Customization: | Available |
---|---|
Certification: | CE |
Condition: | New |
Still deciding? Get samples of US$ 2000/Piece
Request Sample
|
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
08P/16P | |
Switching Capacity | 140Gbps |
Forwarding Capacity(Ipv4/Ipv6) | 104MPPS |
Service Port | 8*PON port(OLT-G08P)/16*PON port(OLT-G16P), 4*GE SFP, 4*GE COMBO port, 2*10GE SFP+ port |
Redundancy Design | Dual power supply Support AC input, double DC input and AC+DC input |
Power Supply | AC: input 90~264V 47/63Hz; DC: input -36V~-72V; |
Power Consumption | ≤110W |
Dimensions (Width x Depth x Height) | 440mm×44mm×380mm |
Weight (Full-Loaded) | ≤3kg |
Environmental Requirements | Working temperature: -10°C~55°C Storage temperature: -40°C~70°C Relative humidity: 10%~90%, non-condensing |
Item | OLT-G08P/16P | |
PON Features |
ITU-TG.984.x standard Maximum 20 Km PON transmission distance access 128 terminals for single fiber PON Uplink and downlink triple churning encrypted function with 128Bits ONU terminal legitimacy certification, report illegal ONU registration DBA algorithm, the particle is 1Kbit/s Standard OMCI management function ONU batch software upgrade, fixed time upgrade, real time upgrade PON port optical power detection |
|
L2 Features | MAC | MAC Black Hole Port MAC Limit 64K MAC (packet exchange chip cache 2MB, external cache 720 MB ) |
VLAN | 4K VLAN entries Port-based/MAC-based/protocol/IP subnet-based QinQ and flexible QinQ (StackedVLAN) VLAN Swap and VLAN Remark PVLAN to realize port isolation and saving public-vlan resources GVRP |
|
Spanning Tree | STP/RSTP/MSTP Remote loop detecting |
|
Port | Bi-directional bandwidth control Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring |
|
Security Features |
User's Security | Anti-ARP-spoofing Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binding to the port and MAC address filtering IEEE 802.1x and AAA/Radius authentication |
Device Security | Anti-DOS attack(such as ARP, Synflood, Smurf, ICMP attack), ARP detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP log in through Telnet Hierarchical management and password protection of users |
|
Network Security | User-based MAC and ARP traffic examination Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port URPF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user's physical location Plaintext authentication of OSPF, RIPv2 and BGPv4 packets and MD5 cryptograph authentication |
|
Service Features | ACL | Standard and extended ACL Time Range ACL Flow classification and flow definition based on source/destination MAC address, VLAN, 802.1p, ToS, DiffServ, source/destination IP(IPv4/IPv6) address, TCP/UDP port number, protocol type, etc packet filtration of L2~L7 deep to 80 bytes of IP packet head |
QoS | Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color monitor of self-defined flow Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark CAR(Committed Access Rate), Traffic Shaping and flow statistics Packet mirror and redirection of interface and self-defined flow Super queue scheduler based on port or self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR. Congestion avoid mechanism, including Tail-Drop and WRED |
|
IPv4 | ARP Proxy DHCP Relay DHCP Server Static Routing RIPv1/v2 OSPFv2 BGPv4 Equivalent Routing Routing Strategy |
|
IPv6 | ICMPv6 ICMPv6 Redirection DHCPv6 ACLv6 OSPFv3 RIPng BGP4+ Configured Tunnels ISATAP 6to4 Tunnels Dual stack of IPv6 and IPv4 |
|
Multicast | IGMPv1/v2/v3 IGMPv1/v2/v3 Snooping IGMP Filter MVR and cross VLAN multicast copy IGMP Fast leave IGMP Proxy PIM-SM/PIM-DM/PIM-SSM PIM-SMv6, PIM-DMv6, PIM-SSMv6 MLDv2/MLDv2 Snooping |
|
Reliability | Loop Protection | EAPS and GERP (recover-time <50ms) Loopback-detection |
Link Protection | FlexLink (recover-time <50ms) RSTP/MSTP (recover-time <1s) LACP (recover-time <10ms) BFD |
|
Device Protection | VRRP host backup 1+1 power hot backup |
|
Maintenance | Network Maintenance | Port real-time, utilization and transmit/receive statistic based on Telnet RFC3176 sFlow analysis LLDP GPON OMCI RFC 3164 BSD syslog Protocol Ping and Traceroute |
Device Management | CLI, Console port, Telnet and WEB SNMPv1/v2/v3 RMON (Remote Monitoring)1,2,3,9 groups MIB NTP NGBNView network management |
1. What are the payment terms that you support?