LTP-8X, LTP-4X optical line terminals

User manual
Firmware version 3.46.0 (02.11.2022)



|| DeviceType | Optical Line Terminals |
|| DeviceName1 | LTP-8X, LTP-4X |
|| DocTitleAdditional | User manual, Issue 22 (02.11.2022) |
|| fwversion | 3.46.0 |



Terms and definitions

CBR — Constant bitrate

DBA — Dynamic bandwidth allocation

ERPS — Ethernet Ring Protection Switching

FTP — File Transfer Protocol

FW — Firmware

GPON — Gigabit PON

HSI — High Speed Internet

IGMP — Internet Group Management Protocol

IP — Internet protocol

MLD — Multicast Listener Discovery

OLT — Optical Line Terminal

ONT — Optical Network Terminal

ONU — Optical Network Unit

PCB — Printed Circuit Board

SLA — Service Level Agreement

SNTP — Simple Network time protocol

SNMP — Simple Network Management Protocol

SFP — Small Form-factor Pluggable

TFTP — Trivial File Transfer Protocol

URI — Uniform Resource Identifier

VEIP — Virtual Ethernet Interface Point

Notes and warnings

Notes contain important information, tips or recommendations on device operation and setup.


Warnings are used to inform the user about situations that may cause harm to a software and hardware complex, lead to malfunction or data loss.


Additional information, clarifications.

General information

Introduction

A GPON is a network of passive optical networks (PON) type. It is one of the most effective state-of-the-art solutions for the 'last mile' issue that significantly reduces the required amount of cable and provides data transfer with downstream rate up to 2.5 Gbps and upstream rate up to 1.25 Gbps. Being used in access networks, GPON-based solutions allow end users to have access to new services based on IP protocol in addition to more common ones.

The key GPON advantage is the use of one optical line terminal (OLT) for multiple optical network terminals (ONT). OLT converts Gigabit Ethernet and GPON interfaces and is used to connect a PON network with data communication networks of a higher level.

The range of OLT GPON equipment produced by Eltex comprises of LTP-4X/LTP-8X terminals with internal Ethernet switch with RSSI function and 4/8 GPON ports respectively.

This user manual describes purpose, main technical specifications, installation order, rules of configuration, monitoring, and software update for the devices.

Purpose

The LTP-8X/4X optical line terminal is designed to establish connection with upstream equipment and provide broadband access across passive optical networks. Ethernet connection is established through Gigabit uplink and 10GBASE-X interfaces, GPON interfaces are used to connect to optical networks. Each PON interface allows connection of up to 128 subscriber optical terminals through one fibre and supports dynamic bandwidth allocation (DBA).

The following services are provided to end users:

The device supports the following functions:

Delivery package

The standard delivery package includes:

  1. LTP-4X/8X optical line terminal;
  2. Mounting set for 19'' rack;
  3. RS-232 DB9(F) — DB9(F) console cable for LTP rev.B; RJ-45 — DB9(F) console cable for LTP rev.С and rev.D;
  4. CD with User Manual and Quick Configuration Manual (optionally);
  5. Power cable (if equipped with 220 V power module);
  6. Passport.

Technical specifications

Table 1 — Main specifications of the line terminal

Interfaces

Number of Ethernet interfacesLTP-8X10
LTP-4X6
ConnectorRJ-45SFP
Data rate10/100/1000 Mbps duplex/half-duplex1000/10000 Mbps duplex
Standards10/100BASE-TХ, 1000BASE-T1000BASE-X, 10GBASE-X
StandardsIEEE 802.1D, IEEE 802.1p, IEEE 802.1Q
Number of PON interfacesLTP-8X8
LTP-4X4
Connector typeSC/UPC (socket)
in accordance with ITU-T G.984.2, FSAN Class B+, FSAN Class С++, SFF-8472
Transmission mediumFibre optical cable SMF — 9/125, G.652
StandardsDigital RSSI (Received Signal Strenght Indication)
Splitting ratio1:4, 1:8, 1:16, 1:32, 1:64, 1:128

Class B+

Class C++

Range of coverage20 km40 km
Transmitter1490 nm DFB Laser1490 nm DFB Laser
Data rate2488 Mbps2488 Mbps
Average output power+1,5..+5 dBm+7..+10 dBm
Spectral linewidth with -20dB1.0 nm1.0 nm
Receiver1310 nm APD/TIA1310 nm APD/TIA
Data rate1244 Mbps1244 Mbps
Receiver sensitivity-28 dBm-32 dBm
Receiver optical overload-8 dBm

-12 dBm

Processor
Clock frequency800 MHz
Core quantity1
RAMLTP-4X/8Х rev.B512 MB
LTP-4X/8Х rev.С512 MB
LTP-4X/8Х rev.D512 MB
Non-volatile memoryLTP-4X/8Х rev.B512 MB
LTP-4X/8Х rev.С512 MB
LTP–4X/8Х rev.D512 MB
Switch
Bandwidth128 Gbps
MAC table16К entries
VLAN supportup to 4K in accordance with 802.1Q
Quality of Service (QoS)8 prioritized egress queues per port
Control
Local controlCLI — Command Line Interface
Remote controlCLI (SSH2, Telnet), SNMP
MonitoringСLI, SNMP
Access restrictionby password, IP address, MAC address, privilege level
General parameters
Power supply

AC: 150–250 V, 50 Hz
DC: 36–72 V


Power supply options for LTP-4X/8X rev.C, LTP-4X/8Х rev.D:

  • single AC or DC power supply;
  • two hot-swappable AC or DC power supplies.
Maximum power consumptionLTP-8X rev.Bno more than 50 W
LTP-8X rev.C/rev.Dno more than 55 W
LTP-4X rev.Bno more than 40 W
LTP-4X rev.C/rev.Dno more than 50 W
Operating temperature rangefrom -5 to +40 °C
Relative humidityup to 80 %
Dimensions (W ×H × D)19", 1U
Dimensions with installed power module:
LTP-4X/8Х rev.B430 × 44 × 259 mm
LTP-4X/8Х rev.С430 × 44 × 317 mm
LTP-4X/8Х rev.D430 × 44 × 317 mm
WeightComplete set
LTP-4X/8Х rev.Bno more than 3.5 kg
LTP-4X/8Х rev.Сno more than 5 kg
LTP-4X/8Х rev.Dno more than 5 kg
Modules
Power module0.5 kg

Compatible SFP transceivers

Correct and error-free operation of GPON interface requires exact parameters to be chosen and set for each transceiver type. This can be done only under laboratory conditions by the terminal vendor.  The following table lists SFP transceivers for which seamless terminal operation is guaranteed.

DDMI (Digital Diagnostic Monitoring Interface) provides information on transceiver parameters, such as temperature, supply voltage, etc. DDMI also measures the level of ONT signal (RSSI). All compatible transceivers support this function.

Table 2 — List of compatible SFP transceivers

Vendor

SFP transceiver model

Class

DDMI

NEOPHOTONICS

PTB38J0-6538E-SC

B+

+

NEOPHOTONICS

38J0-6537E-STH1+

C++

+

NEOPHOTONICS

38J0-6537E-STH2+

C++

+

NEOPHOTONICS

38J0-6537E-STH3+

C++

+

Ligent Photonics

LTE3680M-BC

B+

+

Ligent Photonics

LTE3680M-BH

B+

+

Ligent Photonics

LTE3680P-BC

C+

+

Ligent PhotonicsLTE3680P-BC+1C++

Ligent Photonics

LTE3680P-BH

C+

+

Ligent Photonics

LTE3680P-BC2

C++

+

Fanghang

DLOLT43BCDS20

B+

+

Fanghang

DLOLT43CCDS20

C+

+

Fanghang

FH-DLT43CCDS20

C+

+

HisenseLTE3680M-BC+

B+

+

HisenseLTE3680P-BC+1C++
HisenseLTE3680P-BC+2C+++

Design

Front panel

The devices have a metal housing available for 19” form-factor rack mount; housing size is 1U. The front panel layout is shown in the figures below. Tables 3 and 4 list connectors, LEDs and controls located on the front panel of the terminal.

Figure 1 — LTP-4X rev.B front panel layout

Figure 2 — LTP-8X rev.B front panel layout


Figure 3 – LTP-4X rev.C/rev.D front panel layout 

 
Figure 4 — LTP-8X rev.C/rev.D front panel layout

Table 3 — Description of the connectors, LEDs, and controls located on the front panel of LTP-4X/8X rev.B

#

Front panel element

Description

1

Console

RS-232 console port for local control of the device

2

GE Port 0..3

4 RJ-45 connectors of 10/100/1000BASE-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)

3



Combo GE



0..3

4 chassis for SFP modules of 1000BASE-X uplink interface for connection to IP networks (for LTP-4X)

4 RJ-45 connectors of 10/100/1000BASE-T Gigabit uplink interfaces for connection to IP networks (for LTP-4X)

4..7

4 chassis for SFP modules of 1000BASE-X uplink interface for connection to IP networks (for LTP-8X)

4 RJ-45 connectors of 10/100/1000BASE-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)

4

10G/1G 0..1

2 chassis for SFP modules of 10GBase/1000BASE-X uplink interface for connection to IP networks

5

PON

4 chassis for SFP modules of xPON 2.5 G (for LTP-4X)

8 chassis for SFP modules of xPON 2.5 G (for LTP-8X)

6

Power

Device power indicator

7

Status

Device operation indicator

8

F

Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;
  • pressing the key for more than 10 seconds resets the device to factory default configuration. 

Configuring the response to a button click performs in the terminal CLI, for detailed description see Section System environment configuration.

Table 4 — Description of the connectors, LEDs, and controls located on the front panel of LTP-4X/8X rev.C, LTP-4X/8X rev.D

#

Front panel element

Description

1

Power

Device power indicator

2

Status

Device operation indicator

3

Fan

Fan operation LED

4

RPS

Redundant power supply LED

5

Console

Console port for local management of the device

Console cable pin assignment is shown in APPENDIX A. RS-232 NULL-MODEM CABLE PIN DESIGNATION

6

F

Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;
  • pressing the key for more than 10 seconds resets the device to factory default configuration.

7

GE Port 0..3

4 RJ-45 connectors of 10/100/1000BASE-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)

8

Combo GE

0..3

4 chassis for SFP modules of 1000BASE-X uplink interface for connection to IP networks (for LTP-4X)

4 RJ-45 connectors of 10/100/1000BASE-T Gigabit uplink interfaces for connection to IP networks (for LTP-4X)

4..7

4 chassis for SFP modules of 1000BASE-X uplink interface for connection to IP networks (for LTP-8X)

4 RJ-45 connectors of 10/100/1000BASE-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)

9

10G/1G 0..1

2 chassis for SFP modules of 10GBase/1000BASE-X uplink interface for connection to IP networks

10

PON

4 chassis for SFP modules of xPON 2.5 G (for LTP-4X)

8 chassis for SFP modules of xPON 2.5 G (for LTP-8X)


4 electrical Ethernet and 4 optical interfaces are combined (Combo GE 4..7). The combo ports may have only one active interface at the same time.

Rear panel

The rear panel layout of the device is depicted in Fig. 5, 6, 7.

Table below lists rear panel connectors. 

Figure 5 — LTP-4X/8X (DC) rear panel layout



Figure 6 — LTP-4X/8X (AC) rear panel layout


Figure 7 — Rear panel layout of LTP-4X/8X rev.C, LTP-4X/8X rev.D with two power modules

Table 5 — Rear panel connectors description

Rear panel element

Description

36 .. 72 VDC, max 5A

Connector for DC power supply

160–250 VAC, 50 Hz, max 1A

Connector for AC power supply

Fan0, Fan1

Ventilation units

Earth bonding point

Earth bonding point

Light indication 

The indicators located on the front panel show the status of the terminal. Indicator states are listed in Tables 6 and 7.

Table 6 — LTP-4X/8X rev.B status light indication

LED name

Indicator state

Device state

Power

Off

Power is off

Solid green

Power is on, normal device operation

Status

Flashes green

Normal operation

Flashes red

Critical failure

Table 7 — LTP-4X/8X rev.C/rev.D status light indication

LED name

Indicator state

Device state

Power

Solid green

Power is on, normal device operation

Off

Power is off

Red

The primary source of the main power supply is unavailable (in case the device is connected to a redundant power supply) or the main power supply failed

Status

Flashes green

Normal operation

Flashes red

Critical failure

Fan

Solid green

All fans are operational

Solid red

One or more fans are failed

RPS

Solid green

Redundant power supply is connected and operates correctly

Disabled

Redundant power supply is not connected

Red

The primary source of the redundant power supply is unavailable or the redundant power supply failed

Temperature sensors

2 temperature sensors are used to measure temperature inside the terminal case.

Figure below shows the sensor location on PCB.

Figure 8 — Temperature sensors allocation

Ventilation system

There are ventilation openings on the device rear, front and side panels that serve to remove heat. The rear panel has two ventilation units installed (Figure 5, Figure 6 and Figure 7).

Air flows in through the perforated front and side panels, circulates through all internal components, cools them down, and then it is removed by fans located on the perforated rear panel.

The device contains 2 fans. The ventilation units are detachable. The procedure for assembly and dismantling is described in Ventilation Units Replacement.

Safety rules and installation procedure

This chapter describes how to install the terminal in a rack and connect it to the power supply.

Safety requirements

General requirements
Any operations with the equipment should comply to the "Safety Regulations for Operation of Consumer's Electrical Installations".

Operations with the terminal should be carried out only by personnel authorised in accordance with the safety requirements.

  1. Before operating the device, all engineers should undergo special training.
  2. The terminal should be connected only to properly functioning supplementary equipment.
  3. The device could be permanently used under the following conditions:
  4. The terminal should not be exposed to mechanical shock, vibration, smoke, dust, water, and chemicals.
  5. To avoid components overheating which may result in device malfunction, do not block air vents or place objects on the equipment.

Electrical safety requirements

  1. Prior to connecting the device to a power source, ensure that the equipment case is grounded with an earth bonding point. The earthing wire should be securely connected to the earth bonding point. The resistance between the earth bonding point and earthing busbar should be less than 0.1 Ω. Any PC and measurement instruments should be properly grounded prior to their connection to the terminal. The potential difference between the equipment case and the cases of the instruments should be less than 1 V.
  2. Prior to turning the device on, ensure that all cables are undamaged and securely connected.
  3. Make sure the device is off, when installing or removing the case.
  4. Power modules of LTP-X rev.B should be replaced only when the device is powered off. Follow the procedure in Terminal installation. Power modules of LTP-X rev.C/rev.D terminals can be installed and removed without powering the device off.
  5. Follow the instructions given in SFP transceivers replacement to install or remove SFP transceivers. This operation does not require the terminal to be turned off.

