LTP-8X, LTP-4X optical line terminals

User manual
Firmware version 3.38.2 (20.05.2020)



|| DeviceType | Optical line terminals |
|| DeviceName1 | LTP-8X, LTP-4X |
|| DocTitleAdditional | User manual, Issue 15 (20.05.2020) |
|| fwversion | 3.38.2 |



Terms and Definitions

CBR            Constant bitrate

DBA            Dynamic bandwidth allocation

ERPS          Ethernet Ring Protection Switching

FTP            File Transfer Protocol

FW             Firmware

GPON        Gigabit PON

HSI            High Speed Internet

IGMP          Internet Group Management Protocol

IP             Internet protocol

MLD           Multicast Listener Discovery

OLT            Optical Line Terminal

ONT            Optical Network Terminal

ONU           Optical Network Unit

PCB            Printed Circuit Board

SLA            Service Level Agreement

SNTP          Simple Network time protocol

SNMP         Simple Network Management Protocol

SFP            Small Form-factor Pluggable

TFTP           Trivial File Transfer Protocol

URI            Uniform Resource Identifier

VEIP           Virtual Ethernet Interface Point

NOTES AND WARNINGS

Notes contain important information, tips, or recommendations on device operation and setup.


Warnings are used to inform the user about harmful situations for the device and the user alike, which could cause malfunction or data loss.

General information

Introduction

A GPON is a network of passive optical networks (PON) type. It is one of the most effective state-of-the-art solutions for the 'last mile' issue that significantly reduces the required amount of cable and provides data transfer with downstream rate up to 2.5 Gbps and upstream rate up to 1.25 Gbps. Being used in access networks, GPON-based solutions allow end users to have access to new services based on IP protocol in addition to more common ones.

The key GPON advantage is the use of one optical line terminal (OLT) for multiple optical network terminals (ONT). OLT converts Gigabit Ethernet and GPON interfaces and is used to connect a PON network with data communication networks of a higher level.

The range of OLT GPON equipment produced by Eltex comprises of LTP-4X/LTP-8X terminals with internal Ethernet switch with RSSI function and 4/8 GPON ports respectively.

This user manual describes purpose, main technical specifications, installation order, rules of configuration, monitoring, and software update for the devices.

Purpose

The LTP-8X/4X optical line terminal is designed to establish connection with upstream equipment and provide broadband access across passive optical networks. Ethernet connection is established through Gigabit uplink and 10G Base-X interfaces; GPON interfaces are used to connect to optical networks. Each PON interface allows connection of up to 128 subscriber optical terminals through one fibre and supports dynamic bandwidth allocation (DBA).

The following services are provided to end users:

The device supports the following functions:

Delivery Package

The standard delivery package includes:

  1. LTP-4X/8X optical line terminal.
  2. Mounting set for 19'' rack.
  3. RS-232 DB9(F)—DB9(F) console cable for LTP rev. B; RJ-45—DB9(F) console cable for LTP rev. C.
  4. CD with Operation Manual and Quick Setting Guide.
  5. Power cable (if equipped with 220V power supply);
  6. Declaration of conformity;
  7. Passport.

Technical specifications

Table 1 – Main specifications of the line terminal

Interfaces

Number of Ethernet interfaces


LTP-8X

10

LTP-4X

6

Connector

RJ-45

SFP

Data rate, Mbps

10/100/1000

duplex/half-duplex

1000/10000

duplex

Standards

10/100Base-TX/ 1000Base-T

1000Base-X, 10GBase-X

IEEE 802.1D, IEEE 802.1p, IEEE 802.1Q

Number of PON interfaces

LTP-8X

8

LTP-4X

4

Connector type

SC/UPC (socket) in accordance with ITU-T G.984.2, FSAN Class B+, FSAN Class C++, SFF-8472

Transmission medium

SMF – 9/125, G.652 fibre optical cable

Standards

Digital RSSI (Received Signal Strenght Indication)

Splitting ratio

1:4, 1:8, 1:16, 1:32, 1:64, 1:128


Class B+

Class C++

Range of coverage

20 km

40 km

Transmitter:

1490 nm DFB Laser

1490 nm DFB Laser

Data transfer rate

2488 Mbps

2488 Mbps

Average output power

+1.5..+5 dBm

+7..+10 dBm

Spectral line width with -20dB

1.0 nm

1.0 nm

Receiver:

1310 nm APD/TIA

1310 nm APD/TIA

Data transfer rate

1244 Mbps

1244 Mbps

Receiver sensitivity

-28 dBm

-32 dBm

Receiver optical congestion

-8 dBm

-12 dBm

Processor

Clock frequency

800 MHz

Core quantity

1

RAM

LTP-8X

256 MB

LTP-4X/8X rev.B

512 MB

LTP-4X/8X rev.C

512 MB

Non-volatile memory

LTP-8X

2x32 MB SPI Flash

LTP-4X/8X rev.B

512 MB

LTP-4X/8X rev.C

512 MB

Switch

Switch performance

128 Gbps

MAC table

16K entries

VLAN functions

up to 4K in accordance with 802.1Q

Quality of Service(QoS)

8 prioritized egress queues per port

Control

Local control

CLI – command line interfaces

Remote control

CLI (SSH2, Telnet), SNMP

Monitoring

CLI, SNMP

Access restriction

by password, IP address, MAC address, privilege level

General parameters

Power supply

AC: 150-250V, 50 Hz
DC: -36..-72V

Power supply options for LTP-4X/8X rev.C:

  • single AC or DC power supply;
  • two AC/DC hot swappable power supplies.

Power consumptionLTP-8X (HW version 1vX)20 W max.
LTP-8X (HW version 2vX)55 W max.
LTP-4X40 W max.
Range of operating temperaturesfrom +5 to +40°C
Relative humidity

80% max.

Dimensions19", 1U
Dimensions with an installed power module:
LTP-8X430x44x258 mm
LTP-4X/8X rev.B430x44x259 mm
LTP-4X/8X rev.C430x44x317 mm
WeightComplete set
LTP-8X3.5 kg max.
LTP-4X/8X rev.B3.5 kg max.
LTP-4X/8X rev.C5 kg max.
Modules
Power module0.5 kg

Compatible SFP transceivers

Correct and error-free operation of GPON interface requires exact parameters to be chosen and set for each transceiver type. This can be done only under laboratory conditions by the terminal vendor.  The following table lists SFP transceivers for which seamless terminal operation is guaranteed.

DDMI (Digital Diagnostic Monitoring Interface) provides information on transceiver parameters, such as temperature, power voltage, etc. DDMI also measures the level of ONT signal (RSSI). All compatible transceivers support this function.

Table 2 – List of compatible SFP transceivers

Vendor

SFP transceiver model

Class

DDMI

NEOPHOTONICS

PTB38J0-6538E-SC

B+

+

NEOPHOTONICS

38J0-6537E-STH1+

C+ HP

+

NEOPHOTONICS

38J0-6537E-STH2+

C+ HP

+

NEOPHOTONICS

38J0-6537E-STH3+

C+ HP

+

Ligent Photonics

LTE3680M-BC

B+

+

Ligent Photonics

LTE3680M-BH

B+

+

Ligent Photonics

LTE3680P-BC

C+

+

Ligent PhotonicsLTE3680P-BC+1C++

Ligent Photonics

LTE3680P-BH

C+

+

Ligent Photonics

LTE3680P-BC2

C+ HP

+

Fanghang

DLOLT43BCDS20

B+

+

Fanghang

DLOLT43CCDS20

C+

+

Fanghang

FH-DLT43CCDS20

C+

+

Design

Front panel

The devices have a metal housing available for 19” form-factor rack mount; housing size is 1U. The front panel layout is shown in the figures below. Tables 3 and 4 list connectors, LEDs and controls located on the front panel of the terminal.


Figure 1 – LTP-4X rev.B front panel layout

Figure 2 – LTP-8X/LTP-8X rev.B front panel layout

Figure 3 – LTP-4X rev.C front panel layout

Figure 4 – LTP-8X rev.C front panel layout


Table 3 – Description of the connectors, LEDs, and controls located on the front panel of LTP-8X, LTP-4X/8X rev. B

#

Front panel element

Description

1

Console

RS-232 console port for local control of the device

2

GE Port 0..3

4 x RJ-45 connectors of 10/100/1000 Base-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)

3




Combo GE




0..3


4 chassis for SFP modules of 1000 Base-X uplink interface for connection to IP networks (for LTP-4X)

4 x RJ-45 connectors of 10/100/1000 Base-T Gigabit uplink interfaces for connection to IP networks (for LTP-4X)

4..7


4 chassis for SFP modules of 1000 Base-X uplink interface for connection to IP networks (for LTP-8X)

4 x RJ-45 connectors of 10/100/1000 Base-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)

4

10G/1G 0..1

2 chassis for SFP modules of 10GBase/1000 Base-X uplink interface for connection to IP networks

5


PON


4 chassis for SFP modules of xPON 2.5 G (for LTP-4X)

8 chassis for SFP modules of xPON 2.5 G (for LTP-8X)

6

Power

Device power LED

7

Status

Device operation LED

8

F


Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;
  • pressing the key for more than 10 seconds resets the device to factory default configuration. 

Configuring the response to a button click performs in the terminal CLI, for detailed description see Section System environment configuration.

Table 4 – Description of the connectors, LEDs, and controls located on the front panel of LTP-4X/8X rev. C

#

Front panel elements

Description

1

Power

Device power LED

2

Status

Device operation LED

3

Fan

Fan operation LED

4

RPS

Redundant power supply LED

5

Console

Console port for local management of the device.
Pin assignment:

  1. not used
  2. not used
  3. RX
  4. GND
  5. GND
  6. TX
  7. not used
  8. not used
  9. not used

Console cable pin assignment is shown in Appendix A. RS-232 NULL-MODEM CABLE PIN DESIGNATION

6 F

Functional key that reboots the device and resets it to factory default configuration:

  • pressing the key for less than 10 seconds reboots the device;
  • pressing the key for more than 10 seconds resets the device to factory default configuration.
7 GE Port  0..3 4 x RJ-45 connectors of 10/100/1000 Base-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)
8 Combo GE 0..3 4 chassis for SFP modules of 1000 Base-X uplink interface for connection to IP networks (for LTP-4X)
4 x RJ-45 connectors of 10/100/1000 Base-T Gigabit uplink interfaces for connection to IP networks (for LTP-4X)
4..7 4 chassis for SFP modules of 1000 Base-X uplink interface for connection to IP networks (for LTP-8X)
4 x RJ-45 connectors of 10/100/1000 Base-T Gigabit uplink interfaces for connection to IP networks (for LTP-8X)
9 10G/1G 0..1 2 chassis for SFP modules of 10GBase/1000 Base-X uplink interface for connection to IP networks
10 PON 4 chassis for SFP modules of xPON 2.5 G (for LTP-4X)
8 chassis for SFP modules of xPON 2.5 G (for LTP-8X)


4 electrical Ethernet and 4 optical interfaces are combined (Combo GE 4..7). The combo ports may have only one active interface at the same time.

Rear panel

The rear panel layout of the device is depicted in Fig. 5, 6, 7.

Table below lists rear panel connectors.                                                  

Figure 5 – LTP-4X/8X (DC) rear panel layout

Figure 6 – LTP-4X/8X (AC) rear panel layout

Figure 7 – Rear panel layout of LTP-4X/8X rev.C with two power adapters

Table 5 – Rear panel connectors description

Element

Description

36 .. 72 VDC, max 5AConnector for DC power supply
160-250 VAC, 50Hz, max 1AConnector for AC power supply
Fan0, Fan1Ventilation units
Earthing boltEarth bonding point

Light indication

The indicators located on the front panel show the status of the terminal. Indicator states are listed in Tables 6 and 7.

Table 6 – LTP-8X, LTP-4X/8X rev.B status light indication

LEDLED state

Device state

Power
offPower is off
solid greenPower is on, normal device operation
Status flashes greenNormal state
flashes redCritical failure

Table 7 – LTP-4X/8X rev.C status light indication

LEDLED stateDevice state
Power solid greenPower is on, normal device operation
offPower is off
solid redThe primary source of the main power supply is unavailable (in case the device is connected to a redundant power supply) or the main power supply failed
Status flashes greenNormal state
flashes greenCritical failure
Fan solid greenAll fans are operational
solid redOne or more fans are failed
RPS solid greenBackup power supply is connected and operates correctly
offBackup power supply is not connected
solid redThe primary source of the redundant power supply is unavailable or the redundant power supply failed

Temperature sensors

2 temperature sensors are used to measure temperature inside the terminal case.

Figure below shows the sensor location on PCB.

Figure 8 – Temperature sensors allocation

Ventilation system

There are ventilation openings on the device rear, front and side panels that serve to remove heat. The rear panel has two ventilation units installed (Fig. 5, Fig. 6, Fig. 7).

