Download as pdf or txt
Download as pdf or txt
You are on page 1of 84

Translated from Chinese (Simplified) to English - www.onlinedoctranslator.

com

EPON OLT WEBAdministration User Manual

Software version:epon_firmware_I_V3.0.0_Rel
Version date Description

V1.0 2018.06.05 initial version

V1.1 2018.08.08 add feature

V2.0 2019.04.29 Web page revisions and added features

V2.0.2 2019.05.27 IncreaseLOIDandCTC3.0support

V2.2.0 2019.07.18 Add link aggregation function

V3.0.0 2020.05.05
content

1System specification................................................ ...................................................... ......................................1

1.1describe................................................. ...................................................... ......................................1

1.2Log in................................................. ...................................................... ......................................1

1.3Login status................................................ ...................................................... ................................1

2 TOPOpicture................................................. ...................................................... ......................................3

3 ONUsList ................................................................ ...................................................... ......................................6

4 VLANsmanage................................................. ...................................................... ......................................9

5advanced settings................................................ ...................................................... ......................................11

5.1Operating status................................................ ...................................................... ......................11

5.2System Management................................................ ...................................................... ......................11

5.2.1Device Management ................................................ ...................................................... ............11

5.2.2Diagnostic tools................................................ ...................................................... ............12

5.2.3Network Interface................................................ ...................................................... ............13

5.2.4Upgrade Management ................................................ ...................................................... ............14

5.2.5Time Management ................................................ ...................................................... ............14

5.2.6Serve(SSH/SNMP) ................................................ ...................................................... ....15

5.2.7Alarm List ...................................................... ...................................................... ............18

5.2.8User Management................................................ ...................................................... ............18

5.3 PONmanage................................................. ...................................................... ......................20

5.3.1 ONUBlock List ................................................................ ...................................................... ......20

5.3.2Upstream Bandwidth Configuration...................................................... ...................................................... ......20

5.3.3 PONset up................................................. ...................................................... ............twenty one

5.3.4 LOIDsAllow List ................................................ ...................................................... ......twenty three

5.3.5 ONUBulk Upgrade ...................................................... ...................................................... ......twenty four

5.3.6 PONOptical Diagnostics ................................................ ...................................................... ............26

5.3.7Bulk configuration...................................................................... ...................................................... ............27

5.4 ONUmanage................................................. ...................................................... ......................................29

5.4.1 ONUBasic Information................................................ ...................................................... ......29


5.4.2 ONUPort Configuration...................................................... ...................................................... ......31

5.4.3 ONUMulticast Management...................................................... ...................................................... ......32

5.4.4 ONUStatistics................................................ ...................................................... ......37

5.5Port Management ................................................ ...................................................... ......................38

5.5.1Port Information ...................................................... ...................................................... ............38

5.5.2Port Statistics...................................................... ...................................................... ......38

5.5.3Port Configuration...................................................... ...................................................... ............39

5.5.4portVLAN ..................................................................... ...................................................... ...........39

5.5.5Loop Detection ...................................................... ...................................................... ..........................................43

5.5.6Port Isolation ...................................................... ...................................................... ..........................................47

5.6 MACAddress Management ................................................ ...................................................... .............47

5.7Protocol Management ................................................ ...................................................... ......................50

5.7.1 RSTP ..................................................... ...................................................... .................................50

5.7.2 IGMP ..................................................................... ...................................................... .................................52

5.7.3DHCP...................................................... ...................................................... .................................57

5.7.4 MSTP ................................................ ...................................................... .................................61

5.8 ACL/QOS ............................................... ...................................................... .................................65

5.8.1time limit................................................ ...................................................... ............65

5.8.2 ACLsmanage................................................. ...................................................... ..........................................67

5.8.3packet filtering (Packet Filter) ................................................................ ......................................................70

5.8.4 QOS...................................................................... ...................................................... ................................71

5.9routing................................................. ...................................................... ......................................72

5.9.1Routing Management ................................................ ...................................................... ............72

5.9.2 ARPsurface................................................. ...................................................... ................................73

5.10Link Aggregation ..................................................... ...................................................... ......................................73