Terminal installation

Check the device for visible mechanical damage before installing and turning it on. In case of any damage, stop the installation, fill in a corresponding document and contact your supplier. If the terminal was exposed to low temperatures for a long time before installation, leave it for 2 hours at ambient temperature prior to operation. If the device was exposed to high humidity for a long time, leave it for at least 12 hours in normal conditions prior to turning it on.

Support brackets mounting
The delivery package includes support brackets for rack installation and mounting screws to fix the terminal case on the brackets. To install the support brackets:

Figure 9 — Support brackets mounting

Terminal rack installation
To install the terminal to the rack:

Figure 10 — Device rack installation

The terminal is horizontally ventilated. The side panels have air vents. Do not block the air vents to avoid components overheating and subsequent terminal malfunction.

To avoid overheating and provide necessary ventilation of the terminal, sufficient space should be provided above and below the terminal, not less than 10 cm.

Power module installation

Depending on power supply requirements, the LTP-4X/8X rev.B terminals can be supplemented with either an AC power module, 220 V, 50 Hz, or a DC power module, 48 V. Location of the power module is shown in Figure 11.


Figure 11 — Power module installation

The LTP-4X rev.C/rev.D and LTP-8X rev.C/rev.D terminals can use one or two power modules. The second power module installation is necessary when greater reliability is required. In case of using two power modules, it is allowed to use different power plants for supplying (with different voltage).


Figure 12 — Power module installation for LTP rev.C/rev.D

From the electric point of view, both places for power module installation are identical. In the context of device operation, the power module located closer to the edge is considered as the main module, and the one closer to the centre — as the backup module. Power modules can be inserted and removed without powering the device off. When additional power module is inserted or removed, the terminal continues operation without reboot.
To install a power module:

The device installation order:

Getting started with the terminal

Connecting to the terminal CLI

This chapter describes various connection methods for Command Line Interface (CLI) of the terminal.

A serial port (hereafter — COM port) is recommended to use for the initial configuration of the terminal.

Connecting to CLI via COM port

This type of connection requires PC either to have an integrated COM port or to be supplied with an USB-COM adapter cable. The PC should also have a terminal program installed, e. g. Hyperterminal.

image035.png

Figure 13 — Connecting the terminal to a PC via COM port

Connecting to CLI via Telnet protocol

The Telnet protocol connection is more universal than the connection via COM port. Connection to CLI can be established directly at the terminal location or via an IP network with the help of a remote desktop.

This section considers direct connection to CLI at the terminal location. Remote connection is similar, but requires changes in the terminal IP address that will be considered in detail in the Network Settings section.

In order to be connected to the terminal, a PC should have a Network Interface Card (NIC). Additionally you will need a network cable (Patching Cord RJ-45) of the required length, as it is not included in the
terminal delivery package.

image037.png

Figure 14 — Connecting the terminal to a PC via network cable

image039.png

Figure 15 — Network connection configuration

image041.png

Figure 16 — Telnet client startup

Connecting to CLI via Secure Shell protocol

Secure Shell connection (SSH) has functionality similar to the Telnet protocol. However, as opposed to Telnet, Secure Shell encrypts all traffic data, including passwords. This enables secure remote connection via public IP networks.

This section considers direct connection to CLI at the terminal location. Remote connection is similar, but requires changes in the terminal IP address that will be considered in detail in the Network Settings section.

In order to be connected to the terminal, a PC should have a Network Interface Card (NIC). The PC should have an SSH client installed, e. g. PuTTY. Additionally you will need a network cable (Patching Cord RJ-45) of the required length, as it is not included in the terminal delivery package.


Figure 17 — SSH client startup

Getting started with terminal CLI

CLI is the main means of communication between user and the terminal. This chapter considers general operations in CLI: commands grouping, automatic code completion, and history.

CLI views hierarchy

Views are used in the terminal CLI to group commands and optimize their length.

Figure 18 shows a graphic chart of main views and the commands to switch between them.

 
Figure 18 — CLI mode hierarchy


Figure 19 — Switch view hierarchy


 
Figure 20 — Configure view hierarchy

Figure 20 shows the Configure view, which consists of four parts:

CLI hotkeys

In order to speed up the operations with the command line, the following hotkeys have been added:

Hotkey

Result

Ctrl+C

Termination of the current operation; clear line

Ctrl+D

Transition up one level

Ctrl+Z

Transition to root section

Ctrl+A

Transition to the beginning of line

Ctrl+E

Transition to the end of line

Ctrl+U

Removal of characters to the left of a cursor

Ctrl+К

Removal of characters to the right of a cursor

Ctrl+W

Remove a word

Ctrl+B

Transition of a cursor one position backwards

Ctrl+F

Transition of a cursor one position ahead

CLI automatic command completion

In order to make work with CLI faster and easier, an automatic command completion is implemented. A good knowledge of CLI command system allows user to work with CLI as fast as with graphical interface.

For example, enter the ex command in the Top view and press <Tab>.

LTP-8X# ex<Tab> 
LTP-8X# exit

As this view has only one command with the ex prefix, CLI automatically completes it.

If there are several commands with this prefix, CLI shows hints with possible options.

LTP-8X# co<Tab> 
commit configure copy 
LTP-8X# con<Tab> 
LTP-8X# configure

CLI command history

Sometimes it might be necessary to execute the same set of operations several times. To make the work with repeating commands easier, the terminal CLI keeps the command history.

The list of previously entered commands can be displayed by using the show history command.

LTP-8X# show history 
Last CLI commands: 
show version 
configure terminal 
exit 
show history
LTP-8X#

Use the <Up> and <Down> cursor keys to scroll the command history and the <Enter> key to execute the selected command.

LTP-8X# <Up> 
LTP-8X# show management <Up> 
LTP-8X# switch <Up> 
LTP-8X# exit <Up> 
LTP-8X# show uptime <Enter> 
up 1 day, 23:44

Group operations

Group operations can be performed on such terminal configuration objects as interfaces and ONT. It is especially convenient, when you have to apply the same actions to multiple objects.

To perform a group operation, select the range of object IDs instead of one object ID. This feature is supported by a majority of CLI commands.

For example, enable fec for all ONTs in a certain channel.

LTP-8X(config)# interface ont 0/0-127 
LTP-8X(config)(if-ont-0/0-127)# fec

Or view the list of active ones in the first 4 GPON channels.

LTP-8X# show interface ont 0-3 ont online 

GPON-port 0 has no online ONTs
GPON-port 1 has no online ONTs
GPON-port 2 has no online ONTs
GPON-port 3 has no online ONTs

Total ONT count: 0

Configuring the terminal

Terminal configuration

A collection of all terminal settings is referred to as configuration. This chapter provides information on the parts which configuration consists of. It also defines lifecycle of configuration and describes main operations, which can be performed.

Configuration structure

The terminal configuration can be conventionally divided into 3 parts. Figure below shows the configuration structure.

 
Figure 21 — Terminal configuration structure

System is a general system part. This group includes such settings as: network, service settings, user table, etc.
Switch represents a switch configuration. This group includes configuration parameters for Ethernet interfaces of the front panel, as well as VLAN settings.
GPON contains 5 subparts:

Configuration lifecycle

The terminal configuration may have the following states:

The RUNNING configuration is loaded to a new CLI session and becomes available for review (CANDIDATE). After changing the configuration (CANDIDATE) in the CLI session, user can either enter the commit command to accept the changes or use the rollback command to discard the changes and apply the current (RUNNING) configuration. The save command saves the RUNNING configuration into NVRAM of the terminal.
Figure below shows a chart of configuration lifecycle.


Figure 22 — Configuration lifecycle of the terminal diagram

Configuration autosave

In some cases, for example, when several operators are working on the terminal or the terminal is automatically configured through OSS/BSS, it may be convenient to organize a centralized saving of the configuration into NVRAM at a specified time or at a specified time interval. The terminal allows this with the help of a configuration autosave mechanism.

For daily autosave of the configuration, define a time when autosave should be implemented.

LTP-8X(config)# config autosave hour 3 minute 44

For autosave at specified time intervals, define the interval in seconds.

LTP-8X(config)# config autosave period 3600

Check the entered data by using the do show config command.

LTP-4X(config)# do show config 
	Config: 
		Daily autosave: at 03:44 
		Periodic autosave: every 3600 seconds 
	   LTP-4X(config)#

For disabling a mode, use the no command.

LTP-4X(config)# no config autosave hour 
LTP-4X(config)# no config autosave period

Apply the changes.

LTP-8X(config)# do commit

Creating a configuration backup

Configuration backups allow the terminal operation to be quickly restored after abnormal situations or replacement. Manual or triggered (on events) creation of backups is recommended at a regular basis.

Terminal configuration is uploaded to a TFTP server which is available in the management network. The copy command is used to upload the data. Pass the uploaded terminal configuration fs://config and destination URI as parameters.

LTP-8X# copy fs://config tftp://192.168.1.1/config 
Upload backup file to TFTP-server..

  Configure a triggered upload to create backups automatically.

Configuration restore

The terminal configuration is restored from the TFTP/FTP/HTTP server which is available in the management network. The copy command is used to restore the data. Define source URI as parameter and fs://config as restored configuration.

LTP-8X# copy tftp://10.0.105.1/config fs://config 
	Download file from TFTP-server.. 
	Reading of the configuration file.. 
	Configuration have been successfully restored (all not saved changes was lost)

Configuration reset

To reset a terminal configuration to factory settings, use the default command.

LTP-8X# default 
	Do you really want to set up default configuration? (y/n) y 
	Configuration have been reseted to default. 

	Terminal will be reloaded.


Resetting a configuration of a remote terminal also resets network settings. The terminal will not be available for operation until the network settings are reconfigured.

Network settings

This chapter describes adjustment of network settings for the terminal. Adjusting network settings enables remote control and integration with OSS/BSS systems.

Network parameters configuration

It is recommended to adjust network settings via COM port connection. This will prevent issues with connection loss upstream the terminal being adjusted. Be very careful when using remote adjustment.

User management

This chapter is devoted to management of the terminal users.

The factory settings provide only one user, i. e. the device administrator.


login: admin
password: password


When starting to configure the terminal, it is recommended to change the password of the 'admin' user.

For security reasons, there is a strictly defined set of permissions, which can be delegated to terminal users. For these purposes, each user gets his own level of privileges. Level 0 corresponds to a minimum set of permissions, Level 15 — to a maximum set of permissions.

CLI commands are ranked by the level of privileges. Level 0 commands are available to all users. Level 15 commands are available only to Level 15 users. Thus, the level of commands available to a user does not exceed the user's level.

The levels of privileges can be modified as required.

User list preview

To view the list of terminal users, enter the show users config command.

LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15

The admin, root and remote users always exist and cannot be deleted or duplicated. The terminal supports up to 16 users.

Adding a new user

In order to operate effectively and safely, the terminal, as a rule, requires one or several additional users. To add a new user, enter the user command in the configure view.

LTP-8X(config)# user operator
LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15
     4            operator            0
LTP-8X(config)#

Pass the name of the new user to the user command as a parameter. The name should not be longer than 32 characters. The name should not contain special characters.

Changing user password

To change user password, enter the user command. Pass the user name and a new password as parameters.

LTP-8X(config)# user operator password newpassword

The password should not be longer than 31 characters and shorter than 8 characters. If the password contains a space, use quotations for the password.

Viewing and changing user access rights

To manage user access rights, a user priority system is implemented. A newly created user is granted with a minimal set of permissions.

LTP-8X(config)# user operator
LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15
     4            operator            0
LTP-8X(config)#

To change the user priority level, enter the user command. Pass the user name and a new priority as parameters.

LTP-8X(config)# user operator priviledge 15
LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15
     4            operator           15
LTP-8X(config)#

Deleting a user

To delete a user, enter the no user command in the configure view. Pass the user name as a parameter.

LTP-8X# configure terminal 
LTP-8X(config)# no user operator

ААА configuration

This chapter describes configuring of services and protocols related to authentication, authorization and accounting.

Hereafter, the term 'authorization' means authorization of the commands — definning rights for executing commands on a remote server.

Authorization of a user — a process of obtaining a specified permission set, combined with authentication process.

LTP-X supports radius and tacacs+ AAA protocols. Below is a table of the functionality of these protocols.

Table 10 — Permissions and the required level of privileges

Function and protocol

Tacacs+

Radius

Authentication

+

+

Authorization

+

-

Accounting start-stop

+

+

Accounting commands

+

-

Configuring servers

The principles of servers configuration are common for supported protocols. You can configure an IP address, key, response timeout and a data exchange port for each server. You can set up to 3 servers for the RADIUS. The LTP will apply to the servers according to their priorities. If the priority is not set, the 0 priority (the highest) will be used by default.

AAA methods configuration

By default, every AAA function is implemented locally — local user data base is used for authentication and authorization, accounting via a remote server is disabled.

For using of configured in previous steps servers, define a method of a function performing.

In case server configured for a function unavailable or key is not defined properly, the function will be implemented locally.

Services configuration

This chapter describes configuration of integrated terminal services.

SNMPD configuration

To work with the Eltex.EMS management system, the terminal should be configured to work with Simple Network Management Protocol (SNMP).

The types and purpose of SNMP traps are closely connected with the log of active alarms.

You need to configure users to operate with SNMPv3. 

The SNMPv3 agent supports authNoPriv and authPriv methods. The encryption of the password performs according to the MD5 algorithm.

NTPD configuration

The terminal has no integrated real-time clocks with a battery. For the events in system log to show correct time and for automated operations to be performed in time, time synchronisation should be adjusted with the help of the NTP protocol.

ACSD and DHCPD configuration

The terminal has an integrated auto configuration server (ACS). To ensure interaction between ONTs and ACS, ONTs should obtain IP addresses for their management interfaces. The terminal has an integrated DHCP server to solve this task. These two servers are interconnected and cannot work separately.

ACSD configuration

DHCPD configuration

LOGD configuration

System log collects terminal history data and allows its further display. Adjustment of system log operates with such terms as module, filter level, and output device.

image056.png
Figure 23 — Terminal system log

Messages of the system log are grouped into modules according to their functions. Configuration of the following modules is possible:

Table 11 — System log modules

Module

Description

alarm

Alarms log message

snmp

Messages from the SNMP agent

dhcpd

Messages from the integrated DHCP server

pmchal-ipc

Messages from the pmchal subsystem of interprocess communication

pmchal-gpon

GPON messages

pmchal-machine

Messages on operation of state machines for OLT, channels, and ONT

pmchal-olt

OLT general information

pmchal-gpon-port

Information about GPON channels

pmchal-ont

ONT information

pmchal-scheduler

Messages from the task scheduler subsystem

pmchal-rdn

Messages on GPON channels reservation

pmchal-dhcpra

Messages from DHCP Relay Agent

pmchal-dhcpv6ra

Messages from DHCPv6 Relay Agent

pmchal-pppoeia

Messages from PPPoE Intermediate Agent

A filtering level and additional display information can be specified for messages of each module.
The filtering level sets the minimum importance level of the messages to be displayed in the log. The used filtering levels are listed in Table 12.