Air flows in through the perforated front and side panels, circulates through all internal components, cools them down, and then is removed by fans located on the perforated rear panel.

The device contains 2 fans. The ventilation units are detachable. The procedure for dismantlement and installation is described in Ventilation Units Replacement.

Safety rules and Installation procedure

Introduction

This section describes safety measures and installation of the terminal into a rack and connection to a power supply.

Safety requirements

General requirements
Any operations with the equipment should comply to the Safety Rules for Operation of Customers' Electrical Installations.

Operations with the terminal should be carried out only by personnel authorised in accordance with the safety requirements.

  1. Before operating the device, all engineers should undergo special training.
  2. The terminal should be connected only to properly functioning supplementary equipment.
  3. The device could be permanently used provided the following requirements are met:
  4. The terminal should be not be exposed to mechanical shock, vibration, smoke, dust, water, and chemicals.
  5. To avoid components overheating which may result in device malfunction, do not block air vents or place objects on the equipment.

Electrical Safety Requirements

  1. Prior to connecting the device to a power source, ensure that the equipment case is grounded with an earth bonding point. The earthing wire should be securely connected to the earth bonding point. The resistance between the earth bonding point and earthing busbar should be less than 0,1 Ω.PC and measurement instruments should be grounded prior to connection to the terminal. The potential difference between the equipment case and the cases of the instruments should be less than 1V.
  2. Prior to turning the device on, ensure that all cables are undamaged and securely connected.
  3. Make sure the device is off, when installing or removing the case.
  4. Power modules of LTP-X, LTP-X rev. B should be replaced only when the device is powered off. Follow the procedure in Terminal installation. Power modules of LTP-X rev. C terminals can be installed and removed without powering the device off.
  5. Follow the instructions given in SFP transceivers replacement to install or remove SFP transceivers. This operation does not require the terminal to be turned off.

 Terminal installation

Check the device for visible mechanical damage before installing and turning it on. In case of any damage, stop the installation, fill in a corresponding document and contact your supplier. If the terminal was exposed to low temperatures for a long time before installation, leave it for 2 hours at ambient temperature prior to operation. If the device was exposed to high humidity for a long time, leave it for at least 12 hours in normal conditions prior to turning it on.
Support brackets mounting
The delivery package includes support brackets for rack installation and mounting screws to fix the terminal case on the brackets. To install the support brackets:

Figure 9  – Support brackets mounting

Terminal rack installation
To install the terminal to the rack:

Figure 10 – Device rack installation

The terminal is horizontally ventilated. The side panels have air vents. Do not block the air vents to avoid components overheating and subsequent terminal malfunction.

To avoid overheating and provide necessary ventilation of the terminal, sufficient space should be provided above and below the terminal, not less than 10 cm.

Power module installation

Depending on power supply requirements, the LTP-8X, LTP-4X rev. B, and LTP-8X rev. B terminals can be supplemented with either an AC power module, 220 V, 50 Hz, or a DC power supply module, 48 V. Location of the power module is shown in Figure 11.

Figure 11 – Power module installation

The LTP-4X rev. C and LTP-8X rev. C terminals can use one or two power modules. The second power module installation is necessary when greater reliability is required. In case of using two power supply modules, it is allowed to use different power plants for supplying (with different voltage).


Figure 12 – Installation of power modules for LTP Rev. C

From the electric point of view, both places for power module installation are equivalent. In the terms of device operation, the power module located closer to the edge is considered as the main module, and the one closer to the centre — as the backup module. Power modules can be inserted and removed without powering the device off. When an additional power module is inserted or removed, the switch continues to operate without reboot.
To install a power module:

The device installation order:

Getting Started with the terminal

Connecting to the Terminal CLI

Introduction

This chapter describes various connection methods for Command Line Interface (CLI) of the terminal.

A serial port (hereafter — COM port) is recommended for preliminary adjustment of the terminal.

Connecting to CLI via COM port

This type of connection requires PC either to have an integrated COM port or to be supplied with an USB-COM adapter cable. The PC should also have a terminal program installed, e. g. Hyperterminal.

Figure 13 – Connecting the terminal to a PC via COM port

Connecting to CLI via Telnet protocol

The Telnet protocol connection is more flexible than the connection via COM port. Connection to CLI can be established directly at the terminal location or via an IP network with the help of a remote desktop.

This section considers direct connection to CLI at the terminal location. Remote connection is similar, but requires changes in the terminal IP address that will be considered in detail in the Network Settings section.

In order to be connected to the terminal, a PC should have a Network Interface Card (NIC). The connection will additionally require the sufficient amount of network cable (Patching Cord RJ45) as it is not included in the delivery package.

 

Figure 14 – Connecting the terminal to a PC via network cable

Figure 15 – Network connection configuration

Figure 16 – Telnet client startup

Connecting to CLI via Secure Shell protocol

Secure Shell connection (SSH) has functionality similar to the Telnet protocol. However, as opposed to Telnet, Secure Shell encrypts all traffic data, including passwords. This enables secure remote connection via public IP networks.

This section considers direct connection to CLI at the terminal location. Remote connection is similar, but requires changes in the terminal IP address that will be considered in detail in the Network Settings section.

In order to be connected to the terminal, a PC should have a Network Interface Card (NIC). The PC should have an SSH client installed, e. g. PuTTY. The connection will additionally require the sufficient amount of network cable (Patch Cord RJ-45) as it is not included in the delivery package.

 
Figure 17 – SSH client launch

Getting Started with terminal CLI

Introduction

CLI is the main means of communication between user and the terminal. This chapter considers general operations in CLI: commands grouping, automatic code completion, and history.

CLI views hierarchy

Views are used in the terminal CLI to group commands and optimize their length.

Figure 18 shows a graphic chart of main views and the commands to switch between them.

  
Figure 18 – CLI views hierarchy

The Top view includes general commands, which refer to the device in general. For example: view terminal parameters, firmware update, reboot, etc. The Switch configure view is a group of switch-related commands: VLAN, GE interfaces, LACP, etc. The Configure view is a list of terminal configuration commands. For example: user management, services configuration, GPON interface and ONT configuration, profile configuration, etc.

Figure 19 – Switch view hierarchy

  
Figure 20 – Configure view hierarchy

Figure 20 shows the Configure view, which consists of four parts. The GPON-port view is used to configure GPON interfaces. The ONT view is used to configure the ONT. ONT configuration templates are modified in the ONT template view. The profile of the terminal configuration is configured in the Profile view.

CLI hotkeys

In order to speed up the operations with the command line, the following hotkeys have been added:

HotkeyResult
Ctrl+CTermination of the current operation; clear line
Ctrl+DTransition up one level
Ctrl+ZTransition to root section
Ctrl+ATransition to the beginning of line
Ctrl+ETransition to the end of line
Ctrl+URemoval of characters to the left of a cursor
Ctrl+KRemoval of characters to the right of a cursor
Ctrl+WRemove a word
Ctrl+BTransition of a cursor one position backwards
Ctrl+FTransition of a cursor one position ahead

CLI automatic code completion

In order to make work with CLI faster and easier, an automatic code completion is implemented. A good knowledge of CLI command system allows user to work with CLI as fast as with graphical interface.

For example, enter the ex command in the Top view and press <Tab>:

LTP-8X# ex<Tab> 
LTP-8X# exit

As this view has only one command with the ex prefix, CLI automatically completes it.

If there are several commands with this prefix, CLI shows hints with possible options:

LTP-8X# co<Tab> 
commit configure copy 
LTP-8X# con<Tab> 
LTP-8X# configure

CLI command history

Sometimes it might be necessary to execute the same set of operations several times. To make the work with repeating commands easier, the terminal CLI keeps the command history.

The list of previously entered commands can be displayed with the help of the show history command:

LTP-8X# show history 
Last CLI commands: 
show version 
configure terminal 
exit 
show history
LTP-8X#

Use the <Up> and <Down> cursor keys to scroll the command history and the <Enter> key to execute the selected command.

LTP-8X# <Up> LTP-8X# show management <Up> 
LTP-8X# switch <Up> 
LTP-8X# exit <Up> 
LTP-8X# show uptime <Up> 

up 1 day, 23:44

Group operations

Group operations can be performed on such terminal configuration objects as interfaces and ONT. It is especially convenient, when you have to apply the same actions to multiple objects.

To perform a group operation, select the range of object IDs instead of one object ID. This feature is supported by a majority of CLI commands.

For example, enable fec for all ONTs in a certain channel.

LTP-8X(config)# interface ont 0/0-127 
LTP-8X(config)(if-ont-0/0-127)# fec

Or view the list of active ones in the first 4 GPON channels:

LTP-8X# show interface ont 0-3 ont online 
GPON-port 0 has no online ONTs
GPON-port 1 has no online ONTs
GPON-port 2 has no online ONTs GPON-port 3 has no online ONTs
Total ONT count: 0

Configuring the terminal

Terminal configuration

Introduction

A collection of all terminal settings is referred to as configuration. This chapter provides information on the parts which configuration consists of. It also defines lifecycle of configuration and describes main operations, which can be performed.

Configuration structure

The terminal configuration can be conventionally divided into 3 parts. Figure below shows the configuration structure.

worddavc14bc7ad67586fb9ca602881b5a49a38.png
Figure 21 – The structure of terminal configuration

System is a general system part. This group includes such settings as network settings, services configuration, user table, etc.
Switch represents a switch configuration. This group includes configuration parameters for Ethernet interfaces of the front panel, as well as VLAN settings.
GPON contains 5 subparts: OLT — settings for GPON OLT and GPON interfaces. OLT profiles — OLT profile part, which contains profiles for address tables, VLAN, DHCP RA, and PPPoE IA. ONT — ONT configuration base. ONT templates — ONT template part; ONT profiles — ONT profile part. 

Configuration lifecycle

The terminal configuration may have the following states:

The Running configuration is loaded to a new CLI session and becomes available for review (Candidate). After changing the configuration (Candidate) in the CLI session, user can either enter the commit command to accept the changes or use the rollback command to discard the changes and apply the current (Running) configuration. The save command saves the Running configuration into NVRAM of the terminal.
Figure below shows a chart of configuration lifecycle.

 
Figure 22 – Configuration lifecycle of the terminal chart

Configuration autosave

In some cases, for example, when several operators are working on the terminal or the terminal is automatically configured through OSS/BSS, it may be convenient to organize a centralized saving of the configuration into NVRAM at a specified time or at a specified time interval. The terminal allows this with the help of a configuration autosave mechanism.

For daily autosave of the configuration, define a time when autosave should be implemented:

LTP-8X(config)# config autosave hour 3 minute 44

For autosave at specified time intervals, define the interval in seconds:

LTP-8X(config)# config autosave period 3600

Check the entered data by using the do show config command.

LTP-4X(config)# do show config 
	Config: 
		Daily autosave: at 03:44 
		Periodic autosave: every 3600 seconds 
	   LTP-4X(config)#

For disabling a mode, use no command:

LTP-4X(config)# no config autosave hour 
LTP-4X(config)# no config autosave period

Apply the changes.

LTP-8X(config)# do commit

Creating a configuration backup

Configuration backups allow the terminal operation to be quickly restored after abnormal situations or replacement. Manual or triggered (on events) creation of backups is recommended at a regular basis.

Terminal configuration is uploaded to a TFTP server which is available in the management network. The copy command is used to upload the data. Pass the uploaded terminal configuration fs://config and destination URI as parameters.

LTP-8X# copy fs://config tftp://192.168.1.1/config 
Upload backup file to TFTP-server..

Configure a triggered upload to create backups automatically.

Configuration restore

The terminal configuration is restored from a TFTP server which is available in the management network. The copy command is used to restore the data. Define source URI as parameter and fs://config as restored configuration.

LTP-8X# copy tftp://10.0.105.1/config fs://config 
	Download file from TFTP-server.. 
	Reading of the configuration file.. 
	Configuration have been successfully restored (all not saved changes was lost)

Configuration reset

To reset a terminal configuration to factory settings, use the default command.

LTP-8X# default 
	Do you really want to set up default configuration? (y/n) y 
	Configuration have been reseted to default. 

	Terminal will be reloaded.


Resetting a configuration of a remote terminal also resets network settings. The terminal will not be available for operation until the network settings are reconfigured.

Network settings

Introduction

This chapter describes adjustment of network settings for the terminal. Adjusting network settings enables remote control and integration with OSS/BSS systems.

Network parameters configuration

It is recommended to adjust network settings via COM port connection. This will prevent issues with connection loss upstream the terminal being adjusted. Be very careful when using remote adjustment.

User management

Introduction

This chapter is devoted to management of the terminal users.

