manual_pt dslam adsl2 .pdf
Post on 28-Nov-2015
81 Views
Preview:
TRANSCRIPT
1
DSLAM CTS1848
Technical Manual
Version 3.0
2009-05-20
2
CONTENTS
CHAPTER 1 ABOUT DSLAM5048 ................................................................................................ 5
1.1 IP-DSLAM INTRODUCTION ........................................................................................................ 5
1.1.1 ADSL ............................................................................................................................... 6
1.1.2 ATM ................................................................................................................................. 6
1.1.3 VLAN ............................................................................................................................... 7
1.1.4 Multicast/IGMP snooping ............................................................................................. 11
1.2 TECHNICAL SPECIFICATIONS ..................................................................................................... 14
CHAPTER 2 INSTALLATION & INITIALIZING ..................................................................... 15
2.1 DESKTOP INSTALLATION ............................................................................................................ 15
2.2 RACK INSTALLATION ................................................................................................................. 15
2.3 ALLOCATION OF SUBSCRIBERS’ LINE ......................................................................................... 16
2.4 SOFTWARE CONFIGURATION AND CONNECTING ......................................................................... 17
2.4.1 Initializing ..................................................................................................................... 17
2.4.2 Connecting through RS232 ............................................................................................ 18
2.4.3 Connecting Through Telnet ............................................................................................ 20
CHAPTER 3 CONFIGURING WITH WEB ......................................................................... 22
3.1 WEB LOGIN ............................................................................................................................... 22
3.2 WEB MANAGEMENT ................................................................................................................. 23
3.2.1 Status ............................................................................................................................. 24
3.2.2 Configuration ................................................................................................................ 29
3.2.3 System ............................................................................................................................ 38
3.2.4 Batch Config .................................................................................................................. 41
CHAPTER 4 DSLAM COMMAND LINE ................................................................................... 44
4.1 CLI SPECIALTIES ....................................................................................................................... 44
4.2 COMMAND LINE HELP ............................................................................................................... 44
4.3 COMMAND STRUCTURES........................................................................................................... 44
4.4 COMMAND LINE EDITING .......................................................................................................... 45
4.5 ERROR INFORMATION................................................................................................................ 45
CHAPTER 5 OPERATION & MAINTENANCE ........................................................................ 47
5.1 LOGIN USER MANAGEMENT ..................................................................................................... 47
5.1.1 Create User ................................................................................................................... 47
5.1.2 Delete User .................................................................................................................... 47
5.1.3 Get User ........................................................................................................................ 47
5.1.4 Password Reset .............................................................................................................. 48
5.2 ETHERNET MANAGEMENT ........................................................................................................ 48
5.2.1 Modify ethernet interface .............................................................................................. 48
5.2.2 Modify aggr interface .................................................................................................... 48
5.2.3 Get aggr interface ......................................................................................................... 49
5.2.4 Delete aggr interface ..................................................................................................... 49
3
5.3 SET SNMP ................................................................................................................................ 50
5.3.1 Create snmp community ................................................................................................ 50
5.3.2 Get snmp community ..................................................................................................... 50
5.3.3 Delete snmp community ................................................................................................. 50
5.3.4 Create snmp host ........................................................................................................... 50
5.3.5 Get snmp host ................................................................................................................ 51
5.3.6 Delete snmp host ........................................................................................................... 51
5.4 OPERATION MANAGEMENT ....................................................................................................... 52
5.4.1 Configuration saving ..................................................................................................... 52
5.4.2 Software reboot .............................................................................................................. 52
5.4.3 Verbose display .............................................................................................................. 52
CHAPTER 6 PORT CONFIGURATION ..................................................................................... 54
6.1 ADSL BASIC COMMANDS ......................................................................................................... 54
6.1.1 Adsl line interface Commands ....................................................................................... 54
6.1.2 ADSL Alarm commands ................................................................................................. 60
6.2 ATM COMMANDS ...................................................................................................................... 67
6.2.1 ATM port commands ..................................................................................................... 67
6.2.2 AAL5 VC Statistics Commands ...................................................................................... 68
6.2.3 EOA Commands ............................................................................................................ 70
6.3 BRIDGING COMMANDS ............................................................................................................. 71
6.3.1 Bridge Interface Commands .......................................................................................... 71
6.3.2 Bridge Forwarding Commands ..................................................................................... 72
6.3.3 Bridge static ucast Commands ...................................................................................... 72
6.4 VLAN COMMANDS .................................................................................................................. 73
6.4.1 GVRP Port Info Commands .......................................................................................... 73
6.4.2 VLAN static commands .................................................................................................. 75
6.4.3 VALN svlan Commands ................................................................................................. 79
6.4.4 VLAN mapprofile info Commands ................................................................................. 81
6.4.5 VLAN mapprofile param Commands ............................................................................. 81
6.5 IGMP COMMANDS .................................................................................................................... 82
6.5.1 Bridge Multicast Commands ......................................................................................... 82
6.5.2 IGMP cfg info Commands ............................................................................................. 83
6.5.3 IGMPSnoop port info Commands ................................................................................. 85
6.5.4 IGMP Snoop mvlan config Commands .......................................................................... 87
6.5.5 IGMP querier info Commands ...................................................................................... 91
6.6 FILTERING COMMANDS ............................................................................................................. 91
6.6.1 Filter rule entry commands ........................................................................................... 91
6.6.2 Filter subrule ip Commands .......................................................................................... 92
6.6.3 Filter rule map Commands ............................................................................................ 94
6.6.4 ACL port macentry Commands ..................................................................................... 95
6.6.5 ACL global macentry Commands .................................................................................. 96
CHAPTER 7 QUICK START ........................................................................................................ 98
7.1 DEFAULT VALUES ...................................................................................................................... 98
4
7.2 QUICK START COMMANDS ........................................................................................................ 98
7.2.1 System commands .......................................................................................................... 98
7.2.2 Change IP address ......................................................................................................... 98
7.2.3 Create Default Route ..................................................................................................... 99
7.2.4 Aggregating Mode ......................................................................................................... 99
7.2.5 Stacking Mode ............................................................................................................... 99
7.2.6 Modify the Upstream/Downstream Rate ...................................................................... 100
7.2.7 VLAN configuration..................................................................................................... 101
7.2.8 VLAN management ...................................................................................................... 101
7.2.9 PVC modification ........................................................................................................ 101
7.2.10 Multicast ...................................................................................................................... 101
7.2.11 MAC binding ............................................................................................................... 102
7.2.12 IP filtering ................................................................................................................... 102
7.2.13 Snmp function enable .................................................................................................. 102
7.3 TYPICAL CONFIGURATION ....................................................................................................... 103
7.3.1 Bridge Service Set-up .................................................................................................. 103
7.3.2 VLAN Fast Configuration ............................................................................................ 104
7.3.3 Multicast for Multiple PVC ......................................................................................... 107
APPENDIX A: ABBREVIATION & TERMINOLOGY ................................................................ 109
5
Chapter 1 About DSLAM5048
With the built-in POTS splitter 48 ADSL/ADSL2/ADSL2+ subscribers, DSLAM5048 is an
advanced IP based DLSAM designed for network service providers to offer excellent
services for multiple subscribers. It‟s suitable for broadband access networks with low
density, and for fast deployment on field to save the investment. As IP DSLAM techniques
become mature, IP-DSLAM is widely applied to rural, supermarket, business center, and
other remote areas.
With the compact dimension, DSLAM5048 is easy for taking, mounting or assembling. It
can be installed on desk, on wall, or mounted on rack.
DSLAM5048 can support 24Mbps downrate and 3Mbps uprate streams for each adsl port
with the extension distance up to 20kft (6.1km).
1.1 IP-DSLAM Introduction
DSLAM5048 deals with the signal as following protocols:
Figure 1-1 Protocol stack for DSLAM5048
Standards Compliance:
The equipment in this document complies with the following standards (as applicable):
Institute of Electrical and Electronics Engineers (IEEE)
IEEE802.1q Virtual LANs
IEEE802.1p Traffic Class Expediting and Dynamic Multicast Filtering
IEEE802.3 CSMA/CD Access Method
IEEE802.1ad Virtual Bridged Local Area Networks
International Telecommunication Union–Telecommunication Standardization Sector
(ITU-T) Recommendations
G.992.3 Asymmetric digital subscriber line transceivers 2 (ADSL2)
6
G.992.4 Splitterless asymmetric digital subscriber line transceivers 2 (splitterless
ADSL2)
G.992.5 Asymmetrical Digital Subscriber Line (ADSL) transceivers - Extended
bandwidth ADSL2 (ADSL2+)
1.1.1 ADSL
ADSL (Asymmetrical Digital Subscriber Loop) is based on normal twisted line. It takes
advantages of telephone lines to provide high-speed upstream/downstream rates. With
DMT (Discrete Multi-tone Modulation), IP DSLAM can divide three service channels,
namely POTS, ADSL upstream and downstream, into 256 sub-channels and the traffic is
overlaid on them.
Figure 1-2 Sub-channel division scheme of ADSL by DMT
ADSL technology encounters three phases: ADSL, ADSL2, and ADSL2+. The standard
organization issued the corresponding standards listing in the table. The later version is
fully compatible to the older one.
Phase Standards
ADSL ANSI T1.413 i2, ITU G.992.1, ITU G.992.2
ADSL2 ITU G.992.3
ADSL2+ ITU G.992.5
1.1.2 ATM
ATM (Asynchronous Transfer Mode) is a cell-based switching and multiplexing technique,
combining the circuit-switching and packet-switching characteristics.
First of all, ATM is a connection-oriented connection based on VC (virtual channel). When
a user calls to other users, ATM network has to set up a connection firstly. Between two
physical interfaces connecting directly, there are many VCs identified by VPI/VCI.
Moreover, VPI/VCI is local value for one connection segment and can be reused for
different segments.
7
Figure 1-3 Virtual Channel in ATM
Besides this, ATM is able to switch over packets and share the bandwidth for VC
connections controlled by the statistical multiplexing principle.
ATM carrier is 53-byte cell, which composite of 5-byte header and 48-byte payload. For
header, the definition for UNI (user-network interface) and NNI (network-network interface)
is similar.
Figure 1-4 definition of ATM cell
To establish an ATM connection, you can do either in PVC or in SVC:
1) PVC (Permanent Virtual Circuit )
PVC is established by the network management and kept connection until release by
the network management, no matter the traffic is passing through or the terminal
element is connected to.
2) SVC (Switched Virtual Circuit )
SVC is established through ATM cell by terminal elements. The setting-up of SVC is
similar to telephone line in PSTN: the communication is initiated by end-user‟s calling;
the network establishes a virtual channel connection for both end-users through ATM
cells; after communication is completed, SVC is released by ATM cells.
1.1.3 VLAN
VLAN (Virtual Local Area Network) is an advanced network technique which assigns the
networks equipments logically, instead of physically, into the networks segments to
achieve the virtual working groups.
8
VLAN is brought up as a protocol to solve Ethernet broadcasting and security issues.
Compared to normal Ethernet frame, VLAN adds an additional VLAN header, use VLAN
ID to divide users into smaller working groups virtually, and limit the visiting between
different working groups on Layer2. Therefore, each working group is a virtual LAN.
The benefit of virtual LAN should be limiting the scope of broadcasting, forming a virtual
working group, able to do dynamic management of networks.
VLAN A
VLAN B
VLAN A
VLAN B
VLAN A
VLAN B
LAN Switch
LAN Switch
Router
Figure 1-5 Application of VLAN in LAN
In 1999, IEEE802.1Q standard (Protocol for Virtual Bridged Local Area Networks) was
formally issued by IEEE organizer as international standard for VLAN, which made the
VLAN interworking between different vendors possible. In 802.1Q, a special Ethernet
segment is defined. Compared to the normal Ethernet frame, VLAN package format adds
a 4-byte 802.1Q tag after the source address. In 802.1Q tag, 2-byte is for TPID (tag
protocol identifier, value=8100) and 2-byte is for TCI (Tag Control Information). TPID is a
new type of the IEEE definition to indicate it‟s a message with 802.1Q tag.
Figure 1-6 Definition of 802.1Q tag
With the widely deployment of Ethernet networks like Metro-Ethernet, using 802.1Q VLAN
to isolation or identifying users encounters a big limitation. Since VLAN message provides
only 12 bits for VLAN tag assignment which stands for 4k VLAN ID, it‟s hard to meet the
need of metro-Ethernet with a lot of users to be identified. Therefore, QinQ came into
being.
9
QinQ (well-known as stacked VLAN) was created to expand the number of VLAN initially.
It encapsulates another 802.1Q tag based on the normal 802.1Q package, and increases
the VLAN number to be 4kx4k. Though adding additional 4 bytes in QinQ message, it
keeps a fixed format as shown in the following. Generally, the first encapsulated
VLAN/VLAN ID is called CVLAN/CVLAN ID; the second encapsulated VLAN/VLAN ID is
called SVLAN/SVLAN ID.
Figure 1-7 Definition of stack VLAN
DSLAM5048 supports two modes for VLAN function: Native VLAN and Stack VLAN. In
Native VLAN mode, DSLAM5048 only provides 802.1Q VLAN, and can not work as stack
VLAN; in stack VLAN mode, only stack VLAN is supported as well. DSLAM5048 can
create 512 802.1Q VLAN and 512 Stack VLAN maximally.
1.1.3.1 Native VLAN mode
In Native VLAN mode, when DSLAM5048 Bridge interface receives an Ethernet frame,
DSLAM5048 identifies VLAN ID and marks VLAN tag.
1) When a frame without VLAN tag is received, bridge interface will set PVID as VLAN ID
and mark VLAN tag. In default, PVID is 1;
2) When a frame with VLAN tag is received, bridge interface will maintain the original
VLAN tag.