1.Create Link Aggregation...................................................... ...................................................... .............73

2.View Link Aggregation ................................................ ...................................................... .............74

3.Load Balancing Routing Algorithm ................................................ ...................................................... ......74

4.Delete Link Aggregation ................................................ ...................................................... .............75

6Quick Access ................................................................ ...................................................... ......................................76


7root ..................................................................... ...................................................... ................................................78
1System specification

1.1describe

pass throughOLTConnect to the network with an external port.OLTThe default out-of-band management address is192.168.100.1, please set the computer

network segment to the same network segment as in-band192.168.100.XXX(E.g:192.168.100.100), only after setting can be managed through out-of-bandOLT.

1.2Log in

Please open a browser (currently supportsfirefox/chrome/IE 9and more advanced versions)

enterOLTofIPaddress:

①192.168.100.1(Out-of-band management address, connect toNMSmouth)

②192.168.99.1(In-band management address, connected to the connection port)

As shown in the figure below, choose Chinese as the language, and enter the user name and password to log in:

illustrate:

1.The default username is super accountroot, the user password isadmin, which is the same as the login command line; 2.The same user

can log in to the web page and the command line at the same time;

3.The page timeout exit is five minutes, if there is no operation within five minutes, the page will automatically exit; 4.The

default Chinese language can be set via the command line"web-lang en”.

1.3Login status

1
After logging in, you will see the following page:

PONThe status of the port and the upper link port is displayed here.PONhow many mouth will showONUregistration, how manyONU online

and how manyONUOffline; the uplink port information will display the port management status and link connection status at a glance.

2
2 TOPOpicture

The figure below showsPONThe status of the mouth: (the red font indicates the offline status)

1.right mouse clickPONport icon for quick access to advanced settings -PONManagement - Upstream bandwidth configuration,

PONset up,PONOptical diagnosis, batch configuration.

2.right mouse clickONUicon for quick access to advanced settings -ONUAdministration - basic information, port

configuration and deletionONU, restartONUor addONUto the block list.

3
3.Move the mouse cursor toPONicon to automatically display the online status of the port, how manyONUonline, how many

ONU offline.

4.Move the mouse cursor toONUicon to automatically display the stationONUThe name,MACAddress, online status, authentication status.

5.Search through the gray box in the upper right corner of the interfaceONUname orONU MACAddress can quickly find the corresponding ONU.

① Partial or full length can be entered arbitrarilyMACAddress or name, the number of search results is shown in the figure below, click the

black arrows up and down to quickly view eachONUstate, while the correspondingONUThe icon automatically flashes five times.

4
② foundONUA layer of light blue is wrapped around the icon. Click refresh/reset to reset the icon state.

③ Click Save as Picture to display the current topology map state in a new tab page of the browser. (The original topology map interface

cannot be right-clicked)

5
3 ONUslist

① switchPON IDget differentPONoralONUlist

② The red font shows offlineONU

③ Last disconnection time and reason for disconnection

1.add oneONU, you can specifyONU IDorONU IDfor0automatic allocationONU ID

2.Click on Upstream Bandwidth Configuration to enterPONAdministration - Upstream Bandwidth Configuration Page

6
3.clickONUThe block list goes toPONmanage--ONUBlock list page

4.Can be managed in batchesONU,can deleteONUor addONUto the block list when clicking on

bulk managementONUThe following interface will appear:

Multiple can be selectedONUSimultaneous operation

7
5.Move the mouse cursor to the configuration to automatically display the following interface:

8
4 VLANsmanage

The following figureVLANmanagement showsVLANThe member ports of the list include labeled ports (tagged),

untagged ports (untagged) and as defaultVLANport.

1.createVLAN:enterVLAN ID, select the label (tagged port) or without labels (untagged port). If you

want to create aVLAN, enter the sameVLAN IDcan be; if you want to create a continuous multipleVLAN, you

can enter a validVLAN IDScope.