The factory settings provide only one user, i. e. the device administrator.


login: admin
password: password


When you start to configure the terminal, we recommend you to change the password of the 'admin' user.

For security reasons, there is a strictly defined set of permissions, which can be delegated to terminal users. For these purposes, each user gets his own level of privileges. Level 0 corresponds to a minimum set of permissions, Level 15 – to a maximum set of permissions.

CLI commands are ranked by the level of privileges. Level 0 commands are available to all users. Level 15 commands are available only to Level 15 users. Thus, the level of commands available to a user does not exceed the user's level.

The levels of privileges can be modified as required.

User list preview

To view the list of terminal users, enter the show users config command:

LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15

The admin and root users always exist and cannot be deleted or duplicated. The terminal supports up to 16 users.

Adding a new user

In order to operate effectively and safely, the terminal, as a rule, requires one or several additional users. To add a new user, enter the user command in the configure view:

LTP-8X(config)# user operator
LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15
     4            operator            0
LTP-8X(config)#

Pass the name of the new user as a parameter to the user command. The name should not be longer than 32 characters. The name should not contain special characters.

Changing user password

To change user password, enter the user command. Pass the user name and a new password as parameters.

LTP-8X(config)# user operator password newpassword

The password should not be longer than 31 characters and shorter than 8 characters. If the password contains a space, use quotations for the password.

Viewing and changing user access rights

To manage user access rights, a user priority system is implemented. A newly created user is granted with a minimal set of permissions:

LTP-8X(config)# user operator
LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15
     4            operator            0
LTP-8X(config)#

To change the user priority level, enter the user command. Pass the user name and a new priority as parameters.

LTP-8X(config)# user operator priviledge 15
LTP-8X(config)# do show users config 
    ##                Name      Privilege
     1                root           15
     2               admin           15
     3              remote           15
     4            operator           15
LTP-8X(config)#

Deleting a user

To delete a user, enter the no user command in the configure view. Pass the user name as a parameter:

LTP-8X# configure terminal 
LTP-8X(config)# no user operator

AAA configuration

Introduction

This chapter describes configuring of services and protocols related to authentication, authorization and accounting.

Hereafter, the term 'authorization' means authorization of the commands – definning rights for executing commands on a remote server.

Authorization of a user  –  a process of obtaining a specified permission set, combined with authentication process.   

LTP-X supports radius and tacacs+ AAA protocols. Table below represents functionalities of the protocols.

Table 10 – Permissions and the required level of privileges

Function and protocol

Tacacs+

Radius

Authentication

+

+

Authorization

+

-

Accounting start-stop

+

+

Accounting commands

+

-

Configuring servers

The principles of servers configuration are common for supported protocols. You can configure an IP address, key, response timeout and a data exchange port for each server. You can set up to 3 servers for the RADIUS. The LTP will apply to the servers according to their priorities. If the priority is not set, the 0 priority (the highest) will be used by default.

AAA methods configuration

By default, every AAA function is implemented locally – local user data base is used for authentication and authorization, accounting via a remote server is disabled.

For using of configured in previous steps servers, define a method of a function performing.

In case server configured for a function unavailable or key is not defined properly, the function will be implemented locally.

Services configuration

Introduction

This chapter describes configuration of integrated terminal services.

SNMPD configuration

To work with the Eltex.EMS management system, the terminal should be configured to work with Simple Network Management Protocol (SNMP).

The types and purpose of SNMP traps are closely connected with the log of active alarms.

You need to configure users to operate with SNMPv3. 

The SNMPv3 agent supports authNoPriv and authPriv methods. The encryption of the password performs according to the MD5 algorithm.

NTPD configuration

The terminal has no integrated real-time clocks with a battery. For the events in system log to show correct time and for automated operations to be performed in time, time synchronisation should be adjusted with the help of the NTP protocol.

ACSD and DHCPD configuration

The terminal has an integrated auto configuration server (ACS). To ensure interaction between ONTs and ACS, ONTs should obtain IP addresses for their management interfaces. The terminal has an integrated DHCP server to solve this task. These two servers are interconnected and cannot work separately.

ACSD configuration

DHCPD configuration

LOGD configuration

System log collects terminal history data and allows its further display. Adjustment of system log operates with such terms as module, filter level, and output device.


Figure 23 – Terminal system log

Messages of the system log are grouped into modules according to their functions. Configuration of the following modules is possible:

Table 11 – System log modules

Module

Description

alarm

Alarms log message

snmp

Messages from the SNMP agent

dhcpd

Messages from the integrated DHCP server

pmchal-ipc

Messages from the pmchal subsystem of interprocess communication

pmchal-gpon

GPON messages

pmchal-machine

Messages on operation of state machines for OLT, channels, and ONT

pmchal-olt

OLT general information

pmchal-gpon-port

Information about GPON channels

pmchal-ont

ONT information

pmchal-scheduler

Messages from the scheduler subsystem

pmchal-rdn

Messages on GPON channels reservation

pmchal-dhcpra

Messages from DHCP Relay Agent

pmchal-dhcpv6ra

Messages from DHCPv6 Relay Agent

pmchal-pppoeia

Messages from PPPoE Intermediate Agent

A filtering level and additional display information can be specified for messages of each module.
The filtering level sets the minimum importance level of the messages to be displayed in the log. The used filtering levels are listed in Table 12.

Table 12 – System log filtering levels

Level

Description

emergency

Further operation of the system is not possible

alert

The system requires emergency intervention

critical

Critical events

error

Operation errors

warning

Operation errors

notice

Important events during normal operation

info

Information messages

debug

Debug messages

none

Messages are not registered in the log


The emergency level is the maximum level, the debug level is the minimum one.

The log subsystem allows display of the terminal operation log on different devices. All output devices can be used simultaneously.

Table 13 – System log output devices

Output device

Name

Description

System log

system

The system log allows the log to be displayed locally or with the help of the syslog server.

Console

console

Being used for log display, the console allows system messages to be visible as soon as they are received in the terminal connected to the Console port.

CLI sesions

rsh

Being used for log display, CLI sessions allow system messages to be visible as soon as they are received in all CLI sessions connected via telnel or SSH.

CLI sesions

file

Logging into a file allows system messages to be written directly to the file, which can be sent to support specialists for further analysis.

The log is saved in non-volatile memory by default. The system has 4 log rotated files of 1M each. The last 3 logs are archived to gzip.

Module configuration

Consider module configuration by the example of the pmchal-gpon module responsible for messages from the GPON subsystem. Other modules have similar configuration process.

Configuring of command logging to syslog

The system is capable to record all the user's commands to syslog. Use the following command to activate the function:

LTP-8X(config)# logging commands

Configuring the Origin parameter

The system can add an additional origin-id parameter to messages sent to the Syslog server. It will be added to the beginning of the log message.

Only one additional parameter can be used at a time.

LTP-8X(config)# logging origin-id 
   hostname      The sysname will be used as the hostname field of a
                 syslog message
   string        The user defined string will be used as the hostname
                 field of syslog header
   ip            The IP address of the sending interface will be used
                 as the hostname field of a syslog message

LTP-8X(config)# logging origin-id 

Configuring the log storage

Use the following command to record logs to non-volatile memory:

LTP-8X(config)# logging permanent

If you enter «no» before the command, the logs will be recorded to RAM. In this case, the logs will be erased after reboot.

System log configuration

ALARMD configuration

ALARMD is a terminal alarms manager. Alarms manager enables troubleshooting and provides information about important events related to terminal operation.

A record in active alarms log (an event) corresponds to an event, which happened in the terminal. Types of events and their descriptions are provided in the following table.

Table 14 – Types of events in the active alarms log

Event

Descriptiom

Threshold

ram

Free RAM size decreased to the threshold

30% *

login

User tried to log in or logged in using their credentials

-

config-save

User saved the configuration

-

firmware-update

LTP-8X firmware update completed successfully/with errors

-

duplicate-mac

Two devices with the same MAC addresses detected

-

physical-layer-flapping

Flapping on Ethernet ports

-

pon-gpon-port-no-ont

The first ONT connected/the last ONT disconnected on channel

-

ont-physical-layer

ONT connected/disconnected

-

olt-update

ONT connected/disconnected

-

ont-update

ONT chip firmware update completed successfully/with errors

-

gpon-port-flapping

GPON interface flapping

-

ont-flapping

ONT flapping

-

download

File download completed successfully/with errors

-

battery-power

Switch ONT to battery power

-

battery-low

ONT battery low

Set on ONT

lan-los

ONT Ethernet port lost connection

-

ont-config

Configuration of the connected ONT
valid/invalid

-

file-delete

File deleted successfully/with errors

-

physical-layer-errors

Physical layer errors on Ethernet ports

-

physical-layer-block

Ethernet port blocked

-

link

Ethernet port status changed (up/down)

-

logout

User logged out

-

ont-dying-gasp

Dying Gasp signal received from ONT

-

ont-rei

Remote Error Indication (REI)

-

ont-power-off

ONT power off

-

config-change

OLT configuration changed

-

shutdown

SNMP agent shut down

-

oms

OMS-MIB operation completed successfully/with errors

-

ont-state-changed

ONT status changed

-

ont-config-changed

ONT configuration changed

-

gpon-port-state-changed

OLT channel configuration changed

-

pon-alarm-gpon-port

Event related to OLT channel

-

pon-alarm-onui

Event related to ONT

-

ont-update-inprogress

Updating ONT firmware

-

olt-device-reset

Resetting OLT chip

-

ont-signal-degrade

The signal received from OLT is below the threshold value

-28 dBm

ont-high-rx-power

The signal received from ONT is above the threshold value

-8 dBm

ont-low-rx-power

The signal received from ONT is below the threshold value


gpon-port-ont-count-overflow

ONT number on channel exceeded


olt-device-not-working

GPON OLT configuration was loaded successfully/with errors

-

load-average

GPON OLT configuration was loaded successfully/with errors

120*

free-space

Free drive space decreased to the threshold

30%*

temperature

Temperature of one of the two OLT chips exceeded the threshold

60

fan

Fan rotation speed exceeded the safe operating limits

4800 < X
< 9000*

system-reboot

System reboot alarm message

-

rssi-update

RSSI value on ONT changed

-

storm-detected

The excess of the limit of broadcast/multicast/unknown unicast traffic transmission

-

power-supply

The status of the power supplies modules has been changed

-


* The value can be adjusted.

Every record in the active alarms log has the parameters specified in Table 15 that are specified for every event type.

Table 15 – Parameters of events in the active alarms log

TokenDescription
severityDescribes event severity. Has four statuses (info, minor, major, critical)
send-on-inSpecifies whether an SNMP trap should be sent when an event is added to the log. Has two states (true/false)
send-on-outSpecifies whether an SNMP trap should be sent when an event is deleted from the log. Has two states (true/false)
ttlThe time an event exists in the active alarms log (from 1 to 2,147,483,647). Specified in seconds. The parameter has several special values. 0 – the event exists in the log until a normalising event is received. -1 – an SNMP trap is sent (if specified), but the event is not recorded in the alarms log.

Active alarms log configuration

VLAN Configuration

Introduction

This chapter describes VLAN configuration in the terminal switch.

VLAN ( Virtual Local Area Network) is a group of devices, which communicate on the channel level and are combined into a virtual network, connected to one or more network devices (GPON terminals or switches). VLAN is a very important tool for creating a flexible and configurable logical network topology over the physical topology of a GPON network. VLAN has two or more switch interfaces. A VLAN member interface can be either tagged or untagged. An outgoing packet of a tagged interface has a VLAN tag. An outgoing packet of an untagged interface has no VLAN tags. For more information about the configuration and rules of operation of interfaces, see the Configuring VLAN section.

Adding VLAN

CLI automatically switches view to work with the VLAN. The same command is used to configure existing VLANs.

VLAN Configuration

VLAN Deletion

Configuring access control list and policy

Introduction

ACL (Access Control List) – the table which defined filtering rules for incoming traffic according to data transmitted in the incoming packets: protocols, TCP/UDP ports, IP address or MAC address. The ACL based on IPv4 and MAC should have different names. You can set one type of the lists per interface. Each access list contains up to 20 rules.

