Professional Documents
Culture Documents
Zhone Ipd Extenders Troubleshooting
Zhone Ipd Extenders Troubleshooting
Zhone Ipd Extenders Troubleshooting
Troubleshooting
Network Extenders
TNE / ENE Questions?
Unable to login Remote TNE / ENE
1)The first thing to verify is that you have the correct default
gateway configured in the TNE / ENE unit.
2)Can you get web access to the unit from the Ethernet ports of the
TNE / ENE unit?
3) Is this the only TNE unit that you can't access?
4) Do you have other TNE units that you can web into?
5) Are you trying to access the TNE through the T1 ports?
6) If you can't access any other units, do you have a firewall
between you and the TNE unit?
7) Do you have a duplicate IP address in your network?
8) What is the IP address, mask, and gateway of the TNE?
9) If you can get access to the ethernet ports of the TNE and can
access web management from there, can you send me the
nvr_backup file from the unit? To get this file, you need to tftp it.
10)The command is: tftp -i 192.168.254.252 get
nvr_backup.bin.Password where the IP address is the address of
your TNE unit, and the Password is your superuser password for
the unit.
IPD Performance Issues with TNEs:
A source MAC address defined in the L2 Filters table of one subscriber port will not
be allowed to source traffic from any other subscriber port until the L2 filter entry is
deleted.
Learned source MAC addresses which are NOT defined in any subscriber L2 filter
tables are allowed to move freely between subscriber ports on the same line card.
Learned source MAC addresses not defined in any subscriber L2 filter tables are
allowed to move between different line card subscriber ports as long as the source
MAC has not been flooded between line cards from VLAN Flood or the source MAC
is transmitting to an unknown destination This causes the source MAC to be
learned on the line card backplane connection (or uplink).
Duplicate MAC & Network Loop
Detection and Prevention
When two subscriber ports are accidentally bridged together or some other type of
adverse condition creates or simulates a network loop, where a source MAC
address is learned from multiple locations, the same logic mentioned above will
occur:
A. If the source MAC is duplicated on subscriber ports, but not learned on an
uplink port, the MAC is allowed to source traffic from the first learned
subscriber port, but not on the second learned subscriber port until it has aged
from the first.
B. If the source MAC is learned on both a subscriber port and an uplink port, the
MAC is allowed to source traffic from the uplink but not from the subscriber
port until it has aged from the uplink.
Source MAC address duplication will cause an SNMP trap to be sent (if
snmpSecurity_Events Trap is enabled) and the port LED in web management to
change to orange, indicating a MAC movement/duplication violation where
traffic from the duplicated source MAC has been blocked. The SNMP Trap,
Diagnostics Loop Detect/MAC Movement Summary, and Port Statistics indicate
the orange LED slot and port, the number of times packets have been dropped due
to the violation, and the valid slot/port location of the source MAC address. The port
LED will remain orange in web management until the port statistics have been reset
AND the duplicate MAC stops sourcing traffic until it has aged from the original port.
Duplicate MAC & Network Loop
The slot/port location is only meaningful when the valid location of the source MAC is
on another subscriber port. When the valid location of the source MAC is located on
an uplink port, the slot/port will indicate the slot of the violated MAC and the
backplane port number of the violated MAC (a port number higher than the number of
front panel ports available for that slot).
protocol filter ingress packet received by BLC subscriber port dropped from protocol filter
match/mismatch.
protocol filter egress packet destined out BLC subscriber port dropped from protocol filter
match/mismatch.
IP range (ingress) packet received by BLC subscriber port dropped from IP filter mismatch.
QoS VLAN config ingress packet received by BLC subscriber port dropped because incoming
VLAN tag does not match port VLAN configuration
QoS VLAN config egress packet destined out BLC subscriber port dropped because VLAN tag
does not match port VLAN configuration
Database trusted/untrusted violation source MAC address learned on BLC uplink has also been
learned on the subscriber port. Traffic originating from this source MAC on this subscriber
port will be dropped until the MAC has been aged from the BLC uplink port (5 minute age
time). The purpose of this feature is to prevent subscribers from spoofing the MAC addresses
of important network resources (such as default gateway and servers).
Database static mac moved from a configured port a MAC address defined in a layer 2 port filter
has been learned on a port other than the one where the layer 2 port filter has been defined.
This source MAC will not be allowed to transmit on any subscriber port other than the one
where the filter for this particular MAC has been defined.
Other drop reason packets dropped during DSL link up or there is no destination for the packet
IPD12000/4000 Traffic Flow
> tftp
-i 192.168.254.252 get nvr_backup.bin.Password
where the IP address is the address of your IPD unit, and the Password is
your superuser password for the unit.
Do you use the command " get nvr_backup.bin.Password to get the backup
file?
If you used the command "get nvr_cfg.bin.Password, this would not save the
management configurations such as the IP address and subnet mask.
Example of TFTP on PC:
If you have a Windows PC the command to use is:
tftp -i 192.168.254.252 put c:\ethX_01_01.bin where the IP address
is the IP of the ETHX box and the ethx1_01_01.bin is the filename.