. Default is125Second.
6> Query message sourceIPAddress: Configure the source of the general group query packet or the specific group query packet sent by the
7> Query message sourceMACAddress: Configure the source of the general group query packet or the specific group query packet sent by
the multicast router to the user sideMACThe address, which defaults to the inband address of the device. Specific group query interval:
8> For a specific program, send a specific group query at the interval set by this command to confirm whether the user is watching the
53
If the user is not watching the program, the system will no longer send the program stream to the user, so as to avoid wasting
bandwidth when the user still receives the multicast stream without watching the program. Default is1000millisecond. Number of
9> queries for a specific group: for a specific program by sendingNSecond-rate(NSet by this command) a specific group query to confirm
10>Maximum response time for specific group query: After the specific group query message is sent, all online users will
54
5.Configure MulticastVLAN 100Description
IGMPThe routing port can only be the uplink port, which is connected to the multicast server.
55
7.Configure Unknown Multicast Policy
Suppression policy for unknown multicast service flow: If the service flow carries unknown multicast for a specific purpose, configure it as transparent transmission. Unknown
multicasts with no special purpose will occupy bandwidth. Generally, it is configured to be discarded, and the default is transparent transmission.
56
Add multicast program library, users can switch to this multicastVLANprogram channel.
10.Static multicast entries will not be aged out and can only be deleted manually
5.7.3DHCP
57
This device supports configurationDHCP SnoopingFunction,DHCP RelayFunction,DHCP Option82function andDCHP
ServerFunction
1. DHCP Relay
DHCP Relayfunction is working in three layers, which can makeDHCPThe client's request message is sent to the specifiedDHCP
hint:OpenDHCP Relayfunctionality needs to be ensuredDHCPThe function is enabled and the routing function (ip route enable)also open;
openDHCP RelayThe relevant function configuration needs to ensure thatDHCP RelayThe function has been turned on.
(2)Option60strategy: according toDHCPcarried by the clientOption60domain value to find the server address.
hint: Switching a policy will clear the server table created by another policy.
Increase the server address (the maximum supported configuration of the system32server table)
58
2. DHCP Option82
Disabled by default.
(1)Retention policy (default policy): The request message sent by the client does not carryOption82informationOLTwill bring
Option82information, the client sends it withOption82information, thenOLTDoes not handle direct forwarding servers.
(2)Stripping strategy: The request message sent by the client does not carryOption82informationOLTDoes not deal with the direct forwarding server,
the client sends it withOption82information, thenOLTstrippedOption82The information is then forwarded to the server.
(3)Replacement strategy: The request message sent by the client does not carryOption82informationOLTDoes not deal with the direct forwarding
server, the client sends it withOption82information, thenOLTreplaceOption82The information is then forwarded to the server.
3. DHCP Snooping
DHCP Snoopingfunction by listeningDHCPThe message interaction between the client and the server to record the user
configuration needs to ensure thatDHCP SnoopingThe function has been turned on.
59
Add trusted port
This configuration can only be configured on the uplink port, and the trusted port is allowed to receive allDHCPPacket, untrusted port is not
4. DHCP Server
Disabled by default, it must be disabled before enablingDHCP Relay,DHCP Option82,DHCP SnoopingFunction. After opening, start the
configurationDHCPServer, the default is the in-band management network segment, and the interface is a logical portvlanif-1
60
5.7.4 MSTP
MSTPcompatibleSTPandRSTP, which can not only converge quickly, but also make differentVLANThe traffic is forwarded along their
respective paths, thus providing a better load sharing mechanism for redundant links. pass throughMSTPA switching network is divided into multiple
domains, and multiple spanning trees are formed in each domain, and the spanning trees are independent of each other. Each spanning tree is called
a multiple spanning tree instanceMSTI (Multiple Spanning Tree Instance), each domain is called aMSTarea(MST Region: Multiple Spanning Tree
1. MSTarea
It consists of multiple devices in the switching network and the network segments between them. A local area network can have multiple devices. MST
domain, eachMSTThe domains are physically connected directly or indirectly, and can beMSTPThe configuration command divides multiple devices into the same
61
The configurable length of the domain name is0-32bit, reverts to383A21F00165.
2. CIST
in eachMSTwithin the domainMSTPGenerated by calculationIST(eachMSTa spanning tree within the domain), whileMSTP put each
MSTThe domain is treated as a single switching device, calculated inMSTinterdomain generationCST(connects all within the switched
networkMSTa spanning tree for the domain),CISTis a single spanning tree connecting all devices in a switched network, consisting of IST
andCSTconstitute together.VLANThe mapping table isMSTproperty of the domain, which describesVLANandMSTIThe mapping
62
Configuration interface and priority
63
3. MSTI
OneMSTwithin the domain throughMSTPGenerate multiple spanning trees, each spanning tree is independent of each other, and has the following
characteristics:
① eachMSTICalculate its own spanning tree independently, without interfering with each other
⑧ RunningMSTPprotocol network, aVLANThe message will be forwarded along the following path: AtMST
64
4.port configuration
5.8 ACL/QOS
5.8.1time limit
1.used to specifyACLThe effective time period for the rule. After the configuration is successful, createACLWhen rules, you can specify the effective
time by referring to the time period name.ACLRules are only valid during the effective time period.