Configuring MAC access-list

In a MAC access list, filtering is implemented according to the following criteria and a mask:

Table 16 – The list of MAC access-list criteria

CriteriaMaskCommand example
Src MACYespermit A8:F9:4B:00:00:00 FF:FF:FF:00:00:00 any
Dst MACYespermit any A8:F9:4B:00:00:00 FF:FF:FF:00:00:00
VlanNopermit any any vlan 10
COSYespermit any any vlan any cos 4 4
EthertypeYesPermit any any vlan any cos any ethertype 0x0800 0xFF00

Configuring IP access-list

The rules of an IP access list support criteria that are available in a MAC access-list

Table 17 – The list of the IP access list-criteria

CriteriaMaskCommand example
Proto IDNopermit tcp ...
permit udp ...
permit any ...
permit proto <id> ...
Src IPYespermit any 10.10.0.0 255.0.255.0 any
Dst IPYespermit any any 10.10.0.0 255.0.255.0
DSCPNopermit any any any dscp 48
PrecedenceNopermit any any any precedence 7
Src MACYespermit any any any dscp any mac A8:F9:4B:00:00:00 FF:FF:FF:00:00:00 any
Dst MACYespermit any any any dscp any mac any A8:F9:4B:00:00:00 FF:FF:FF:00:00:00
VlanNopermit any any any dscp any mac any any vlan 10
COSYespermit any any any dscp any mac any any vlan any cos 4 4
EthertypeYespermit any any any dscp any mac any any vlan any cos any ethertype 0x0800 0xFF00

Configuring ACL based on a bit mask

The filtering based on a bit mask is available in MAC and IP access-lists. The configuration is implemented with the help of offset-list.

Command format:

offset-list list1 <offset-type> <offset> <byte-mask> <byte-value> ...

You can configure up to 5 unique offsets on the OLT.

Table 18 – The list of the available offset-list

offset-listTypeLimits
macl20..127
macdst-mac0..5
macsrc-mac0..5
macinner-tag0..1
macouter-tag0..1
macethtype0..1
ipl30..23
ipl40..89


permit any any vlan any cos any ethertype any offset-list eltex1p

Configuring policies

Configuring policies allows you to perform various manipulations on classified traffic, such as cos, dscp, queue setting.


While the configuration, you should remember that deny in an ACL rule exclude the traffic from processing according to policy.

IGMP and MLD configuration in terminal switch

Introduction

This chapter describes IGMP and MLD configuration in the terminal switch.

Enabling snooping

  • Snooping is globally enabled in all VLANs.
  • MLD snooping is not supported for Model 1.

Enabling report proxy

To enable proxy from all VLANs, use the "from all to <VLAN>" structure.

Interface configuration

Introduction

This chapter describes configuration of terminal interfaces.

Terminal interfaces can be divided into two groups: Ethernet interfaces and GPON interfaces. Ethernet interfaces are used for terminal connection to operator's network core. GPON interfaces are used for ONT connections.

Figure 24 – A set of interfaces for a terminal with PCB rev. 1

 

Figure 25 – A set of interfaces for a terminal with PCB rev. 2

Table 19 shows types of terminal switch interfaces.

Table 19 – Interfaces types and numbers

InterfaceNoteNumberRange
10G-front-port
2[0..1]
front-port

 
for LTP-8X8[0..7]
for LTP-4X4[0..3]
pon-port


for PCB rev.1 LTP-8X2[0..1]
for PCB rev.2 LTP-4X4[0..3]
for PCB rev.2 LTP-8X8[0..7]

Ethernet interface configuration

Configuring Storm Control

A storm appears due to excessive number of broadcast or/and multicast messages transmitted on the network via a single port simultaneously. It leads to an overload of the network resources and appearing of delays. A storm also can be caused by loopback segments of an Ethernet network. The switch evaluates the rate of incoming broadcast, multicast and unknown unicast traffic for port with enabled Storm Control and drops packets if the rate exceeds the set maximum value.

There is an opportunity to record a storm event to the log and disable the port for a specified time (in seconds).

LTP-8X(switch)(config-if)# rate-limit uu 1000 2048 
LTP-8X(switch)(config-if)# rate-limit mc 1000 2048 logging 
LTP-8X(switch)(config-if)# rate-limit bc 1000 2048 logging shutdown 30

For manual enabling of the port after blocking by Storm Control, use the clear storm command:

LTP-8X(switch)# clear storm front-port 0

GPON interface configuration

Port Mirroring configuration

Port mirroring is used to duplicate the traffic on monitored ports by sending ingress or and/or egress packets to the controlling port. Users can define a controlled port and controlling ports and select the type of the traffic (ingress or egress), which will be sent to the controlling port.

Configuration of the controlled port

Configuration of the controlling port

LLDP configuration

Introduction

Link Layer Discovery Protocol (LLDP) – a protocol of the Data Link layer, which allows network equipment to announce data on them and their capabilities to the network and to collect data on neighboring devices. The standard RFC mib 1.0.8802 are supported by the SNMP agent.

LLDP configuration

ERPS configuration

Introduction

ERPS (Ethernet Ring Protection Switching) – a link layer protocol designed to increase the stability and reliability of a data network by creating a ring topology with logical blocking of interfaces. It is realized by reducing recovery network time in case of breakdown. Recovery time does not exceed 1 second. It is much less than network change over time in case of spanning tree protocols usage.

ERPS configuration

ARP-Inspection configuration

Introduction

The ARP Inspection function is dedicated to defense against attacks which use ARP (for instance, ARP-spoofing – ARP traffic interception). ARP Inspection is implemented on the basis of static correspondence between IP and MAC addresses defined for VLAN.

ARP-Inspection configuration

QoS configuration

Configuring QoS rules
The traffic prioritization and allocation by hardware queues (IEEE 802.1p/DSCP) are implemented on the basis of set rules in the system.

Table 20 – Traffic prioritization methods

Method

Description

0

All the priorities are equal

1

Packet selection according to IEEE 802.1p

2

Packet selection only according to IP ToS (Type of Service) on 3 level - support for Differentiated Services Codepoint (DSCP)

3

Interaction according to either 802.1p or DSCP/TOS

Weighted Round Robin (WRR) configuration

Weighted Round Robin (WRR) – an algorithm which distribute throughput by classes, using a scheme of weighted round robin. The OLT has 8 hardware queues.

LAG configuration

Introduction

This chapter describes configuration of uplink interfaces aggregation. Link aggregation (IEEE 802.3ad) is a technology that allows multiple physical links to be combined into one logical link (aggregation group). Aggregation group has a higher throughput and is very reliable.


Figure 26 – Multiple physical links combined to an aggregation group

The terminal supports two interface aggregation modes: static and dynamic. Static aggregation implies that all communication links of a group are always active. As for dynamic aggregation, link activity is dynamically determined during operation via LACP protocol.

Table 21 – Operation modes of aggregation groups

Mode

Description

static

Link aggregation protocol is not used

lacp

LACP is used

The terminal has several algorithms of load balancing within aggregation groups.

Table 22 – Load balancing modes

Mode

Description

ip

Based on IP addresses of sender and receiver

ip-l4

Based on IP addresses of sender and receiver, and L4

mac

Based on MAC addresses of sender and receiver

mac-ip

Based on MAC and IP addresses of sender and receiver

mac-ip-l4

Based on MAC and IP addresses and L4 of sender and receiver

The terminal supports two LACP modes. Passive – the terminal does not initiate creation of a logical link, but processes incoming LACP packets. Active – the terminal creates an aggregated communication link and initiates parameters conformance. The parameters are coordinated if equipment operates in active or passive LACP modes.

LAG configuration

LAG configuration represents configuration of static aggregation and LACP. To configure LAG, perform the steps marked blue in Figure 27. LACP configuration requires all steps to be performed.


Figure 27 – LAG and LACP configuration procedure

DHCP Relay Agent configuration

Introduction

This chapter describes configuration of DHCP Relay Agent in the terminal.

DHCP Relay Agent is used to provide a DHCP server with additional information about a received DHCP request. This may include information about the terminal running DHCP Relay Agent as well as information about the ONT, which sent the DHCP request. DHCP packets are modified by interception and further processing in the terminal CPU.

The DHCP server analyses DHCP option 82 and identifies the ONT. DHCP Relay Agent allows the option to be both transparently transmitted from the ONT and formed/rewritten according to a specified format. DHCP option 82 is especially useful for networks, which have no private VLANs dedicated for each user.

DHCP Relay Agent supports configurable formats for both Circuit ID and Remote ID. The format of the suboptions is configured with the help of the tokens listed in Table 23. The placeholders will be replaced with corresponding values, while the rest of the words will be passed as is.

Table 23 – DHCP Option 82 tokens

Token

Description

%HOSTNAME%

Terminal network name

%MNGIP%

Terminal IP address

%GPON-PORT%

Number of the OLT channel the DHCP request arrived from

%ONTID%

ID of the ONT, which sent the DHCP request

%PONSERIAL%

Serial number of the ONT, which sent the DHCP request

%GEMID%

ID of the GEM port the DHCP request arrived to

%VLAN0%

External VID

%VLAN1%

Internal VID

%MAC%

MAC address of the ONT, which sent the request

%OLTMAC%

OLT`s MAC address

%OPT60%

DHCP option 60 received from the ONT

%OPT82_CID%

Circuit ID received from the ONT

%OPT82_RID%

Remote ID received from the ONT

%DESCR%

First 20 characters of ONT description

In addition to DHCP option 82, DHCP Relay Agent has some more functions related to network security. It provides protection from DoS attacks by setting a threshold for intensity of DHCP messages, which are received from ONT. Exceeding the threshold blocks DHCP requests. The blocking time can be configured.

It also protects from illegal DHCP servers by controlling the source IP address of DHCP responses. Transmitted are only the DHCP responses, which arrived from IP addresses of trusted DHCP servers.

DHCP Relay Agent profiles management

A set of profiles is used for DHCP Relay Agent configuration. All VLANs use dhcp-ra-00 profile by default.

The configuration is flexible as it allows DHCP profiles to be assigned not only to a terminal on the whole, but separately to each VLAN as well. To assign a profile, the following steps should be taken.

DHCP Relay Agent profiles configuration

Active DHCP leases monitoring

When enabled, DHCP-RA allows monitoring of DHCP leases. To view the list of sessions, use the do show interface gpon-port 0 dhcp sessions command:

LTP-4X# show interface gpon-port 1 dhcp sessions 
    DHCP sessions (2):
##             Serial    ONT   Service         IP                  MAC      	   Vid      GEM    Life time
1    454C5458690000E8    1/4      1   	 192.168.101.102    A8:F9:4B:E5:67:8B      1101     433      3587
2    454C5458690000E8    1/4      0    	 192.168.200.51     A8:F9:4B:E5:67:8A      600      432      86307

Broadcast-unicast relay configuration

To reduce the broadcast traffic and avoid responses from illegal DHCP-servers, unicast messages can be configured to interact with the specified DHCP Relay Agent. Relay Agent can be individually started for each separate VLAN. The service allows processing only for the packets, which have only one 802.1q tag.

PPPoE Intermediate Agent configuration

Introduction

This chapter describes configuration of PPPoE Intermediate Agent of the terminal.

PPPoE Intermediate Agent is used to provide BRAS with additional information about a received PADI request. This may include information about the terminal running PPPoE Intermediate Agent as well as information about the ONT, which sent the PADI request. PADI packets are modified by interception and further processing in the terminal CPU.

BRAS analyses the Vendor Specific tag and identifies the ONT. PPPoE Intermediate Agent forms or rewrites the Vendor Specific tag using a specified format. Vendor Specific tags are especially useful for networks, which have no private VLANs dedicated for each user.

PPPoE Intermediate Agent supports configurable formats for Circuit ID and Remote ID. The format of the suboptions is configured with the help of the tokens listed in Table 24. The placeholders will be replaced with corresponding values, while the rest of the words will be passed as is.

Table 24 – Vendor Specific tag tokens

Token

Description

%HOSTNAME%

Terminal network name

%MNGIP%

Terminal IP address

%GPON-PORT%

Number of the OLT channel the PADI request arrived

%ONTID%

ID of the ONT, which sent the PADI request

%PONSERIAL%

Serial number of the ONT, which sent the PADI

%GEMID%

ID of the GEM port the PADI request arrived to

%VLAN0%

External VID

%VLAN1%

Internal VID

%MAC%

MAC address of the ONT, which sent the request

%OLTMAC%

OLT`s MAC address

%DESCR%

First 20 characters of ONT description

In addition to vendor specific tag support, PPPoE Intermediate Agent has some more functions related to network security. It provides protection from DoS attacks by setting a threshold for intensity of PADI messages, which are received from ONT. Exceeding the threshold blocks PADI requests. The blocking time can be configured.

PPPoE Intermediate Agent also limits the number of simultaneous PPPoE sessions. The restriction can be set for both the total number of terminal sessions and for every ONT separately.

PPPoE Intermediate Agent profiles configuration

To configure a PPPoE Intermediate Agent profile, the following steps should be taken.

