Customization: | Available |
---|---|
Type: | Fiber Transceiver |
Wiring Devices: | Integrated Wiring |
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
Attributes | OLT-G8 | |
PON Features |
GPON | Satisfy ITU -T standard TR-101 compliant solution for FTTx OLT applications High splitter rate, each PON port supports 32*ONU, 96*T-CONT Maximum transmission distance of 20KM Support uplink FEC, downlink FEC(Forward Error Correction) ONU identifier authentication: SN /SN+PASSWD Bandwidth allocation mechanism 5 types of T-CONT bandwidth Static Bandwidth Allocation Dynamic Bandwidth Allocation GPON feature parameter 4096 port-IDs per GPON MAC (Downstream and Upstream) 1024 Alloc -IDs per GPON MAC (Upstream ) |
L2 Features | MAC | MAC Black Hole Port MAC Limit |
VLAN | 4K VLAN entries Port-based/MAC-based/IP subnet-based VLAN Port-based QinQ and Selective QinQ (StackVLAN) VLAN Swap and VLAN Remark and VLAN Translate GVRP Based on ONU service flow VLAN add, delete, replace |
|
Spanning tree protocol | IEEE 802.1D Spanning Tree Protocol (STP) IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) IEEE 802.1s Multiple Spanning Tree Protocol instances (MSTP) |
|
Port | Bi-directional bandwidth control Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring and traffic mirroring |
|
Security Features | User security | Anti-ARP-spoofing Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binds to a port and port MAC address filtration IEEE 802.1x and AAA/Radius authentication TACACS+ authentification DHCP anti-attack flood attack automatic suppression ONU isolation control |
Device security | Anti-DOS attack(such as ARP, Synflood, Smurf, ICMP attack), ARP detection, worm, and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP login through Telnet Hierarchical management and password protection of users |
|
Network security | User-based MAC and ARP traffic examination Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding Supports IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port PDF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user's physical location Plaintext authentication of OSPF\RIPv2 and MD5 cryptography authentication |
|
IP Routing | IPv4 | ARP Proxy DHCP Relay DHCP Server Static route |
IPv6 | ICMPv6 ICMPv6 redirection DHCPv6 ACLv6 Configured Tunnel 6to4 tunnel IPv6 and IPv4 Tunnels |
|
Service Features | ACL | Standard and extended ACL Time Range ACL Packet filter providing filtering based on source/destination MAC address, source/destination IP address, port, protocol, VLAN, VLAN range, MAC address range, or invalid frame. System supports concurrent identification at most 50 service traffic Support packet filtration of L2~L7 even deep to 80 bytes of IP packet head |
QoS | Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color monitor of self-defined flow Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark CAR(Committed Access Rate)\Traffic Shaping and flow statistics Packet mirror and redirection of the interface and self-defined flow Super queue scheduler based on port and self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR. Congestion avoid mechanism, including Tail-Drop and WRED |
|
Multicast |
IGMPv1/v2/v3 IGMPv1/v2/v3 Snooping IGMP Filter MVR and cross VLAN multicast copy IGMP Fast leave IGMP Proxy PIM-SM/PIM-DM/PIM-SSM PIM-SMv6\PIM-DMv6\PIM-SSMv6 MLDv2/MLDv2 Snooping |
|
MPLS | NPLS LDP | |
Reliability | Loop protection | EAPS and GERP (recover-time <50ms) Loopback-detection |
Link protection | FlexLink (recover-time <50ms) RSTP/MSTP (recover-time <1s) LACP (recover-time <10ms) BFD |
|
Device protection | VRRP host backup Double fault-tolerant backup of host program and configuration files 1+1 power hot backup |
|
Maintenance | Network maintenance | Telnet-based statistics RFC3176 sFlow LLDP 802.3ah Ethernet OAM RFC 3164 BSD Syslog Protocol Ping and Traceroute |
Device management | Command-line interface(CLI), Console, Telnet and WEB configuration System configuration with SNMPv1/v2/v3 RMON (Remote Monitoring)1/2/3/9 groups of MIB NTP(Network Time Protocol) |