When VLAN ID of Ethernet frame is identified, Ethernet packets will be forwarded to the
next bridge interface determined by VLAN according to the destination MAC. If the packet
is forwarded to untagged bridge interface, then VLAN tag will be removed before sending
out; if the packet is forwarded to tagged bridge interface, then VLAN tag keeps
unchanged.
10
Figure 1-8 Dealing of VLAN tag in Native VLAN Mode
1.1.3.2 Stack VLAN Mode
In Stack VLAN mode, DSLAM5048 Bridge interface received an Ethernet packet. It needs
to identify CVLAN ID, SVLAN ID, and marks SVLAN tag.
Figure 1-9 Dealing of VLAN tag in stack VLAN mode
Frame At Ingress with/without tag Frame At Engress tag marking
CVLAN SVLAN CtoS VVLAN CVLAN SVLAN
X X X PVID PSVID
X X PVID SVLAN ID
X CVLAN ID SVLAN ID
X CVLAN ID PSVID
X CVLAN ID SVLAN ID
How to deal with CVLAN/SVLAN ID should follow the procedure shown in the scheme.
When the bridge interface receives a frame without any VLANs, then CVLAN at the
egress port is set as PVID of the ingress port; SVLAN at the egress port is set as
PSVID of the ingress port;
When the bridge interface receives a frame with 802.1Q VLAN, then CVLAN at the
egress port is ingress port‟s VLAN ID; SVLAN ID is identified by a mapping file
named ctosprofile, which records the relationship between CVLAN and SVLAN.
If ctosprofile exists, then SVLAN ID is determined according to CVLAN;
If ctosprofile does not exist, then SVLAN ID is recorded as PSVID.
11
When the bridge interface receives a frame with complete CVLAN/SVLAN, then
CVLAN/SVLAN at the egress port is unchangeable.
In order to get the forwarding port, VVLAN is defined as the combination of CVLAN and
SVLAN. After CVLAN/SVLAN are determined, we get VVLAN ID and use it to find the
egress port based on the destination MAC.
1.1.4 Multicast/IGMP snooping
DSLAM5048 supports static multicast configuration and IGMP snooping function, and
takes advantages of IGMP (Internet Group Management Protocol) V1/V2/V3 to delivery
multi-medium and multicast traffic effectively.
All IGMP traffic control by DSLAM5048 control panel; Default the IGMP Package will be
dropped, therefore IGMP permission rule should be set up on the control panel platform
before configuring IGMP service. The setting of IGMP should base on global, port and
VLAN.
1.1.4.1 IGMP Snooping
IGMP (Internet Group Management Protocol) snooping is running in the data link layer,
are bound by layer2 multicast mechanism, is proposed for multicast group management
and control.
When the DSLAM receives igmp frame transferring between the host and router, igmp
snooping will analysis igmp frame and establish the relationship between ports.
When snooping joining igmp frame sent by igmp host, DSLAM will add this host to the
corresponding multicast table ; when snooping leaving igmp frame, DSLAM will delete the
corresponding multicast items.
Through continuous snooping igmp frames, DSLAM can establish and maintain the
multicast forwarding table in layer2, and forward multicast frames according to the
forwarding table.
In order to reduce the delay in the control panel and multicast channels, DSLAM also
supports Proxy reporting functions. In Proxy mode, when user port receives IGMP frames
and apply for adding, the proxy function is kiched off and intercepted applying request.
Then after passing authentication checking, the logic checking is proceding : If the
requested group is not in DSLAM‟s forwarding table, then DSLAM sends a request to the
uplink router and ask for adding igmp, and set up a new multicast forwarding table ;if the
requested group is in DSLAM‟s forwarding table, then DSLAM adds this user directly.
Frame Snooping Method Proxy Method
Join In Residential mode, join report is
forwarded to uplink;
Join report is forwarded to querier port
only if DSLAM has no corresponding
12
In un-residential mode, join report is
forwarded through querier port, which
is set by dynamic learning and static
configuration.
multicast group; otherwise, directly
joins multi-cast table.
Leave In normal mode, leave frame is
forwarded to querier port and waiting
for special group query ;as query
result, this port will be deleted from
multicast table .
In fast normal mode, leave frame is
forwarded to querier port and then
deleted from the multicast table without
waiting for query.
Similar to Snooping Method.
Leave frame is send to querier port only
if it‟s the last leaver of the group
registered.
Query IGMP general query frame is forwarded
to all ports in the multicast groups, and
update the existing members ;
IGMP special query frame is forwarded
through VLAN-based query port to all
ports in the multicast groups. If no
multicast channel exists in the
corresponding VLAN, query frame will
be sent to all unregistered and fwdall
ports.
IGMP general query frame is sent to all
registered port in multicast groups and
get existing member. DLSAM reply to
report the status of all registered
multicast groups.
IGMP group and source special query
for ports will not be forwarded to user
port.
DSLAM responses to the query based
on the group registered on it.
Note:The proxy reporting handling is done for an IGMP frame if the proxy reporting is
enabled for the global and corresponding VLAN.
1.1.4.2 IGMP and VLAN
IGMP module forwards IGMP frames based on VLAN bridged mode: if VLAN is
configured as residential mode, the frames will be sent to the uplink port directly; if VLAN
is configured as unrestricted, the frames will be sent to all port and querier ports belongs
to this VLAN.
When a query coming from ADSL port, whose VLAN is set as residential mode, then this
query will be dropped; When a query coming from ADSL port, whose VLAN is set as
unrestricted mode, then this query will be forwarded to all ports.
1.1.4.3 IGMP Snooping and Static Multicast
Besides establishing multicast through IGMP Snooping Module‟s dynamic learning,
DSLAM5048 also do it through static configuration. The static multicast configuration is to
13
configure multicast address, vlanid, egress port table and forbidden egress port table. The
forbidden members configed by static can not be learned through IGMP snooping Module.
However, the implementation of multicast in either ways uses the same multicast channel
database.
14
1.2 Technical Specifications
Physical
Properties
UPLINK 2 * 1000BaseT Ethernet port
Subscriber interface 48ports ADSL/ADSL2/ADSL2+ subscriber
interface with built-in POTS Splitter
Supply Power AC power: auto range 90-240V 47~63Hz
DC power: -40~-60VDC
Power Consumption 75Watts
Dimensions 440×332×44.5mm (1U/19 In.)
Weight 7.5KG
Operation Conditions
Operation Temperature 0~60ºC
Humidity 5%~95% RH (non-condensed),
Altitude -40m~5000m
Software
Properties
Management
SNMP-based GUI EMS, local RS232 CLI
Ethernet SNMP/TELNET/Web management
SNMP V1/V2/V3
Protocol IGMP snooping/proxy ; GVRP; GMRP; LACP;
SNMP/UDP/IP/MAC/Ethernet
Throughput Max. upstream 120Mb/s
downstream 1Gb/s
MAC address
Max. learning number 4000
Max. on CPE side 16
Max. on NET side 256
VLAN
802.1Q VLAN Number 512
VLAN ID (1-4095)
Stacked VLAN Number 512
VLAN ID(1-4095)
PVC
MAX PVC Number 384
MAX PVC per port 8
Package size 64 to 1536
multicast Max. number 256
QOS
Queue scheduling WFQ, Strict Priority
congress control PPD、WRD,EPD
Max priority queues 8
FILTER FILTER number. rule-in 275
rule-out 25
RMON RMON number 20
15
Chapter 2 Installation & Initializing
Preconditions:
The installing process should strictly abide to the process described in the manual.
In order to avoid the accident damage such as scratching, please take care of taking up
and putting down the equipment.
In order to avoid electrostatic damage, it‟s recommended to wear ESD gloves or wrist
when installing the equipment.
2.1 Desktop installation
1. DSLAM5048 can be installed at the stable desktop.
2. Make sure the air exhausting hole is not blocked.
2.2 Rack Installation
DSLAM5048 as a 1U standard cabinet can be installed into 19-inch or other standard
racks.
Only qualified person are permitted to install or maintain DSLAM5048. These qualified
person should pass the technical training lesson, be full of operational experience and
well know the potential hazards when doing a special operation and able to minimize the
risk as well.
After make sure the installation tool kits and material is ok, we can remove the package of
the equipments and put it on the flat table. Then you can follow the steps as the following.
Step 1: decide the installation position, then pre-setting some screw holes on the rack
according to the equipment‟s height. The user should keep the distance of two
DSLAM5048 about 1U, and make sure the length of connection line and ventilation meet
the basic requirement.
Step 2: Fix the L-shape brackets to both side of DSLAM5048 by tool kits. Each bracket
can be fixed by three screws.
Step 3: DSLAM5048 is carefully lifted up and slowly pushed into the rack by hand guiding
till the front panel is aligned with the side board of rack.
Step 4: Fix the screws on rack and DSLAM5048 is well fixed to the rack.
16
Step 5: make sure the ground connection is good in order to operating safety. Usually, the
rack has ground connection itself, so no separating ground is required for the equipment,
if it is installed on the rack. However, if the rack does not have one or equipment is not
rack-installed, individual grounding connection is requested to the equipment.
Method: Using a line to connect the equipment‟s ground to the grounding terminal of the
equipment room.
2.3 Allocation of subscribers’ line
On the front of DLSAM5048 (shown in Figure 2-1), there are four standard RJ21 female
connectors marked as PSTN0-23/PSTN24-27 & LINE0-23/LINE24-47.
Four standard cables with RJ21 male connectors are used to connect PSTN interfaces to
PSTN system and LINE interfaces to the terminal subscribers.
Figure 2-1 Overview of the connection panel
This 48-pin cable has a RJ21 male connector on one hand (shown in Figure 2-2), and 24
pairs of twist lines open on the other end.
Figure 2-2 RJ21 Male connector for the user side
When configuring the twist lines, the port ID is identified as the following table.
Table 2-1 Assignment of port ID
Port
ID
Color for
Transmitting
Color for
Receiving
Port
ID
Color for
Transmitting
Color for
Receiving
1 white Blue 14 black Brown
2 white Orange 15 black Gray
17
3 white Green 16 Yellow Blue
4 white Brown 17 Yellow Orange
5 white Gray 18 Yellow Green
6 red Blue 19 Yellow Brown
7 red Orange 20 Yellow Gray
8 red Green 21 Blue-White Blue
9 red Brown 22 Blue-White Orange
10 red Gray 23 Blue-White Green
11 black Blue 24 Blue-White Brown
12 black Orange N/A Blue-White Gray
13 black Green
Figure 2-3 Allocation scheme of 50pin cable
2.4 Software configuration and connecting
Before you power on DSLAM5048, you should do some check-ups to guarantee the
physical installation is finished and other preparation is ready.
1) Clear up the installing field, and remove the un-usable items;
2) Check the ground line to guarantee well-grounding.
2.4.1 Initializing
When the physical installation is completed, you power on DSLAM5048 and then observe
the following Phenomenon: Power LED (PWR) is constantly on; the equipment finishes
18
the initializing while the status LED is constantly on
2.4.2 Connecting through RS232
The user can configure or manage IP-DSLAM DSLAM5048 through RS232 interface as
shown in Figure 2-4.
Figure 2-4 Connect DSLAM5048 to PC by RS232
Note:If there is no RS232 terminal in your laptop, please use a USB-RS232 converting
cable.
i). Then start the HyperTerminal in Microsoft Windows as the following path:
START PROGRAMS Accessories Communications HyperTerminal
Note:HyperTerminal can be installed from Control Panel if it is not installed yet. Please
refer to Windows Help for more information.
ii). If this is the first time to run it, the program will ask you to give a name for current
connection and select an icon.
Figure 2-5 HyperTerminal Window
iii). Continue by clicking OK and select the serial port being used.
19
Figure 2-6 Name the connection
iv). Choose the serial port and configure the communication parameters including baud
rate, data bits etc.
Default values are set as follows.
Baud Rate 9600
Data Bits 8
Stop Bits 1
Parity None
Flow Control None
Up to then, DSLAM5048 is successfully accessed.
20
2.4.3 Connecting Through Telnet
Using a crossover Ethernet cable, the user can access DSLAM5048 locally through Telnet
as shown in Figure 2-7.
Figure 2-7 Local Access to DSLAM5048 by Telnet
If the user wants to access the equipment remotely, please connect the network interface
to the uplink port directly.
i). Open DOS window in Microsoft Windows as the following path:
START RUN cmd
ii). Enter: >telnet 192.168.1.32
Default username: admin
Default password: admin
21
Note:The default IP address of DSLAM5048 is 192.168.1.32. If it’s the first time to
telnet, only local telnet can be used since there is no default gateway.
Up to then, DSLAM5048 is successfully accessed.
22
Chapter 3 Configuring with Web
3.1 Web login
DSLAM5048 supports various ways of network management, such as
super-terminal, TELNET and WEB. This chapter will importantly introduce how to use the
WEB to login and manage the DSLAM5048.
Step 1: query the IP address of DSLAM5048 through super-terminal, type the
command:
This command lists the manage ip address. The default manage IP address is
192.168.1.32.
Step 2: At your web browser, enter the IP address default as the URL: 192.168.1.32,
a login box is displayed.
You must enter your username and password to access the DSLAM, The default
network login is the same as the login used at the CLI. Type the following:
User Name: admin
Password: admin
Click on “OK”. The main page is displayed:
23
3.2 Web Management
The WEB page of DSLAM5048 is comprised of two parts. Left part for the menu, the menu
provide 4 contents, they are Status, Configuration, System and Batch Configuration. Right
part for operation interface, the page will show corresponding content according to the
catalogue you are click.
Status:
Connections: indicate the current connections of all ports
DSL Show: indicate the current Status of all adsl ports
DSL Performance: indicate the current Performance of all adsl ports
Mac Forwarding: indicate the current Mac of all ports
DSL Subscriber: indicate the current Subscriber information of all ports
Configuration:
VLAN Config: allows you to show, create and delete Vlan.