Table 12 — System log filtering levels

Level

Description

emergency

Further operation of the system is not possible

alert

The system requires emergency intervention

critical

Critical events

error

Operation errors

warning

Warnings

notice

Important events during normal operation

info

Information messages

debug

Debug messages

none

Messages are not registered in the log


The emergency level is the maximum level, the debug level is the minimum one.


Enabling the debug logging level increases the load on the system produced by LOGD. It is not recommended to use debug mode unless necessary.

The log subsystem allows display of the terminal operation log on different devices. All output devices can be used simultaneously.

Table 13 — System log output device

Output device

Name

Description

System log

system

The system log allows the log to be displayed locally or with the help of the syslog server.

Console

console

Being used for log display, the console allows system messages to be visible as soon as they are received in the terminal connected to the Console port.

CLI sesions

rsh

Being used for log display, CLI sessions allow system messages to be visible as soon as they are received in all CLI sessions connected via telnel or SSH.

File

file

Logging into a file allows system messages to be written directly to the file, which can be sent to support specialists for further analysis.

The log is saved in non-volatile memory by default. The system has 4 log rotated files of 1M each. The last 3 logs are archived to gzip.

Module configuration

Consider module configuration by the example of the pmchal-gpon module responsible for messages from the GPON subsystem. Other modules have similar configuration process.

Configuring command logging to syslog

The system is capable to record all the user's commands to syslog. Use the following command to activate the function.

LTP-8X(config)# logging commands

Configuring the Origin parameter

The system can add an additional origin-id parameter to messages sent to the Syslog server. It will be added to the beginning of the log message.

Only one additional parameter can be used at a time.

LTP-8X(config)# logging origin-id 
   hostname      The sysname will be used as the hostname field of a
                 syslog message
   string        The user defined string will be used as the hostname
                 field of syslog header
   ip            The IP address of the sending interface will be used
                 as the hostname field of a syslog message

Configuring the log storage

Use the following command to record logs to non-volatile memory.

LTP-8X(config)# logging permanent

If you add "no" before the command, the logs will be recorded to RAM. In this case, the logs will be erased after reboot.

System log configuration

ALARMD configuration

ALARMD is a terminal alarms manager. Alarms manager enables troubleshooting and provides information about important events related to terminal operation.

A record in active alarms log (an event) corresponds to an event, which happened in the terminal. Types of events and their descriptions are provided in the following table.

Table 14 — Types of events in the active alarms log

Event

Description

Threshold

ram

Free RAM size decreased to the threshold

30 % *

login

User tried to log in or logged in by entering the credentials

-

config-save

User saved the configuration

-

firmware-update

LTP-8X firmware update completed successfully/with errors

-

duplicate-mac

Two devices with the same MAC addresses detected

-

physical-layer-flapping

Flapping on Ethernet ports

-

pon-gpon-port-no-ont

The first ONT connected/the last ONT disconnected on channel

-

ont-physical-layer

ONT connected/disconnected

-

olt-update

OLT chip firmware update completed successfully/with errors

-

ont-update

ONT chip firmware update completed successfully/with errors

-

gpon-port-flapping

GPON interface flapping

-

ont-flapping

ONT flapping

-

download

File download completed successfully/with errors

-

battery-power

Switch ONT to battery power

-

battery-low

ONT battery low

Set in ONT

lan-los

ONT Ethernet port lost connection

-

ont-config

Configuration of the connected ONT
valid/invalid

-

file-delete

File deleted successfully/with errors

-

physical-layer-errors

Physical layer errors on Ethernet ports

-

physical-layer-block

Ethernet port blocked

-

link

Ethernet port status changed (up/down)

-

logout

User logged out

-

ont-dying-gasp

Dying Gasp signal received from ONT

-

ont-rei

Remote Error Indication (REI)

-

ont-power-off

ONT power off

-

config-change

OLT configuration changed

-

shutdown

SNMP agent shut down

-

oms

OMS-MIB operation completed successfully/with errors

-

ont-state-changed

ONT status changed

-

ont-config-changed

ONT configuration changed

-

gpon-port-state-changed

OLT channel configuration changed

-

pon-alarm-gpon-port

Event related to OLT channel

-

pon-alarm-onui

Event related to ONT

-

ont-update-inprogress

Updating ONT firmware

-

olt-device-reset

Resetting OLT chip

-

ont-signal-degrade

The signal received from OLT is below the threshold value

-28 dBm

ont-high-rx-power

The signal received from ONT is above the threshold value

-8 dBm

ont-low-rx-power

The signal received from ONT is below the threshold value


gpon-port-ont-count-overflow

ONT number on channel exceeded


olt-device-not-working

GPON OLT configuration was loaded successfully/with errors

-

load-average

Average CPU load reached the threshold, estimated time is 1 minute

120*

free-space

Free drive space decreased to the threshold

30 %*

temperature

Temperature of one of the two OLT chips exceeded the threshold

60

fan

Fan rotation speed exceeded the safe operating limits

4800 < X
< 9000*

system-reboot

System reboot alarm message

-

rssi-update

RSSI value on ONT changed

-

storm-detected

The excess of the limit of broadcast/multicast/unknown unicast traffic transmission

-

power-supply

The status of the power supplies modules has been changed

-

ont-los-video-power

Loss of CaTV signal on ONT

-20

ont-low-video-power

Low CaTV signal level reached on the ONT

-10

ont-high-video-power

High CaTV signal level reached on the ONT

0



* The value can be adjusted.

Every record in the active alarms log has the parameters specified in Table 15 that are specified for every event type.

Table 15 — Parameters of events in the active alarms log

Token

Description

severity

Describes event severity. Has four statuses (info, minor, major, critical)

send-on-in

Specifies whether an SNMP trap should be sent when an event is added to the log. Has two states (true/false)

send-on-out

Specifies whether an SNMP trap should be sent when an event is deleted from the log. Has two states (true/false)

ttl

The time an event exists in the active alarms log (from 1 to 2,147,483,647). Specified in seconds. The parameter has several special values. 0 — the event exists in the log until a normalising event is received. –1 — an SNMP trap is sent (if specified), but the event is not recorded in the alarms log

Active alarms log configuration

VLAN Configuration

This chapter describes VLAN configuration in the terminal switch.

VLAN ( Virtual Local Area Network) is a group of devices, which communicate on the channel level and are combined into a virtual network, connected to one or more network devices (GPON terminals or switches). VLAN is a very important tool for creating a flexible and configurable logical network topology over the physical topology of a GPON network. VLAN has two or more switch interfaces. A VLAN member interface can be either tagged or untagged. An outgoing packet of a tagged interface has a VLAN tag. An outgoing packet of an untagged interface has no VLAN tags. For more information about the configuration and rules of operation of interfaces, see the VLAN Configuration.

Adding VLAN

CLI automatically switches view to work with the VLAN. The same command is used to configure existing VLANs.

VLAN Configuration

VLAN Deletion

Configuring access control list and policy

ACL (Access Control List) — the table which defined filtering rules for incoming traffic according to data transmitted in the incoming packets: protocols, TCP/UDP ports, IP address or MAC address. The ACL based on IPv4 and MAC should have different names. You can set one type of the lists per interface. Each access list contains up to 20 rules.

Configuring MAC access-list

In a MAC access list, filtering is implemented according to the following criteria and a mask:

Table 16 — The list of MAC access-list criteria

Criteria

Mask

Command example

Note

Src MAC

Yes

permit A8:F9:4B:00:00:00 FF:FF:FF:00:00:00 any

Mask 00:00:00:00:00:00 corresponds to any

Mask FF:FF:FF:00:00:00 corresponds to the address range A8:F9:4B:00:00:00 - A8:F9:4B:FF:FF:FF

Mask FF:FF:FF:FF:FF:FF corresponds to one specific address

Dst MAC

Yes

permit any A8:F9:4B:00:00:00 FF:FF:FF:00:00:00

Vlan

No

permit any any vlan 10


COS

Yes

permit any any vlan any cos 4 4

Mask 0 corresponds to any

Mask 4(100) corresponds to cos 4(100), 5(101), 6(110), 7(111)

Mask 7 corresponds to one specific cos

Ethertype

Yes

permit any any vlan any cos any ethertype 0x0800 0xFF00

Mask 0x0000 corresponds to any

Mask 0xFF00 corresponds to the range 0x0800 - 0x08FF

Mask 0xFFFF corresponds to one specific ethertype

LTP-8X# switch 
LTP-8X(switch)# configure terminal
LTP-8X(switch)(config)# mac access-list extended eltexsrc


Configuring IP access-list

The rules of an IP access list support criteria that are available in a MAC access-list

Table 17 — The list of the IP access list-criteria

Criteria

Mask

Command example

Note

Proto ID

No

permit tcp ...
permit udp ...
permit any ...
permit proto <id> ...


Src IP

Yes

permit any 10.10.0.0 255.0.255.0 any

Mask 0.0.0.0 corresponds to any

Mask 255.0.255.0 corresponds to the range 10.0.10.0 - 10.255.10.255

Mask 255.255.255.255 corresponds to one specific address

Dst IP

Yes

permit any any 10.10.0.0 255.0.255.0

DSCP

No

permit any any any dscp 48


Precedence

No

permit any any any precedence 7


Src MAC

Yes

permit any any any dscp any mac A8:F9:4B:00:00:00 FF:FF:FF:00:00:00 any

Mask 00:00:00:00:00:00 corresponds to 

any

Mask FF:FF:FF:00:00:00 corresponds to the address range A8:F9:4B:00:00:00 - A8:F9:4B:FF:FF:FF

Mask FF:FF:FF:FF:FF:FF corresponds to one specific address

Dst MAC

Yes

permit any any any dscp any mac any A8:F9:4B:00:00:00 FF:FF:FF:00:00:00

Vlan

No

permit any any any dscp any mac any any vlan 10


COS

Yes

permit any any any dscp any mac any any vlan any cos 4 4

Mask 0 corresponds to any

Mask 4(100) corresponds to cos 4(100), 5(101), 6(110), 7(111)

Mask 7 corresponds to one specific cos

Ethertype

Yes

permit any any any dscp any mac any any vlan any cos any ethertype 0x0800 0xFF00

Mask 0x0000 corresponds to any

Mask 0xFF00 corresponds to the range 0x0800 - 0x08FF

Mask 0xFFFF corresponds to one specific ethertype

Configuring ACL based on a bit mask

The filtering based on a bit mask is available in MAC and IP access-lists. The configuration is implemented with the help of offset-list.

Command format:

offset-list list1 <offset-type> <offset> <byte-mask> <byte-value> ...

You can configure up to 5 unique offset-lists on the OLT.

Table 18 — The list of the available offset-lists

offset-list

Type

Limits

mac

l2

0..127

mac

dst-mac

0..5

mac

src-mac

0..5

mac

inner-tag

0..1

mac

outer-tag

0..1

mac

ethtype

0..1

ip

l3

0..23

ip

l4

0..89


permit any any vlan any cos any ethertype any offset-list eltex1p

Configuring policies

Configuring policies allows you to perform various manipulations on classified traffic, such as cos, dscp, queue setting.

While the configuration, you should remember that deny in an ACL rule exclude the traffic from processing according to policy.

IGMP and MLD configuration in terminal switch

This chapter describes IGMP and MLD configuration in the terminal switch.

Enabling snooping

  • Snooping is globally enabled in all VLANs.
  • MLD snooping is not supported for Model 1.

Enabling report proxy

To enable proxy from all VLANs, use the "from all to <VLAN>" structure.

Interface сonfiguration

This chapter describes configuration of terminal interfaces.

Terminal interfaces can be divided into two groups: Ethernet interfaces and GPON interfaces. Ethernet interfaces are used for terminal connection to operator's network core. GPON interfaces are used for ONT connections.

 

Figure 24 — Set of terminal interfaces

Table 19 shows types of terminal switch interfaces.

Table 19 — Interfaces types and numbers

Interface

Note

Quantity

Range

10G-front-port


2

[0..1]

front-port

 

for LTP-4X

4

[0..3]

for LTP-8X

8

[0..7]

pon-port

for LTP-4X

4

[0..3]

for LTP-8X

8

[0..7]

Ethernet interface configuration

Configuring Storm Control

A storm appears due to excessive number of broadcast or/and multicast messages transmitted on the network via a single port simultaneously. It leads to an overload of the network resources and appearing of delays. A storm also can be caused by loopback segments of an Ethernet network. The switch evaluates the rate of incoming broadcast, multicast and unknown unicast traffic for port with enabled Storm Control and drops packets if the rate exceeds the set maximum value.

There is an opportunity to record a storm event to the log and disable the port for a specified time (in seconds).

LTP-8X(switch)(config-if)# rate-limit uu 1000 2048 
LTP-8X(switch)(config-if)# rate-limit mc 1000 2048 logging 
LTP-8X(switch)(config-if)# rate-limit bc 1000 2048 logging shutdown 30

For manual enabling of the port after blocking by Storm Control, use the clear storm command.

LTP-8X(switch)# clear storm front-port 0

GPON interface configuration

GPON port force enable

LTP-X devices have the ability to forcibly enable GPON ports that are disabled in the configuration

LTP-8X# show interface gpon-port 7 state 
    Reading:  .
    Gpon-port status information:
        Gpon-port:                             7
        State:                          DISABLED
        ONT count:                             0
        Force-mode:                     disabled
        ONT autofind:                    enabled
        SFP vendor:                       Ligent
        SFP product number:          LTE3680M-BC
        SFP vendor revision:                 1.0
        SFP temperature [C]:                  67
        SFP voltage [V]:                    3.28
        SFP tx bias current [mA]:            n/a
        SFP tx power [dBm]:                  n/a

To forcibly enable the port, put it into the force mode. The command is applied without entering the commit command.

LTP-8X# force-mode interface gpon-port 7


The command will not apply to an enabled gpon-port.

As a result, the port will be enabled until the next reconfiguration or reboot.

LTP-8X# show interface gpon-port 7 state 
    Reading:  .
    Gpon-port status information:
        Gpon-port:                             7
        State:                                OK
        ONT count:                             0
        Force-mode:                      enabled
        ONT autofind:                    enabled
        SFP vendor:                       Ligent
        SFP product number:          LTE3680M-BC
        SFP vendor revision:                 1.0
        SFP temperature [C]:                  65
        SFP voltage [V]:                    3.25
        SFP tx bias current [mA]:          16.81
        SFP tx power [dBm]:                 3.34


The force-mode command stops if the device is reconfigured or rebooted, because it is not saved in the configuration.

Unknown-multicast traffic forwarding

LTP-X devices have the ability to forward unknown-multicast to broadcast-gem-port. Configuration is performed for each GPON port separately.