2.deleteVLANThe same is true, you can choose to delete a single or delete a continuousVLAN ID

9
10
5advanced settings

5.1Operating status

The picture below shows theOLTsystem information, hardware status, system uptime

5.2System Management

5.2.1Device management

1.rebootOLT

2.backupOLTconfigure

3. importOLTconfigure

4.reset

5. save configuration

6.View the current configuration (exportTXTconfig file)

11
5.2.2Diagnostic tools

Device supportpingDiagnose, check link connection.

supportpingdomain name

12
5.2.3Network Interface

The default remote management interface is the out-of-band interface (NMSport) and with inner port (upper port)

1.Configure the default route (the default route must exist in the network segment that exists in the band or out of band)

2. DNS

3.Configuring Out-of-Band ManagementIPaddress

13
4.In-band management (before adding in-band management, create the correspondingVLAN)

5.2.4Upgrade management

Firmware can be upgraded with this configuration (firmware/imgFile system(system/imgfile) and

full version (upgrade/zip file).

5.2.5time management

14
1.Configure time zone

2.configureOLTsystem time

5.2.6Serve(SSH/SNMP)

If you want a higher level of security connection, you can passSSHLogin command line:

1. FRPC

FRPIt is a high-performance reverse proxy application that can be used for intranet penetration. This device supports configuration asFRPClient,

users can build their own server for remote management. Type only supportshttpprotocol.

15
2. SNMPconfigure

set support configurationtrap serverandcommunity

3. SH Access
First, you need to add a public key to the server.

Notice: you need to create aOPENSSHpublic key in the format, its type needs to belegacy, key typeRSA create.

SecureCRT:

PuttygenKey generator:

16
① Fill in the public key aboveOLT

② Complete the increase

17
Now you can log in with username and password.

5.2.7Alarm list

5.2.8User Management

In the user management menu, you can add, delete users, and modify user passwords

increase user:

18
root(root) cannot be deleted

To modify the user password, you can only modify the password of your own login account.

19
delete specified user

5.3 PONmanage

5.3.1 ONUblock list

Increaseonuto block list

5.3.2Upstream bandwidth configuration

20
5.3.3 PONset up

5.3.3.1 PONAuthentication

This function can be configuredPONAuthentication type and authentication mode of the port

Modify the type to add manually

twenty one
Modify the authentication mode to supportMAC,LOID,LOID+PASSWORD,Hybrid

5.3.3.2 P2P

This configuration can be setP2PWhether to open. If enabledP2P,butPONmiddleONUcan communicate with each other. The

default state is disabled

twenty two
5.3.3.3rogueONUdetect

detectPONAre there any hooligansONU, which is not turned on by default

Change to manual detection

5.3.4 LOIDsallow list

IncreaseLOID

deleteLOID

twenty three
5.3.5 ONUBulk upgrade

In the current configuration, to upgradeONUMirror, you need to configure it firstONUupgrade type

Next you need to bindONUTypes of

twenty four
Choose what needs to be upgradedONU

Next, select the upgrade file, upgrade type and what you want to upgradePONmouth, click to confirm,OLTwill start the batch

upgrade of the specifiedONU.

25
5.3.6 PONOptical diagnosis

1.View optical module information

2.readPONOptical diagnostic information of the optical module

3.readONUOptical diagnostic information, you need to manually refresh to get itONUOptical power data

26
5.3.7Batch configuration

Support configurationONUportVLAN,ONU WLAN,ONU WANconnect

Notice: This configuration is a private protocol and only supports our companyONU!

1. ONUportVLAN

Maximum supported configuration8indivualONUport numberVLAN

2. ONU WLAN, the encryption method can be modified,SSIDname,SSIDpassword

27
3.WANconnected, showingPONall under the mouthONUofwanConnection Status

Add toWANconnect

28
If you delete the newly addedWANconnection, waiting30s

5.4 ONUmanage

5.4.1 ONUBasic Information

As shown above, the following operations can be done:

1.set upONUBasic Information,ONUname andONUDescription.

29
2.rebootONU
3.unregisterONU

4.Changefec mode
5.refreshONUOptical diagnostic data

6. ONUUpgrade management

Operate as follows, select the upgrade file and click OK, theONUwill enter the upgrade state

7.CheckONUAlarm information

8.single pageWANlink configuration

Notice:This configuration is a private protocol and only supports our companyONU!