SNMP Config: allows you to show and set the Snmp.
PVC Config: allows you to show and set the PVC.
MAC Binding: allows you to show and set the MAC binding.
IP Binding: allows you to show and set the IP binding.
IP Gateway: allows you to show and set the Gateway.
IP Multicast: allows you to show and set the igmp
LAN connection: allows you to show and set the lan interface
Authentication: allows you to show and create user
Access Control: allows you to show and set access control
System:
System Info: allows you to show the system information
Save Config: allows you to save the present configuration
24
System Reboot: allows you to reboot the DSLAM
Backup/Restore: allows you to backup/restore the configurations
Firmware Update: allows you to upgrade the firmware.
Batch Config:
DSL Profile: allows you to config dsl profile to ports
DSL Active: allows you to Enable/Disable dsl ports
IP Binding: allows you to config IP Binding to the bridge ports
The following sections describe the features provided in each of the above menu entries.
3.2.1 Status
Click on the left menu “Status” will be marked the following subdirectories.
3.2.1.1 Connections
If Click “Status” choose “connections” will appear the following pages
1: The purpose of the first part is indicated the Local IP address.
25
Click can set up the LAN interface.
You can change the IP Address, Subnet Mask, and mgmtvlanid Then Apply the
setting.
2: The purpose of the second part is indicated the DSL Port Connection Status
DSL: indicate all physical dsl ports: 0-47, which are connected to subscribers, if click 0-47, the
0-47 port parameters can be indicated.
Activate: indicate ports Active status, “Enable” means the port is opened, “disable” means the
port is closed.
Connected: indicate ports connect status. The “ ” is green means the port is connected,
“ ” means the port is not connection.
Profile: indicate ports‟ profile name.
Name: indicate ports‟ subscribers name.
Description: indicate ports‟subscribers description.
If click , the dsl ports rates panel will be showed as
follows, this figure shows upstream and downstream rates of all the dsl ports.
26
if click 0-47, the 0-47 port parameters can be indicated as follows (For example,
click 0):
This page is indicated the current parameters of the adsl port, You can click
to show DSL profile attributes, the figure is as
follows,
27
This page indicate the Port profile setting, you can change the parameters
and then apply to .
3.2.1.2 DSL Show
If Click “Status” choose “DSL Show” will appear the following pages
This page indicates the DSL status of all the dsl ports.
Note: please wait for about 30 seconds to let the page loading.
28
3.2.1.3 DSL Performance
If Click “Status” choose “DSL Performance” will appear the following pages
This page indicate the dsl-0 performance, you can select port number to show
other ports.
3.2.1.4 MAC Forwarding
If Click “Status” choose “Mac Forwarding” will appear the following pages
This page indicate the MAC forwording learn from subscribers and uplink.
3.2.1.5 DSL Subscriber
If Click “Status” choose “DSL Subscriber” will appear the following pages
29
This page indicate all dsl subscribers‟ name and description. You can type name
and
Description then click to change the setting.
3.2.2 Configuration
Click on the left menu “Configuration” will be marked the following
subdirectories.
3.2.2.1 VLAN Config
If Click menu “Configuration” choose “Vlan Config” will appear the following pages.
30
At this Page, you can get all the vlan information and let you to config vlan.
Delete vlan: you can click to delete the vlan.
Note: the defaut-vlan can not be deleted.
Create new Vlan: this link help you to create new vlan.
if you click the figure will be shown as follows:
At this page: you need type the Vlan Name , Vlan Id , select the Egressports ,
UntaggedPorts and FullBridgeStatus. Then you click “create” button to apply as soon
as you finished typing the parameters.
After you create the new VLAN you need to change the PVID of every ports ,click the
PVID setting as below
31
Select the PVC Action into modify pvid then enter the PVC which you want to
modify as below
Click the apply button then the 48 ports‟ PVID will be modify into 317
3.2.2.2 SNMP Config
If Click menu “Configuration” choose “SNMP Config” will appear the following page .
At this Page, you can get all the Snmp information and let you to config Snmp.
Create new Community: this link help you to create new community
32
If you click the figure will be shown as follows:
At this page , you need type the Community and select the Access then click
to apply.
Create new Host: this link help you to create a snmp host
If you click , the figure is show as follows:
At this page, you need type the community and Host IP that you want to set to
manage the DSLAM5048, then click button to apply the setting.
Delete a Community/Host: you can click to delete community and host.
3.2.2.3 PVC Config
Click the configuration-->PVC config as below
33
Select the PVC Action into add and enter the new vpi/vci for example add a new
PVC 8/36 On every ports as below:
Select the PVC Action into modify and modify the vpi/vci for example modify the
PVC into 8/35 as below:
34
3.2.2.4 MAC Binding
If Click menu “Configuration” choose “MAC Binding” will appear the following page .
At this Page, you can get all the acl information and let you to config acl.
Add MAC binding: this link help you to create port acl.
If you click the figure will be shown as follows:
At this Page, you need select port and type Mac Address then click
to binding mac address to port.
Delete Port Acl: you can click to release the MAC binding.
3.2.2.5 IP Binding
If Click menu “Configuration” choose “IP Binding” will appear the following page .
At this Page, you can get all the IP binding to the ports and let you to config IP
binding.
Add IP binding: this link help you to create IP binding.
If you click the figure will be shown as follows:
35
At this Page, you need select port and type IP Address then click to
binding IP address to the port.
Delete IP binding: you can click to release the IP Binding
3.2.2.6 IP Gateway
If Click menu “Configuration” choose “IP Gateway” will appear the following page .
At this Page, you can get the IP gateway , and you can type the gateway then click
to change the setting.
3.2.2.7 IP Multicast
If Click menu “Configuration” choose “IP Multicast” will appear the following page .
At this page you can get the info and parameters of igmap configurations, you can click
36
the button to check MAC address of multicast forwarding:
If you need to modify the parameters, please click the button as below:
3.2.2.8 LAN Connection
If Click menu “Configuration” choose “LAN Connection” will appear the following
page .
At this Page, you can get the IP Address, Subnet Mask, and mgmtvlanid , if you
need change the setting. You can type the new IP Address&Subnet and
37
mgmtvlanid Then click to change the setting.
3.2.2.9 Authentication
If Click menu “Configuration” choose “Authentication” will appear the following page .
At this Page, you can get currently defined users , and config authentication
. Create a new User: this link help you to create a new user.
If you click the figure will be shown as follows:
At this page , you need type Username&Password then click to add a
new user.
You can click to change the password . and click to
delete the user.
3.2.2.10 Access Control
Click the configuration-->access control as below:
38
For example if you want to only allow from 192.168.1.10-192.168.1.20 can config the
DSLAM. You need to enter the IP address as below:
3.2.3 System
Click on the left menu “System” will be marked the following subdirectories.
39
3.2.3.1 System Info
If Click menu “System” choose “System Info” will appear the following page .
At this Page, you can get and config the System information.
3.2.3.2 System Reboot
If Click menu “System” choose “System Reboot” will appear the following page.
At this page, you can click button to restart the system, or you can
select “Reset to factory default settings” and then click “Reboot” button to reboot
system to factory.
3.2.3.3 Save Config
If Click menu “System” choose “Save Config” will appear the following page.
40
At this page, you can click button to save the present config setting.
3.2.3.4 Backup/Restore
click the system-->backup/restore into the interface as below:
Put the file which you want to restore as below and don‟t forget save the
configuration.
3.2.3.5 Firmware Update
If Click menu “System” choose “Firmware Update” will appear the following page.
At this page, you can update the firmware. You can select the new firmware and
then click to update the new firmware.
41
3.2.4 Batch Config
Click left menu “Batch Config” will be marked the following subdirectories.
3.2.4.1 DSL Profile
If click “Batch Config” choose “DSL Profile" the figure will be shown as follows:
At this Page, you can select the ProfileName and select the DSL ports ,then
click to batch config the Profile setting.
If You click the figure will be shown as follows:
42
At this Page, you can change the profile params , then click to
change the profile setting.
3.2.4.2 DSL Active
If click “Batch Config” choose “DSL Active" the figure will be shown as follows:
At this page, you need type the Ports that you want to disable or enable. then
click to batch config.
3.2.4.3 IP Binding
If click “Batch Config” choose “IP Binding" the figure will be shown as follows:
43
At this page, you need type Start port, End port, IP Address,IP step then click
to batch config the IP Bindig.
44
Chapter 4 DSLAM Command Line
DSLAM5048 provides amount of commands through the command line interface, it can
satisfy operating maintenance requirements.
4.1 CLI Specialties
Support local configuration by Console (RS-232) port;
Support login configuration through Telnet locally or remotely;
Support case-insensitive typing for all commands;
Provide a function similar to DosKey to execute history commands;
Provide online help when user entering “?”;
Provide TFTP service to simplify uploading and downloading files
4.2 Command Line help
Command Line interface provides online help assistance for users.
1) If type in „?‟ after the prompt, all commands and related simple descriptions will be
displayed. For example,
$?
2) If type in a command followed by a space and „?‟, then the related keywords and simple
description will be displayed.
For example:
$get ?
3) If just type in a command and a few characters of its keyword, then press<tab> and it
displays all the complete keyword.
$get e
4.3 Command Structures
The normal command structure is shown as the following.
<Action> <object> <sub object> <sub sub object> <parameter name > [<parameter value>]
Where
45
<Action> Action is the first keyword for the command. The following three
actions are highlighted.
Action Description
get Query for a sub-object; if no specific parameter is defined,
then query all parameters.
modify Change the parameters of an object.
create Establish an object and configure its parameters
<object> Object is what CLI operates on. Normally it‟s fixed and can not be
created.
<sub object> Sub object is the sub-set of the object.
<sub sub
object>
Sub Sub Object is the sub set of the sub-object.
<parameter
name>
Parameter Name is the name of sub sub object‟s parameter.
<parameter
value>
Parameter Value is the value of sub sub object‟s parameter.
Other parameters in [] are optional.
Note:1) Some commands have no sub object or parameter name and parameter
values belong to object or sub object.
2) For certain commands, more than one there are not only one sub objects or
sub sub objects.
4.4 Command Line editing
Command line interface provides basic command edit function:
key Attribute
Normal key Provide basic command input, and case insensitive
Backspace Delete one character ahead
→ Move the cursor one character after
← Move the cursor one character ahead
↑
↓
Display history command
Del Delete the character on the cursor
4.5 Error Information
If the command passes the syntax checking, then the command is well executed;
46
otherwise, it causes errors with the error report. The following table lists the most common
error information:
(1) Table 4-1 Common error information
Error report Error causes
Unrecognized command
No command find
No keyword find
Parameter type error
Parameter overflow
Insufficiency arguments supplied No input parameter
Error:specified node not fond by path No target find
Too many arguments supplied Input parameter overflow
47
Chapter 5 Operation & Maintenance
5.1 Login User Management
DSLAM5048 provides two types of users with different authorization, root and user.
root is super-user which has full authorization to manage. user is normal user who
can only query and can not create and modify.
5.1.1 Create User
Syntax create user name <values1> password <value2> <root/user>
Usage <value1> is the name of the new added user.
<values2> is the password of the new user
root/user is the type of user.
Example $create user name system password 123456 root
/* add a root user, named as system with password 123456*/
5.1.2 Delete User
Syntax delete user name <values1>
Usage <value1> is the name of the deleted user.
Example $delete user name system
/* delete a user, named as system */
5.1.3 Get User
Syntax get user
Example
48
5.1.4 Password Reset
Syntax passwd <value1>
Usage The new password should be entered twice.
Example
5.2 Ethernet Management
5.2.1 Modify ethernet interface
Syntax Modify Ethernet intf ifname eth-0 <parameter1> <value1> <parameter2>
<value2> ……
Usage eth-0 is the name of the ethernet port;
<parameterN> <valueN> are pair of the settings shown in the following
Enable/disable Open/close the uplink port
Ip IP address
Mask Mask of subnet
Speed Port rate can be set as 10bt(10Mbps), 100bt(100Mbps),
1000bt(1Gbps) and auto(auto-negotiated).
duplex Operating mode can be ser as auto, half, and full.
mgmtvlanid Manage VLAN ID
Example $modify Ethernet intf ifname eth-0 ip 192.168.1.33 mask 255.255.255.0
/* set the uplink port, IP address 192.168.1.33, subnet mask 255.255.255.0*/
Note: Default the Ethernet ports eth-0 and eth-1 are Stacking mode .
5.2.2 Modify aggr interface
Syntax modify aggr intf ifName aggr-0 <parameter1> <value1> <parameter2>
<value2> ……
Usage eth-0 & eth-1 are Aggregated in default, aggr-0 is the name of the default
aggregator interface;
<parameterN> <valueN> are pair of the settings shown in the following
49
Enable/disable Open/close the uplink port
Ip IP address
Mask Mask of subnet
Speed Port rate can be set as 10bt(10Mbps), 100bt(100Mbps),
1000bt(1Gbps) and auto(auto-negotiated).
usedhcp Whether obtain an ip address for this interface from a
DHCP server, can be set as false and true.
mgmtvlanid Manage VLAN ID
Example $modify aggr intf ifName aggr-0 ip 192.168.1.33 mask 255.255.255.0
/* set the aggr-0 port, IP address 192.168.1.33, subnet mask 255.255.255.0*/
5.2.3 Get aggr interface
Syntax get aggr intf [ifname]
Usage [ifname] is optional input.
Exampl
e
5.2.4 Delete aggr interface
Syntax delete aggr intf ifname <ifname>
Usage <ifname> is the aggr port name.
Example Delete aggr intf ifname aggr-0
50
5.3 Set SNMP
SNMP management is available in DSLAM5048. The user should create SNMP host
before using SNMP method.
5.3.1 Create snmp community
Syntax Create snmp comm community <value1> <ro/rw>
Usage <value1> is the name of the new community;
<ro/rw> refers as read-only or read/write.