LTP-8X# configure terminal
LTP-8X(config)# interface gpon-port 0
LTP-8X(config)(if-gpon-0)# unknown-multicast-forward enable
LTP-8X(config)(if-gpon-0)# unknown-multicast-forward to broadcast-gem


This functionality is required for some protocols, such as IS-IS.

After applying the settings, the specified GPON port will be reconfigured, which will lead to the reconfiguration of all ONTs on the port.

GPON ports redundancy configuration

GPON port redundancy is designed to increase the reliability of the PON network. There are several types of redundancy: Type-A, Type-B, Type-C and Type-D. LTP-X supports Type-B redundancy. Type-B redundancy provides the ability to automatically switch between channels by using an additional GPON port. There are several ONT connection schemes (Figure 25 and Figure 26).

Figure 25 — Type-B redundancy. Connection scheme 1

Figure 26 — Type-B redundancy. Connection scheme 2

Before beginning to operate with redundancy, make sure that OLT supports it.

Redundancy is supported on the following boards:

The necessary information can be obtained by using the show system environment command.

LTP-8X# show system environment 
    System information:
        CPU load average (1m, 5m, 15m):   0.60  0.44  0.31
        Free RAM/Total RAM (Mbytes):      175/495
        Temperature (sensor1/sensor2):    40C/50C
        Reset button:                     enabled

        Fan configured speed, %:          auto
        Fan minimum speed, %:             15
        Fan speed levels, %:              16 27 39 51 64 76 88 100 

        Fan state (fan0/fan1):            8640rpm  8760rpm

        PLD FW version:                   14 

        TYPE:                             LTP-8X-rev.C 
        HW_revision:                      1v4 
        SN:                               GP2B000860 
        MAC:                              E0:D9:E3:DF:E4:D0 

        Power supply information:
                Module 1: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1
                Module 2: PM150(75) 48/12 1vX
                        Type: Direct current(DC)
                        Intact: 0

Before connecting an ONT, check the list of supported ONTs (Table 20). For the proper redundancy operation, it is necessary to connect ONT to OLT according to one of the schemes (Figure 25 and Figure 26).

Table 20 — List of supported ONTs

Device

The version with which support began

NTU-1(C)

3.26.4

NTU-1 rev.B

3.28.1

NTU-RG-5421G(С)-Wac

1.2.1

NTU-RG-5421G-Wz

NTU-52V(C)

NTU-RG-5402G-W

NTU-RG-5440G-Wac

2.1.0

NTU-RG-5440G-Wz

In case of malfunction on the main channel, such as line breakage, there will be a seamless channel change — the redundant channel will become the main channel, the main channel in this case will go to redundant state. Seamless channel change is the transition of all ONTs from the main channel to the redundant channel without interrupting client sessions.

LTP-8X# show interface ont 0-1 redundant

-----------------------------------
GPON-port 0 ONT redundant list
-----------------------------------

        ##         Serial   ONT ID   GPON-port      Status   RSSI[dBm]     Version   EquipmentID
         1   ELTX62108400        2           0   REDUNDANT         n/a   3.28.1.69         NTU-1

-----------------------------------
GPON-port 1 ONT redundant list
-----------------------------------

        ##         Serial   ONT ID   GPON-port   Status   RSSI[dBm]     Version   EquipmentID
         1   ELTX62108400        2           1       OK      -14.85   3.28.1.69         NTU-1

Total ONT count: 2


Once the communication line is restored, there will be no switching back. The next switch will only occur if there is a malfunction on the current main channel.

Port Mirroring configuration

Port mirroring is used to duplicate the traffic on monitored ports by sending ingress or and/or egress packets to the controlling port. Users can define a controlled port and controlling ports and select the type of the traffic (ingress or egress), which will be sent to the controlling port.

Configuration of the controlled port

Configuration of the controlling port

LLDP configuration

Link Layer Discovery Protocol (LLDP) is a Data link layer protocol that allows network devices to announce information about themselves and their capabilities to the network, as well as to collect this information about neighboring devices. The standard RFC mib 1.0.8802 are supported by the SNMP agent.

LLDP configuration

LTP-8X(switch)(config)# lldp lldpdu flooding


LTP-8X(switch)(config)# commit



ERPS configuration

ERPS (Ethernet Ring Protection Switсhing) — link layer protocol designed to increase the stability and reliability of a data network by creating a ring topology with logical blocking of interfaces. It is realized by reducing recovery network time in case of breakdown. Recovery time does not exceed 1 second. It is much less than network change over time in case of spanning tree protocols usage.

ERPS configuration

ARP-Inspection configuration

The ARP Inspection function is dedicated to defense against attacks which use ARP (for instance, ARP-spoofing — ARP traffic interception). ARP Inspection is implemented on the basis of static correspondence between IP and MAC addresses defined for VLAN.

ARP-Inspection configuration

QoS rules configuration

The traffic prioritization and allocation by hardware queues (IEEE 802.1p/DSCP) are implemented on the basis of set rules in the system.

Table 21 — Traffic prioritization methods

Method

Description

0

All the priorities are equal

1

Packet selection according to IEEE 802.1p

2

Packet selection only according to IP ToS (Type of Service) on 3 level — support for Differentiated Services Codepoint (DSCP)

3

Interaction according to either 802.1p or DSCP/TOS

Weighted Round Robin (WRR) configuration

Weighted Round Robin (WRR) — an algorithm which distribute throughput by classes, using a scheme of weighted round robin. The OLT has 8 hardware queues.

LAG configuration

This chapter describes configuration of uplink interfaces aggregation. Link aggregation (IEEE 802.3ad) is a technology that allows multiple physical links to be combined into one logical link (aggregation group). Aggregation group has a higher throughput and is very reliable.

Figure 27 — Multiple physical links combined to an aggregation group

The terminal supports two interface aggregation modes: static and dynamic. Static aggregation implies that all communication links of a group are always active. As for dynamic aggregation, link activity is dynamically determined during operation via LACP protocol.

Table 22 — Operation modes of aggregation groups

Mode

Description

static

Link aggregation protocol is not used

lacp

LACP is used

The terminal has several algorithms of load balancing within aggregation groups.

Table 23 — Load balancing modes

Mode

Description

ip

Based on IP addresses of sender and receiver

ip-l4

Based on IP addresses of sender and receiver, and L4

mac

Based on MAC addresses of sender and receiver

mac-ip

Based on MAC and IP addresses of sender and receiver

mac-ip-l4

Based on MAC and IP addresses and L4 of sender and receiver

The terminal supports two LACP modes. Passive — the terminal does not initiate creation of a logical link, but processes incoming LACP packets. Active — the terminal creates an aggregated communication link and initiates parameters conformance. The parameters are coordinated if equipment operates in active or passive LACP modes.

LAG configuration

LAG configuration represents configuration of static aggregation and LACP. To configure LAG, perform the steps marked blue in Figure 28. LACP configuration requires all steps to be performed.


Figure 28 — LAG and LACP configuration procedure

DHCP Relay Agent configuration

This chapter describes configuration of DHCP Relay Agent in the terminal.

DHCP Relay Agent is used to provide a DHCP server with additional information about a received DHCP request. This may include information about the terminal running DHCP Relay Agent as well as information about the ONT, which sent the DHCP request. DHCP packets are modified by interception and further processing in the terminal CPU.

The DHCP server analyses DHCP option 82 and identifies the ONT. DHCP Relay Agent allows the option to be both transparently transmitted from the ONT and formed/rewritten according to a specified format. DHCP option 82 is especially useful for networks, which have no private VLANs dedicated for each user.

DHCP Relay Agent supports configurable formats for both Circuit ID and Remote ID. The format of the suboptions is configured with the help of the tokens listed in Table 24. The placeholders will be replaced with corresponding values, while the rest of the words will be passed as is.

Table 24 — DHCP Option 82 tokens

Token

Description

%HOSTNAME%

Terminal network name

%MNGIP%

Terminal IP address

%GPON-PORT%

Number of the OLT channel the DHCP request arrived from

%ONTID%

ID of the ONT, which sent the DHCP request

%PONSERIAL%

Serial number of the ONT, which sent the DHCP request

%GEMID%

ID of the GEM port the DHCP request arrived to

%VLAN0%

External VID

%VLAN1%

Internal VID

%MAC%

MAC address of the ONT, which sent the request

%OLTMAC%

OLT MAC address

%OPT60%

DHCP option 60 received from the ONT

%OPT82_CID%

Circuit ID received from the ONT

%OPT82_RID%

Remote ID received from the ONT

%DESCR%

First 20 characters of ONT description

In addition to DHCP option 82, DHCP Relay Agent has some more functions related to network security. It provides protection from DoS attacks by setting a threshold for intensity of DHCP messages, which are received from ONT. Exceeding the threshold blocks DHCP requests. The blocking time can be configured.

It also protects from illegal DHCP servers by controlling the source IP address of DHCP responses. Transmitted are only the DHCP responses, which arrived from IP addresses of trusted DHCP servers.

DHCP Relay Agent profiles management

A set of profiles is used for DHCP Relay Agent configuration. All VLANs use dhcp-ra-00 profile by default.

The configuration is flexible as it allows DHCP profiles to be assigned not only to a terminal on the whole, but separately to each VLAN as well. To assign a profile, the following steps should be taken.

DHCP Relay Agent profiles configuration

Active DHCP leases monitoring

When enabled, DHCP-RA allows monitoring of DHCP leases. To view the list of sessions, use the do show interface gpon-port 0 dhcp sessions command.

LTP-4X# show interface gpon-port 1 dhcp sessions 
    DHCP sessions (2):
##      Serial       ONT  Service       IP                 MAC          Vid    GEM  Life time
1  454C5458690000E8  1/4    1     192.168.101.102  A8:F9:4B:E5:67:8B    1101   433   3587
2  454C5458690000E8  1/4    0     192.168.200.51   A8:F9:4B:E5:67:8A    600    432   86307

It is also possible to remove dynamic entries from the DHCP snooping table with the clear dhcp-sessions interface ont command.

LTP-8X# clear dhcp-sessions interface ont <0-7>[/0-127]

Broadcast-unicast relay configuration

To reduce the broadcast traffic and avoid responses from illegal DHCP-servers, unicast messages can be configured to interact with the specified DHCP Relay Agent. Relay Agent can be individually started for each separate VLAN. The service allows processing only for the packets, which have only one 802.1q tag.

PPPoE Intermediate Agent configuration

This chapter describes configuration of PPPoE Intermediate Agent of the terminal.

PPPoE Intermediate Agent is used to provide BRAS with additional information about a received PADI request. This may include information about the terminal running PPPoE Intermediate Agent as well as information about the ONT, which sent the PADI request. PADI packets are modified by interception and further processing in the terminal CPU.

BRAS analyses the Vendor Specific tag and identifies the ONT. PPPoE Intermediate Agent forms or rewrites the Vendor Specific tag using a specified format. Vendor Specific tags are especially useful for networks, which have no private VLANs dedicated for each user.

PPPoE Intermediate Agent supports configurable formats for Circuit ID and Remote ID. The format of the suboptions is configured with the help of the tokens listed in Table 25. The placeholders will be replaced with corresponding values, while the rest of the words will be passed as is.

Table 25 — Vendor Specific tag tokens

Token

Description

%HOSTNAME%

Terminal network name

%MNGIP%

Terminal IP address

%GPON-PORT%

Number of the OLT channel the PADI request arrived

%ONTID%

ID of the ONT, which sent the PADI request

%PONSERIAL%

Serial number of the ONT, which sent the PADI

%GEMID%

ID of the GEM port the PADI request arrived to

%VLAN0%

External VID

%VLAN1%

Internal VID

%MAC%

MAC address of the ONT, which sent the request

%OLTMAC%

OLT`s MAC address

%DESCR%

First 20 characters of ONT description

In addition to vendor specific tag support, PPPoE Intermediate Agent has some more functions related to network security. It provides protection from DoS attacks by setting a threshold for intensity of PADI messages, which are received from ONT. Exceeding the threshold blocks PADI requests. The blocking time can be configured.

PPPoE Intermediate Agent also limits the number of simultaneous PPPoE sessions. The restriction can be set for both the total number of terminal sessions and for every ONT separately.

PPPoE Intermediate Agent profile configuration

To configure a PPPoE Intermediate Agent profile, the following steps should be taken.

Active PPPoE sessions monitoring

Enabling PPPoE-IA allows active PPPoE sessions to be monitored. To view the list of sessions, use the following command.

LTP-8X(config)(if-ont-0/4)# do show interface gpon-port 0 pppoe session 
PPPoE sessions (1):
 ## Serial            GPON-port Ont ID  Port  Client             Session ID   Duration    Unblock
 1  454C54586700008C  0         4        353   A8:F9:4B:E3:16:5C  0x0003       0:00:27     0:00:00

Disabling session monitoring

The session monitoring is enabled in PPPoE-IA by default. Due to the fact that system resources are used for each session, in this mode, there are 8192 sessions to be initialized through the OLT (the maximum session-limit value).

If you need to bypass this limit and save opportunity to fill the Vendor-Specific tag fields, you can disable the monitoring. Use the following command.

LTP-8X(config-pppoe-ia)("pppoe-ia-00")# no sessions-monitoring enable 
LTP-8X(config-pppoe-ia)("pppoe-ia-00")# do commit

To enable the monitoring, use the command:

LTP-8X(config-pppoe-ia)("pppoe-ia-00")# sessions-monitoring enable 
LTP-8X(config-pppoe-ia)("pppoe-ia-00")# do commit


PPPoE-IA is capable to detect sessions which are established while session monitoring is enabled. If a session was established before monitoring being enabled, re-initiate the session.

IP Source Guard configuration

The IP Source Guard function allows restriction of unauthorised usage of IP addresses in the network by linking IP and MAC addresses of the source to a specific service on a specific ONT. There are two operation modes:

  1. To enable transmission of any traffic from clients, it is necessary to specify an explicit match between MAC and IP addresses of client equipment.
  2. Client equipment obtains its address via the DHCP protocol. Based on data exchange between client equipment and the DHCP server, a DCHP snooping table is generated on the OLT that contains MAC-IP-GEM port matches and information about lease period. Only the packets with source MAC and source IP fields matching the records in the DHCP snooping table are passed from the client. To support client equipment with static IP addresses, static entries can be created in the dynamic mode.

To enable the IP Source Guard functions, enable DHCP-RA. For more information on DHCP-RA, see DHCP Relay Agent configuration.
These functions are not supported in Model 1 (for more information about models, see Service Models).

When IP Source Guard is enabled, any non-IP traffic is forbidden.

IP Source Guard configuration

After the IPSG mode has been enabled/disabled/changed, the OLT is reconfigured automatically.

To enable DHCP session reset for a device with the same MAC address, there is an option:

LTP-8X(config)# ip source-guard one-dynamic-binding-for-MAC

It will automatically overwrite the old session with the new one.