30
5.4.2 ONUport configuration

1.can be based on port number andONU IDChoose what you want to configureONU

2.Can be configured as followsONUbasic functions

31
3.Configure portsVLAN

5.4.3 ONUMulticast management

1.configureONUmulticast mode

32
2.configureONUMulticast Quick Leave

33
3.configureONUMaximum Multicast Group: Only inONUThe multicast mode isigmp-snoopingconfigurable, whenONUmulticast mode from

igmp-snoopingWhen switching to other modes, the configuration will be restored to the default value, which is64. First need to

checkONUThe multicast mode isigmp-snoopingmodel:

Next you can configureONUMaximum number of multicast groups, max255(CTCThe standard defines the maximum value, depending on the

specific ONUsupport)

4.Configure MulticastVLANMode: The configuration determinesONUWhether the multicast service flow forwarded by the port carriesVLAN

Label,untagTo peel off the label,tagIn order not to peel off the label,translateto convertVLANlabels, configurable up to8Group

conversion. The default mode isuntag.

34
configureONUmulticastVLANmode istagoruntag:

configureONUmulticastVLANFor switching modes, up to8GroupVLANconvert(CTCThe standard defines the maximum value, depending on

the specificONUsupport)

35
5.configureONUmulticastVLAN. only atONUThe multicast mode isigmp-snoopingconfigurable, whenONUmulticast mode fromigmp-

snoopingWhen switching to other modes, multicastVLANwill be cleared. Each port can be configured with up to8multicastVLAN(

CTCThe standard defines the maximum value, depending on the specificONUsupport).

36
5.4.4 ONUStatistics

set upPONandLANStatistical status of the mouth

View the historical statistics of the current port

37
5.5Port management

5.5.1port information

5.5.2port statistics

38
5.5.3port configuration

1.You can switch the port number to get different port information

2.Configure the basic information of sentence segmentation, for example: configureMTUor default

3.Configure storm suppression toPPSIn units, broadcast, multicast and unicast storm suppression can be configured,0Indicates that the storm suppression

function is turned off

4.Port mirroring function

5.5.4portVLAN

39
1.set portVLANTypes of

Ports can be configured hereVLANforhybrid,accessandtrunkmode, then you can also configure the port default

VLAN

40
2.can be added at this portVLANand selectvlanmark or go mark mode.

Of course, you can also delete the portVLAN

41
3.add portVLANconvert

4.add portQinQ

42
Configuration is also supportedCVLANScope:

5.5.5Loop detection

This function needs to detect the loop on the user side in order to deal with the loop in the networking and prevent the loop from

affecting the service. After the loop detection function on the user side is enabled, the system automatically detects the loop on the user

side. When a loop is detected, it will stop the loop and issue an alarm.

5.5.5.1 PONLoop detection

1.PONLoop detection function introduction:

PONThe loop detection function is enabled by default, and the loop detection processing conditions are as follows:

(1)when the sameONUA loop occurs on the port or downlink device, due toONUThe port loop detection function is enabled by default

Yes, do not triggerPONLoop detection.

43
(2)the same onePONmouth is differentONUA loop occurs between whenP2PWhen the feature is off (off by default),

Only the loop alarm is issued, not theONUjoin the blacklist; whenP2PWhen the function is turned on, a loop alarm will be issued and a loop will

occur at the same time.ONUadd to blacklist.

(3)differentPONunder the mouthONUA loop occurs whenPONWhen the port isolation function is turned on (on by default),

Only the loop alarm is issued, not theONUjoin the blacklist; whenPONPort isolation is off and two loops occur PONdefault of

mouthVLANAt the same time, a loop alarm will be issued and one loop will occur at the same time.ONUadd to blacklist.

Notice:

1->PONLoop detection blacklistedONU, the configuration is saved without automatic blacklist removal or manual recovery mode, after

restarting the device, theONUIt will be permanently on the blacklist, and you need to manually remove the blacklist.

2->In manual authentication mode, after loop detection is added to the blacklist, manual authentication is required before going online again.