Example $ Create snmp comm community public ro
/*create a community named as public*/
5.3.2 Get snmp community
Syntax get snmp comm [community <value1>]
Usage <value1> is the name of the new community;
<ro/rw> refers as read-only or read/write.
[community <value1>] is optional parameter. If it‟s omitted, all snmp
community will be displayed.
Example
5.3.3 Delete snmp community
Syntax delete snmp comm [community <value1>]
Usage <value1> is the name of the deleted community;
Example Delete snmp comm community public
5.3.4 Create snmp host
Syntax create snmp host ip <value1> community <value2>
51
Usage <value1> is IP address of snmp host;
<value2> is community of snmp host;
Example create snmp host ip 192.168.1.222 community public
/* create a snmp host with IP address 192.168.1.222 and community public*/
Note:1) Make sure community successfully created before create snmp host,
otherwise creating snmp host will be failed.
2) Not more than 4 snmp hosts can be created.
5.3.5 Get snmp host
Syntax get snmp host [ip <value1> community <value2>]
Usage <value1> is IP address of snmp host;
<value2> is community of snmp host;
[ip <value1> community <value2>] is optional item. If no input for this item,
all snmp hosts will be displayed.
Example
5.3.6 Delete snmp host
Syntax delete snmp host ip <value1> community <value2>
Usage <value1> is IP address of snmp host;
<value2> is community of snmp host;
Example $Delete snmp host ip 192.168.1.222 community public
52
5.4 Operation Management
5.4.1 Configuration saving
Syntax commit
5.4.2 Software reboot
Syntax Reboot [config <option>]
Usage [config <option>] is optional. If no setting for this parameter, the machine will
reboot directly then.
option description
default Restore to the default values before rebooting
backup Backup the configuration before rebooting
last Restore to the latest backup configuration before rebooting
clean Clean the current configuration before rebooting
minimum Operate in the minimum configuration after rebooting
safe Operate in the safe mode after rebooting. In this mode, the
default user and password is root, root.
Example $ reboot config default
5.4.3 Verbose display
Syntax Verbose [on/off]
Usage [on/off] is the setting of displaying on or off.
Example If the verbose displaying is set on, when the user change the setting of eth-0
port, then detailed information will be shown.
53
If the verbose displaying is set off, then detailed information will be omiited.
54
Chapter 6 Port Configuration
DSLAM5048 provides 48 ADSL physical ports defined as dsl-0~dsl-47 in the system, before
modify the ADSL port parameters, the user should close the port firstly , then open port After
finishing modification.
6.1 ADSL Basic Commands
6.1.1 Adsl line interface Commands
6.1.1.1 Modify adsl line interface
Syntax Modify adsl line intf ifname <value1> parameterN <valueN>
Usage <value1> is the name of ADSL port, whose profile is to be modified or viewed.
ifname<values1> is optional. Without this parameter, the interface of all
adsl ports will be displayed.
parameterN <valueN>
Enable/disable Open/close adsl line port. No
value.
lineTransAtucConfig ADSL standard
linepmcconfpmsf State force
Example $modify adsl line intf ifname dsl-0 disable
/*close adsl line dsl-0*/
6.1.1.2 Get adsl line interface
Syntax get adsl line intf [ifname <value1>]
Usage <value1> is the name of ADSL port, whose intf is to be modified or viewed.
[ifname <value1>] is the name of ADSL port, whose intf is to be modified or
viewed.
55
Example
6.1.1.3 Modify adsl line profile
Syntax Modify adsl line profile ifname <value1> parameterN <valueN>
Usage <value1> is the name of ADSL port, whose profile is to be modified or viewed.
parameter <valueN>
atucrateadaptation
Defines what form of transmit rate adaptation is configured on this modem.
fixed stands for the fixing rate;
adaptAtStartup stands for adapted rate when starting up
adaptAtRuntime stands for automatically negotiation rate after line is
activated
atuctargetsnr
Configured target signal/noise margin in the downstream. This is the noise
margin the modem must achieve with a BER of 10 to the power -7, or
better, to successfully complete initialization.
atucmaxsnrmargin
Configured Maximum acceptable Signal/Noise Margin in the downstream.
If the Noise Margin is above this, the modem should attempt to reduce its
power output to optimize its operation.
atucminsnrmgn
Configured Minimum Signal/Noise Margin in the downstream. This is the
Noise Margin, the modem must achieve with a BER of 10 to the power -7 or
better, to successfully complete initialization. The default value mentioned is
an indicative value only.
aturminsnrmgn
Configured Minimum Signal/Noise Margin. This is the Noise Margin, the
modem must achieve with a BER of 10 to the power -7 or better, to
56
successfully complete initialization. The default value mentioned is an
indicative value only.
aturmaxsnrmgn
Configured Maximum acceptable downstream Signal/Noise Margin. If the
Noise Margin is above this the modem attempts to reduce its power output
to optimize its operation. The value set by the user is in dB/10, and ranges
from 0 to 31 dB in 1 dB steps.
aturtargetsnrmargin
Noise Margin the modem must achieve with a BER of 10 to the power -7 or
better to successfully complete initialization.
atucfastmintxrate
Configured Minimum Transmit rate for 'Fast' channels, in the downstream.
Also refer to 'adslAtucConfRateChanRatio' for information regarding RADSL
mode and refer to ATU-R transmit rate for ATU-C receive rates.
atucintlmintxrate
Configured Minimum Transmit rate for 'Interleave' channels, in the
downstream. Also refer to 'adslAtucConfRateChanRatio' for information
regarding RADSL mode and refer to ATU-R transmit rate for ATU-C receive
rates.
atucfastmaxtxrate
Configured Maximum Transmit rate for 'Fast' channels, in the downstream.
Also refer to 'adslAtucConfRateChanRatio' for information regarding RADSL
mode and ATU-R transmit rate for ATU-C receive rates.
atucintlmaxtxrate
Configured Maximum Transmit rate for 'Interleave' channels, in the
downstream. Also refer to 'adslAtucConfRateChanRatio' for information
regarding RADSL mode and ATU-R transmit rate for ATU-C receive rates.
atucmaxintldelay <valid values: 0 - 255>
Configured maximum Interleave Delay for this channel in the downstream.
Interleave delay applies only to the interleave channel and defines the
mapping (relative spacing) between subsequent input bytes at the
interleaver input and their placement in the bit stream at the interleaver
output. Larger numbers provide greater separation between consecutive
input bytes in the output bit stream, allowing for improved impulse noise
immunity at the expense of payload latency.
atucgsbitswap
This parameter enables/disables bit swapping
aturfastmintxrate
Configured Minimum Transmit rate for 'Fast' channels, in the upstream. Also
refer to 'adslAturConfRateChanRatio' for information regarding RADSL
mode and ATU-C transmit rate for ATU-R receive rates.
aturintlmintxrate
Configured Minimum Transmit rate for 'Interleave' channels, in bps. Also
refer to 'adslAturConfRateChanRatio' for information regarding RADSL
57
mode and to ATU-C transmit rate for ATUR receive rates.
aturfastmaxtxrate
Configured Maximum Transmit rate for 'Fast' channels, in bps. Also refer to
'adslAturConfRateChanRatio' for information regarding RADSL mode and to
ATU-C transmit rate for ATUR receive rates.
aturintlmaxtxrate
Configured Maximum Transmit rate for 'Interleave' channels, in bps. Also
refer to 'adslAturConfRateChanRatio' for information regarding RADSL
mode and to ATU-C transmit rate for ATU-R receive rates.
aturmaxintldelay
Configured maximum Interleave Delay for this channel. Interleave delay
applies only to the interleave channel and defines the mapping (relative
spacing) between subsequent input bytes at the interleaver input and their
placement in the bit stream at the interleaver output. Larger numbers
provide greater separation between consecutive input bytes in the output
bit stream, allowing for improved impulse noise immunity at the expense of
payload latency.
aturratemode
Defines what form of transmit rate adaptation is configured on this modem.
The default value mentioned is an indicative value only.
Example $modify adsl line profile ifname dsl-0 aturmaxintldelay 16
/*set the maximum delay of close adsl line dsl-0*/
6.1.1.4 Get adsl line profile
1) Get adsl line profile for upstream/downstream one time
Syntax get adsl line profile [ifname <value1>]
Usage <value1> is the name of ADSL port, whose profile is to be modified or viewed.
[ifname <value1>] is optional. Without this parameter, the line interfaces of all
adsl ports will be displayed.
58
Exampl
e
59
2) Get adsl line profile for upstream or downstream
Syntax get adsl line profile showview <atuc|atur|all> [ifname <value1>]
Usage <atuc|atur|all> choose the up/downstream. Atuc stands for downstream; atur
stands for upstream; all stands for both upstream and downstream.
<value1> is the name of ADSL port, whose profile is to be modified or viewed.
[ifname <value1>] is optional. Without this parameter, the line interfaces of all
adsl ports will be displayed.
60
Exampl
e
6.1.2 ADSL Alarm commands
6.1.2.1 Modify adsl alarm profile
Syntax Modify adsl alarm profile ifname <value1> parameterN <valueN>
Usage <value1> is the name of ADSL port, whose profile is to be modified.
parameterN <valueN> should be one or more than one parameters of ADSL
alarm profile.
parameter <valueN>
atucthresh15minlofs <valid value: 0-900>
For the downstream, the number of Loss of Frame Seconds encountered by
an ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAtucperflofsthreshtrap‟.
atucthresh15minloss <valid value: 0-900>
For the downstream, the number of Loss of Signal Seconds encountered by
an ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAtucPerfLossThreshTrap‟.
61
atucthresh15minlols <valid value:0-900>
For the downstream, the number of Loss of Link Seconds encountered by
an ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAtucperflolsthreshtrap‟.
atucthresh15minlprs <valid value:0-900>
For the downstream, the number of Loss of Power Seconds encountered by
an ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAtucperflprsthreshtrap‟.
atucthresh15miness <valid value:0-900>
For the downstream, the number of Error Seconds encountered by an ADSL
interface within any given 15 minutes performance data collection period,
which causes the snmp agent to send an „adslAtucperfEssthreshtrap‟.
atucthreshfastrateup
Applies only to „Fast channel‟ in the downstream.
Configured change in rate causing an „adslAtucRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟>=‟ChanPrevTxRate‟+ „atucthreshfastrateup‟
atucthreshintlrateup
Applies only to „Interleave channel‟ in the downstream.
Configured change in rate causing an „adslAtucRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟>=‟ChanPrevTxRate‟+ „atucthreshintlrateup‟
atucthreshfastratedn
Applies only to „Fast channel‟ in the downstream.
Configured change in rate causing an „adslAtucRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟<=‟ChanPrevTxRate‟-„atucthreshfastratedn‟
atucthreshintlratedn
Applies only to „Interleave channel‟ in the downstream.
Configured change in rate causing an „adslAtucRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟<=‟ChanPrevTxRate‟-„atucthreshintlratedn‟
atucinitfailtrap <valid value: False, True>
Enables/disables the initfailure trap. The default value is „disable‟.
Atucoptrapenable <valid value: False, True>
Enables/disables the OpStatechange trap.
aturthresh15minlofs <valid value:0-900>
For the upstream, the number of Loss of Frame Seconds encountered by an
ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAturperflofsthreshtrap‟.
aturthresh15minloss <valid value:0-900>
62
For the upstream, the number of Loss of Signal Seconds encountered by an
ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAturPerfLossThreshTrap‟.
aturthresh15minlprs <valid value:0-900>
For the upstream, the number of Loss of Power Seconds encountered by an
ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAturperflprsthreshtrap‟.
aturthresh15miness <valid value:0-900>
For the upstream, the number of Error Seconds encountered by an ADSL
interface within any given 15 minutes performance data collection period,
which causes the snmp agent to send an „adslAturperfEssthreshtrap‟.
aturthreshfastrateup
Applies only to „Fast channel‟ in the upstream.
Configured change in rate causing an „adslAturRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟>‟ChanPrevTxRate‟+ „atucthreshfastrateup‟
aturthreshintlrateup
Applies only to „Interleave channel‟ in the upstream.
Configured change in rate causing an „adslAturRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟>‟ChanPrevTxRate‟+ „aturthreshintlrateup‟
aturthreshfastratedn
Applies only to „Fast channel‟ in the upstream.
Configured change in rate causing an „adslAturRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟<‟ChanPrevTxRate‟-„aturthreshfastratedn‟
aturthreshintlratedn
Applies only to „Interleave channel‟ in the upstream.
Configured change in rate causing an „adslAturRateChangeTrap‟.
A trap is produced when:
„ChanCurrTxRate‟<‟ChanPrevTxRate‟-„aturthreshintlratedn‟
atucgspmstatetrapenable <valid value: False, True>
It indicates change in power management state.
linealarmgscntrsreset <valid value: False, True>
This parameter resets performance counters at runtime.
Example $modify adsl line intf ifname dsl-0 disable
/*close adsl port dsl-0*/
$ modify adsl alarm profile ifname dsl-0 atucthresh15minlofs 50
/*set the number of LOF in the downstream within any given 15 minutes to 50.
*/
63
$modify adsl line intf ifname dsl-0 enable
/*open adsl port dsl-0*/
6.1.2.2 Get adsl alarm profile
Syntax get adsl alarm profile [ifname <value1>]
Usage <value1> is the name of ADSL port, whose profile is to be viewed.
[ifname<values1>] is optional. Without this parameter, the alarm profile of all adsl
ports will be displayed.