Active PPPoE sessions monitoring

Enabling PPPoE-IA allows active PPPoE sessions to be monitored. To view the list of sessions, use the following command:

LTP-8X(config)(if-ont-0/4)# do show interface gpon-port 0 pppoe session 
PPPoE sessions (1):
 ## Serial            GPON-port Ont ID  Port  Client             Session ID   Duration    Unblock
 1  454C54586700008C  0         4        353   A8:F9:4B:E3:16:5C  0x0003       0:00:27     0:00:00

Disabling session monitoring

The session monitoring is enabled in PPPoE-IA by default. Due to the fact that system resources are used for each session, in this mode, there are 8192 sessions to be initialized through the OLT (the maximum session-limit value).

If you need to bypass this limit and save opportunity to fill the Vendor-Specific tag fields, you can disable the monitoring. Use the following command:

LTP-8X(config-pppoe-ia)("pppoe-ia-00")# no sessions-monitoring enable 
LTP-8X(config-pppoe-ia)("pppoe-ia-00")# do commit

To enable the monitoring, use the command:

LTP-8X(config-pppoe-ia)("pppoe-ia-00")# sessions-monitoring enable 
LTP-8X(config-pppoe-ia)("pppoe-ia-00")# do commit


PPPoE-IA is capable to detect sessions which are established while session monitoring is enabled. If a session was established before monitoring being enabled, re-initiate the session.

IP Source Guard configuration

Introduction

The IP Source Guard function allows restriction of unauthorised usage of IP addresses in the network by linking IP and MAC addresses of the source to a specific service on a specific ONT. There are two operation modes:

  1. To enable transmission of any traffic from clients, it is necessary to specify an explicit match between MAC and IP addresses of client equipment.
  2. Client equipment obtains its address via the DHCP protocol. Based on data exchange between client equipment and the DHCP server, a DCHP snooping table is generated on the OLT that contains MAC-IP-GEM port matches and information about lease period. Only the packets with source MAC and source IP fields matching the records in the DHCP snooping table are passed from the client. To support client equipment with static IP addresses, static entries can be created in the dynamic mode.

To enable the IP Source Guard functions, enable DHCP-RA. For more information on DHCP-RA, see DHCP Relay Agent configuration.
These functions are not supported in Model 1 (for more information about models, see Service Models).

When IP Source Guard is enabled, any non-IP traffic is forbidden.

IP Source Guard configuration

After the IPSG mode has been enabled/disabled/changed, the OLT is reconfigured automatically.

To enable DHCP session reset for a device with the same MAC address, there is an option:
LTP-8X(config)# ip source-guard one-dynamic-binding-for-MAC
It will automatically overwrite the old session with the new one.

To add static matches, use the following command:

LTP-8X(config)# ip source-guard bind ip <IP> mac <MAC> interface-ont <ONT> service <NUM>

Where:

IP – IP address of client equipment in the X.X.X.X format;
MAC – MAC address of client equipment in the XX:XX:XX:XX:XX:XX format;
ONT – ONT identifier in the X/Y format (CNANNEL_ID/ONT_ID);
NUM – service number on the ONT, which will transfer traffic from the specified addresses, 0–7.
To disable IP Source Guard and remove static matches, use the negative no command:

LTP-8X(config)# no ip source-guard enable 
LTP-4X(config)# no ip source-guard bind ip <IP>

In case of OLT power supply loss, entries of DHCP snooping table might be lost. In this case the service will not work until the address is prolonged or received again. The problem usually occurs when lease time is long. You may solve the problem by saving of snooping table in non-volatile memory:

LTP-8X# show ip source-guard 
    IP Source Guard:
        Enabled:                                       true
        Mode:                                          dynamic
        Database enabled:                              true
        Database update frequency:                     1020
        Bind [0]:
            Ip:                                        192.168.200.90
            Mac:                                       00:22:B0:50:59:71
            Interface-ont:                             0/4
            Service:                                   2
        Vlan [10]                                      Allowed
        Vlan [20]                                      Allowed


IP Source Guard Database will work only if automatic time synchronization is implemented via NTP

Configuring multicast traffic between ONTs within the same tree

Introduction

The functionality allows you to turn multicast traffic to the same port from which it came. The configuration consists of two parts: vlan configuration, multicast in which pon-port should be deployed, and on which the functional will work.

Configuration

ONT configuration

Service Models

This chapter considers main terms and classification of service models.

Introduction

In general, a service model is based on a method, which describes how the services are provided: VLAN for Subscriber or VLAN for Service. The VLAN for Service architecture means that a service VLAN (S-VLAN) is used to provide all users with a certain service. The VLAN for Subscriber architecture implies that a client VLAN (C-VLAN) is used to provide a user with multiple services. These methods are often combined in practice and form a hybrid model, which uses S-VLAN and C-VLAN simultaneously.

VLAN for Subscriber architecture

A separate VLAN is used for each subscriber in the C-VLAN model. A dedicated C-VLAN is used to provide services to each user between the OLT and service routers. Service GEM ports are created for every OLT service between every ONT and the OLT. When a service request is generated upstream, records are added to the MAC table in the OLT according to C-VLAN. In case of downstream traffic, a corresponding GEM port is determined for a definite service according to the MAC table in the OLT.

If the destination address of the downstream transmission is unknown (broadcast or unknown unicast), i. e. the GEM port cannot be determined, two options are available:

The destination address, in case it is unknown (broadcast or unknown unicast), will be determined based on the method implemented in a definite service model.

The architecture of this service model is shown in figure below.


Figure 28 – VLAN for Subscriber Service Model architecture

VLAN for Service architecture

The S-VLAN model has a separate VLAN for every service. Consider its operation on an example of an abstract S-VLAN 100 service.

S-VLAN 100 is used between the OLT and service routers that is global for all subscribers in terms of this service. When a service request is generated upstream, records are added to the MAC table in the OLT according to S-VLAN and subscriber's MAC address. In case of downstream traffic, a corresponding subscriber of the service is determined based on the MAC table.

If the destination address of the downstream transmission is unknown (broadcast or unknown unicast), i. e. the GEM port cannot be determined, two options are available:

The destination address, in case it is unknown (broadcast or unknown unicast), will be determined based on the method implemented in a definite service model.

The architecture of this service model is shown in figure below.

Figure 29 – VLAN for Service Service Model architecture

Operating principle

The configuration model concept is used for implementation of different service models in the terminal. A configuration model defines general principles for data communication channelling for both OLT and ONTs.

Table 25 – Service Models


VLAN for Service

VLAN for Subscriber

Broadcast to Unicast GEM

Dedicated Broadcast GEM

Model 1

 -

+

+

 -

Model 2

+

 -

 -

+

Model 3

+

 -

 -

+

Model 1

Consider an example of Model 1 implementation.
The chart of this service model is shown in Figure 30.


Figure 30 – Service Model 1 chart

A C-VLAN is used between an ONT and service routers (BRAS, VoIP SR) that encapsulate services for one subscriber (one ONT), such as VoIP, Internet, and IPTV unicast. An S-VLAN that is global for all subscribers (ONTs) is used for the TR-069 management service. Corresponding GEM ports are created for every OLT service between the ONTs and OLT. A dedicated MC-VLAN is used for multicast transmissions.

The OLT casts C-VLAN (for VoIP, Internet, and IPTV unicast) or S-VLAN (for TR-069) for every service into a corresponding U-VLAN. An ONT associates the U-VLAN with corresponding ONT interfaces or program modules. For example, the TR-069 service is associated with a TR-069 client with the help of a corresponding interface. The VoIP, Internet, and IPTV unicast services can operate in the router or bridge modes depending on the ONT configuration. The chart shows all services configured in the router mode.

Broadcast and unknown unicast traffic is transmitted in this model by replicating a corresponding packet (broadcast or unknown unicast) to the OLT. C-VLAN replicates services to all associated GEM ports and at the same time translates data to the corresponding U-VLAN for each service. The TR-069 service is replicated between the corresponding GEM ports of all subscribers (ONTs). Thus, the model implements VLAN for Subscriber for the VoIP, Internet, and IPTV unicast services, but uses VLAN for Service for the TR-069 service.

Model 2

Consider an example of Model 2 implementation.

The chart of this service model is shown in the following figure.


Figure 31 – Service Model 2 chart

Dedicated S-VLANs are used between the OLT and service routers (BRAS, VoIP SR) for each of the following services: VoIP, Internet, IPTV unicast, and TR-069. These S-VLANs are common for all subscribers (ONTs). Corresponding GEM ports are created for every OLT service between the ONTs and OLT. A dedicated MC-VLAN is used for multicast transmissions.

OLT transmits S-VLAN into a corresponding U-VLAN for each service. An ONT associates the U-VLAN with corresponding ONT interfaces or program modules. For example, the TR-069 service is associated with a TR-069 client with the help of a corresponding interface. The VoIP, Internet, and IPTV unicast services can operate in the router or bridge modes depending on the ONT configuration. The chart shows all services configured in the router mode.

All broadcast and unknown unicast traffic is redirected to a dedicated broadcast GEM port in this model. Broadcast and unknown unicast packets are sent to U-VLAN (for the VoIP, Internet, and IPTV unicast services) in the ONT.

This model is similar to Model 3 except the following: transmission of C-VLAN to U-VLAN is performed on the OLT side, while the VoIP, Internet, and IPTV unicast traffic comes to U-VLAN in the ONT.

Thus, the model implements VLAN for Service for the VoIP, Internet, IPTV unicast, and TR-069 services.

Model 3

Consider an example of Model 3 implementation.

The chart of this service model is shown in the following figure.

Dedicated S-VLANs are used between the OLT and service routers (BRAS, VoIP SR) for each of the following services: VoIP, Internet, IPTV unicast, and TR-069. These S-VLANs are common for all subscribers (ONTs). Corresponding GEM ports are created for every OLT service between the ONTs and OLT. A dedicated MC-VLAN is used for multicast transmissions.

The VoIP, Internet, IPTV, and TR-069 unicast services are associated with S-VLAN in an ONT. The ONT transmits S-VLAN into a corresponding U-VLAN for each service. An ONT associates the U-VLAN with corresponding ONT interfaces or program modules. For example, the TR-069 service is associated with a TR-069 client with the help of a corresponding interface. The VoIP, Internet, and IPTV unicast services can operate in the router or bridge modes depending on the ONT configuration. The chart shows all services configured in the router mode.

All broadcast and unknown unicast traffic is redirected to a dedicated broadcast GEM port in this model. Broadcast and unknown unicast packets come to S-VLAN in the ONT. These packets are transmitted into the corresponding U-VLANs on the ONT side. In this case, broadcast and unknown unicast are replicated neither in the OLT nor in the ONT since every service has a separate S-VLAN for broadcast and unknown unicast traffic.

Figure 32 – Service Model 3 chart

Thus, the model implements VLAN for Service.

Model configuration

ONT licensing

Introduction

By default, OLT supports only Eltex ONTs operation. To enable any third-party ONTs, OLT requires a license. To purchase the license, contact Eltex Marketing Department.

If a third-party ONT is connected to OLT without a license, the following entry will be made in the log file:
Jul 4 11:10:14 LTP-8X pmchal: error: [ONT2/0] License is not valid, configuration will not continue

Loading a license file to OLT

A license is a text file of the following format:

{
"version":"<VER>",
"type":"all",
"count":"<count>",
"sn":"<SN>",
"mac":"<MAC>",
"sign":"<hash>"
}

Where:

VER – license file version number;
count – number of third-party ONTs enabled on the OLT;
SN – LTP serial number;
MAC – LTP MAC address;
hash – license file digital signature.
There are two ways to load a license to OLT:

  1. Use the copy command:

    LTP-8X# copy tftp://<IP>/<PATH> fs://license 
    Download file from TFTP-server..
    License successfully installed. Please reboot device for changes to make effect

    Where:

    IP – IP address of the TFTP server;
    PATH – path to the license file on the TFTP server.

    Restart the LTP after loading the license. 


  2. Use CLI:

    LTP-8X# license set """<license>""" 
    License saved.
    License successfully installed.

    Where:

    license – full content of the license file including curly brackets.
    To view information about the license on the device, use the show command.

    LTP-8X# show license 
    Active license information:
        License valid:              yes
        Version:                    1.2
        Board SN:                   GP2B000022
        Licensed vendor:            all
        Licensed ONT count:         10
        Licensed ONT online:        3

    The license file remains after device reload, firmware update, and configuration load. If OLT is reset to factory settings, the license is also deleted.

Deleting a license file from OLT

If necessary, you can delete a previously installed license using the no license command.

LTP-8X# no license 
License file removed. 
License successfully deleted from system. 
LTP-8X# show license 
Active license information: 
	No license installed

EasyConfig. EasyConfig mode

LTP-X EasyMode

EasyMode is a function set of LTP optical terminals. EasyMode is dedicated to fast GPON deployment according to realized service model. EasyMode allows providers to configure Triple-Play services promptly.