2.PONLoop Detection Parameter Configuration

(1)Loop detection state: the default is disabled state, optional configuration is enabled, after configurationPONLoop detection function

take effect;

(2)Loop Detection Interval: This parameter is configuredPONLoop detection packet sending interval, by default5second hair

A loop detection packet;

(3)Loop Detection Recovery Mode: This parameter is configured when a loop occursONUWhether to automatically recover after being added to the blacklist

Removing the blacklist, the default is automatic recovery mode, and manual recovery mode is optional;

(4)Auto recovery time: This parameter is only in loop detection recovery modeAutotakes effect when the default30automatic recovery in seconds

complex;

44
(5)Manual recovery: This configuration is only available when the loop detection recovery mode isManualcan be configured when, after configurationONUwill be from black

List removed.

3. PONView loop detection information

5.5.5.2Uplink port loop detection

1.The loop detection function of the uplink port is introduced:

The loop detection function of the uplink port is enabled by default. The loop detection processing conditions are as follows:

(1)When the spanning tree protocol is enabled, the loop detection of the uplink port does not take effect, only when the spanning tree protocol is disabled

The interface loop detection will take effect;

(2)A loop occurs on the same uplink port, directlyLink Downthe uplink port;

(3)A loop occurs on different uplink ports, whenPVIDWhen not, a loop alarm occurs, and noLink Downport; when

PVIDWhen the same, a loop alarm occurs at the same timeLink Downone of the ports.

2.Uplink port loop detection parameter configuration

45
(1)Loop detection status: the default is enabled status, the optional configuration is disabled, after the configuration, the loop detection function of the uplink port

failed;

(2)Loop Detection Interval: This parameter is used to configure the interval for sending loop detection packets on the uplink port. By default,5second hair

A loop detection packet;

(3)Loop detection recovery mode: This parameter is configured when a loop occurs on the portLink DownWhether to automatically restore after

Link Up, the default is automatic recovery mode, optional manual recovery mode;

(4)Auto recovery time: This parameter is only in loop detection recovery modeAutotakes effect when the default30automatic recovery in seconds

complex;

(5)Manual recovery: This configuration is only available when the loop detection recovery mode isManualcan be configured when, after configurationLink Down

port willLink Up.

3.View the loop detection information of the uplink port

46
5.5.6Port isolation

By defaultPONPort isolation is enabled, and port isolation of uplink ports is disabled.

Ports that communicate with each other can be added or deletedID

5.6 MACaddress management

47
1.configureMACAddress aging time

2.IncreaseMACAddress (can choose to increase static or black holeMACaddress)

3.clearMACaddress

48
Optionally delete based on port number:

can also be based onVLAN IDclear

49
4. MACAddress query

can be based onMACaddress type, port number,VLAN ID,MACAddress query:

5.7Protocol management

5.7.1 RSTP

set upRSTPBridge Information:

50
After the setting is successful, you can see the following configuration results:

Port configuration:

51
5.7.2 IGMP

1. IGMPconfiguration, the default isdisablemodel

2.configureIGMP snoopingparameter:

snoopingThe mode can be configured with the following parameters:

1> Protocol policy: The policy for whether multicast protocol packets outside the multicast program library can pass through. By default, it ispass. Quick Away:

2> When Quick Away is enabled, the device receivesigmpThe leave message will immediately disconnect the multicast service; when fast leave is not enabled,

when the device does not receive the message within the maximum response time of general group query/maximum response time of specific group query

igmpThe multicast service flow will be disconnected only after adding group packets. Default is disabled. Multicast member aging time: when the device does

3> not receive any data within the aging timeigmpIf a group message is added, the user is considered to be offline, and the multicast service flow of the user is

disconnected. Default is260Second.

52
3.configureIGMP proxyparameter

proxyThe mode can be configured with the following parameters:

1> Protocol strategy: same as above

2> Quick departure: same as above

3> Robustness coefficient: This command can be used when the user wants to adjust the robustness coefficient according to the

stability of the network. After setting, the system uses this robustness coefficient to confirm the aging time of multicast users.