Example
6.1.2.3 Modify adsl alarm profilext
Syntax Modify adsl alarm profilext ifname <value1> parameterN <valueN>
Usage <value1> is the name of ADSL port, whose profile is to be modified.
parameterN <valueN> should be one or more than one parameters of ADSL
alarm profile.
parameter <valueN>
atucthresh15minffstr <valid value: 0-900>
For the downstream, the number of failed retains encountered by an ADSL
interface within any given 15 minutes performance data collection period,
which causes the snmp agent to send an „adslAtucFailedFastRTrap‟.
atucthresh15minsesl <valid value: 0-900>
For the downstream, the number of severe errored seconds encountered by
an ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an „adslAtucSesLTrap‟.
64
atucthresh15minuasl <valid value: 0-900>
For the downstream, the number of unavailable errored seconds
encountered by an ADSL interface within any given 15 minutes performance
data collection period, which causes the snmp agent to send an
„adslAtucUasThreshTrap‟.
atucthresh15minfecsl <valid value: 0-900>
For the downstream, the number of forward error correction seconds
encountered by an ADSL interface within any given 15 minutes performance
data collection period, which causes the snmp agent to send an
„adslAtucPerfFecsLThreshTrap‟.
atucthresh1daylofs <valid value: 0-86400>
For the downstream, the number of Loss of frame seconds encountered by
an ADSL interface within any given 1 days performance data collection
period, which causes the snmp agent to send an
„adslAtucPerfLofsThresh1dayTrap‟.
atucthresh1dayloss <valid value: 0-86400>
For the downstream, the number of Loss of link seconds encountered by an
ADSL interface within any given 1 days performance data collection period,
which causes the snmp agent to send an
„adslAtucPerfLossThresh1dayTrap‟.
atucthresh1daylols <valid value: 0-86400>
For the downstream, the number of Loss of link seconds encountered by an
ADSL interface within any given 1 days performance data collection period,
which causes the snmp agent to send an
„adslAtucPerfLolsThresh1dayTrap‟.
atucthresh1daylprs <valid value: 0-86400>
For the downstream, the number of Loss of power seconds encountered by
an ADSL interface within any given 1 days performance data collection
period, which causes the snmp agent to send an
„adslAtucPerfLprsThresh1dayTrap‟.
atucthresh1dayess <valid value: 0-86400>
For the downstream, the number of errored seconds encountered by an
ADSL interface within any given 1 days performance data collection period,
which causes the snmp agent to send an
„adslAtucPerfEssThresh1dayTrap‟.
atucthresh1daysesl <valid value: 0-86400>
For the downstream, the number of severe errored seconds encountered
by an ADSL interface within any given 1 days performance data collection
period, which causes the snmp agent to send an
„adslAtucPerfSesLThresh1dayTrap‟.
atucthresh1dayuasL<valid value: 0-86400>
For the downstream, the number of unavailable errored seconds
encountered by an ADSL interface within any given 1 days performance
data collection period, which causes the snmp agent to send an
65
„adslAtucPerfUasLThresh1dayTrap‟.
atucthresh1dayfecsl <valid value: 0-86400>
For the downstream, the number of forward error seconds encountered by
an ADSL interface within any given 1 days performance data collection
period, which causes the snmp agent to send an
„atucPerfFecsLThresh1dayTrap‟.
aturthresh15minsesl <valid value: 0-900>
For the upstream, the number of severe errored seconds encountered by
an ADSL interface within any given 15 minutes performance data collection
period, which causes the snmp agent to send an
„adslAturPerfSesLThresh15MinTrap‟.
aturthresh15minuasl <valid value: 0-900>
For the upstream, the number of unavailable errored seconds encountered
by an ADSL interface within any given 15 minutes performance data
collection period, which causes the snmp agent to send an
„adslAturPerfUasLThreshTrap‟.
aturthresh15minfecsl <valid value: 0-900>
For the upstream, the number of forward error correction seconds
encountered by an ADSL interface within any given 15 minutes
performance data collection period, which causes the snmp agent to send
an
„adslAturPerfFecsLThreshTrap‟.
aturthresh1daylofs <valid value: 0-86400>
For the upstream, the number of Loss of Frame seconds encountered by
an ADSL interface within any given 1 day performance data collection
period, which causes the snmp agent to send an
„adslAturPerfLofsThresh1dayTrap‟.
aturthresh1dayloss <valid value: 0-86400>
For the upstream, the number of Loss of signal seconds encountered by an
ADSL interface within any given 1 day performance data collection period,
which causes the snmp agent to send an
„adslAturPerfLossThresh1dayTrap‟.
aturthresh1daylprs <valid value: 0-86400>
For the upstream, the number of power seconds encountered by an ADSL
interface within any given 1 day performance data collection period, which
causes the snmp agent to send an
„adslAturPerfLprsThresh1dayTrap‟.
aturthresh1dayess <valid value: 0-86400>
For the upstream, the number of errored seconds encountered by an ADSL
interface within any given 1 day performance data collection period, which
causes the snmp agent to send an
„adslAturPerfEssThresh1dayTrap‟.
aturthresh1daysesl <valid value: 0-86400>
For the upstream, the number of severe errored seconds encountered by
66
an ADSL interface within any given 1 day performance data collection
period, which causes the snmp agent to send an
„adslAturPerfSesLThresh1dayTrap‟.
aturthresh1dayuasl <valid value: 0-86400>
For the upstream, the number of unavailable errored seconds encountered
by an ADSL interface within any given 1 day performance data collection
period, which causes the snmp agent to send an
„adslAturPerfUasLThresh1dayTrap‟.
aturthresh1dayfecsl <valid value: 0-86400>
For the upstream, the number of forward error correction seconds
encountered by an ADSL interface within any given 1 day performance data
collection period, which causes the snmp agent to send an
„adslAturPerfFecsLThresh1dayTrap‟.
Example $modify adsl line intf ifname dsl-0 disable
/*Close adsl port dsl-0*/
$modify adsl alarm profilext ifname dsl-0 aturthresh1daysesl 50
/*modify aturthresh1daysesl value of adsl port dsl-0 to 50*/
$modify adsl line intf ifname dsl-0 enable
6.1.2.4 Get adsl alarm profilext
Syntax get adsl alarm profilext [ifname <value1>]
Usage <value1> is the name of ADSL port, whose profile is to be viewed.
[ifname<values1>] is optional. Without this parameter, the alarm profile of all
adsl ports will be displayed.
67
Example
6.2 ATM commands
6.2.1 ATM port commands
6.2.1.1 Get ATM port
Syntax get atm port [ifname <value1>]
Usage <value1> is the name of ATM port, which is to be modified or viewed.
[ifname <value1>] is optional. Without this parameter, all ATM ports will be
displayed.
68
Example
6.2.1.2 Modify ATM port
Syntax modify atm port ifname <value1> <parameter> <value>
Usage <value1> is the name of ATM port, which is to be modified or viewed.
[ifname <value1>] is optional. Without this parameter, all ATM ports will be
displayed.
Example $modify atm port ifname atm-0 disable
Note:If the user wants to modify ATM parameters, please set the admin status of ATM
port to down firstly. After finishing modification, set the admin status of ATM port back to
up.
6.2.2 AAL5 VC Statistics Commands
6.2.2.1 Create AAL5 interface
Syntax Create atm vc intf ifname <value1> lowif <value2> vpi < value3> vci <
value4> [parameter <value> ……parameterN <valueN>]
Usage <value1> is the name of aal5 interface, which is to be created and must be
started with aal5.
<value2> is the name of aal5 interface, which is to be created and must be
started with aal5.
VPI/VCI is PVC tag. One PVC tag only creates for one aal5 interface.
Example $create atm vc intf ifname all5-25 lowif dsl-0 vpi 0 vci 32
/*creat an aal5 port in adsl port dsl-0, named as aal5-25, VPI/VCI=0/32*/
69
6.2.2.2 Modify AAL5 interface
Syntax modify atm vc intf ifname <value> parameter1 <value1> [<vpi> <vci>
parameter2 <value2> ……parameterN <valueN>]
Usage <value> is the name of aal5 interface, which is to be modified or viewed.
Example $modify atm vc intf ifname aal5-0 vpi 0 vci 81
/*modify aal5-0 port VPI=0,VCI=81* /
6.2.2.3 Delete AAL5 interface
Syntax delete atm vc intf ifname <value>
Usage <value> is the name of aal5 interface, which is to be deleted.
Example $delete atm vc intf ifname aal5-0
/*delete aal5-0* /
6.2.2.4 Get aal5 interface
Syntax get atm port intf [ifname <value1>]
Usage <value1> is the name of aal5 interface, which is to be viewed.
Example
70
6.2.3 EOA Commands
6.2.3.1 Create EOA interface
Syntax create eoa intf ifname <value1> lowif <value2> [parameter <value>……]
Usage <value1> is the name of EOA interface, which is to be created and must be
started with eoa-.
<value2> is the name of lower EOA interface.
Example $create eoa intf ifname eoa-25 lowif aal5-25
6.2.3.2 Modify EOA interface
Syntax Modify eoa intf ifname <value1> [parameter <value>……]
Usage <value1> is the name of EOA interface, which is to be modified.
Example $ modify eoa intf ifname eoa-25 disable
6.2.3.3 Delete EOA interface
Syntax delete eoa intf ifname <value1>
Usage <value1> is the name of EOA interface, which is to be deleted.
Example $ delete eoa intf ifname eoa-25
6.2.3.4 Get EOA interface
Syntax get eoa intf [ifname <value1>]
Usage <value1> is the name of EOA interface, which is to be viewed.
Example
71
6.3 Bridging Commands
6.3.1 Bridge Interface Commands
6.3.1.1 create bridge port interface
Syntax create bridge port intf ifname <value1> portid <value2> [parameter
<value>……]
Usage <value1> is the name of eoa interface
<value2> is the portid number
Example $create bridge port intf ifname eoa-48 portid 49
/*create bridge port 49 * /
6.3.1.2 modify bridge port interface
Syntax modify bridge port intf portid <value1> [parameter <value>……]
Usage <value1> is the name of bridge interface, which is to be modified or viewed.
Example $modify bridge port intf portid 25 status disable
/*disable bridge interface 25* /
6.3.1.3 delete bridge port interface
Syntax delete bridge port intf portid <value1>
Usage <value1> is the name of bridge interface, which is to be deleted.
Example $delete bridge port intf portid 25
/*delete bridge interface 25* /
6.3.1.4 get bridge port interface
Syntax get bridge port intf [portid <value1>]
Usage <value1> is the name of bridge interface, which is to be viewed.
72
Example
6.3.2 Bridge Forwarding Commands
6.3.2.1 get bridge port forwarding
Syntax get bridge port forwarding [vlanid <value1> macaddr <value2>]
Usage <value1> is VLAN ID;
<value2> is VLAN‟s MAC address, which format is xx:xx:xx:xx:xx:xx.
Example
6.3.2.2 delete bridge port forwarding
Syntax delete bridge port forwarding [vlanid <value1> macaddr <value2>]
Usage <value1> is VLAN ID;
<value2> is VLAN‟s MAC address, which format is xx:xx:xx:xx:xx:xx.
Example
6.3.3 Bridge static ucast Commands
6.3.3.1 Create bridge static ucast
Syntax create bridge static ucast vlanid <value1> ucastaddr <value2> portid
<value3>
Usage <value1> is VLAN ID;
73
<value2> is VLAN‟s MAC address, which format is xx:xx:xx:xx:xx:xx;
<value3> is the name of bridged interface.
Example $ create bridge static ucast vlanid 1 ucastddr 00:11:22:33:44:55 portid 2
/*create the static MAC address forwarding table for MAC=00:11:22:33:44:55
on port 2 */
6.3.3.2 Delete bridge static ucast
Syntax delete bridge static ucast [vlanid <value1>] ucastaddr <value2>
Usage <value1> is VLAN ID;
<value2> is VLAN‟s MAC address, which format is xx:xx:xx:xx:xx:xx.
Example $ delete bridge static ucast vlanid 1 ucastaddr 00:11:22:33:44:55
/*delete the static MAC address forwarding table for MAC=00:11:22:33:44:55
*/
6.3.3.3 Get bridge static ucast
Syntax get bridge static ucast [vlanid <value1>] macaddr <value2>
Usage <value1> is VLAN ID;
<value2> is VLAN‟s MAC address, which format is xx:xx:xx:xx:xx:xx.
Example
6.4 VLAN Commands
6.4.1 GVRP Port Info Commands
6.4.1.1 Modify gvrp port info
Syntax Modify gvrp port info portid <value1> [parameterN <valueN>]
Usage <value1> is the name of Bridge interface.
parameterN <valueN>
74
Portvlanid The VLAN Identifier.
Psvlanid Port service Vlan Index, the Service VLAN ID
assigned to frames received on this port. This is
applicable only to Non-Provider ports. The
value zero here means that this field is not
applicable. Psvlanid and ctosprofileid both can
be non-zero. But they both can not be zero. In
case of bridge port on PPPoE and IPoE
interfaces psvlanid value must be non-zero,
ctosprofileid is ignored for such a port. For
other bridge ports† psvlanid value can be zero.
If both psvlanid and ctosprofileid have non-zero
value for such ports, the ctosprofileid shall be
applied and psvlanid shall be ignored.
acceptframetypes When this is Tagged, the device will discard
untagged frames or Priority-Tagged frames
received on this port. When All, untagged
frames or Priority- Tagged frames received on
this port will be accepted and assigned to the
PVID for this port.
ctosprofileid This specifies the CtoS profileId for the Vlan
Map profile associated† with this interface.
Value zero for this means no CtoS profile
associated with this port. psvlanid and
ctosprofileid both can be non-zero. But they
both can not be zero. In case of bridge port on
PPPoE and IPoE interfaces psvlanid value
must be non-zero, ctosprofileid is ignored for
such a port. For other bridge ports psvlanid
value can be zero. If both psvlanid and
ctosprofileid have non-zero value for such
ports, the ctosprofileid shall be applied and
psvlanid shall be ignored.
Ppstatus This specifies if the port is a provider port or a
Non-Provider port as per Vlan stacking model.