EasyMode can be used for:

Software and hardware requirements

The EasyMode is supported by the hardware of B and C revisions and by NTU terminals. For EasyMade operation, it is necessary to use the software no below than:

For LTP-8X(4X)

3.26.1

For NTU-1

3.24.0

For NTU-2W

3.25.1

For NTU-2V(C), NTU-RG-1402-GW

3.25.2

For NTU-RG-1421(31)G-Wac

3.28.1

Detailed information about the easy configuration mode is contained in the LTP EasyMode manual document, which can be found in the Download Center.

Automatic ONT activation

Automatic activation speeds up the process of adding new ONTs to an existing configuration with the necessary profiles.

Automatic ONT activation configuration

After applying the changes, the OLT will reconfigure.
To apply ONT configuration changes that are added automatically, you must enter the rollback command first. Changes will not be made until the command is entered and an error will be issued indicating the need to enter.

ONT configuration

Introduction

This chapter describes general principles of ONT configuration. It also defines configuration profiles.

ONT is configured with the help of a profile, which defines high-level expression of data communication channels. All operations related to channel creation are performed automatically. The way data communication channels are created depends on the selected service model.

ONT configuration includes specification of configuration profiles and individual ONT parameters. Configuration profiles allow general parameters to be set for all or for a range of ONTs. Profile parameters may include, for instance, DBA settings, configuration of VLAN operations in OLT and ONT, settings of Ethernet ports in ONT. Specific ONT parameters allow each separate ONT to have its own settings specified. Such settings include, for example, GPON password, subscriber's VLAN, etc.

General principles of configuration

Service is the key term of ONT configuration. This term completely includes a communication channel, through which data is transferred from the interfaces located on the front panel of the terminal (see section Interface configuration) to users' ONT ports. There are two service profiles: cross-connect and dba. The cross-connect profile creates a GEM service port, the dba profile allocates an Alloc-ID for this ONT and associates a corresponding GEM port to the Alloc-ID.

Table 26 – ONT profiles

Profile

Description

cross-connect

Defines VLAN transformation in OLT and ONT

dba(alloc)

Defines upstream traffic parameters

shaping

Defines restrictions for upstream and downstream service traffic

management

Defines TR-69 management service parameters

ports

Defines user port groups in ONT as well as IGMP and multicast parameters for user ports


Figure 33 – ONT scope of operation

ONT profiles configuration

Cross-connect profile configuration

DBA profile configuration

This profile configures dynamic bandwidth allocation (DBA). These parameters allow specification of any T-CONT type described in G.984.3.

DBA configuration is described in details in DBA configuration.

Shaping profile configuration

Configuration of this profile allows restriction of upstream and downstream services.

The configuration of shaping profile represented detailed in Shaping configuration

Ports profile configuration

The ports profile allows you to group ports in ONT. The profile also contains IGMP and multicast setting as they are separately adjusted for each port.
You can adjust up to 4 Ethernet ports and a VEIP virtual port, which will serve as a link between the OMCI and RG domains in ONT.

Management profile configuration

The management profile enables specific configuration of the TR-069 management protocol, namely configuration of a TR-client in ONT.

The TR-069 protocol configuration is described in detail in VoIP configuration.

Re-defining the parameters set in the cross-connect profile. Custom parameters

In some cases, it is necessary to define unique VLAN ID/802.1p tags for ONT. For solving this problem, you can use custom parameters instead of creating a profile.

Custom svid

LTP-8X# configure terminal 
LTP-8X(config)# interface ont 0/0 
LTP-8X(config)(if-ont-0/0)# service 0 custom svid 1234

If cross-connect profile defined in the specified service has tag-mode double-tagged, VLAN ID of the external tag will be replaced. For single-tagged service, VLAN ID of the single tag will be replaced.

Custom cvid

LTP-8X# configure terminal 
LTP-8X(config)# interface ont 0/0 
LTP-8X(config)(if-ont-0/0)# service 0 custom cvid 1234

If cross-connect profile defined in the specified service has tag-mode double-tagged, VLAN ID of the internal tag will be replaced. For single-tagged service, VLAN ID of the single tag will be replaced.

If you set custom svid and cvid simultaneously for single-tagged service, svid will be used for replacing the VLAN ID.

Custom cos

LTP-8X# configure terminal 
LTP-8X(config)# interface ont 0/0 
LTP-8X(config)(if-ont-0/0)# service 0 custom cos 3

Replaces 802.1p field in a tag.

ONT configuration procedure

Figure below shows a step-by-step procedure of ONT configuration.

Figure 34 – ONT configuration procedure

Model 1

Consider configuration of a data communication channel, which is based on Model 1 and implements VLAN for Subscriber (except for the control service, which is implemented in S-VLAN).

Routed mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the VLAN ID for the subscriber to 200, U-VLAN IDs to 10 and 11 for each service respectively. Traffic between the OLT and ONT will be transmitted into VLAN 10 and 11. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 35 – Routed service abstract representation for Model 1

Bridged mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the subscriber VLAN ID to 200. Configure transmission of tagged traffic to LAN port 1. To do this, set the U-VLAN ID to 10. Traffic to port 2 will be transmitted untagged. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 36 – Bridged service abstract representation for Model 1

Model 2 

Model 2 is a hybrid of Model 1 and Model 3. It is based on VLAN for Service. Model 2 services configuration is similar to Model 3.

Model 3

Consider configuration of ONT data communication for Model 3, which implements the VLAN for Service principle.

Routed mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the VLAN ID to 200 for Internet, to 201 for IPTV unicast. Services will be provided by operator in these VLANs. Set U-VLANs to 200 and 201 for each service respectively. These VLANs will transmit traffic to the subscriber device. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 37 – Routed service abstract representation for Model 3

Bridged mode

Configure the Internet (PPPoE), IPTV unicast, and management services via the TR-069 protocol. Set the VLAN ID to 200 for Internet, to 201 for UC_IPTV. Set U-VLAN to 200 for Internet. Multicast traffic will be transmitted to VLAN 98, management will be performed via VLAN 9.

Figure 38 – Bridged service abstract representation for Model 3

Tunnelling configuration

Usual profiles in the tag-mode, single-tag or double-tag modes are aimed at mapping the traffic, which is transmitted to the gem port and tagged as user vid or untagged, into the traffic tagged outer vid or outer:inner vid respectively.

Models 2 and 3 allow traffic tunnelling configuration, which extends the range of possible GPON applications in operator's network.

Using the profiles tagged as selective-tunnel allows a tag to be added to incoming packets with a certain set of user vid tags. The profiles tagged as tunnel allow a tag to be added to incoming packets with any user-vid tags.

Consider the following diagram and its configuration as an example. 

Figure 39 – Communication diagram

VLAN 300 (multicast) and Q-in-Q VLAN 1100 and 1200 (Internet) come to the uplink OLT. It is necessary to let them pass to the switch integrated in the OLT via SFP-ONU. In addition, a corporate client is connected to the splitter via SFP-ONU that sends a random set of VLANs to be passed to remote devices after removing tags of these VLANs at the ONT LAN port. To organise a tunnel for this client, VLAN 500 is selected in the operator's network.

Consider the procedure of OLT configuration for the above diagram.

The number of UVIDs processed in all selective-tunnel services on one ONT should not exceed 42.

The VLANs used for tunnel services cannot be used for other types of services within one GPON channel.

The tunnel service is the last one to be configured on the ONT, therefore the user-vid used by other services will not be processed by the tunnel service.

The traffic with a random user-vid tag should not contain additional 802.1q tags. Otherwise, it will be declined by any service provided for this user-vid.

It is impossible to use double-tagged and tunnel services simultaneously on one terminal.

You can create up to 12 services on a single interface using tunnel or selective tunnel.

It is not recommended to use untagged traffic for tunnelling.

DBA configuration

Introduction

This chapter considers DBA configuration for ONT.

GPON technology implies that all ONTs of one GPON channel use common communication medium (fibre). It is necessary to provide a mechanism that will ensure data transfer from all ONTs without collisions. The mechanism is called dynamic bandwidth allocation (DBA) and ensures allocation of time intervals in OLT for data transfer to ONTs.

A logical unit of the DBA algorithm is Alloc-ID (allocation) with a corresponding T-CONT (traffic counter) on the ONT side. Data transfer parameters (frequency, transmission window) are separately configured for every Alloc-ID (T-CONT) and are referred to as service level agreement (SLA).

G.984.3 provides several SLA combinations called T-CONT type. There are the following T-CONT types:

The terminal allows configuration of up to 256 default allocations per channel. When one ONT is connected, at least one default allocation will be provided. Thus, when 128 subscribers are connected to a channel, 128 service allocations will be provided. The remaining 128 allocations will be enough to process data, but not enough to process more than one service in its own allocation. Adhere to the rule: Amax = 256 / N – 1, where Amax is the maximum number of allocations per single ONT, and N is the number of ONTs per channel. If the calculated amount of services exceeds ONT Amax, configure a combination of multiple services into a single allocation. For more detailed information, see Services in one T-CONT.

DBA parameters are configured in the dba profile. These parameters allow specification of any T-CONT type described in G.984.3. First of all, choose service-class to define the basic DBA algorithm. After that, configure status-reporting to define the type of ONT queues status report. The fixed-bandwidth, guaranteed-bandwidth, and besteffort-bandwidth parameters define the fixed, guaranteed, and best-effort bandwidth correspondingly. Table 27 shows the correspondence between the dba profile settings and T-CONT types.

Table 27 – DBA profile configuration and T-CONT types


T-CONT
type 1

T-CONT
type 2

T-CONT
type 3

T-CONT
type 4

T-CONT
type 5

service-class

cbr

voip

type5

type5

type5

status-reporting

-

+

+

+

+

fixed-bandwidth

+

-

-

-

+

guaranteed-bandwidth

-

+

+

-

+

besteffort-bandwidth

-

-

+

+

+

The following rules apply to dba profile assignment:

DBA profiles assignment

Services in different T-CONTs

Two Alloc-IDs will be allocated for ONTs in the OLT. Each service will operate in its allocation. There will be two T-CONTs on the ONT side corresponding to the allocations.

Services in one T-CONT

One Alloc-ID will be allocated for ONTs in the OLT. Each ONT will have one T-CONT configured. The T-CONT will be used to transfer traffic from multiple services. Traffic priority will be based on the value of the priority queue field of the corresponding cross-connect profiles.

Single profile for multiple ONTs

This is a typical scenario in most cases, when similar services require the same DBA parameters on different ONTs.

Profiles assignment example

Consider two ONTs, which need to have the following three services: Internet, VoIP, and SecurityAlarm. The VoIP service should operate in a separate allocation (a definite throughput should be ensured). The Internet and SecurityAlarm services may operate in one allocation.

This configuration implies that the OLT allocates two Alloc-IDs to each ONT. The Internet and SecurityAlarm services operate in one allocation, the VoIP service uses another one. Each ONT has two T-CONTs configured, which correspond to the Alloc-IDs of the ONT. Traffic priority between the Internet and SecurityAlarm services on the ONT side is based on the "priority-queue" value of the ServiceInternet and ServiceAlarm cross-connect profiles, which were assigned to the services.

The Internet and SecurityAlarm services require calculation of SLA parameters. This is done by adding the appropriate parameters for both services. Below is an example of SLA parameters calculation.

Table 28 – SLA parameters

SLA parameters

Internet

SecurityAlarm

Sum

bandwidth fixed

0

0

0

bandwidth guaranteed

10048

1024

11072

bandwidth besteffort

329984

20096

350080

For more information about SLA parameters, see DBA parameters configuration.

DBA parameters configuration

T-CONT type 1 configuration

Consider configuration of a 100 Mbps fixed bandwidth.

T-CONT type 2 configuration

Consider configuration of a 100 Mbps guaranteed bandwidth.

T-CONT type 3 configuration

Consider configuration of a 100 Mbps guaranteed bandwidth with a possibility of allocation of a 200 Mbps best-effort bandwidth.

T-CONT type 4 configuration

Consider configuration of a 200 Mbps best-effort bandwidth without allocation of a guaranteed bandwidth.

LTP-8X(config)# profile dba dba-00 
LTP-8X(config-dba)("dba-00")# sla class type5


T-CONT type 5 configuration

Consider configuration of a 100 Mbps fixed bandwidth and a 200 Mbps guaranteed bandwidth with a possibility of allocation of a 1244 Mbps best-effort bandwidth.

Shaping configuration

Introduction

This chapter describes how to configure Shaping profile for an ONT.

A shaping profile allows limiting a downstream and upstream bandwidth for a specified ONT. 

Downstream restriction in OLT uses the downstream policer algorithm. The restriction can either use one policer for all services or individual policers for each separate service.

Upstream restriction in ONT uses the upstream shaping algorithm. It is possible to use either a single policer for all services simultaneously or different policers for each service separately.

Shaping parameters configuration

Downstream policer configuration

You need to configure a bandwidth limit of 100 Mbps for all services.

