Customization: | Available |
---|---|
Certification: | CE |
Condition: | New |
Suppliers with verified business licenses
Audited by an independent third-party inspection agency
Item
|
OLT-G08P/16P
|
Switching Capacity
|
140Gbps
|
Forwarding Capacity(Ipv4/Ipv6)
|
104MPPS
|
Service Port
|
8*PON port(OLT-G08P)/16*PON port(OLT-G16P), 4*GE SFP, 4*GE COMBO port, 2*10GE SFP+ port
|
Redundancy Design
|
Dual power supply
Support AC input, double DC input and AC+DC input |
Power Supply
|
AC: input 90~264V 47/63Hz;
DC: input -36V~-72V; |
Power Consumption
|
≤110W
|
Dimensions (Width x Depth x Height)
|
440mm×44mm×380mm
|
Weight (Full-Loaded)
|
≤3kg
|
Environmental Requirements
|
Working temperature: -10°C~55°C
Storage temperature: -40°C~70°C Relative humidity: 10%~90%, non-condensing |
Item
|
OLT-G08P/16P
|
|
PON Features
|
ITU-TG.984.x standard
Maximum 20 Km PON transmission distance access 128 terminals for single fiber PON Uplink and downlink triple churning encrypted function with 128Bits ONU terminal legitimacy certification, report illegal ONU registration DBA algorithm, the particle is 1Kbit/s Standard OMCI management function ONU batch software upgrade, fixed time upgrade, real time upgrade PON port optical power detection |
|
L2 Features
|
MAC
|
MAC Black Hole
Port MAC Limit 64K MAC (packet exchange chip cache 2MB, external cache 720 MB ) |
VLAN
|
4K VLAN entries
Port-based/MAC-based/protocol/IP subnet-based QinQ and flexible QinQ (StackedVLAN) VLAN Swap and VLAN Remark PVLAN to realize port isolation and saving public-vlan resources GVRP |
|
Spanning Tree
|
STP/RSTP/MSTP
Remote loop detecting |
|
Port
|
Bi-directional bandwidth control
Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring |
|
Security
Features |
User's Security
|
Anti-ARP-spoofing
Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binding to the port and MAC address filtering IEEE 802.1x and AAA/Radius authentication |
Device Security
|
Anti-DOS attack(such as ARP, Synflood, Smurf, ICMP attack), ARP
detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP log in through Telnet Hierarchical management and password protection of users |
|
Network Security
|
User-based MAC and ARP traffic examination
Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port URPF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user's physical location Plaintext authentication of OSPF, RIPv2 and BGPv4 packets and MD5 cryptograph authentication |
|
Service Features
|
ACL
|
Standard and extended ACL
Time Range ACL Flow classification and flow definition based on source/destination MAC address, VLAN, 802.1p, ToS, DiffServ, source/destination IP(IPv4/IPv6) address, TCP/UDP port number, protocol type, etc packet filtration of L2~L7 deep to 80 bytes of IP packet head |
QoS
|
Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color
monitor of self-defined flow Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark CAR(Committed Access Rate), Traffic Shaping and flow statistics Packet mirror and redirection of interface and self-defined flow Super queue scheduler based on port or self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR. Congestion avoid mechanism, including Tail-Drop and WRED |
|
IPv4
|
ARP Proxy
DHCP Relay DHCP Server Static Routing RIPv1/v2 OSPFv2 BGPv4 Equivalent Routing Routing Strategy |
|
IPv6
|
ICMPv6
ICMPv6 Redirection DHCPv6 ACLv6 OSPFv3 RIPng BGP4+ Configured Tunnels ISATAP 6to4 Tunnels Dual stack of IPv6 and IPv4 |
|
Multicast
|
IGMPv1/v2/v3
IGMPv1/v2/v3 Snooping IGMP Filter MVR and cross VLAN multicast copy IGMP Fast leave IGMP Proxy PIM-SM/PIM-DM/PIM-SSM PIM-SMv6, PIM-DMv6, PIM-SSMv6 MLDv2/MLDv2 Snooping |
|
Reliability
|
Loop Protection
|
EAPS and GERP (recover-time <50ms)
Loopback-detection |
Link Protection
|
FlexLink (recover-time <50ms)
RSTP/MSTP (recover-time <1s) LACP (recover-time <10ms) BFD |
|
Device Protection
|
VRRP host backup
1+1 power hot backup |
|
Maintenance
|
Network Maintenance
|
Port real-time, utilization and transmit/receive statistic based on Telnet
RFC3176 sFlow analysis LLDP GPON OMCI RFC 3164 BSD syslog Protocol Ping and Traceroute |
Device Management
|
CLI, Console port, Telnet and WEB
SNMPv1/v2/v3 RMON (Remote Monitoring)1,2,3,9 groups MIB NTP NGBNView network management |
1. What are the payment terms that you support?
Usually, we accept T/T, PayPal, Western Union, and Alibaba Trade Assurance. You can select the terms of payment which is more convenient for you.
2. What about the lead time?
Usually, if there's stock, we ship the goods within 3~5 working days after the deposit is confirmed. If it is out of stock, the lead time depends.
3. How about the shipping?
When the package is small, we normally choose FedEx, DHL, TNT, and UPS and so on, while the goods have high weight and volume, we suggest using air or sea shipment.
4. How can I place an order?
(1) Negotiation is agreed upon for the product price and specifications.
(2) The proforma invoice will be sent for confirmation.
(3) After the agreement on the proforma invoice, the customer makes the deposit.
(4) Manufacturing will be started as soon as the payment is confirmed by our bank.
(5) Ship out the goods within the agreed delivery deadline.
5. Can you do OEM for us?
Yes. If there is a certain order quantity, we can do OEM including printing, logo, and customized model for you.
6. How about the Warranty?
There are 12 months for the warranty.While the warranty is not responsible for those broken by violence or updated with other brands.