This field is applicable only in Vlan stacking
scenario. The modification of this parameter is
allowed only when the bridge port is disabled.
Normally, for the user side, it‟s set as disable as
Non-Provider; for network side, it‟s set as
enable as Provider.
Example $modify gvrp port info portid 2 psvlanid 2
Note:The data packet forwarding by Non-provider port will strip the SVLAN tag, and
75
keep CVLAN tag; these forwarding by provider port will keep SVLAN tag.
6.4.1.2 Get gvrp port info
Syntax get gvrp port info [portid <value1>]
Usage <value1> is the name of Bridge interface.
Exampl
e
6.4.2 VLAN static commands
6.4.2.1 Create vlan static vland
Syntax Create vlan static vlanid <value1> vlanname <value2> [parameterN
<valueN>]
Usage <value1> is VLAN ID, ranged from 1 to 4094;
<value2> is the name of VLAN descried as a string without space.
parameterN <valueN>
egressports The set of ports, which are permanently
assigned to the egress list for this VLAN, by
management.
acceptframetypes When this is Tagged, the device will discard
untagged frames or Priority-Tagged frames
received on this port. When All, untagged
frames or Priority- Tagged frames received on
this port will be accepted and assigned to the
PVID for this port.
untagged ports The set of ports, which should transmit egress
packets for this VLAN, as untagged. This
tagged untagged transmission criterion is with
76
respect to CVlan tag only. VLAN here means
the 802.1q Vlan in case of Native Vlan mode
and Virtual Vlan in case of Stacked Vlan Mode.
bridgemode This specifies the state of full bridging for the
VLAN. There can be three values associated
with this, based on global fullBridgingStatus.
These values can be restricted bridging,
unrestricted full bridging, residential bridging
and crossconnect bridging.
If the user does not specify the bridging mode
at the time of VLAN creation, the VLAN inherits
the globally set bridging mode. The user can
modify bridging mode for a created VLAN.
The default residential VLAN, like any other
residential VLAN allows only one net side
bridge port as its member. This port shall be
added automatically to the default VLAN if it is
the only net side bridge port being added to the
VLAN. Subsequently, the user can add another
net side port to the egressportslist and
untaggedportslist only after removing the
previously added net side bridge port.
Unrestricted bridging is not applicable for
bridge ports created over the PPPoE interface
even though the VLAN may be unrestricted.
For a Vlan with bridging mode as
CrossConnect there is no learning and lookup
and there can be at most two member ports for
it. In band Management traffic not supported for
a vlan in crossconnect mode. VLAN here
means the 802.1q vlan in case of Native Vlan
mode and Virtual Vlan in case of Stacked Vlan
Mode.
Example $ create vlan static vlanid 2 vlanname vlan2 egressports 1 2 3 4 5
untaggedports 1 2 3 4
/*create static VLAN named as vlan2 with VLAN ID 2, and add bridge ports
1,2,3,4,5 to this VLAM, and mark bridge ports 1,2,3,4 as untagged port.*/
6.4.2.2 Get vlan static vland
Syntax get vlan static [vlanid <value1>] [vlanname <value2>]
77
Usage
Example
6.4.2.3 Delete vlan static
Syntax delete vlan static vlanid <value1> vlanname <value2>
Usage <value1> is VLAN ID, ranged from 1 to 4094;
<value2> is the name of VLAN descried as a string without space.
Example $delete vlan static vlanid 2 vlanname vlan2
6.4.2.4 Modify vlan static
Syntax Modify vlan static vlanid <value1>|| vlanname <value2> [paramterN
<valueN>
Usage <value1> is VLAN ID, ranged from 1 to 4094;
<value2> is the name of VLAN descried as a string without space.
parameterN <valueN>
igmpsnoopaction This parameter specifies that if an action is
"Learn" then igmpsnoop will be supported for
this Vlan and an entry will be learnt. Here
78
action will be applied in conjunction with
global igmpsnoopStatus and port level
igmpsnoopStatus flags, that is IGMP
functionality will be executed for a frame if
IGMP is enabled globally and on the port it
has been received and for the vlan/virtual
vlan on which it has come.If action is "drop"
then igmpsnoop functionality is not supported
for this vlan and IGMP frames shall be
dropped. If action is "transparently forward",
then IGMP frames received for this Vlan shall
be forwarded transparently and learning will
not be done
igmpsnoopproxyreporting This parameter provides a configuration
option to choose between transparent
snooping or Proxy reporting behavior per
Vlan. Depending on the type of mode, IGMP
module will perform either transparent
snooping or proxy reporting for the IGMP
messages, received on a Vlan. Here the Vlan
which is being referred is the one on which
learning will happen. It will be multicast vlan,
if "Multicast Vlan option" is enabled.
igmpsnoopingressprio This parameter specifies the ingress priority
to be forced on the incoming frame. If the
ingress priority field has valid value, then that
value will be used for traffic class
determination and packet priority. If valid
egress priority is configured for a port, then
egress priority shall override the ingress
priority. In addition, there is support of invalid
value for ingress priority to indicate that the
priority is not to be forced on ingress frame
for this port. Here the Vlan which is being
referred is the one on which learning shall
happen. It will be multicast vlan, if "Multicast
Vlan option" is enabled.
Bridging Mode This specifies the state of full bridging for the
VLAN. There can be three values associated
with this, based on global fullBridgingStatus.
These values can be restricted bridging,
unrestricted full bridging and residential
bridging. If the user does not specify the
bridging mode at the time of VLAN creation,
79
the VLAN inherits the globally set bridging
mode. The user can modify bridging mode for
a created VLAN. If the dynamic entry for the
VLAN to be created already exists, the user
can only specify globally set bridging mode
for this VLAN.
The default residential VLAN, like any other
residential VLAN allows only one net side
bridge port as its member. This port shall be
added automatically to the default VLAN if it
is the only net side bridge port being added to
the VLAN. Subsequently, the user can add
another net side port to the egressportslist
and untaggedportslist only after removing the
previously added net side bridge port.
Unrestricted bridging is not applicable for
bridge ports created over the PPPoE
interface even though the VLAN may be
unrestricted.
Example $modify vlan static vlanid 2 bridgemode CrossConnect
$modify vlan static vlanid 1 igmpsnoopaction Drop
6.4.3 VALN svlan Commands
6.4.3.1 Create vlan svlan
Syntax Create vlan svlan svlanid <value1> [parameterN <valueN]
Usage <value1> is SVLAN ID.
parameterN <valueN>
Svlantype Type of Service Vlan based on the kind of
service carried over it. Residential S-VLAN
shall carry traffic for residential customers who
typically subscribe to some ISP. Business
S-VLAN shall carry traffic for customers who
have requirements similar to a leased line that
connects two or more sites through an SVLAN.
cvlanpreservemode This defines the C-Vlan tag handling for this
S-VLAN.
80
Preserve means the C-Vlan tag is subjected to
transformations only as per dot1Q behavior
(based on V-Vlan untagged configuration)but
shall not be overridden by PVID if the received
frame is C Vlan tagged. Here Port VlanID of
ingress ports shall be used for frames received
untagged.
NonPreserve means that C-VLAN tag is
determined by Columbia whether or not the
frame was received tagged based on PVID of
ingressport.
Example $ create vlan svlan svlanid 2
6.4.3.2 Get vlan svlan
Syntax get vlan svlan [svlanid <value1>]
Usage
Example
6.4.3.3 Modify vlan svlan
Syntax Modify vlan svlan svlanid <value1> [parameterN <valueN]
Usage <value1> is SVLAN ID.
Example $modify vlan svlan svlanid 2 cvlanpreservemode NonPreserve
6.4.3.4 Delete vlan svlan
Syntax delete vlan svlan svlanid <value1>
Usage <value1> is SVLAN ID.
Example $ delete vlan svlan svlanid 2
81
6.4.4 VLAN mapprofile info Commands
6.4.4.1 Create vlan mapprofile info
Syntax create vlan mapprofile info profileid <value1> profiletype CTos
Usage <value1> is Ctosprofile ID.
Example $ create vlan mapprofile info profileid 1 profiletype CTos
6.4.4.2 Get vlan mapprofile info
Syntax Get vlan mapprofile info [profileid <value1>]
Usage <value1> is Ctosprofile ID.
Example
6.4.4.3 Delete vlan mapprofile info
Syntax Delete vlan mapprofile info profileid <value1>
Usage <value1> is Ctosprofile ID.
Example $delete vlan mapprofile info profileid 2
6.4.5 VLAN mapprofile param Commands
6.4.5.1 Create vlan mapprofile param
Syntax create vlan mapprofile param profileid <value1> vlan1 <value2> vlan2
<value3>
Usage <value1> is Ctosprofile ID.
<value2> is CVLAN ID.
82
<value3> is SVLAN ID.
Example $create vlan mapprofile param profileid 1 vlan1 2 vlan2 2
Note:One ctosprofile can be consisted of several CVLAN/SVLAN groups, but CVLAN
ID must be the same for one ctosprofile.
6.4.5.2 Get vlan mapprofile param
Syntax Get vlan mapprofile param [profileid <value1>] [vlan1 <value2>]
Usage <value1> is Ctosprofile ID.
<value2> is CVLAN ID.
Example
6.4.5.3 Delete vlan mapprofile param
Syntax delete vlan mapprofile param profileid <value1> vlan1 <value2>
Usage <value1> is Ctosprofile ID.
<value2> is CVLAN ID.
Example $ delete vlan mapprofile param profileid 1 vlan1 2
Note:Ctosprofile and parameters can not be modified, except for creation and deletion.
6.5 IGMP Commands
6.5.1 Bridge Multicast Commands
6.5.1.1 Create bridge static mcast
Syntax create bridge static mcast [vlanid vlanid] mcastaddr mcastaddr
[ egressports egressports ] [ forbidegressports forbidegressports ]
83
Usage
mcastaddr is MAC address of multicast group.
egressports is the member to be created into multicast.
forbidegressports is the member forbidden to be created into multicast.
Example $create bridge static mcast vlanid 100 egressports 1 2 3 21 385
forbidegressports 22 48 mcastaddr 01:00:5e:00:00:04
6.5.1.2 Get bridge static mcast
Syntax get bridge static mcast [vlanid vlanid] mcastaddr mcastaddr
Usage
Example $ get bridge static mcast vlanid 100 mcastaddr 01:00:5e:00:00:04
6.5.1.3 Delete bridge static mcast
Syntax delete bridge static mcast [vlanid vlanid] mcastaddr mcastaddr
Usage
Example $ delete bridge static mcast vlanid 100 mcastaddr 01:00:5e:00:00:04
6.5.2 IGMP cfg info Commands
6.5.2.1 Get igmpsnoop cfg info
Syntax get igmpsnoop cfg info
Usage
Example
$get igmpsnoop cfg info
Query Interval : 125 Query Response Interval : 10
StartUp Query Interval : 31 UnSolicRprtInterval : 10
Anxious Timer : 125 V1 Host Timer : 260
Last Member Query Interval : 10 Robustness Variable : 2
Igmp Snoop Status : Disable
Version Mask : v1 v2 v3
Report Suppression Status : Disable Proxy Report Status : Disable
StartUp QryCount : 2 Last Member QryCount : 2
84
6.5.2.2 Modify igmpsnoop cfg info
Syntax modify igmpsnoop cfg info [parameterN valueN]
Usage
parameterN <valueN>
queryinterval This parameter is used to calculate the entry age out
timer, when no reports or queries are received on the
entry. When the value of this parameter multiplied by
10, it should be greater than the Query Interval
configured at the router. The time for which an entry
created at Igmpsnoop module exists, if no messages
are received for it is approximately
(((QueryInterval*10)*Robustness) + Query Response
Time received in Last Query)
anxioustimer This parameter specifies the maximum time (in
seconds) before which the IgmpSnoop module will
forward all IGMP membership reports received. It is
started once, whenever the first membership report is
received for a group, to ensure that reports are
forwarded for a sufficiently long time, to take care of
any lost reports. The unit is seconds.
v1hosttimer This parameter specifies the maximum time (in
seconds), for which the IgmpSnooping module can
assume that there are Version 1 group members
present, for the group for which this timer is running.
The unit of this parameter is seconds.
lastmembqryinterval This parameter specifies the Last Member Query
Interval that is the Max Response Time inserted into
Group-Specific Queries sent in response to Leave
Group messages, and is also the amount of time
between Group-Specific Query messages. The value of
this parameter may be tuned to modify the leave
latency of the network. A reduced value results in
reduced time to detect the loss of the last member of a
group. The unit of this parameter is one-tenth of
second.
robustness This parameter allows tuning for the expected packet
loss on a subnet. The IgmpSnooping module is robust
to [RobustnessVar] packet losses.
status This parameter specifies whether Igmp Snooping
needs to be enabled in the system.
reportsup Report Suppression is enabled or not.
qryrespinterval This parameter is used to derive Max Response Code
85
to be filled in General query that will be initiated from
Columbia
proxyreportstatus This parameter controls whether proxy reporting will be
supported at the global level
versionmask This parameter controls which versions of IGMP are
currently supported at Columbia. Depending on the
version mask, IGMP messages of unsupported version,
will be dropped
startupqryinterval This parameter specifies the interval between General
Queries sent on receiving Port Up topology change
trigger.
startupqrycount This parameter specifies the number of General
Queries sent on receiving Port Up topology change
trigger, separated by the StartupQryInterval
lastmemberqrycount This parameter specifies the number of Group-specific
or Group-and-Source-specific Queries sent before
assuming there are no listener for this Group or
Group-Source pair.
unsolicrprtinterval This parameter specifies the interval between
unsolicited membership reports of a group sent for
robustness no of times. This field is applicable only
when proxy reporting is enabled.