The total bandwidth for all services is limited by the value set for 0 service.

Upstream shaping configuration

Shaping allows limiting all types of traffic for services by bandwidth or set different values of bandwidth for each type separately.

There is an opportunity to limit bandwidth for multicast and broadcast traffic separately. In this case unicast traffic will be limited by the global value. If you set the limit for unicast traffic, you should set limits for multicast and broadcast traffic as well. Otherwise, multicast and broadcast traffic will not be limited at all. 

For the correct bandwidth limiting, different DBA profiles should be assigned for each service.

Configuration of Storm-control in upstream direction

To protect against the storm that occurred in the pon part of OLT, you can use the advanced functionality of the shaping profile.

Configuration example of bc and mc traffic restriction. The limit is set at the number of packets per second. If necessary, you can provide logging of the event when the threshold is exceeded, block ONT*, or perform both actions.

LTP-8X(config-shaping)("shaping-00")# upstream broadcast storm-control rate-limit 100 logging shutdown 
LTP-8X(config-shaping)("shaping-00")# upstream multicast storm-control rate-limit 100 logging shutdown

* The blocking time is set in the global configuration by the command:

LTP-8X(config)# gpon olt ont-block-time 1

The time is set in minutes.

RG ONT

Introduction

This chapter considers issues related to configuration of Residential Gateway (RG) ONTs. The chapter introduces the notion of Bridged and Routed services.

Consider the concept of OMCI and RG management domains. These terms are determined in TR-142 Issue 2. In terms of management domains, an ONT is considered as a device, which operates in the OMCI domain only. The devices, which operate in both management domains (i. e. have an integrated router), are denoted as ONT/RG. Everything that refers to the OMCI domain can be applied to both ONT and ONT/RG devices. For this reason, we will further denote ONT/RG as ONT. If an ONT is configured without the RG domain (without a router), skip all steps concerning RG.

Figure below shows an ONT/RG scheme and its management domains.

Figure 40 – ONT/RG management domains

Bridged service is a service, which configuration requires the OMCI management domain only, i. e. it can be completely configured with the help of the OMCI protocol in ONT.

Routed service is a service, which configuration requires both the OMCI and RG management domains.

In addition to configuration in terminal, a routed service requires the RG domain to be configured by using one of the following methods:

  1. Pre-defined configuration—subscriber is provided with an ONT having fixed configuration.
  2. Local ONT configuration using WEB interface.
  3. ONT configuration using the TR-069 protocol and auto configuration server (ACS).

Contact ONT vendor for information about RG domain configuration.

ONT is connected to RG using a Virtual Ethernet interface point (VEIP), which corresponds to the TR-069 WAN interface (described in TR-098) on the RG side. VEIP is represented by a virtual port in terminal parameters. The port has the same configuration procedure as Ethernet ports in the ports profile.



Figure 41 – Services configuration in ONT and RG domains

Figure above shows two services (each with a corresponding GEM port on the ONT side), with one of them being routed and using both the OMCI and RG management domains and the other one being bridged and using only OMCI for configuration. Terminal configuration includes configuration of bridge interfaces (green areas in the figure) and distribution of LAN ports between the management domains.
The bridge parameter of the cross-connect profile is responsible for association of a service with a management domain. Being set, the bridge parameter creates a bridged service (the bridge group parameter is the bridge number in this case). When no bridge is set, a routed service is created (there is only one bridge associated with RG; it has a special bridge number—0).

Mixed configuration

Consider an example of ONT configuration, which simultaneously uses both management domains. Port numbers and the internal structure are shown in Figure 41.

As a result, you will have the mixed configuration of the ONT. One of the services is managed completely by the OMCI domain (the bridged service), LAN2 and LAN3 ports on the ONT are connected as bridges. The second service is managed by both OMCI and RG (the routed service; the RG domain can be configured, for instance, through the WEB interface on the ONT). LAN0 and LAN1 ports are connected to RG ONT.

High Speed Internet configuration

Configuration of High Speed Internet (HSI) does not have any peculiarities and can be easily performed as described in Section 5.1.
Correct operation of IPv6 requires to do the following:

Example of a routed configuration:

LTP-8X(config)# profile cross-connect ipv6 
LTP-8X(config-cross-connect)("ipv6")# outer vid 300 
LTP-8X(config-cross-connect)("ipv6")# user vid 300 
LTP-8X(config-cross-connect)("ipv6")# type multicast 
LTP-8X(config-cross-connect)("ipv6")# exit 
LTP-8X(config)# profile ports ipv6 
LTP-8X(config-ports)("ipv6")# veip multicast 
LTP-8X(config-ports)("ipv6")# exit 
LTP-8X(config)# exit 
LTP-8X# commit

Example of a bridged configuration:

LTP-8X(config)# profile cross-connect ipv6_br 
LTP-8X(config-cross-connect)("ipv6_br")# bridge 
LTP-8X(config-cross-connect)("ipv6_br")# bridge group 10 
LTP-8X(config-cross-connect)("ipv6_br")# outer vid 300 
LTP-8X(config-cross-connect)("ipv6_br")# user vid 300 
LTP-8X(config-cross-connect)("ipv6_br")# type multicast 
LTP-8X(config-cross-connect)("ipv6_br")# exit 
LTP-8X(config)# profile ports ipv6_br 
LTP-8X(config-ports)("ipv6_br")# port 0 multicast 
LTP-8X(config-ports)("ipv6_br")# port 0 bridge group 10 
LTP-8X(config-ports)("ipv6_br")# exit 
LTP-8X(config)# exit 
LTP-8X# commit

Multicast configuration

Introduction

The chapter describes peculiarities of IPTV service configuration.

Hosts and routers use the Internet Group Management Protocol (IGMP) to support multicasting. It provides all systems of a physical network with relevant information: which hosts are included in groups and which group corresponds to a host.

IGMP snooping is a technique that allows network devices of the channel level (switches) to snoop IGMP requests from hosts to a group router in order to decide whether group traffic transmission to the corresponding interfaces should be started or stopped. When a switch snoops a host's IGMP request for connection to a multicast group, it adds the port the host is connected to into the group (for group traffic retranslation). And vice versa, having snooped a leave_group request, the switch removes the corresponding port from the group.


Figure 42 – IGMP snooping is disabled

Figure above shows traffic multicasting regardless of whether an end host needs the traffic or not. When IGMP snooping is enabled, the multicasting situation changes as follows: the switch will analyse all IGMP packets between connected devices and the routers the multicast traffic comes from. When the switch receives a consumer's IGMP request for connection to a multicast group, it adds the port the consumer is connected to into the group. And vice versa, having received a request for leaving a group, the switch removes the corresponding port from the group.


Figure 43 – IGMP snooping is enabled

As you can see from the Figure 43, LTP-8X with enabled IGMP snooping translates multicast traffic only to the hosts, which are members of the IGMP group.
IGMP proxy is an IGMP client and group router at the same time (IGMP router). On the one hand, proxy requests an upstream router for group channels; on the other hand, it receives join/leave requests from hosts and replicates upstream traffic to the corresponding interfaces.

Model 1 Multicast configuration

Consider configuration of a multicast service for Model 1.

An STB, which works in VLAN 14, is connected to an ONT port in this example. Upstream IGMP packets arrive to VLAN 14 though a GEM port and the OLT changes VLAN 14 to subscriber's VLAN 200.

As we have a multicast server in VLAN 98 in our example, we need to configure a proxy on the switch to translate IGMP packets from VLAN 200 to VLAN 98 (for more information, see VLAN configuration). The multicast service comes downstream to the ONT port in VLAN 98 and changes to VLAN 14.

For more information on general configuration principles of data communication channels, see Service Models.


Figure 44 – Model 1 Multicast

Model 3 Multicast configuration

Consider configuration of a multicast service for Model 3.

The multicast service operates in VLAN 98 in our example, an STB operating in VLAN 14 is connected to an ONT port. Upstream IGMP packets come to VLAN 14 in the ONT, where VLAN 14 is replaced with the service VLAN 98, and then the data is further transferred upstream through the GEM port. The multicast service comes downstream to the ONT port in VLAN 98 and changes to VLAN 14. For more information on general configuration principles of data communication channels, see Section 5.1.

Figure 45 – Model 3 Multicast

IPv6 Multicast configuration

IPv6 multicast is configured the same way as shown above. However, there are some differences in configuration:

VoIP configuration

Introduction

The chapter describes peculiarities of VoIP service configuration. The terminal supports several methods of VoIP configuration:

A method is chosen based on service model and ONT functionality.

VoIP Configuration in OMCI management domain

VoIP is a special bridged service. It has all general properties of a bridged service. Operator's actions required for services configuration are described in detail in ONT configuration.

As opposed to other bridge services, VoIP requires the iphost type in the cross-connect profile to terminate traffic in internal virtual IP interface. That also requires the Iphost eid parameter to be specified. As a rule, it should equal 1. Contact your ONT vendor for information about the Iphost eid value for the VoIP.

VoIP configuration in RG management domain

In case the VoIP client is located after the U point (i. e. in the RG management domain), the VoIP service has the same configuration procedure as all other routed services. The procedure is described in detail in ONT configuration. All the general steps of service configuration are applied to VoIP as well.

Configuration of management via TR-069

Introduction

This chapter describes configuration of a data communication channel for the CPE management service via the TR-069 protocol.

An ONT management channel can be established in one of the two modes: Inband and OutOfBand. Inband is the preferred mode as it is simpler. Contact your ONT vendor for information about operation capabilities of both modes. 

ONT management via TR-069 is a special service. All general steps of service configuration apply to TR-069 management. Operator's actions required for services configuration are described in detail in ONT configuration.
As opposed to other services, the management service requires the management type in the cross-connect profile. You also need to specify the Iphost eid parameter. As a rule, it should equal 0.

Configuration of a TR-069 Inband management

This mode is characterised by its simple implementation. Management traffic goes through the same bridge as user traffic. Figure below shows a part of the OMCI layout. Arrows show the traffic flow.

Figure 46 – TR-069 Inband management channel

Configuration of a TR-069 OOB management channel

Not all ONT vendors support creation of Inband management channels via TR-069. To solve this, a capability to create an OutOfBand management channel was developed as an alternative. The main peculiarity of the mode is the use of a separate bridge for management. See a part of the OMCI layout below. Arrows show the traffic flow.

 
Figure 47 – TR-069 OutOfband management channel

TR-069 client parameters configuration

To configure TR-069 client parameters, use the management profile.

LTP-8X# show profile management management-00 
    Name:                                              'management-00'
    Description:                                       'ONT Profile Management 0'
    Enable omci configuration:                         true
    Url:                                               ''
    Username:                                          ''
    Password:                                          ''

In case when the DHCP server transmits the TR-069 parameters via option 43, there is no need to transfer them via OMCI. Disable this phase with the no omci-configuration command.

Otherwise, specify TR-069 client parameters explicitly.

ONT configuration templates

Introduction

It is not always convenient, especially for large-scale operators, to build ONT configuration from separate profiles for each subscriber. This process is painstaking and risky in a certain sense, as it is highly prone to operator error.

As a rule, such companies employ at least one service plan with pre-defined ONT profiles. This chapter describes ONT templates, an effective solution to simplify the work of subscriber service specialists.

The essence of configuration templates is simple. Network administrator prepares required quantity of templates for the quantity of service plans. Configuration template contains detailed profile list and a set of ONT parameters. Subscriber service specialist or OSS/BSS system assigns the template to an ONT and identifies additional configuration parameters if necessary. As a rule, configuration assignment is performed in one click or by using one command.

Preparing ONT configuration template

ONT configuration template assignment

ONT configuration preview with templates

You can view the ONT configuration using the same command: show interface ont <id> configuration. You can distinguish the template parameters from the general ones by [T](Template) markers. In this example, Rf port state is the only general parameter.

LTP-8X(config)(if-ont-0/0-10)# do show interface ont 0/0 configuration
-----------------------------------
[ONT0/0] configuration
-----------------------------------
    Description:                      ''
    Enabled:                          true
    Serial:                           ELTX5C00008C
    Password:                         ‘0000000000'
[T] Fec up:                           false
[T] Easy mode:                        false
[T] Downstream broadcast:             true
[T] Downstream broadcast filter:      true
[T] Ber interval:                     none
[T] Ber update period:                60
    Rf port state:                    disabled
[T] Omci error tolerant:              false
    Service [0]:
[T]     Profile cross connect:        Service1     NT Profile Cross Connect 1
[T]     Profile dba:                  dba-00       ONT Profile DBA 0
        Custom cross connect:         disabled


    Service [1]:
[T]     Profile cross connect:        Service2     NT Profile Cross Connect 2
[T]     Profile dba:                  dba-00       ONT Profile DBA 0
        Custom cross connect:         disabled
[T] Profile shaping:                  shaping-00   ONT Profile Shaping 0
[T] Profile ports:                    ports-00     ONT Profile Ports 0
[T] Profile management:               unassigned
    Template:                         test         ONT Template 1

Terminal monitoring

General information

Information on current terminal firmware version

To view information on the current version of terminal firmware, use the show version command.