2.Increasetime-range
1>Relative time: Periodic time, for example, every Tuesday09:00totwenty three:00.
65
2> Absolute time: from a specific point in time to another point in time, e.g.2020year4moon29day9:00
to2020year4moon29day18:00.
66
3.deleteTime-range
5.8.2 ACLsmanage
When you need to filter specific data packets by matching rules, use this configuration to createACL(Access
Control List).
1.basicACL (2000-2999): When the source of the message needs to beIPAddress makingACLrule, use this configuration. After
successfully creating the rule, you can usepacket-filterThe command reference rules filter packets.
67
2.advancedACL(3000-4999): When the source address information, destination address information,IPThis configuration is used when the type of the
carried protocol and the matching rules are formulated for the characteristics of the protocol. After successfully creating the rule, you can use
68
3.linkACL(5000-5999): When the source of the message needs to beMACaddress, sourceVLAN ID, Layer 2 protocol type, purpose
MACAddress and other link layer information formulationACLrule, use this configuration. successfully createdACLAfter the
69
5.8.3packet filtering (Packet Filter)
Used to configure the specified portACLFilter the rules and make them take effect. when needed to useACLThis configuration is
70
5.8.4 QOS
Used to configure the queue scheduling mode of the system. Queue scheduling is to divide the packets that need to be sent from the same port
into multiple queues, and schedule between queues to determine which queue's packets are sent first and which queue's packets are sent later. When
the user needs to select different queue scheduling modes according to the importance of the business, to ensure that the important business can still
be provided when the network is congestedQoSWhen guaranteed, use this configuration. Device support8a queue.
71
2.Set queue scheduling: if selectedWRRmode, all weights must add up to equal100or0
5.9routing
5.9.1route management
72
hint: When the routing switch is turned off, all static routes are configured as well asARPEntries are cleared.
2.Static route:
If the next one is reachable, it will actively learn the next hop gateway.ARP, the state of the static route becomes
reachable.
5.9.2 ARPsurface
5.10link aggregation
Link aggregation is a process of bundling multiple uplink ports of the same type into one logical port. Without upgrading hardware, the bandwidth of the
uplink ports can be increased, and the link backup mechanism can be used to effectively improve the connection between links. reliability.
hint:
73
① A port cannot join multiple aggregation groups at the same time;
② Spanning tree protocol: The port added to the aggregation group will be treated as a logical port for protocol operation;
③ Uplink port loop detection: When the port is added to the aggregation group, the port loop detection does not take effect;
④ Uplink port attributes: The attributes of the member ports added to the aggregation group must be consistent: rate, port type,MTU, port speed limit,
storm control; when configuring the member port attributes of the aggregation group, the members in the group are bound together for configuration;
⑤VLANAttribute: The member port that joins the aggregation groupVLANThe configuration must be consistent:PVID,portVLAN;Configure aggregation
group membersVLANWhen the group members are bound together and configured;
⑥ The destination port of port mirroring cannot join the aggregation group as a member of the aggregation group, and the port that joins the aggregation group at the same time cannot
⑦ Configured staticMACThe port of the address cannot be added to the aggregation group as a member of the aggregation group;
⑧ ConfiguredACLThe port of the rule cannot join the aggregation group as a member of the aggregation group;
⑨ Multicast is configuredVLANRouting ports cannot join aggregation groups as members of aggregation groups;
After the creation is successful, you can view the member ports that have joined the aggregation group, and you can add and delete aggregation group members in the
aggregation group.
74
By default, the load balancing routing algorithm is based onsrc-macHash calculation is performed, and other routing algorithms can be configured according to
requirements.
When a link aggregation needs to be deleted, all members in the aggregation group are deleted, and the aggregation group is deleted.
75
6quick access
After the login page is successful, the mouse cursor is moved to the quick access and the following functions are automatically displayed:
1. Turn off real-time alarms: Turn off the real-time alarm information that pops up automatically in the lower right corner of the page
76
2. Save configuration: save all configuration information modified by the current access to the OLT
3. Log out
4. Reboot
6. View the current configuration: export the current configurationOLTconfig file, filenameoltconfigtmp.txt
77
7root
Click on the top right cornerrootThen enter the system management - user management
78
Thanks!
79