The robustness factor is a factor set to enhance the robustness of the system. It directly affects the aging time of multicast

users and the number of times that general group query packets are sent. If a subnet may lose packets, the robustness factor

should be increased to ensure the stability of multicast users. Default is2. Maximum response time for general group query:

4> After the general group query message is sent, all online users will respond within the response timereportmessage, by

default10Second. Universal Group Inquiry Interval: When the device is inproxyIn this mode, the device will send a general

5> group query packet at each general group query interval. Default is125Second.

6> Query message sourceIPAddress: Configure the source of the general group query packet or the specific group query packet sent by the

multicast router to the user sideIPaddress, defaults to192.168.100.1.

7> Query message sourceMACAddress: Configure the source of the general group query packet or the specific group query packet sent by

the multicast router to the user sideMACThe address, which defaults to the inband address of the device. Specific group query interval:

8> For a specific program, send a specific group query at the interval set by this command to confirm whether the user is watching the

program, and no feedback from the user is received.reportmessage, it is considered to use

53
If the user is not watching the program, the system will no longer send the program stream to the user, so as to avoid wasting

bandwidth when the user still receives the multicast stream without watching the program. Default is1000millisecond. Number of

9> queries for a specific group: for a specific program by sendingNSecond-rate(NSet by this command) a specific group query to confirm

whether the user is watching the program, the default is2Second-rate.

10>Maximum response time for specific group query: After the specific group query message is sent, all online users will

households will respondreportmessage, by default800millisecond.

4.Configure MulticastVLAN 100,VLANMust exist for the creation to succeed.

54
5.Configure MulticastVLAN 100Description

6.Configuring Multicast Routing Ports

IGMPThe routing port can only be the uplink port, which is connected to the multicast server.

55
7.Configure Unknown Multicast Policy

Suppression policy for unknown multicast service flow: If the service flow carries unknown multicast for a specific purpose, configure it as transparent transmission. Unknown

multicasts with no special purpose will occupy bandwidth. Generally, it is configured to be discarded, and the default is transparent transmission.

8.Configuring the Multicast Program Library

56
Add multicast program library, users can switch to this multicastVLANprogram channel.

9.Configuring Multicast Static Entries

10.Static multicast entries will not be aged out and can only be deleted manually

11.delete dynamic entries

5.7.3DHCP

57
This device supports configurationDHCP SnoopingFunction,DHCP RelayFunction,DHCP Option82function andDCHP

ServerFunction

1. DHCP Relay

DHCP Relayfunction is working in three layers, which can makeDHCPThe client's request message is sent to the specifiedDHCP

server. Disabled by default.

hint:OpenDHCP Relayfunctionality needs to be ensuredDHCPThe function is enabled and the routing function (ip route enable)also open;

openDHCP RelayThe relevant function configuration needs to ensure thatDHCP RelayThe function has been turned on.

DHCP RelayThere are two strategies:

(1) StandardPolicy (default policy): According toVLANturn upDHCPserver address;

(2)Option60strategy: according toDHCPcarried by the clientOption60domain value to find the server address.

hint: Switching a policy will clear the server table created by another policy.

Increase the server address (the maximum supported configuration of the system32server table)

58
2. DHCP Option82

to enhanceDHCPServer security, improvedIPan address configuration strategyDHCPoptions.

Disabled by default.

Three strategies are supported:

(1)Retention policy (default policy): The request message sent by the client does not carryOption82informationOLTwill bring

Option82information, the client sends it withOption82information, thenOLTDoes not handle direct forwarding servers.

(2)Stripping strategy: The request message sent by the client does not carryOption82informationOLTDoes not deal with the direct forwarding server,

the client sends it withOption82information, thenOLTstrippedOption82The information is then forwarded to the server.

(3)Replacement strategy: The request message sent by the client does not carryOption82informationOLTDoes not deal with the direct forwarding

server, the client sends it withOption82information, thenOLTreplaceOption82The information is then forwarded to the server.

3. DHCP Snooping

DHCP Snoopingfunction by listeningDHCPThe message interaction between the client and the server to record the user

IP/MACinformation. Disabled by default.

hint:OpenDHCP Snoopingfunctionality needs to be ensuredDHCPfunction is enabled, openDHCP SnoopingThe relevant function

configuration needs to ensure thatDHCP SnoopingThe function has been turned on.