To add static matches, use the following command:

LTP-8X(config)# ip source-guard bind ip <IP> mac <MAC> interface-ont <ONT> service <NUM>

Where:

To disable IP Source Guard and remove static matches, use the negative no command.

LTP-8X(config)# no ip source-guard enable 
LTP-4X(config)# no ip source-guard bind ip <IP>

In case of OLT power supply loss, entries of DHCP snooping table might be lost. In this case the service will not work until the address is prolonged or received again. The problem usually occurs when lease time is long. You may solve the problem by saving of snooping table in non-volatile memory:

IP Source Guard Database will work only if automatic time synchronization is implemented via NTP.


Configuring multicast traffic between ONTs within the same tree

The functionality allows you to turn multicast traffic to the same port from which it been received. The configuration consists of two parts: vlan configuration, multicast in which pon-port should be deployed, and on which the functional will operate.

Configuration:

ONT configuration

Service Models

This chapter considers main terms and classification of service models.

In general, a service model is based on a method which describes how the services are provided: «VLAN for Subscriber» or «VLAN for Service». The VLAN for Service architecture means that a service VLAN (S-VLAN) is used to provide all users with a certain service. The VLAN for Subscriber architecture implies that a client VLAN (C-VLAN) is used to provide a user with multiple services. These methods are often combined in practice and form a hybrid model, which uses S-VLAN and C-VLAN simultaneously.

VLAN for Subscriber architecture

A separate VLAN is used for each subscriber in the C-VLAN model. A dedicated C-VLAN is used to provide services to each user between the OLT and service routers. Service GEM ports are created for every OLT service between every ONT and the OLT. When a service request is generated upstream, records are added to the MAC table in the OLT according to C-VLAN. In case of downstream traffic, a corresponding GEM port is determined for a definite service according to the MAC table in the OLT.

If the destination address of the downstream transmission is unknown (broadcast or unknown unicast), i. e. the GEM port cannot be determined, two options are available:

The destination address, in case it is unknown (broadcast or unknown unicast), will be determined based on the method implemented in a definite service model.

The architecture of this service model is shown in figure below.

image069.png
Figure 29 — "VLAN for Subscriber" service model architecture

VLAN for Service architecture

The S-VLAN model has a separate VLAN for every service. Consider its operation on an example of an abstract S-VLAN 100 service.

S-VLAN 100 is used between the OLT and service routers that is global for all subscribers in terms of this service. When a service request is generated upstream, records are added to the MAC table in the OLT according to S-VLAN and subscriber's MAC address. In case of downstream traffic, a corresponding subscriber of the service is determined based on the MAC table.

If the destination address of the downstream transmission is unknown (broadcast or unknown unicast), i. e. the GEM port cannot be determined, two options are available:

The destination address, in case it is unknown (broadcast or unknown unicast), will be determined based on the method implemented in a definite service model.

The architecture of this service model is shown in figure below.

image071.png
Figure 30 — "VLAN for Service" service model architecture

Operating principle

The configuration model concept is used for implementation of different service models in the terminal. A configuration model defines general principles for data communication channelling for both OLT and ONTs.

Table 26 — Service Models


VLAN for Service

VLAN for Subscriber

Broadcast to Unicast GEM

Dedicated Broadcast GEM

Model 1

 -

+

+

 -

Model 2

+

 -

 -

+

Model 3

+

 -

 -

+

Model 1

Consider an example of Model 1 implementation.
The scheme of this service model is shown in the Figure 31.

Figure 31 — Service Model 1 scheme

A C-VLAN is used between an ONT and service routers (BRAS, VoIP SR) that encapsulate services for one subscriber (one ONT), such as VoIP, Internet, and IPTV unicast. An S-VLAN that is global for all subscribers (ONTs) is used for the TR-069 management service. Corresponding GEM ports are created for every OLT service between the ONTs and OLT. A dedicated MC-VLAN is used for multicast transmissions.

The OLT casts C-VLAN (for VoIP, Internet, and IPTV unicast) or S-VLAN (for TR-069) for every service into a corresponding U-VLAN. An ONT associates the U-VLAN with corresponding ONT interfaces or program modules. For example, the TR-069 service is associated with a TR-069 client with the help of a corresponding interface. The VoIP, Internet, and IPTV unicast services can operate in the router or bridge modes depending on the ONT configuration. The chart shows all services configured in the router mode.

Broadcast and unknown unicast traffic is transmitted in this model by replicating a corresponding packet (broadcast or unknown unicast) to the OLT. C-VLAN replicates services to all associated GEM ports and at the same time translates data to the corresponding U-VLAN for each service. The TR-069 service is replicated between the corresponding GEM ports of all subscribers (ONTs). Thus, the model implements "VLAN for Subscriber" for the VoIP, Internet, and IPTV unicast services, but uses "VLAN for Service" for the TR-069 service.

Model 2

Consider an example of Model 2 implementation.

The chart of this service model is shown in the following figure.


Figure 32 — Service Model 1 scheme

Dedicated S-VLANs are used between the OLT and service routers (BRAS, VoIP SR) for each of the following services: VoIP, Internet, IPTV unicast, TR-069. These S-VLANs are common for all subscribers (ONTs). Corresponding GEM ports are created for every OLT service between the ONTs and OLT. A dedicated MC-VLAN is used for multicast transmissions.

OLT transmits S-VLAN into a corresponding U-VLAN for each service. An ONT associates the U-VLAN with corresponding ONT interfaces or program modules. For example, the TR-069 service is associated with a TR-069 client with the help of a corresponding interface. The VoIP, Internet, and IPTV unicast services can operate in the router or bridge modes depending on the ONT configuration. The chart shows all services configured in the router mode.

All broadcast and unknown unicast traffic is redirected to a dedicated broadcast GEM port in this model. Broadcast and unknown unicast packets are sent to U-VLAN (for the VoIP, Internet, and IPTV unicast services) in the ONT.

This model is similar to Model 3 except the following: transmission of C-VLAN to U-VLAN is performed on the OLT side, while the VoIP, Internet, and IPTV unicast traffic comes to U-VLAN in the ONT.

Thus, the model implements "VLAN for Service" for the VoIP, Internet, IPTV unicast, and TR-069 services.

Model 3

Consider an example of Model 3 implementation.

The chart of this service model is shown in the following figure.

Dedicated S-VLANs are used between the OLT and service routers (BRAS, VoIP SR) for each of the following services: VoIP, Internet, IPTV unicast, TR-069. These S-VLANs are common for all subscribers (ONTs). Corresponding GEM ports are created for every OLT service between the ONTs and OLT. A dedicated MC-VLAN is used for multicast transmissions.

The VoIP, Internet, IPTV, and TR-069 unicast services are associated with S-VLAN in an ONT. The ONT transmits S-VLAN into a corresponding U-VLAN for each service. An ONT associates the U-VLAN with corresponding ONT interfaces or program modules. For example, the TR-069 service is associated with a TR-069 client with the help of a corresponding interface. The VoIP, Internet, and IPTV unicast services can operate in the router or bridge modes depending on the ONT configuration. The chart shows all services configured in the router mode.

All broadcast and unknown unicast traffic is redirected to a dedicated broadcast GEM port in this model. Broadcast and unknown unicast packets come to S-VLAN in the ONT. These packets are transmitted into the corresponding U-VLANs on the ONT side. In this case, broadcast and unknown unicast are replicated neither in the OLT nor in the ONT since every service has a separate S-VLAN for broadcast and unknown unicast traffic.

Figure 33 — Service Model 3 scheme

Thus, the model implements "VLAN for Service".


Model configuration

ONT licensing

By default, OLT supports only ELTEX ONTs operation. To enable any third-party ONTs, OLT requires a license. To purchase the license, contact ELTEX Marketing Department.

If a third-party ONT is connected to OLT without a license, the following entry will be made in the log file:
Jul 4 11:10:14 LTP-8X pmchal: error: [ONT2/0] License is not valid, configuration will not continue

Loading a license file to OLT

A license is a text file of the following format:

{
"version":"<VER>",
"type":"all",
"count":"<count>",
"sn":"<SN>",
"mac":"<MAC>",
"sign":"<hash>"
}

Where:

There are two ways to load a license to OLT.

  1. Use the copy command:

    LTP-8X# copy tftp://<IP>/<PATH> fs://license 
    Download file from TFTP-server..
    License successfully installed. Please reboot device for changes to make effect

    Where:

  2. Use CLI:

    LTP-8X# license set """<license>""" 
    License saved.
    License successfully installed.

    Where:

Deleting a license file from OLT

If necessary, you can delete a previously installed license using the no license command.

LTP-8X# no license 
License file removed. 
License successfully deleted from system. 
LTP-8X# show license 
Active license information: 
	No license installed

EasyСonfig. EasyMode

LTP-X EasyMode

EasyMode is a function set of LTP optical terminals. EasyMode is dedicated to fast GPON deployment according to realized service model. EasyMode allows providers to configure Triple Play services promptly.

EasyMode can be used for:

Software and hardware requirements

The EasyMode is supported by the hardware of B and C revisions and by NTU terminals. For EasyMode operation, it is necessary to use the software no below than:

For LTP-8X(4X)

3.26.1

For NTU-1

3.24.0

For NTU-2W

3.25.1

For NTU-2V(C), NTU-RG-1402-GW

3.25.2

For NTU-RG-1421(31)G-Wac

3.28.1

Detailed information about the easy configuration mode is contained in the LTP EasyMode manual document, which can be found in the Download Center.

Automatic ONT activation

Automatic activation speeds up the process of adding new ONTs to an existing configuration with the necessary profiles.

Automatic ONT activation configuration

After applying the changes, the OLT will reconfigure.
To apply ONT configuration changes that are added automatically, you must enter the rollback command first. Changes will not be made until the command is entered and an error will be issued indicating the need to enter.

ONT configuration

This chapter describes general principles of ONT configuration. It also defines configuration profiles.

ONT is configured with the help of a profile, which defines high-level expression of data communication channels. All operations related to channel creation are performed automatically. The way data communication channels are created depends on the selected service model.

ONT configuration includes assignment of configuration profiles and specification of ONT specific parameters. Configuration profiles allow general parameters to be set for all or for a range of ONTs. Profile parameters may include, for instance, DBA settings, configuration of VLAN operations in OLT and ONT, settings of Ethernet ports in ONT. Specific ONT parameters allow each separate ONT to have its own settings specified. Such settings include, for example, GPON password, subscriber's VLAN, etc.

General principles of configuration

Service is the key term of ONT configuration. This term completely includes a communication channel, through which data is transferred from the interfaces located on the front panel of the terminal (see section Interface configuration) to users' ONT ports. There are two service profiles: cross-connect and dba. The cross-connect profile creates a GEM service port, the dba profile allocates an Alloc-ID for this ONT and associates  a corresponding GEM port to the Alloc-ID.

Table 27 — ONT profiles

Profile

Description

cross-connect

Defines VLAN transformation in OLT and ONT

dba(alloc)

Defines upstream traffic parameters

shaping

Defines restrictions for upstream and downstream service traffic

management

Defines TR-69 management service parameters

ports

Defines user port groups in ONT as well as IGMP and multicast parameters for user ports

Figure 34 — ONT scope of operation

ONT profiles configuration

Cross-connect profile configuration

DBA profile configuration

This profile configures dynamic bandwidth allocation (DBA). These parameters allow specification of any T-CONT type described in G.984.3.

DBA configuration is described in details in DBA configuration.

Shaping profile configuration

Configuration of this profile allows restriction of upstream and downstream services.

The configuration of shaping profile represented detailed in Shaping configuration

Ports profile configuration

The ports profile allows you to group ports in ONT. The profile also contains IGMP and multicast setting as they are separately adjusted for each port.
You can adjust up to 4 Ethernet ports and a VEIP virtual port, which will serve as a link between the OMCI and RG domains in ONT.

Management profile configuration

The management profile enables specific configuration of the TR-069 management protocol, namely configuration of a TR-client in ONT.

The TR-069 protocol configuration is described in detail in VoIP configuration.

Re-defining the parameters set in the cross-connect profile. Custom parameters

In some cases, it is necessary to define unique VLAN ID/802.1p tags for ONT. For solving this problem, you can use custom parameters instead of creating a profile.

Custom svid

LTP-8X# configure terminal 
LTP-8X(config)# interface ont 0/0 
LTP-8X(config)(if-ont-0/0)# service 0 custom svid 1234

If cross-connect profile defined in the specified service has tag-mode double-tagged, VLAN ID of the external tag will be replaced. For single-tagged service, VLAN ID of the single tag will be replaced.

Custom cvid

LTP-8X# configure terminal 
LTP-8X(config)# interface ont 0/0 
LTP-8X(config)(if-ont-0/0)# service 0 custom cvid 1234

If cross-connect profile defined in the specified service has tag-mode double-tagged, VLAN ID of the internal tag will be replaced. For single-tagged service, VLAN ID of the single tag will be replaced.

If you set custom svid and cvid simultaneously for single-tagged service, svid will be used for replacing the VLAN ID.

Сustom cos

LTP-8X# configure terminal 
LTP-8X(config)# interface ont 0/0 
LTP-8X(config)(if-ont-0/0)# service 0 custom cos 3

Replaces 802.1p field in a tag.

ONT configuration procedure

Figure below shows a step-by-step procedure of ONT configuration.

 image081.png

Figure 35 — ONT configuration procedure

Model 1

Consider configuration of a data communication channel, which is based on Model 1 and implements "VLAN for Subscriber" (except for the control service, which is implemented in S-VLAN).

Routed mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the VLAN ID for the subscriber to 200, U-VLAN IDs to 10 and 11 for each service respectively. Traffic between the OLT and ONT will be transmitted into VLAN 10 and 11. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 36 — Routed service abstract representation for Model 1

Bridged mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the subscriber VLAN ID to 200. Configure transmission of tagged traffic to LAN port 1. To do this, set the U-VLAN ID to 10. Traffic to port 2 will be transmitted untagged. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 37 — Bridged service abstract representation for Model 1

Model 2 

Model 2 is a hybrid of Model 1 and Model 3. It is based on «VLAN for Service». Model 2 services configuration is similar to Model 3.

Model 3

Consider configuration of ONT data communication for Model 3, which implements the «VLAN for Service» principle.

Routed mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the VLAN ID to 200 for Internet, to 201 for IPTV unicast. Services will be provided by operator in these VLANs. Set U-VLANs to 200 and 201 for each service respectively. These VLANs will transmit traffic to the subscriber device. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 38 — Routed service abstract representation for Model 3

Bridged mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the VLAN ID to 200 for Internet, to 201 for UC_IPTV. Set U-VLAN to 200 for Internet. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 39 — Bridged service abstract representation for Model 3

Tunnelling configuration

Usual profiles in the tag-mode, single-tag or double-tag modes are aimed at mapping the traffic, which is transmitted to the gem port and tagged as user vid or untagged, into the traffic tagged outer vid or outer:inner vid respectively.