Example $modify igmpsnoop cfg info status enable
6.5.3 IGMPSnoop port info Commands
6.5.3.1 Get igmpsnoop port info
Syntax get igmpsnoop port info [portid]
Usage <value1 > is bridge port.
Example
$get igmpsnoop port info portid 1
Port Index : 1
Port Igmp Snoop Status : Disable Leave Mode : Normal
IGMP Packet's Prio : 0 MaxGroupAllowed : 256
Querier Status : Enable McastVlan Status : Disable
No McastVlan Match Action : Drop
86
6.5.3.2 Modify igmpsnoop port info
Syntax modify igmpsnoop port info portid <value1 > [parameterN valueN]
Usage
<value1 > is bridge port.
parameterN <valueN>
leavemode This parameter specifies the Igmp Snooping Leave
message processing mode for the port. If the mode is set
to 'Normal', the Leave message is forwarded to the
Querier. Then, based on the Query received from
Querier, the Leave processing is triggered. If the mode is
set to 'Fast', the port is immediately deleted from that
multicast group on Leave message reception and then
the Leave message is forwarded. The mode should be
set to 'Fast' for a port only if there is one host behind the
port. This is because if there are multiple hosts behind
the port then it will lead to traffic disruption for other hosts
who might still be listening to that multicast group. If the
mode is set to 'FastNormal', the Leave message is
forwarded and the Leave processing is triggered
immediately without waiting for any trigger from the
Querier. The 'FastNormal' mode, thus, saves the delay
(equal to the time taken for Leave message to reach
router and Querier processing time for it and the time
taken for Query to reach IGMP Snoop module) in Leave
processing.
pktpriority This parameter specifies the Egress Priority to be set in
case the Ethernet frames carrying IGMP packets sent
over this port need to be tagged by the control plane. In
case the frame came tagged, priority that came in the
tagged frame will not be changed. The configured priority
will also be used for choice of traffic class/Queue on
outgoing interface whether the frame is tagged . In case
the bridge port is over an Aggregated ATM VC, this will
also be used to identify the VC, on which the packet is to
be sent. There is an additional support of invalid value for
egress priority in IGMP port info to indicate that the
priority is not to be forced on egress frame for this port.
maxgrpallowed This parameter controls the no. of simultaneous channels
that can be received by this port.
querierstatus This parameter controls whether a port can become
querier.
mcastvlanstatus This parameter controls the status of Multicast Vlan
87
option on a port.
nomatchaction This parameter specifies the action to be taken when
multicast vlan can not be determined for a port where
multicast vlan option is enabled Possible action values
will be Drop, Transparently forward, and Learn based on
ingress vlan.
Example $ modify igmpsnoop port info portid 1 status disable
6.5.3.3 Get igmpsnoop port stats
Syntax get igmpsnoop port stats [vlanid vlanid ] [mcastaddr mcastaddr] [portid
portid]
Usage
<portid > is bridge port;
<vlanid > is VLAN ID;
<mcastaddr> is MAC address of multicast.
Example
6.5.4 IGMP Snoop mvlan config Commands
6.5.4.1 Create igmpsnoop mvlan config
Syntax
create igmpsnoop mvlan config grpipaddr grpipaddr srcipaddr
srcipaddr vlanid vlanid | none [mcastvlanstag mcastvlanstag | none]
[mcastvlanctag mcastvlanctag | invlan | none] [portlist portlist | none]
Usage
parameterN <valueN>
grpipaddr This parameter specifies the Destination Group IP address
88
for a multicast stream. The source address and destination
group address together define a multicast stream. In case
of value 0, this parameter is ignored while determining
Multicast Vlan
srcipaddr This parameter specifies the source IP address of the
Multicast Server. The source address and destination
group address together define a multicast stream. In case
of value 0, this parameter is ignored while determining
Multicast Vlan.
vlanid This parameter specifies the Dot1q tag of an IGMP packet
received. This will be PVID in case an untagged IGMP
packet was received. In case of value 0, this parameter is
ignored while determining Multicast Vlan.
mcastvlanstag This parameter specifies the Multicast SVlanId to be used
in case of stacked mode. In the native mode, this
parameter is not applicable.
mcastvlanctag This parameter specifies the Multicast CVlanId to be used.
Two special values of this parameter are supported in
stacked mode: One value (4097) to signify that repot/leave
shall be forwarded to querier with the C tag with which it
was received from the subscriber port and the S tag
specified in multicast Vlan's definition One value (0) to
signify that report/leave shall be forwarded to querier with
S tag specified in multicast Vlan's definition and no C tag.
Other Value shall signify that, report/leave shall be
forwarded to querier with S and C tag specified in multicast
Vlan's definition.
portlist This parameter specifies the list of ports on which a given
combination of (Group Address, Source Address, VlanId)
maps to a specified multicast vlan (STag, CTag)
Example $create igmpsnoop mvlan config grpipaddr 224.0.0.7 srcipaddr 12.23.34.45
vlanid 6 mcastvlanstag none mcastvlanctag 5 portlist 5 6 10
6.5.4.2 Get igmpsnoop mvlan config
Syntax get igmpsnoop mvlan config [grpipaddr grpipaddr] [srcipaddr
srcipaddr][vlanid vlanid]
Usage
parameterN <valueN>
89
grpipaddr This parameter specifies the Destination Group IP
address for a multicast stream. The source address
and destination group address together define a
multicast stream. In case of value 0, this parameter
is ignored while determining Multicast Vlan
srcipaddr This parameter specifies the source IP address of
the Multicast Server. The source address and
destination group address together define a
multicast stream. In case of value 0, this parameter
is ignored while determining Multicast Vlan.
vlanid This parameter specifies the Dot1q tag of an IGMP
packet received. This will be PVID in case an
untagged IGMP packet was received. In case of
value 0, this parameter is ignored while determining
Multicast Vlan.
Example $get igmpsnoop mvlan config
6.5.4.3 Delete igmpsnoop mvlan config
Syntax delete igmpsnoop mvlan config grpipaddr grpipaddr srcipaddr
srcipaddr vlanid vlanid
Usage
parameterN <valueN>
grpipaddr This parameter specifies the Destination Group IP address
for a multicast stream. The source address and destination
group address together define a multicast stream. In case of
value 0, this parameter is ignored while determining
Multicast Vlan
srcipaddr This parameter specifies the source IP address of the
Multicast Server. The source address and destination group
address together define a multicast stream. In case of value
0, this parameter is ignored while determining Multicast
Vlan.
vlanid This parameter specifies the Dot1q tag of an IGMP packet
received. This will be PVID in case an untagged IGMP
packet was received. In case of value 0, this parameter is
ignored while determining Multicast Vlan.
90
Example $delete igmpsnoop mvlan config grpipaddr 224.0.0.7 srcipaddr 12.23.34.45
vlanid 6
6.5.4.4 Modify igmpsnoop mvlan config
Syntax
modify igmpsnoop mvlan config grpipaddr grpipaddr srcipaddr
srcipaddr vlanid vlanid [mcastvlanstag mcastvlanstag | none]
[mcastvlanctag mcastvlanctag | invlan | none] [portlist portlist | none]
Usage
parameterN <valueN>
mcastvlanstag This parameter specifies the Multicast SVlanId to be used
in case of stacked mode. In the native mode, this
parameter is not applicable.
mcastvlanctag This parameter specifies the Multicast CVlanId to be used.
Two special values of this parameter are supported in
stacked mode: One value (4097) to signify that repot/leave
shall be forwarded to querier with the C tag with which it
was received from the subscriber port and the S tag
specified in multicast Vlan's definition One value (0) to
signify that report/leave shall be forwarded to querier with
S tag specified in multicast Vlan's definition and no C tag.
Other Value shall signify that, report/leave shall be
forwarded to querier with S and C tag specified in multicast
Vlan's definition.
portlist This parameter specifies the list of ports on which a given
combination of (Group Address, Source Address, VlanId)
maps to a specified multicast vlan (STag, CTag)
Example
91
6.5.5 IGMP querier info Commands
6.5.5.1 Create igmpsnoop querier info
Syntax create igmpsnoop querier info vlanid <value1> portid <value2>
Usage <value1 > is VLAN ID.
<value2 > is bridge port.
Example $create igmpsnoop querier info vlanid 2 portid 6
Note:When creating igmpsnoop querier port, VLAN port should be in bridged mode;
the uplink port should be queried in default.
6.5.5.2 Delete igmpsnoop querier info
Syntax delete igmpsnoop querier info vlanid <value1> portid <value2>
Usage <value1 > is VLAN ID.
<value2 > is bridge port.
Example $delete igmpsnoop querier info vlanid 2 portid 6
6.6 Filtering Commands
6.6.1 Filter rule entry commands
6.6.1.1 Create filter rule entry
Syntax
create filter rule entry ruleid ruleid [action drop | allow | setprio |
sendtocontrol | retagprio | copytocontrol | clfrdef | gotonextrule |
forwardexit | exprdef | modifytos | setbaclevel | pktvlanid |
pktservicevlanid | retagserviceprio | ratelimiter | Mirror ] [description
description] [priority priority] [status enable | disable] [statsstatus
enable | disable] [ruleprio low | high] [ruledir in | out] [applywhenreq
enable | disable] [pkttype Mcast | Bcast | Ucast] [snooplevel interface |
92
bridge] [exprid exprid] [actionval actionval] [actionmask actionmask]
Usage
parameterN <valueN>
ruleid unique identifier of a filter rule
action action is applied for the packets matching this filter rule. This
field can be modified only if rule „rulestatus' has the value
'disable'. 'exprdef(10)' action has a special significance that
action is defined in the expression. In this case the 'ExprId'
field must be specified. For other types of actions, the
default relationship between subrules is all ANDed. If
'ruleDir' value is 'out', 'clfrdef', 'ratelimiter' and „modifytos‟
action types are invalid. If the action is 'clfrdef', then the rule
can have at most one subrule, that too of type 'clfrtree'. The
actions setprio, retagprio and setserviceprio require priority
value to be specified in ruleSetPrio parameter. The actions
sendtocontrol, copytocontrol, modifytos, setbaclevel,
setvlanid, setservicevlanid, ratelimiter and mirror require an
additional value to be specified in ruleActionVal parameter.
The actions sendtocontrol, copytocontrol and modifytos also
require ruleActionMask parameter to be specified.
status Admin status of the rule
ruledir Specifies whether the rule will be applied on incoming
interfaces (ingress)or outgoing interfaces(egress).
Example $create filter rule entry ruleid 1 action drop ruledir in
6.6.1.2 Delete filter rule entry
Syntax delete filter rule entry ruleid ruleid
Usage ruleid is the unique identifier of a filter rule.
Example $create filter rule entry ruleid 1 action drop ruledir in
6.6.2 Filter subrule ip Commands
6.6.2.1 Create filter subrule ip
Syntax create filter subrule ip ruleid ruleid subruleid subruleid [srcipaddrfrom
srcipaddrfrom] [srcipaddrto srcipaddrto] [dstipaddrfrom dstipaddrfrom]
93
[dstipaddrto dstipaddrto] [prototypefrom prototypefrom] [prototypeto
prototypeto] [srcaddrcmp eq | neq | lt | leq | gt | geq | any | inrange |
exrange | ingenlist | notingenlist] [dstaddrcmp eq | neq | lt | leq | gt | geq |
any | inrange | exrange | ingenlist | notingenlist] [prototypecmp eq | neq |
lt | leq | gt | geq | any | inrange | exrange] [ipsrcaddrmask
ipsrcaddrmask] [ipdstaddrmask ipdstaddrmask] [subruleprio low | high |
asinrule] [transporthdr ethernet | pppoe] [tosfrom tosfrom] [tosto tosto]
[tosmask tosmask] [toscmp eq | neq | lt | leq | gt | geq | any | inrange |
exrange]
Usage
parameterN <valueN>
ruleid Unique identifier of a filter rule of which this sub rule is being
created.
subruleid Unique identifier of a filter subrule.
srcipaddrfrom Start source IP address of the range of source IP
addresses. This field is invalid if 'srcaddrcmp' is 'any',
'ingenlist' or 'notingenlist'. This field and 'srcipaddrto' specify
a range of source IP addresses if 'srcaddrcmp' is either
'inrange' or 'exrange'.
srcaddrcmp Source IP addresss comparison type. 'ingenlist' means
check if source ip address present in interface classifier
generic list. 'notingenlist' means check if source ip address
not present in interface classifier generic list. 'ingenlist' and
'notingenlist' are invalid if the direction of the rule for which
this subrule is being created is 'out'.
Example $create filter subrule ip ruleid 2 subruleid 1 srcaddrcmp eq srcaddfrom
172.16.0.100
6.6.2.2 Get filter subrule ip
Syntax get filter subrule ip ruleid ruleid subruleid subruleid
Usage
parameterN <valueN>
ruleid Unique identifier of a filter rule of which this sub rule is being
created.
subruleid Unique identifier of a filter subrule.
94
Example $ get filter subrule ip ruleid 1 subruleid 1
6.6.3 Filter rule map Commands
6.6.3.1 Create filter rule map
Syntax create filter rule map ifname ifname | all | alleoa | alleth | allpppoe | allcpe
| allipoe stageid stageid ruleid ruleid [orderid orderid]
Usage
parameterN <valueN>
ifname Name of the interface whose mapping is being created. Only
EOA ,PPPoE, IPOE and ethernet interfaces are allowed. If
the value of this field is 'All', it indicates all interfaces, 'AllEoa'
indicates all 'eoa' interfaces, and 'AllEth' indicates all
'ethernet'interfaces. AllPppoe' indicates all
'PPPoE'interfaces, 'AllIpoe' indicates all 'IPOE' interfaces
and 'AllCpe' indicates all eoa , all ipoe and pppoe interfaces.