59
Add trusted port

This configuration can only be configured on the uplink port, and the trusted port is allowed to receive allDHCPPacket, untrusted port is not

allowed to receiveDHCPresponse message. By default all ports are untrusted ports.

4. DHCP Server

Disabled by default, it must be disabled before enablingDHCP Relay,DHCP Option82,DHCP SnoopingFunction. After opening, start the

configurationDHCPServer, the default is the in-band management network segment, and the interface is a logical portvlanif-1

60
5.7.4 MSTP

MSTPcompatibleSTPandRSTP, which can not only converge quickly, but also make differentVLANThe traffic is forwarded along their

respective paths, thus providing a better load sharing mechanism for redundant links. pass throughMSTPA switching network is divided into multiple

domains, and multiple spanning trees are formed in each domain, and the spanning trees are independent of each other. Each spanning tree is called

a multiple spanning tree instanceMSTI (Multiple Spanning Tree Instance), each domain is called aMSTarea(MST Region: Multiple Spanning Tree

Region). The default state is disabled.

1. MSTarea

It consists of multiple devices in the switching network and the network segments between them. A local area network can have multiple devices. MST

domain, eachMSTThe domains are physically connected directly or indirectly, and can beMSTPThe configuration command divides multiple devices into the same

MSTwithin the domain.

61
The configurable length of the domain name is0-32bit, reverts to383A21F00165.

The configurable range of the modified version is0-65535

2. CIST

in eachMSTwithin the domainMSTPGenerated by calculationIST(eachMSTa spanning tree within the domain), whileMSTP put each

MSTThe domain is treated as a single switching device, calculated inMSTinterdomain generationCST(connects all within the switched

networkMSTa spanning tree for the domain),CISTis a single spanning tree connecting all devices in a switched network, consisting of IST

andCSTconstitute together.VLANThe mapping table isMSTproperty of the domain, which describesVLANandMSTIThe mapping

relationship between, the default is1-4094.

62
Configuration interface and priority

63
3. MSTI

OneMSTwithin the domain throughMSTPGenerate multiple spanning trees, each spanning tree is independent of each other, and has the following

characteristics:

① eachMSTICalculate its own spanning tree independently, without interfering with each other

② eachMSTIThe spanning tree calculation method ofSTPbasically the same

③ eachMSTIThe spanning tree can have different roots, different topologies

④ eachMSTISend within own spanning treeBPDU

⑤ eachMSTIThe topology is determined by command configuration

⑥ Each port is in differentMSTISpanning tree parameters on can be different

⑦ Each port is in differentMSTIThe roles and statuses on the

⑧ RunningMSTPprotocol network, aVLANThe message will be forwarded along the following path: AtMST

domain, along its correspondingMSTIForward. existMSTbetween domains, alongCSTForward.

64
4.port configuration

Quickly switch eachGEoralBPDUprotection, loop protection,Edgeport,P2PFunction

5.8 ACL/QOS

5.8.1time limit

1.used to specifyACLThe effective time period for the rule. After the configuration is successful, createACLWhen rules, you can specify the effective

time by referring to the time period name.ACLRules are only valid during the effective time period.

2.Increasetime-range
1>Relative time: Periodic time, for example, every Tuesday09:00totwenty three:00.

65
2> Absolute time: from a specific point in time to another point in time, e.g.2020year4moon29day9:00

to2020year4moon29day18:00.

66
3.deleteTime-range

5.8.2 ACLsmanage

When you need to filter specific data packets by matching rules, use this configuration to createACL(Access

Control List).

1.basicACL (2000-2999): When the source of the message needs to beIPAddress makingACLrule, use this configuration. After

successfully creating the rule, you can usepacket-filterThe command reference rules filter packets.

Addition of rules: optionaltime-rangeEffective for a specified time or not in usetime-rangeEffective immediately.

67
2.advancedACL(3000-4999): When the source address information, destination address information,IPThis configuration is used when the type of the

carried protocol and the matching rules are formulated for the characteristics of the protocol. After successfully creating the rule, you can use

packet-filterThe command reference rules filter packets.