Models 2 and 3 allow traffic tunnelling configuration, which extends the range of possible GPON applications in operator's network.

Using the profiles tagged as selective-tunnel allows a tag to be added to incoming packets with a certain set of user vid tags. The profiles tagged as tunnel allow a tag to be added to incoming packets with any user-vid tags.

Consider the following diagram and its configuration as an example. 

Figure 40 — Communication diagram

VLAN 300 (multicast) and Q-in-Q VLAN 1100 and 1200 (Internet) come to the uplink OLT. It is necessary to let them pass to the switch integrated in the OLT via SFP-ONU. In addition, a corporate client is connected to the splitter via SFP-ONU that sends a random set of VLANs to be passed to remote devices after removing tags of these VLANs at the ONT LAN port. To organise a tunnel for this client, VLAN 500 is selected in the operator's network.

Consider the procedure of OLT configuration for the above diagram.

The number of UVIDs processed in all selective-tunnel services on one ONT should not exceed 42.

The VLANs used for tunnel services cannot be used for other types of services within one GPON channel.

The tunnel service is the last one to be configured on the ONT, therefore the user-vid used by other services will not be processed by the tunnel service.

The traffic with a random user-vid tag should not contain additional 802.1q tags. Otherwise, it will be declined by any service provided for this user-vid.

It is impossible to use double-tagged and tunnel services simultaneously on one terminal.

You can create up to 12 services on a single interface using tunnel or selective tunnel.

It is not recommended to use untagged traffic for tunnelling.

DBA configuration

This chapter considers DBA configuration for ONT.

GPON technology implies that all ONTs of one GPON channel use common communication medium (fibre). It is necessary to provide a mechanism that will ensure data transfer from all ONTs without collisions. The mechanism is called dynamic bandwidth allocation (DBA) and ensures allocation of time intervals in OLT for data transfer to ONTs.

A logical unit of the DBA algorithm is Alloc-ID (allocation) with a corresponding T-CONT (traffic counter) on the ONT side. Data transfer parameters (frequency, transmission window) are separately configured for every Alloc-ID (T-CONT) and are referred to as service level agreement (SLA).

G.984.3 provides several SLA combinations called T-CONT type. There are the following T-CONT types:

The terminal allows configuration of up to 256 default allocations per channel. When one ONT is connected, at least one default allocation will be provided. Thus, when 128 subscribers are connected to a channel, 128 service allocations will be provided. The remaining 128 allocations will be enough to process data, but not enough to process more than one service in its own allocation. You need to follow the rule: Amax = 256/N – 1, where Amax — the maximum quantity of allocations for user data of an ONT, N — the quantity of ONTs on a channel. If the calculated amount of services exceeds ONT Amax, configure a combination of multiple services into a single allocation. For more detailed information, see Services in one T-CONT.

DBA parameters are configured in the dba profile. These parameters allow specification of any T-CONT type described in G.984.3. First of all, choose service-class to define the basic DBA algorithm. After that, configure status-reporting to define the type of ONT queues status report. The fixed-bandwidth, guaranteed-bandwidth, and besteffort-bandwidth parameters define the fixed, guaranteed, and best-effort bandwidth correspondingly. Table 28 shows the correspondence between the dba profile settings and T-CONT types.

Table 28 — DBA profile configuration and T-CONT types


T-CONT
type 1

T-CONT
type 2

T-CONT
type 3

T-CONT
type 4

T-CONT
type 5

service-class

cbr

voip

type5

type5

type5

status-reporting

-

+

+

+

+

fixed-bandwidth

+

-

-

-

+

guaranteed-bandwidth

-

+

+

-

+

besteffort-bandwidth

-

-

+

+

+

The following rules apply to dba profile assignment:

DBA global settings

Latency reduction mode

Enabling DBA latency reduction mode corrects the procedure of polling active allocations and activates redistribution of the fixed bandwidth between connected ONTs. The function is available for use on trees with any number of ONTs. 

There are two modes of DBA operation: Most demanding — the mode of the most demanding ONTs and Fair allocations — the mode of fair distribution. Most demanding mode splits the bandwidth in such a way that the ONT sending the most traffic to the upstream is a priority for DBA algorithms. In the case of Fair allocations, the bandwidth tends to be evenly distributed among all ONTs on the channel.

To enable this mode, use the following command.

LTP-8X# configure terminal
LTP-8X(config)# gpon olt dba-reduced-latency allocation-mode (most-demanding/fair-allocations)
LTP-8X(config)# do commit
LTP-8X(config)# do save

After applying the configuration, the OLT will be automatically reconfigured.

To disable latency reduction mode use the no command.

LTP-8X# configure terminal
LTP-8X(config)# no gpon olt dba-reduced-latency 
LTP-8X(config)# do commit
LTP-8X(config)# do save


Enabling this mode can lead to GPON port bandwidth reduction to 5–10 %.

DBA short cycle mode

Enabling this mode reduces DBA cycle for the indicated interfaces, which allows to optimize bandwidth allocation for trees with a small number of connected ONTs.

Below is a command for enabling DBA short cycle on 0,1 GPON ports. The mode is available on GPON ports pairs: 0–1, 2–3, 4–5, 6–7. For maximum effect, it is recommended to assign DBA profiles with the status-reporting type 0 parameter set to ONTs connected to gpon-ports with the dba-short-cycle function enabled. For more details on DBA profiles forming procedure, see DBA parameters configuration.

LTP-8X# configure terminal
LTP-8X(config)# gpon olt dba-short-cycle gpon-port 0-1
LTP-8X(config)# do commit
LTP-8X(config)# do save

After applying the configuration, the OLT will be automatically reconfigured.

To disable DBA short cycle mode use the no command.

LTP-8X# configure terminal
LTP-8X(config)# no gpon olt dba-short-cycle gpon-port 0-1
LTP-8X(config)# do commit
LTP-8X(config)# do save


Enabling this mode is not recommended for trees with more than 32 connected ONTs.

DBA profiles assignment

Services in different T-CONTs

Two Alloc-IDs will be allocated for ONTs in the OLT. Each service will operate in its allocation. There will be two T-CONTs on the ONT side corresponding to the allocations.

Services in one T-CONT

One Alloc-ID will be allocated for ONTs in the OLT. Each ONT will have one T-CONT configured. The T-CONT will be used to transfer traffic from multiple services. Traffic priority will be based on the value of the priority queue field of the corresponding cross-connect profiles.

One profile for multiple ONTs

This is a typical scenario in most cases, when similar services require the same DBA parameters on different ONTs.

Profiles assignment example

Consider two ONTs, which need to have the following three services: Internet, VoIP, SecurityAlarm. The VoIP service should operate in a separate allocation (a definite throughput should be ensured). The Internet and SecurityAlarm services may operate in one allocation.

This configuration implies that the OLT allocates two Alloc-IDs to each ONT. The Internet and SecurityAlarm services operate in one allocation, the VoIP service uses another one. Each ONT has two T-CONTs configured, which correspond to the Alloc-IDs of the ONT. Traffic priority between the Internet and SecurityAlarm services on the ONT side is based on the "priority-queue" value of the ServiceInternet and ServiceAlarm cross-connect profiles, which were assigned to the services.

The Internet and SecurityAlarm services require calculation of SLA parameters. This is done by adding the appropriate parameters for both services. Below is an example of SLA parameters calculation.

Table 29 — SLA parameters

SLA parameters 

Internet

SecurityAlarm

Sum

bandwidth fixed

0

0

0

bandwidth guaranteed

10048

1024

11072

bandwidth besteffort

329984

20096

350080

For more information about SLA parameters, see DBA parameters configuration.

DBA parameters configuration

T-CONT type 1 configuration

Consider configuration of a 100 Mbps fixed bandwidth.

T-CONT type 2 configuration

Consider configuration of a 100 Mbps guaranteed bandwidth.

T-CONT type 3 configuration

Consider configuration of a 100 Mbps guaranteed bandwidth with a possibility of allocation of a 200 Mbps best-effort bandwidth.

T-CONT type 4 configuration

Consider configuration of a 200 Mbps best-effort bandwidth without allocation of a guaranteed bandwidth.

T-CONT type 5 configuration

Consider configuration of a 100 Mbps fixed bandwidth and a 200 Mbps guaranteed bandwidth with a possibility of allocation of a 1244 Mbps best-effort bandwidth.

Shaping configuration

This chapter describes how to configure Shaping profile for an ONT.

A shaping profile allows limiting a downstream and upstream bandwidth for a specified ONT. 

Downstream restriction in OLT uses the downstream policer algorithm. The restriction can either use one policer for all services or individual policers for each separate service.

Upstream restriction in ONT uses the upstream shaping algorithm. It is possible to use either a single policer for all services simultaneously or different policers for each service separately.

Shaping parameters configuration

Downstream policer configuration

You need to configure a bandwidth limit of 100 Mbps for all services.

The total bandwidth for all services is limited by the value set for 0 service.

Upstream shaping configuration

Shaping allows limiting all types of traffic for services by bandwidth or set different values of bandwidth for each type separately.

There is an opportunity to limit bandwidth for multicast and broadcast traffic separately. In this case unicast traffic will be limited by the global value. If you set the limit for unicast traffic, you should set limits for multicast and broadcast traffic as well. Otherwise, multicast and broadcast traffic will not be limited at all. 

For the correct bandwidth limiting, different DBA profiles should be assigned for each service.

Configuration of Storm-control in the upsteram direction

To protect against «storms» arising in the pon part of the OLT, you can use the advanced functionality of the shaping profile.

Configuration example to limit bc and mc traffic is given below. The limit is set in the number of packets per second. If necessary, you can provide event logging when the threshold is exceeded, perform ONT blocking*, or do both.

LTP-8X(config-shaping)("shaping-00")# upstream broadcast storm-control rate-limit 100 logging shutdown 
LTP-8X(config-shaping)("shaping-00")# upstream multicast storm-control rate-limit 100 logging shutdown

*The blocking time is set in the global configuration with the following command.

LTP-8X(config)# gpon olt ont-block-time 1

The time is specified in minutes.

RG ONT

This chapter considers issues related to configuration of Residential Gateway (RG) ONTs. The chapter introduces the notion of Bridged and Routed services.

Consider the concept of OMCI and RG management domains. These terms are determined in TR-142 Issue 2. In terms of management domains, an ONT is considered as a device, which operates in the OMCI domain only. The devices, which operate in both management domains (i. e. have an integrated router), are denoted as ONT/RG. Everything that refers to the OMCI domain can be applied to both ONT and ONT/RG devices. For this reason, we will further denote ONT/RG as ONT. If an ONT is configured without the RG domain (without a router), skip all steps concerning RG.

Figure below shows an ONT/RG scheme and its management domains.

image093.png
Figure 41 — ONT/RG management domains

Bridged service is a service, which configuration requires the OMCI management domain only, i. e. it can be completely configured with the help of the OMCI protocol in ONT.

Routed service is a service, which configuration requires both the OMCI and RG management domains.

In addition to configuration in terminal, a routed service requires the RG domain to be configured by using one of the following methods:

  1. Pre-defined configuration — subscriber is provided with an ONT having fixed configuration.
  2. Local ONT configuration using WEB interface.
  3. ONT configuration using the TR-069 protocol and auto configuration server (ACS).

Contact ONT vendor for information about RG domain configuration.

ONT is connected to RG using a Virtual Ethernet interface point (VEIP), which corresponds to the TR-069 WAN interface (described in TR-098) on the RG side. VEIP is represented by a virtual port in terminal parameters. The port has the same configuration procedure as Ethernet ports in the ports profile.



Figure 42 — Services configuration in ONT and RG domains

Figure above shows two services (each with a corresponding GEM port on the ONT side), with one of them being routed and using both the OMCI and RG management domains and the other one being bridged and using only OMCI for configuration. Terminal configuration includes configuration of bridge interfaces (green areas in the figure) and distribution of LAN ports between the management domains.
The bridge parameter of the cross-connect profile is responsible for association of a service with a management domain. Being set, the bridge parameter creates a bridged service (the bridge group parameter is the bridge number in this case). When no bridge is set, a routed service is created (there is only one bridge associated with RG; it has a special bridge number—0).

Mixed configuration

Consider an example of ONT configuration, which simultaneously uses both management domains. Port numbers and the internal structure are shown in Figure 42.

As a result, you will have the mixed configuration of the ONT. One of the services is managed completely by the OMCI domain (the bridged service), LAN2 and LAN3 ports on the ONT are connected as bridges. The second service is managed by both OMCI and RG (the routed service; the RG domain can be configured, for instance, through the WEB interface on the ONT). LAN0 and LAN1 ports are connected to RG ONT.

High Speed Internet configuration

Configuration of High Speed Internet (HSI) does not have any peculiarities and can be easily performed as described in Service Models.
Correct operation of IPv6 requires to do the following:

Example of a routed configuration:

LTP-8X(config)# profile cross-connect ipv6 
LTP-8X(config-cross-connect)("ipv6")# outer vid 300 
LTP-8X(config-cross-connect)("ipv6")# user vid 300 
LTP-8X(config-cross-connect)("ipv6")# type multicast 
LTP-8X(config-cross-connect)("ipv6")# exit 
LTP-8X(config)# profile ports ipv6 
LTP-8X(config-ports)("ipv6")# veip multicast 
LTP-8X(config-ports)("ipv6")# exit 
LTP-8X(config)# exit 
LTP-8X# commit

Example of a bridged configuration:

LTP-8X(config)# profile cross-connect ipv6_br 
LTP-8X(config-cross-connect)("ipv6_br")# bridge 
LTP-8X(config-cross-connect)("ipv6_br")# bridge group 10 
LTP-8X(config-cross-connect)("ipv6_br")# outer vid 300 
LTP-8X(config-cross-connect)("ipv6_br")# user vid 300 
LTP-8X(config-cross-connect)("ipv6_br")# type multicast 
LTP-8X(config-cross-connect)("ipv6_br")# exit 
LTP-8X(config)# profile ports ipv6_br 
LTP-8X(config-ports)("ipv6_br")# port 0 multicast 
LTP-8X(config-ports)("ipv6_br")# port 0 bridge group 10 
LTP-8X(config-ports)("ipv6_br")# exit 
LTP-8X(config)# exit 
LTP-8X# commit

Multicast configuration

The chapter describes peculiarities of IPTV service configuration.

Hosts and routers use the Internet Group Management Protocol (IGMP) to support multicasting. It provides all systems of a physical network with relevant information: which hosts are included in groups and which group corresponds to a host.