If a bridge port on aggregated interface is created then this
field can not have ifIndex of any specific ethernet interface.
stageid This field specifies the stage on the interface to which the
rule in the mapping belongs
ruleid Rule Id of the rule in the mapping.
orderid This field indicates the order of the rule in the attached
sequence. The default value for this field will be same as the
ruleid of the entry.
Example $create filter rule map ifname eoa-1 stageid 1 ruleid 1
6.6.3.2 Get filter rule map
Syntax get filter rule map [ifname ifname | all | alleoa | alleth | allpppoe | allcpe |
allipoe] [stageid stageid] [ruleid ruleid]
Usage
parameterN <valueN>
ifname Name of the interface whose mapping is being created. Only
EOA ,PPPoE, IPOE and ethernet interfaces are allowed. If
the value of this field is 'All', it indicates all interfaces, 'AllEoa'
95
indicates all 'eoa' interfaces, and 'AllEth' indicates all
'ethernet'interfaces. AllPppoe' indicates all
'PPPoE'interfaces, 'AllIpoe' indicates all 'IPOE' interfaces
and 'AllCpe' indicates all eoa , all ipoe and pppoe interfaces.
If a bridge port on aggregated interface is created then this
field can not have ifIndex of any specific ethernet interface.
stageid This field specifies the stage on the interface to which the
rule in the mapping belongs
ruleid Rule Id of the rule in the mapping.
Example $get filter rule map
6.6.4 ACL port macentry Commands
6.6.4.1 Create acl port macentry
Syntax create acl port macentry macaddr <value1> portid <value2>
Usage <value1 > is MAC address (format: xx:xx:xx:xx:xx:xx).
<value2 > is bridge port.
Example $create ACL port macentry macaddr 00:30:50:11:22:33 portId 2
6.6.4.2 Delete acl port macentry
Syntax delete acl port macentry macaddr <value1> portId <value2>
Usage <value1 > is MAC address (format: xx:xx:xx:xx:xx:xx).
<value2 > is bridge port.
Example $delete ACL port macentry macaddr 00:30:50:11:22:33 portid 2
6.6.4.3 Get acl port macentry
Syntax get acl port macentry [macaddr <value1> portId <value2>]
Usage <value1 > is MAC address (format: xx:xx:xx:xx:xx:xx).
<value2 > is bridge port.
96
Example
6.6.5 ACL global macentry Commands
6.6.5.1 Create acl global macentry
Syntax create acl global macentry macaddr <value1> [parameterN <valueN>]
Usage
<value1> is the MAC address (format as xx:xx:xx:xx:xx:xx)
parameterN <valueN>
deny This flag specifies if the MAC address is to be denied
access.
track This flag specifies if the MAC address is to be tracked
across different ports. A trap is raised in case packet from
the address comes over a port for the first time and when it
changes the port.
Example $ create acl global macentry macaddr 00:33:22:33:33:33
6.6.5.2 Modify acl global macentry
Syntax Modify acl global macentry macaddr <value1> [parameterN <valueN>]
Usage <value1> is the MAC address (format as xx:xx:xx:xx:xx:xx)
Example $modify acl global macentry macaddr 00:33:22:33:33:33
6.6.5.3 Delete acl global macentry
Syntax delete acl global macentry macaddr <value1>
Usage <value1> is the MAC address (format as xx:xx:xx:xx:xx:xx)
Example $delete acl global macentry macaddr 00:33:22:33:33:33
97
6.6.5.4 Get acl global macentry
Syntax get acl global macentry [macaddr <value1> ]
Usage <value1> is the MAC address (format as xx:xx:xx:xx:xx:xx)
Example
98
Chapter 7 Quick Start
7.1 Default Values
For the first time to login DSLAM5048, the default values are shown below:
IP address in default 192.168.1.32
Bridge Mode Each adsl port is set as rfc1483B bridge mode
Mapping rule dsl-0~47 atm-0~47 aal5-0~47/aal5-48~95
eoa-0~47/eoa-48~95 (port)1-48 /49-96
bridge port numbering 1~48 mapping to pvc 0/35 for
adsl port 1~48(dsl-0~47)
bridge port numbering 49~96 mapping to pvc-iptv 8/85
for adsl port 1~48(dsl-0~47)
Setting of Ethernet port Stacking mode ,eth-0 for uplink, Bridge port is 385 ,
eth-1 for downlink ,bridge port is 386
VLAN mode Native VLAN mode, and no VLAN tags.
VLAN Management Mgmt interface disable
Others IGMP disable
snmp enabled with the community public and hostip
192.168.1.20
7.2 Quick Start Commands
7.2.1 System commands
Description Examples
1 Save the present configuration commit
2 Restart the dslam reboot
3 Restart the dslam for default setting reboot config default
7.2.2 Change IP address
In default two Giga-Ethernet ports (eth-0ð-1) are set as stacking mode, the eth-0 for
99
uplink interface is enable and IP address is 192.168.1.32. You can change IP address of
eth-0 as the following:
Step Description Examples
1 Get current configuration of
ethernet interface $ get ethernet intf
2
Before change IP address,
you have to close current
interface.
$ modify ethernet intf ifname eth-0 disable
3 Change IP address $ modify ethernet intf ifname eth-0 ip 10.0.0.32
mask 255.255.0.0
4 Open ethernet interface. $ modify ethernet intf ifname eth-0 enable
7.2.3 Create Default Route
The default value for IP address is 192.168.1.32.
You can set default route to 192.168.1.1
$create ip route ip 0.0.0.0 mask 0.0.0.0 gwyip 192.168.1.1
7.2.4 Aggregating Mode
If you want to set DSLAM5048 to aggregator, you should delete the ethernet interface
firstly, Then create aggr interface and bridge port.
Step Examples
1
$ delete bridge port intf portid 385
$ delete bridge port intf portid 386
$ delete ethernet intf ifname eth-0
$ delete ethernet intf ifname eth-1
2
$ create ethernet intf ifname eth-0
$ create ethernet intf ifname eth-1
$ create aggr intf ifname aggr-0 ip 192.168.1.32 mask 255.255.255.0 enable
$ create bridge port intf portid 385 ifname aggr-0 status enable
3
$ create lacp aggr aggrifname aggr-0 aggrtype static
$ modify lacp aggrport info ifname eth-0 aggrstatus enable
$ modify lacp aggrport info ifname eth-1 aggrstatus enable
7.2.5 Stacking Mode
If you want to stack two DSLAM5048, you should delete the aggregator interface firstly,
100
Then create the uplink/downlink ports for eth-0ð-1 of the master units, for the slave
unit , create eth-0 to uplink . connect the downlink port of the master unit to the uplink port
of the slave unit.
Step Examples
1 delete the aggregator
interface
$modify lacp aggrport info ifname eth-0 aggrstatus
disable
$modify lacp aggrport info ifname eth-1 aggrstatus
disable
$delete lacp aggr aggrifname aggr-0
$delete bridge port intf portid 385
$delete aggr intf ifname aggr-0
$delete ethernet intf ifname eth-0
$delete ethernet intf ifname eth-1
2 Create ethernet intf of the
master unit
$create ethernet intf ifname eth-0 ip 192.168.1.32 mask
255.255.255.0 enable
$create bridge port intf portid 385 ifname eth-0 learning
disable status enable
$create ethernet intf ifname eth-1 type downlink enable
$create bridge port intf portid 386 ifname eth-1 learning
enable status enable
$modify bridge mode enable
3 Create ethernet intf of the
slave unit
$create ethernet intf ifname eth-0 ip 192.168.1.33 mask
255.255.255.0 enable
$create bridge port intf portid 385 ifname eth-0 learning
disable status enable
Note: stacking Mode is enable default
7.2.6 Modify the Upstream/Downstream Rate
Step Examples
1 Disable adsl port $modify adsl line intf ifname dsl-1 disable
2 set downlink rate to be 2M $modify adsl line profile atucintlmaxtxrate 2048000
ifname dsl-1
3 set uplink rate to be 512K $modify adsl line profile aturintlmaxtxrate 512000 ifname
dsl-1
4 Open adsl ports $modify adsl line intf ifname dsl-1 enable
Note:If the link is set as fast mode, then all requested rate should be set in fast mode.
101
7.2.7 VLAN configuration
Step Examples
1 create VLAN group 102 $ create vlan static vlanname vlan102 vlanid
102 egressports 2 385 untaggedports 2
2 set VLAN ID $ modify gvrp port info portid 2 portvlanid 102
acceptframetypes all ingressfiltering true
3 get current VLAN information $get vlan curr info
7.2.8 VLAN management
Step Examples
Method 1
1 create VLAN group 1000 in uplink
port
$create vlan static vlanname vlan1000 vlanid
1000 egressports 385
2 configure VLAN port $modify gvrp port info portid 385 portvlanid
acceptframetypes all ingressfiltering true
Method 2 (through Ethernet port)
1 create VLAN group 1000 in uplink
port
$create vlan static vlanname vlan1000 vlanid
1000 egressports 385
2 configure VLAN port through
Ethernet port
$modify ethernet intf ifname eth-0 mgmtvlan
1000
7.2.9 PVC modification
In default value, each port has a PVC 0/35. You can change PVC port as following:
Step Examples
1 disable PVC interface $modify atm vc intf ifname aal5-1 disable
2 Change PVC to be 8/81 $modify atm vc intf ifname aal5-1 vpi 8 vci 81
3 Enable pvc interface $modify atm vc intf ifname aal5-1 enable
4 Display PVC status $get atm vc stats ifname aal5-1
7.2.10 Multicast
You can create static multicast as following :
102
Step Examples
1 create VLAN
multicast
$ create vlan static vlanname vlan100 vlanid 100 egressports 1 2 3
21 22 48 385
2 create static
multicast group
$ create bridge static mcast vlanid 100 egressports 1 2 3 21 385
forbidegressports 22 48 mcastaddr 01:00:5e:00:00:04
7.2.11 MAC binding
Step Examples
Binding Port $create acl port macentry portid 2 macaddr 01:01:01:01:01:01
$create acl port macentry portid 2 macaddr 02:02:02:02:02:02
Binding status
query $get acl port maccentry portid 2
7.2.12 IP filtering
You can create IP filtering as following:
Step Examples
1 create filter rule $create filter rule entry ruleid 2 action drop ruledir in
2 create filter
subrule
$create filter subrule ip ruleid 2 subruleid 1 srcaddrcmp yes
srcaddfrom 172.16.0.100
3
create port
mapping to this
rule
$create filter rule map ifname eoa-0 stageid 1 ruleid 2
4 enable filter
rules $create filter rule entry ruleid 2 status enable
7.2.13 Snmp function enable
In default value, snmp function is not enable. If network management is requested, you
should enable snmp function to manage the equipment.
Step Examples
1 create snmp
community $create snmp comm community public rw
2 create snmp
management $create snmp host ip 192.168.1.55 community public
103
host
3 create snmptrap
host $create snmp traphost ip 192.168.1.55 community public
7.3 Typical Configuration
7.3.1 Bridge Service Set-up
In default, a bridge port is created to each user port. If you use the default bridge port,
you can follow this procedure:
For example (shown as below), user uses DSLAM5048 to access the internet through
dsl-1. A router is used to allocate IP address dynamically. The uplink/downlink rate is
512kbps/2Mbps, and VPI/VCI of local modem is 8/35.
Here we use the default bridge port to set up this service:
Step1: limit the uprate/downrate
click “batch config->dsl profile” change 2M_512K profile and
Select start port 1& endport 1, then click apply to change the rate settings
104
Step2: change PVC setting
click “batch config->PVC config” change VPI to 8 and select start vc and endvc to
aal5-1. then click apply to change the pvc setting.
7.3.2 VLAN Fast Configuration
7.3.2.1 Native VLAN Mode
For example, the local user uses 3rd
port of DSLAM5048 to connect to the remote user
through Ethernet switch. VLAN is classified by Ethernet switch, and VLAN for the remote
user is VLAN2.
105
The configuration procedure is shown as following:
Step1: create static vlan 2
Click “configuration->VLAN config” then click
Step2: PVID config
Click then click
7.3.2.2 Stacked VLAN Mode
106
For example, the local user uses 1st port of DSLAM5048 to connect to the remote user
through Ethernet switch. SVLAN is classified by Ethernet switch
The configuration procedure is shown as following:
$modify nbsize vlanmode stackedmode
$commit
$reboot
$create vlan svaln svlanid 3
$create vlan static vlanname vlan2 egressports 1 385 untaggedports 1
$create vlan static vlanname vlan5 vlanid 5 egressports 385
$create vlan virmap svlanid 3 cvlanid 2 vvlanid 5
$modify gvrp port info portid 1 portvlanid 2 psvlanid 3
$modify bridge port intf portid 385 status disable
107
$modify gvrp port info portid 385 ppstatus enable
$modify bridge port intf portid 385 status enable
7.3.3 Multicast for Multiple PVC
Here we use an example to explain how to configure Multiple PVC and IGMP.
2nd
and 3rd
ports of DSLAM5048 are selected for accessing Internet data/multicast service.
Mutlicast service belongs to VLAN100.User applies PVC 0/35 for data and 8/85 for
multicast.
If DSLAM5048 system is in default value, then follow these steps:
Note: Dslam have two pvc 0/35 for data and 8/85 for multicast defaultly.
Step1: enable PVC-IPTV
Click “batch config->pvc config” select vcs and status then apply.
Step2: create static vlan 100
Click “configuration->VLAN config” then click
Note: config vlan for pvc-iptv so we need type bridge port 50/51.
108
Step3: PVID config
Click then click
109
Appendix A: Abbreviation & Terminology
ADSL Asymmetrical Digital Subscriber Loop
ATM Asynchronous Transfer Mode
DMT Discrete Multi-tone Modulation
IEEE Institute of Electrical and Electronics Engineers
NNI Network Network Interface
VC Virtual Channel
VCI Virtual Channel Identifier
VPI Virtual Path Identifier
UNI User Network Interface
top related