Addition of rules: optionaltime-rangeEffective for a specified time or not in usetime-rangeEffective immediately.

68
3.linkACL(5000-5999): When the source of the message needs to beMACaddress, sourceVLAN ID, Layer 2 protocol type, purpose

MACAddress and other link layer information formulationACLrule, use this configuration. successfully createdACLAfter the

rule, you can usepacket-filtercommand referenceACLRules filter packets.

Addition of rules: optionaltime-rangeEffective for a specified time or not in usetime-rangeEffective immediately.

69
5.8.3packet filtering (Packet Filter)

Used to configure the specified portACLFilter the rules and make them take effect. when needed to useACLThis configuration is

used when the rule filters the port traffic.

70
5.8.4 QOS

Used to configure the queue scheduling mode of the system. Queue scheduling is to divide the packets that need to be sent from the same port

into multiple queues, and schedule between queues to determine which queue's packets are sent first and which queue's packets are sent later. When

the user needs to select different queue scheduling modes according to the importance of the business, to ensure that the important business can still

be provided when the network is congestedQoSWhen guaranteed, use this configuration. Device support8a queue.

1.Set the mapping relationship between priorities and queues

71
2.Set queue scheduling: if selectedWRRmode, all weights must add up to equal100or0

5.9routing

5.9.1route management

1.Turn on the routing switch:

72
hint: When the routing switch is turned off, all static routes are configured as well asARPEntries are cleared.

2.Static route:

If the next one is reachable, it will actively learn the next hop gateway.ARP, the state of the static route becomes

reachable.

5.9.2 ARPsurface

5.10link aggregation

Link aggregation is a process of bundling multiple uplink ports of the same type into one logical port. Without upgrading hardware, the bandwidth of the

uplink ports can be increased, and the link backup mechanism can be used to effectively improve the connection between links. reliability.

1.Create link aggregation

hint:

73
① A port cannot join multiple aggregation groups at the same time;

② Spanning tree protocol: The port added to the aggregation group will be treated as a logical port for protocol operation;

③ Uplink port loop detection: When the port is added to the aggregation group, the port loop detection does not take effect;

④ Uplink port attributes: The attributes of the member ports added to the aggregation group must be consistent: rate, port type,MTU, port speed limit,

storm control; when configuring the member port attributes of the aggregation group, the members in the group are bound together for configuration;

⑤VLANAttribute: The member port that joins the aggregation groupVLANThe configuration must be consistent:PVID,portVLAN;Configure aggregation
group membersVLANWhen the group members are bound together and configured;

⑥ The destination port of port mirroring cannot join the aggregation group as a member of the aggregation group, and the port that joins the aggregation group at the same time cannot

become the destination port of mirroring;

⑦ Configured staticMACThe port of the address cannot be added to the aggregation group as a member of the aggregation group;

⑧ ConfiguredACLThe port of the rule cannot join the aggregation group as a member of the aggregation group;

⑨ Multicast is configuredVLANRouting ports cannot join aggregation groups as members of aggregation groups;

2.View Link Aggregation

After the creation is successful, you can view the member ports that have joined the aggregation group, and you can add and delete aggregation group members in the

aggregation group.

3.Load balancing routing algorithm

74
By default, the load balancing routing algorithm is based onsrc-macHash calculation is performed, and other routing algorithms can be configured according to

requirements.

4.delete link aggregation

When a link aggregation needs to be deleted, all members in the aggregation group are deleted, and the aggregation group is deleted.

75
6quick access

After the login page is successful, the mouse cursor is moved to the quick access and the following functions are automatically displayed:

1. Turn off real-time alarms: Turn off the real-time alarm information that pops up automatically in the lower right corner of the page

76
2. Save configuration: save all configuration information modified by the current access to the OLT

3. Log out

4. Reboot

5.PONOral Diagnosis: Quick AccessPONmanage--PONoral diagnosis

6. View the current configuration: export the current configurationOLTconfig file, filenameoltconfigtmp.txt

7. Simplified Chinese &English: switch page language

77
7root

Click on the top right cornerrootThen enter the system management - user management

78
Thanks!

79

You might also like