IGMP snooping is a technique that allows network devices of the channel level (switches) to snoop IGMP requests from hosts to a group router in order to decide whether group traffic transmission to the corresponding interfaces should be started or stopped. When a switch snoops a host's IGMP request for connection to a multicast group, it adds the port the host is connected to into the group (for group traffic retranslation). Having snooped a leave_group request, the switch removes the corresponding port from the group.

image097.png
Figure 43 — IGMP snooping is disabled

Figure above shows traffic multicasting regardless of whether an end host needs the traffic or not. When IGMP snooping is enabled, the multicasting situation changes as follows: the switch will analyse all IGMP packets between connected devices and the routers the multicast traffic comes from. When the switch receives a consumer's IGMP request for connection to a multicast group, it adds the port the consumer is connected to into the group. And vice versa, having received a request for leaving a group, the switch removes the corresponding port from the group.

image099.png
Figure 44 — IGMP snooping is enabled

As you can see from the Figure 44, LTP-8X with enabled IGMP snooping translates multicast traffic only to the hosts, which are members of the IGMP group.
IGMP proxy is an IGMP client and group router at the same time (IGMP router). On the one hand, proxy requests an upstream router for group channels; on the other hand, it receives join/leave requests from hosts and replicates upstream traffic to the corresponding interfaces.

Model 1 Multicast configuration

Consider configuration of a multicast service for Model 1.

An STB, which works in VLAN 14, is connected to an ONT port in this example. Upstream IGMP packets arrive to VLAN 14 though a GEM port and the OLT changes VLAN 14 to subscriber's VLAN 200.
As we have a multicast server in VLAN 98 in our example, we need to configure a proxy on the switch to translate IGMP packets from VLAN 200 to VLAN 98 (for more information, see VLAN configuration). The multicast service comes downstream to the ONT port in VLAN 98 and changes to VLAN 14.

For more information on general configuration principles of data communication channels, see Service Models.


Figure 45 — Model 1 Multicast

Model 3 Multicast configuration

Consider configuration of a multicast service for Model 3.

The multicast service operates in VLAN 98 in the example below, an STB operating in VLAN 14 is connected to an ONT port. Upstream IGMP packets come to VLAN 14 in the ONT, where VLAN 14 is replaced with the service VLAN 98, and then the data is further transferred upstream through the GEM port. The multicast service comes downstream to the ONT port in VLAN 98 and changes to VLAN 14. For more information on general configuration principles of data communication channels, see Service Models.


Figure 46 — Model 3 Multicast

IPv6 Multicast configuration

IPv6 multicast is configured the same way as shown above. However, there are some differences in configuration.

VoIP configuration

The chapter describes peculiarities of VoIP service configuration. The terminal supports several methods of VoIP configuration:

A method is chosen based on service model and ONT functionality.

VoIP Configuration in OMCI management domain

VoIP is a special bridged service. It has all general properties of a bridged service. Operator's actions required for services configuration are described in detail in ONT configuration.

As opposed to other bridge services, VoIP requires the iphost type in the cross-connect profile to terminate traffic in internal virtual IP interface. That also requires the Iphost eid parameter to be specified. As a rule, it should equal 1. Contact your ONT vendor for information about the Iphost eid value for the VoIP.

VoIP configuration in RG management domain

In case the VoIP client is located after the U point (i. e. in the RG management domain), the VoIP service has the same configuration procedure as all other routed services. The procedure is described in detail in ONT configuration. All the general steps of service configuration are applied to VoIP as well.

Configuration of management via TR-069

This chapter describes configuration of a data communication channel for the CPE management service via the TR-069 protocol.

An ONT management channel can be established in one of the two modes: Inband and OutOfBand. Inband is the preferred mode as it is simpler. Contact your ONT vendor for information about operation capabilities of both modes. 

ONT management via TR-069 is a special service. All general steps of service configuration apply to TR-069 management. Operator's actions required for services configuration are described in detail in ONT configuration.
As opposed to other services, the management service requires the management type in the cross-connect profile. You also need to specify the Iphost eid parameter. As a rule, it should equal 0.

Configuration of a TR-069 Inband management

This mode is characterised by its simple implementation. Management traffic goes through the same bridge as user traffic. Figure below shows a part of the OMCI layout. Arrows show the traffic flow.

image105.png
Figure 47 — TR-069 Inband management channel

Configuration of a TR-069 OOB management channel

Not all ONT vendors support creation of Inband management channels via TR-069. To solve this, a capability to create an OutOfBand management channel was developed as an alternative. The main peculiarity of the mode is the use of a separate bridge for management. See a part of the OMCI layout below. Arrows show the traffic flow.

image107.png
Figure 48 — TR-069 OutOfband management channel

TR-069 client parameters configuration

To configure TR-069 client parameters, use the management profile.

LTP-8X# show profile management management-00 
    Name:                                              'management-00'
    Description:                                       'ONT Profile Management 0'
    Enable omci configuration:                         true
    Url:                                               ''
    Username:                                          ''
    Password:                                          ''

In case when the DHCP server transmits the TR-069 parameters via option 43, there is no need to transfer them via OMCI. Disable this phase with the no omci-configuration command.

Otherwise, specify TR-069 client parameters explicitly.

ONT configuration templates

It is not always convenient, especially for large-scale operators, to build ONT configuration from separate profiles for each subscriber. This process is painstaking and risky in a certain sense, as it is highly prone to operator error.

As a rule, such companies employ at least one service plan with pre-defined ONT profiles. This section describes ONT templates, an effective solution to simplify the work of subscriber service specialists.

The essence of configuration templates is simple. Network administrator prepares required quantity of templates for the quantity of service plans. Configuration template contains detailed profile list and a set of ONT parameters. Subscriber service specialist or OSS/BSS system assigns the template to an ONT and identifies additional configuration parameters if necessary. As a rule, configuration assignment is performed in "one click" or by using one command.

Preparing ONT configuration template

ONT configuration template assignment

ONT configuration preview with templates

You can view the ONT configuration using the same command: show interface ont <id> configuration. You can distinguish the template parameters from the general ones by [T](Template) markers. In this example, Rf port state is the only general parameter.

LTP-8X(config)(if-ont-0/0-10)# do show interface ont 0/0 configuration
-----------------------------------
[ONT0/0] configuration
-----------------------------------
    Description:                      ''
    Enabled:                          true
    Serial:                           ELTX5C00008C
    Password:                         ‘0000000000'
[T] Fec up:                           false
[T] Easy mode:                        false
[T] Downstream broadcast:             true
[T] Downstream broadcast filter:      true
[T] Ber interval:                     none
[T] Ber update period:                60
    Rf port state:                    disabled


[T] Omci error tolerant:              false
    Service [0]:
[T]     Profile cross connect:        Service1     NT Profile Cross Connect 1
[T]     Profile dba:                  dba-00       ONT Profile DBA 0
        Custom cross connect:         disabled
    Service [1]:
[T]     Profile cross connect:        Service2     NT Profile Cross Connect 2
[T]     Profile dba:                  dba-00       ONT Profile DBA 0
        Custom cross connect:         disabled
[T] Profile shaping:                  shaping-00   ONT Profile Shaping 0
[T] Profile ports:                    ports-00     ONT Profile Ports 0
[T] Profile management:               unassigned
    Template:                         test         ONT Template 1


ONT ports management 

This chapter describes Ethernet ports management via OMCI. 

The ability to enable/disable Ethernet ports on connected ONT was implemented, as well as ability to manage and control Poe on ONT as power supply. 

In case of PoE support from ONT side, it is possible to control ports:

All these attributes are transmitted via OMCI (ITU-T G.988 ME 11 "PPTP Ethernet UNI").

Ethernet ports management on ONT

Ethernet ports management on ONT means enabling/disabling the port and performed by [no] port <port number> shutdown command, where <port number> is the number of "0-3" port. 

Step 1. To disable Ethernet port, do the following commands.

LTP-8X(config)(if-ont-0/0)# port 0 shutdown
LTP-8X(config)(if-ont-0/0)# do commit


Step 2. Make sure that changes has been applied, to do that, run the command.

LTP-8X(config)(if-ont-0/0)# do show interface ont 0/0 configuration
...
 	Ports:
 		Port [0]:
 			shutdown: true
 			PoE:
 				Enable: false
 				Pse class control: 0
 				Power priority: high
 		Port [1]:
 			shutdown: false
 			PoE:
 				Enable: true
 				Pse class control: 0
 				Power priority: high
...


Step 3. To enable Ethernet port, do the following commands.

LTP-8X(config)(if-ont-0/0)# no port 0 shutdown
LTP-8X(config)(if-ont-0/0)# do commit

PoE management on ONT ports

PoE management on ONT ports is performed using port <port number> poe enable pseclass-control <class> power-priority <level> command, where 

Enabling PoE on ONT ports

To enable PoE on ONT ports, do the following: 

LTP-8X(config)(if-ont-0/0)# port 0 poe enable
LTP-8X(config)(if-ont-0/0)# do commit

Power class control

This attribute can be used to set specific limits on the power class.
Valid values for this attribute:

To change PoE on ONT ports, do the following:

LTP-8X(config)(if-ont-0/0)# port 0 poe pse-class-control 0
LTP-8X(config)(if-ont-0/0)# do commit

PoE priority settings

This attribute controls port priority in terms of the power management algorithm. Priority set by this attribute can be used by control mechanism which prevents overcurrent situations by disabling ports with lower power priority. 

Valid values for this attribute:

To change PoE priority on ONT ports, do the following:

LTP-8X(config)(if-ont-0/0)# port 0 poe power-priority low
LTP-8X(config)(if-ont-0/0)# do commit


Terminal monitoring

General information

Information on current terminal firmware version

To view information on the current version of terminal firmware, use the show version command.

LTP-8X# show version 
Eltex LTP-8X:rev.C software version 3.40.0 build ХХХХ on ХХ.ХХ.2020 ХХ:ХХ

Terminal information preview

To view information about the terminal, use the show system environment command.

LTP-8X# show system environment 
    System information:
        CPU load average (1m, 5m, 15m):   4.23  2.89  2.53
        Free RAM/Total RAM (Mbytes):      260/495
        Temperature (sensor1/sensor2):    35C/50C
        Reset button:                     disabled

        Fan configured speed, %:          15
        Fan minimum speed, %:             15
        Fan speed levels, %:              16 27 39 51 64 76 88 100 

        Fan state (fan0/fan1):            4620rpm  4620rpm

        PLD FW version:                   14 

        TYPE:                             LTP-8X:rev.C 
        HW_revision:                      1v4 
        SN:                               GP2B000304 
        MAC:                              A8:F9:4B:8B:79:D0 
        Power supply information:
                Module 1: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1
                Module 2: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1

Table 30 — Terminal parameters

Parameter

Description

CPU load average

Average processor load

Free RAM/Total RAM

Free/total RAM

Temperature

Temperature from sensors 1 and 2

Reset button

The action depends on the reset button configuration

Fan configured speed

Set fan rotation speed

Fan minimum speed

Minimum fan rotation speed

Fan speed levels

Set fan rotation speed for each level

Fan state

Fans state and rpm value

PLD FW Version

PLD firmware version

Power supply information

Information about installed power modules

Information on terminal operation time

To view terminal operating time, use the show uptime command.

LTP-8X# show uptime 
up 7 days, 20:11

Network connection check

To check network connection, use the ping command. As a parameter, pass the IP address of the node to be checked.

LTP-8X# ping 192.168.1.254
PING  192.168.1.254  (192.168.1.254):  56  data  bytes 

64 bytes from 192.168.1.254:  seq=0  ttl=64  time=0.422  ms 
64 bytes from 192.168.1.254:  seq=1  ttl=64  time=0.426  ms 
64 bytes from 192.168.1.254:  seq=2  ttl=64  time=0.360  ms 
64 bytes from 192.168.1.254:  seq=3  ttl=64  time=0.397  ms 
64 bytes from 192.168.1.254:  seq=4  ttl=64  time=0.404  ms

--- 192.168.1.254 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet  loss round-trip  min/avg/max  =  0.360/0.401/0.426  ms


Terminal operation log

Use show log command to view log files.

LTP-8X# show log
        ##    Name    Size in bytes    Date of last modification
        1      ltp           994625     Thu Aug 31 13:51:20 2017
        2      ltp.1.gz       41784     Thu Aug 29 12:42:25 2017
        3      ltp.2.gz       59829     Thu Aug 29 00:13:10 2017
Total files: 3
AntonLTP-8X#

Use the show log buffer command to view a local terminal operation log buffer.

LTP-8X# show log buffer
...
Jan 1 00:00:49 LTP-8X pmchal: notice: [OLT] OLT reset successfully
Jan 1 00:01:05 LTP-8X pmchal: notice: [PPPOEIA] PPPoE IA initialized successfully
Jan 1 00:01:05 LTP-8X pmchal: notice: [DHCPRA] DHCP RA initialized successfully
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT initialized successfully
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT0 FW version 2.3.37.1008
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT0 FW is up to date
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT1 FW version 2.3.37.1008
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT1 FW is up to date
...

The log messages can be filtered. To do this, use the show log buffer grep command. The command takes a string as a parameter that is used for search in the log. Only the messages containing the string will be displayed on the screen.

LTP-8X# show log buffer grep pmchal

If console output or output to CLI sessions is configured for log messages, the messages will be output to these devices automatically as soon as they are generated. User does not need to perform any additional operations.

When a remote syslog server is used, use the log display tools provided by the SYSLOG server. Enter show log <filename> command to view the files.

LTP-8X# show log ltp.1.gz

Active alarms log

To view the active alarms log, use the show alarms command. Pass an event type as a parameter (see Table 14) and/or their severity (see Table 15). You can view all active alarms by using the show alarm active all command.

LTP-8X# show alarm active all 
    Active alarms (1):
        ##        Type                     Severity         Description
         0        Fan                      Critical         FAN1 0 rpm
LTP-8X# 

GPON monitoring

GPON OLT state

GPON OLT parameters are listed and described in table below.

Table 31 — GPON OLT parameters

Parameter

Description

Device count

The number of OLT chips

Gpon-ports per device

The number of channels in one OLT chip

Firmware version

OLT chip firmware version

Hardware version

OLT chip hardware version

GPON interface state

MAC table preview

Statistics for GPON interfaces

Statistics for OLT Ethernet interfaces

Multicast statistics

ONT monitoring

ONT configurations list

List of empty ONT configurations

List of connected ONTs

List of disconnected ONTs

ONT statistics

To view ONT statistics, use the show interface ont <ID> counters <type> command. As an argument, pass the ONT ID and the type of requested statistics (see Table 35).

LTP-8X# show interface ont 4/0 counters gem-port-nctp-performance-monitoring 

-----------------------------------
[ONT4/0] counters
-----------------------------------

        ##    Downstream counters for cross-connects: 0    ...    7     MC     BC

         1    Finished intervals                     202    ...  ---    ---    ---
         2    Received GEM frames                     54    ...  ---    ---    ---
         4    Received payload bytes               11576    ...  ---    ---    ---

        ##    Upstream counters for cross-connects:    0    ...    7     MC     BC

         1    Finished intervals                     202    ...  ---    ---    ---
         2    Transmitted GEM frames                  54    ...  ---    ---    ---
         4    Transmitted payload bytes            10448    ...  ---    ---    ---

Table 35 — ONT statistics types

Statistics type

gem-port-performance-monitoring

gem-port-nctp-performance-monitoring

ethernet-performance-monitoring-history-data

ethernet-performance-monitoring-history-data2

ethernet-performance-monitoring-history-data3

gal-ethernet-performance-monitoring-history-data

fec-performance-monitoring-history-data

ethernet-frame-extended-performance-monitoring

multicast-subscriber-monitor

ONT bit error rate

Bit error rate (BER) is the rate of errors in data transmission.

To view BER on reception at the ONT, use the show interface gpon-port <id> downstream-ber command. As an argument, pass the number of the GPON interface.

LTP-8X# show interface gpon-port 0 downstream-ber
-----------------------------------
GPON-port 0 BER table
-----------------------------------
##    Ch/ Id   Errors   Intervals BER Interval   BER
1     0/ 2       0       0        100000         0
2     0/ 3       0       0        100000         0

Viewing the status of ONT ports

To view the status of the ONT ports, run the show interface ont <ID> ports command. Pass the ONT identifier as an argument.

LTP-8X# show interface ont 0/0 ports

-----------------------------------
[ONT0/0] ports state
-----------------------------------

        UNI ##                                            0                   1

        Link:                                            up                  up
        Speed:                                         100M                100M
        Duplex:                                        full                full

        PoE:                          
           State:                                    enable              enable
           Power detection status:         Delivering power    Delivering power
           Power classification status:             Class 3             Class 3
           PsE class control:                       Default             Default
           Power priority:                             high                high
           Consumption:                             1600 mW             1600 mW

Table 36 — Description of PSE statuses

PSE status 

Description 

Disabled

PoE connectivity on the port is disabled

Searching

PoE connectivity on the port is enabled, waiting for device connection

Delivering power

PoE device is connected, power is supplied

Test mode

Test mode 

Fault

Error is detected 

Specific fault

Implementation error is detected 


System environment configuration

You can adjust fans and configure reset button of the device.

Enter show system environment to view the system status.

LTP-8X# show system environment
    System information:
        CPU load average (1m, 5m, 15m):   1.39  3.97  4.11
        Free RAM/Total RAM (Mbytes):      253/495
        Temperature (sensor1/sensor2):    36C/50C
        Reset button:                     disabled

        Fan configured speed, %:          15
        Fan minimum speed, %:             15
        Fan speed levels, %:              16 27 39 51 64 76 88 100 

        Fan state (fan0/fan1):            4620rpm  4620rpm

        PLD FW version:                   14 

        TYPE:                             LTP-8X:rev.C 
        HW_revision:                      1v4 
        SN:                               GP2B000304 
        MAC:                              A8:F9:4B:8B:79:D0 

        Power supply information:
                Module 1: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1
                Module 2: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1

Fans configuration

Reset button configuration

<Reset> button has 3 operating modes.

disabled

disabled

reset-only

only reboot

enabled

reset to factory settings and reboot


LTP-8X(config)# system reset-button disabled

Terminal maintenance

SFP transceivers replacement

SFP transceivers can be installed when the terminal is turned on or off. The front panel has pairs of slots: even slots in the upper line, odd slots at the bottom. SFP transceivers are symmetrically installed for each pair of slots. 

                             
Figure 49 — SFP transceivers installation

Figure 50 — SFP transceivers installation

To remove a transceiver:


Figure 51 — Opening SFP transceiver latch



Figure 52 — SFP transceivers removal

Ventilation units replacement

The terminal design allows ventilation units replacement even when the terminal is on.


image119.png
Figure 53 — Ventilation unit. Installation to the case

To remove a ventilation unit:

image121.png
Figure 54 — Ventilation unit socket

To install a ventilation unit, perform the following actions:

OLT firmware update

This chapter describes the terminal firmware update procedure. To download a firmware file, use the TFTP server available in the terminal management network.

ONT firmware update

This chapter describes different methods of ONT firmware update using the OMCI protocol.

ONT firmware update download

ONT firmware update can run automatically for all ONTs or for a specified ONT. To start the update, download a firmware update file to the line terminal. To download the file, use the copy command and specify the file name and the address of the TFTP server as arguments.

LTP-8X# copy ftp://user:pass@10.54.16.1/ntp-rg-r3.24.1.854.fw.bin.bin fs://ont-firmware 
Download file from FTP-server
Download successfully - speed: 2906533.000 bytes/sec during 1.008 seconds, total size 2929684
..........................................
..........................................
ONT firmware vendor is Eltex Corporation, version 3.24.1.854 Write downloaded file to flash memory.
..........................................
..........................................

ONT firmware custom update

To update firmware of a specified ONT, you need to create a corresponding task and specify the ONT ID and the firmware file name. There are two types of ONT firmware update tasks: single try or multiple tries.

To create a single try update task, use the update ont command and specify the ONT ID and the file name of the firmware.

LTP-8X# update ont 0/0 filename ntp-rg-r3.24.1.854.fw.bin
Task for updated successfully created. ONT firmware will be updated in 20 minutes or more

As a result, the single try update task will be created for the ONT having the specified serial number. This method is used to update the ONTs, which are in the OLT channel at the time of update. The task will end with an error for the ONTs, which are not connected.

To create a multiple tries update task, use a scheduler. This method is generally used to update the ONTs, which are not in the OLT channel at the time of the update. The tasks you create in the scheduler will be executed as soon as the corresponding ONT connects to the channel. To create, delete, or view tasks in the scheduler, use the schedule ont command. To create an ONT firmware update task, use the schedule ont update command and specify the ONT ID and the firmware update file.

LTP-8X# schedule ont update 0/0 ntp-rg-r3.24.1.854.fw.bin 
Task created for [ONT0/0]

To view scheduled tasks, use the show schedule ont update command.

LTP-8X# show schedule ont update Existing tasks (1):
##	Serial	Ch/ Id	Operation	Status	Tries remained
0	---	0/   0	ont_update	scheduled	5

You can delete some of the created tasks by using the no schedule ont update command and specifying the ONTs ID.

LTP-8X# no schedule ont update 0/0 
Task deleted for [ONT0/0]

To clear the scheduler, use the clear schedule ont update command.

LTP-8X# clear schedule ont update 
All tasks cleared

The tasks created in the scheduler will continue running until the update completes successfully or the number of tries is reached (the Tries remained parameter).

ONT firmware autoupdate

To enable firmware autoupdate for all ONTs, use the auto-update ont command and specify the update mode (immediate or postpone).

APPENDIX A. RS-232 NULL-MODEM CABLE PIN DESIGNATION


LTP-4/8X rev.B

DB-9 Socket                                                        DB-9 Socket

LTP-4/8X rev.C, LTP-8X rev.D

Pin assignment:

  1. not used
  2. not used
  3. RX
  4. GND
  5. GND
  6. TX
  7. not used
  8. not used
  9. not used

APPENDIX B. Configuring services on ONT Ericsson, Atron, CIG

Starting with version 3.36, ONT support has been added for Ericsson T063G, Ericsson T073G, Atron RFT620, Atron PSG590, CIG G-25A-J80. In service configuration on these ONTs, there are some features presented below.

VoIP configuration

To configure VoIP, you need to create two new profiles: cross-connect type voice, profile voice.

Internet and IPTV services configuration

These services are configured similarly to ONT ELTEX.

The list of changes

Firmware version

Document version

Issue date

Revisions

Version 3.46.0Issue 2202.11.2022Synchronization with firmware version 3.46.0.
Version 3.44.0Issue 2113.12.2021Synchronization with firmware version 3.44.0.
Version 3.42.2Issue 2030.11.2021Synchronization with firmware version 3.42.2.
Version 3.42.1Issue 1914.10.2021Synchronization with firmware version 3.42.1.
Version 3.42.0Issue 1831.05.2021

Added:

  • Poe support for ONT;
  • Alarm PSE overload support; 
  • PoE support for ONT in SNMP;
  • Ability to set timezone accurate to minutes;
  • OMCI alarm PSE overload support;
  • OMCI LAN port control;
  • NTU-MD500P support.

Added sections:

Fixed:

  • Application of backup-configuration when using ACLs;
  • Removal of ip source-guard database after LTP restart;
  • ONT hanging in CFGFAIL status.
Version 3.40.2Issue 1728.04.2021Synchronization with firmware version 3.40.2.
Version 3.40.0Issue 1610.12.2020

Added:

  • Redundancy functionality for gpon ports;
  • CaTV signal level acquisition;
  • Option to disable VLAN filtering for multicast GEM;
  • Functionality for forced activation of GPON port, without taking into account the configuration;
  • A command to remove dynamic entries from the DHCP Snooping table;
  • Possibility to set ONT auto-activation by GPON ports;
  • Possibility to auto complete the list of log files;
  • Support for PM-DC12 power supply;
  • Alarms for exceeding the CaTV thresholds;
  • Support for LTP-X rev.D boards.

Sections added:

  • GPON port redundancy.

Fixed:

  • UNACTIVATED ONT reload;
  • ONT reloading in case of authorization error;
  • ONT activation bug after mass link crash;
  • ONT activation error after quick reconfiguration;
  • OLT chip reload, during mass ONT power off;
  • Multicast passing through broadcast GEM with unknown-multicast-forward enabled;
  • Supported EqID output for NTU-1 rev.B and NTU-RG-5440G-WZ;
  • pmchal crash when requesting ONT status;
  • Loss of private parameters when updating LTP;
  • Operation with configuration that contains null in the fields;
  • Saving LLDP settings for 10G-front-port;
  • Fixed bug when deleting entries from DHCP Snooping table;
  • Stabilized operation with broken blocks on NAND flash;
  • Possibility to re-prescribe ONT when auto-activation is enabled;
  • Loss of ip arp inspection configuration;
  • pmchal crash when using IPSG;
  • CLI crash when naming interfaces with capital letters;
  • ACL with ARP packets when filtering by ports;
  • Removed duplicate events of front-ports state changes;
  • Isolation for pon ports that related to different chips.
Version 3.38.2Issue 1520.05.2020

Synchronization with firmware version 3.38.2.

Version 3.38.1Issue 1407.02.2020

Synchronization with firmware version 3.38.1.

Version 3.38.0Issue 1313.12.2019

Synchronization with firmware version 3.38.0.

Sections added:

  • CLI hotkeys;
  • Origin parameter configuration.

Changes:

  • Compatible SFP transceivers;
  • User list preview;
  • SNMPD configuration;
  • GPON interface configuration;
  • DHCP Relay Agent profiles management;
  • IP Source Guard configuration;
  • Tunnelling configuration.
Version 3.36.2Issue 1208.10.2019

Synchronization with firmware version 3.36.2.

Version 3.36.0Issue 1107.02.2019

Added:

  • Manual supplemented by LTP R3.36.0 commands.

Sections added:

  • Configuring multicast traffic between ONTs within the same tree;
  • APPENDIX B. Configuring services on ONT Ericsson, Atron, CIG.

Added description:

  • Configuring DHCPD issuing static routes to the network on the ONT TR-interface (option 121).

Version 3.32.0

Issue 10

03.07.2018

Added:

  • Manual supplemented by LTP R3.32.0 commands.

Sections added:

  • ERPS configuration;
  • Deleting a license file from OLT
  • Automatic ONT activation.

Added description:

  • GPON interface configuration; 

Changes:

  • Active DHCP leases monitoring command;
  • IGMP Snooping enabling command.

Version 3.30.0

Issue 9

30.11.2017

Added:

  • Manual supplemented by LTP R3.30.0 commands.

Sections added:

  • LLDP configuration;
  • QoS WRR;
  • ARP-Inspection;
  • Storm Control in PON;
  • Configuring Access List Control and policies. 

Added description:

  • Collaboration of various types of cross-connect;
  • Upstream shaping configuration;
  • SNMPv3 users configuration;
  • SNMPv3 encryption configuration;
  • Additional RADIUS servers configuration;
  • Configuration of syslog entries for entered commands;
  • Updated logging system;
  • Configuration of description for the interface in switch;
  • Storm Control in switch;
  • Fan configuration;
  • Reset button configuration;
  • MAC Notification trap configuration;
  • %OLTMAC% parameter in option 82. 

Changes:

  • PPPoE sessions view command;
  • DHCP sessions view command.

Version 3.26.1

Issue 8

13.12.2016

Added:

  • Manual supplemented by LTP R3.26.1 commands;
  • AAA (radius/tacacs+) functionality description;
  • Extended custom parameters description.

Version 3.26.0

Issue 7

09.07.2016

Added:

  • Manual supplemented by LTP R3.26.0 commands;
  • Information about LTP rev.C;
  • IP Source Guard functionality description;
  • DHCP Relay (broadcast-unicast relay) functionality description;
  • Tunnel configuration description;
  • ONT licensing description;
  • Description of configuring services over IPv6;
  • RS-232 null-modem cable pin designation. 

Changes:

  • OLT. 6.3 firmware update command.

Version 3.24.3

Issue 6

25.04.2016

Added:

  • Manual supplemented by LTP R3.24.3 commands.

Version 3.24.1

Issue 5

17.12.2015

Added:

  • Manual supplemented by LTP R3.24.1 commands.

Version 3.24.0

Issue 4

02.09.2015

Added:

  • Manual supplemented by LTP R3.24.0 commands.

Version 3.20.2

Issue 3

25.07.2014

Added:

  • The manual is given to the LTP-8X R3.20.2 command system;
  • Section 3.2.5 for group operations;
  • 5.13, describing operation with ONT configuration templates.


Issue 2

24.04.2014

Changes:

  • Errors corrected.


Issue 1

21.04.2014

Added:

  • Section 4.1.2, describing the Configuration structure;
  • Section 4.1.4, which describes the Configuration autosave;
  • Step 7 in the MAC address lifetime configuration;
  • Added an application with an example of setting up Triple Play in the VLAN for Subscriber model;
  • Parameters of optical interfaces in table 4.1.

Changes:

  • Fixed table 24 name;
  • Section 6.4.6 is renamed to Multicast statistics.

TECHNICAL SUPPORT

For technical assistance in issues related to handling Eltex Ltd. equipment, please, address to Service Center of the company:

Feedback form on the website: https://eltex-co.com/support/

Servicedesk: https://servicedesk.eltex-co.ru

Visit Eltex official website to get the relevant technical documentation and software, benefit from our knowledge base, send us online request or consult a Service Centre Specialist in our technical forum.

Official website: https://eltex-co.com/

Download center: https://eltex-co.com/support/downloads