LTP-8X# show version 
Eltex LTP-8X:rev.C software version 3.32.0 build XXXX on XX.XX.2018 XX:XX

Terminal information preview

To view information about the terminal, use the show system environment command.

LTP-8X# show system environment 
    System information:
        CPU load average (1m, 5m, 15m):   4.23  2.89  2.53
        Free RAM/Total RAM (Mbytes):      260/495
        Temperature (sensor1/sensor2):    35C/50C
        Reset button:                     disabled

        Fan configured speed, %:          15
        Fan minimum speed, %:             15
        Fan speed levels, %:              16 27 39 51 64 76 88 100 

        Fan state (fan0/fan1):            4620rpm  4620rpm

        PLD FW version:                   14 

        TYPE:                             LTP-8X:rev.C 
        HW_revision:                      1v4 
        SN:                               GP2B000304 
        MAC:                              A8:F9:4B:8B:79:D0 
        Power supply information:
                Module 1: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1
                Module 2: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1

Table 29 – Terminal parameters

Parameter

Description

CPU load average

Number of waiting processes

Free RAM/Total RAM

Free/total RAM

Temperature

Temperature from sensors 1 and 2

Reset button

The action depends on the reset button configuration

Fan configured speed

Set fan rotation speed

Fan minimum speed

Minimum fan rotation speed

Fan speed levels

Set fan rotation speed for each level

Fan state

Fans state and rpm value

PLD FW Version

PLD firmware version

Power supply information

Information about installed power modules

Information on terminal operation time

To view terminal operating time, use the show uptime command.

LTP-8X# show uptime 
up 7 days, 20:11

Network connection check

To check network connection, use the ping command. As a parameter, pass the IP address of the node to be checked.

LTP-8X# ping 192.168.1.254
PING  192.168.1.254  (192.168.1.254):  56  data  bytes 

64 bytes from 192.168.1.254:  seq=0  ttl=64  time=0.422  ms 
64 bytes from 192.168.1.254:  seq=1  ttl=64  time=0.426  ms 
64 bytes from 192.168.1.254:  seq=2  ttl=64  time=0.360  ms 
64 bytes from 192.168.1.254:  seq=3  ttl=64  time=0.397  ms 
64 bytes from 192.168.1.254:  seq=4  ttl=64  time=0.404  ms

--- 192.168.1.254 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet  loss round-trip  min/avg/max  =  0.360/0.401/0.426  ms

Terminal operation log

Use show log command to view log files

LTP-8X# show log
        ##    Name    Size in bytes    Date of last modification
        1      ltp           994625     Thu Aug 31 13:51:20 2017
        2      ltp.1.gz       41784     Thu Aug 29 12:42:25 2017
        3      ltp.2.gz       59829     Thu Aug 29 00:13:10 2017
Total files: 3
AntonLTP-8X#

Use the show log buffer command to view a local terminal operation log buffer.

LTP-8X# show log buffer
...
Jan 1 00:00:49 LTP-8X pmchal: notice: [OLT] OLT reset successfully
Jan 1 00:01:05 LTP-8X pmchal: notice: [PPPOEIA] PPPoE IA initialized successfully
Jan 1 00:01:05 LTP-8X pmchal: notice: [DHCPRA] DHCP RA initialized successfully
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT initialized successfully
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT0 FW version 2.3.37.1008
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT0 FW is up to date
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT1 FW version 2.3.37.1008
Jan 1 00:01:11 LTP-8X pmchal: notice: [OLT] OLT1 FW is up to date
...

The log messages can be filtered. To do this, use the show log buffer grep command. The command takes a string as a parameter that is used for search in the log. Only the messages containing the string will be displayed on the screen.

LTP-8X# show log buffer grep pmchal

If console output or output to CLI sessions is configured for log messages, the messages will be output to these devices automatically as soon as they are generated. User does not need to perform any additional operations.

When a remote syslog server is used, use the log display tools provided by the SYSLOG server. Enter show log <filename> command to view the files.

LTP-8X# show log ltp.1.gz

Active alarms log

To view the active alarms log, use the show alarms command. Pass an event type as a parameter (see Table 14) and/or their severity (see Table 15). You can view all active alarms by using the show alarm active all command.

LTP-8X# show alarm active all 
    Active alarms (1):
        ##        Type                     Severity         Description
         0        Fan                      Critical         FAN1 0 rpm
LTP-8X# 

GPON monitoring

GPON OLT state

GPON OLT parameters are listed and described in table below.

Table 30 – GPON OLT parameters

Parameter

Description

Device count

The number of OLT chips

Gpon-ports per device

The number of channels in one OLT chip

Firmware version

OLT chip firmware version

Hardware version

OLT chip hardware version

GPON interface state

MAC table preview

Statistics for GPON interfaces

Statistics for OLT Ethernet interfaces

Multicast statistics

ONT monitoring

ONT configurations list

List of empty ONT configurations

List of connected ONTs

List of disconnected ONTs

ONT statistics

To view ONT statistics, use the show interface ont 0/0 counters command. As parameters, specify the ONT ID and the type of requested statistics (see Table 34).

LTP-8X# show interface ont 4/0 counters gem-port-nctp-performance-monitoring 

-----------------------------------
[ONT4/0] counters
-----------------------------------

        ##    Downstream counters for cross-connects: 0    ...    7     MC     BC

         1    Finished intervals                     202    ...  ---    ---    ---
         2    Received GEM frames                     54    ...  ---    ---    ---
         4    Received payload bytes               11576    ...  ---    ---    ---

        ##    Upstream counters for cross-connects:    0    ...    7     MC     BC

         1    Finished intervals                     202    ...  ---    ---    ---
         2    Transmitted GEM frames                  54    ...  ---    ---    ---
         4    Transmitted payload bytes            10448    ...  ---    ---    ---

LTP-8X# 

Table 34 – ONT statistics types

Statistics type

gem-port-performance-monitoring

gem-port-nctp-performance-monitoring

ethernet-performance-monitoring-history-data

ethernet-performance-monitoring-history-data2

ethernet-performance-monitoring-history-data3

gal-ethernet-performance-monitoring-history-data

fec-performance-monitoring-history-data

ethernet-frame-extended-performance-monitoring

multicast-subscriber-monitor

ONT bit error rate

Bit error rate (BER) is the rate of errors in data transmission.

To view BER on reception at the ONT, use the show interface gpon-port <id> downstream-ber command. As a parameter, pass the number of the GPON interface.

LTP-8X# show interface gpon-port 0 downstream-ber
-----------------------------------
GPON-port 0 BER table
-----------------------------------
##    Ch/ Id   Errors   Intervals BER Interval   BER
1     0/ 2       0       0        100000         0
2     0/ 3       0       0        100000         0

System environment configuration

You can adjust fans and configure reset button of the device.

Enter show system environment to view the system status.

LTP-8X# show system environment
    System information:
        CPU load average (1m, 5m, 15m):   1.39  3.97  4.11
        Free RAM/Total RAM (Mbytes):      253/495
        Temperature (sensor1/sensor2):    36C/50C
        Reset button:                     disabled

        Fan configured speed, %:          15
        Fan minimum speed, %:             15
        Fan speed levels, %:              16 27 39 51 64 76 88 100 

        Fan state (fan0/fan1):            4620rpm  4620rpm

        PLD FW version:                   14 

        TYPE:                             LTP-8X:rev.C 
        HW_revision:                      1v4 
        SN:                               GP2B000304 
        MAC:                              A8:F9:4B:8B:79:D0 

        Power supply information:
                Module 1: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1
                Module 2: PM160 220/12 1vX
                        Type: Alternate current(AC)
                        Intact: 1

Fans configuration

Reset button configuration

<Reset> button has 3 operating modes.

disabled

disabled

reset-only

only reboot

enabled

reset to factory settings and reboot


LTP-8X(config)# system reset-button disabled

Terminal maintenance

SFP transceivers replacement

SFP transceivers can be installed when the terminal is turned on or off. The front panel has pairs of slots: even slots in the upper line, odd slots at the bottom. SFP transceivers are symmetrically installed for each pair of slots. 

                             
Figure 48 – SFP transceivers installation


Figure 49 – installed SFP transceivers

To remove a transceiver:


Figure 50 – Opening SFP transceiver latch



Figure 51 – SFP transceivers removal

Ventilation units replacement

The terminal design allows ventilation units replacement even when the terminal is on.



Figure 52 – Ventilation unit. Installation to the case


To remove a ventilation unit:


Figure 53 – Ventilation unit socket

To install a ventilation unit, perform the following actions:

OLT firmware update

This chapter describes the terminal firmware update procedure. To download a firmware file, use the TFTP server available in the terminal management network.

ONT firmware update

Introduction

This chapter describes different methods of ONT firmware update using the OMCI protocol.

ONT firmware update download

ONT firmware update can run automatically for all ONTs or for a specified ONT. To start the update, download a firmware update file to the line terminal. To download the file, use the copy command and specify the file name and the address of the TFTP server as parameters:

LTP-8X# copy ftp://user:pass@10.54.16.1/ntp-rg-r3.24.1.854.fw.bin.bin fs://ont-firmware 
Download file from FTP-server
Download successfully - speed: 2906533.000 bytes/sec during 1.008 seconds, total size 2929684
..........................................
..........................................
ONT firmware vendor is Eltex Corporation, version 3.24.1.854 Write downloaded file to flash memory.
..........................................
..........................................

ONT firmware custom update

To update firmware of a specified ONT, you need to create a corresponding task and specify the ONT ID and the firmware file name. There are two types of ONT firmware update tasks: single try or multiple tries.

To create a single try update task, use the update ont command and specify the ONT ID and the file name of the firmware:

LTP-8X# update ont 0/0 filename ntp-rg-r3.24.1.854.fw.bin
Task for updated successfully created. ONT firmware will be updated in 20 minutes or more

As a result, the single try update task will be created for the ONT having the specified serial number. This method is used to update the ONTs, which are in the OLT channel at the time of update. The task will end with an error for the ONTs, which are not connected.

To create a multiple tries update task, use a scheduler. This method is generally used to update the ONTs, which are not in the OLT channel at the time of the update. The tasks you create in the scheduler will be executed as soon as the corresponding ONT connects to the channel. To create, delete, or view tasks in the scheduler, use the schedule ont command. To create an ONT firmware update task, use the schedule ont update command and specify the ONT ID and the firmware update file:

LTP-8X# schedule ont update 0/0 ntp-rg-r3.24.1.854.fw.bin 
Task created for [ONT0/0]

To view scheduled tasks, use the show schedule ont update command:

LTP-8X# show schedule ont update Existing tasks (1):
##	Serial	Ch/ Id	Operation	Status	Tries remained
0	---	0/   0	ont_update	scheduled	5

You can delete some of the created tasks by using the no schedule ont update command and specifying the ONTs ID:

LTP-8X# no schedule ont update 0/0 
Task deleted for [ONT0/0]

To clear the scheduler, use the clear schedule ont update command:

LTP-8X# clear schedule ont update 
All tasks cleared

The tasks created in the scheduler will continue running until the update completes successfully or the number of tries is reached (the Tries remained parameter).

ONT firmware autoupdate

To enable firmware autoupdate for all ONTs, use the auto-update ont command and specify the update mode (immediate or postpone).

APPENDIX A. RS-232 NULL-MODEM CABLE PIN DESIGNATION

LTP-8X, LTP-4/8X rev.B

DB-9 socket                                                         DB-9 socket

LTP-4/8X rev.C

APPENDIX B. Configuring services on ONT Ericsson, Atron, CIG

Introduction

Starting with version 3.36, ONT support has been added for Ericsson T063G, Ericsson T073G, Atron RFT620, Atron PSG590, CIG G-25A-J80. In setting up services on these ONTs, there are some features presented below.

VoIP configuration

To configure VoIP, you need to create two new profiles: cross-connect type voice, profile voice

Internet and IPTV services configuration

These services are configured similarly to ELTEX ONT.

The list of changes

Firmware version

Document version

Issue date

Revisions

Firmware version 3.38.2Issue 1520.05.2020Synchronization with firmware version 3.38.2
Firmware version 3.38.1Issue 1407.02.2020Synchronization with firmware version 3.38.1
Firmware version 3.38.0Issue 1313.12.2019

Synchronization with firmware version 3.38.0

Chapter added:

  • CLI hotkeys
  • Configuring the Origin parameter

Changes:

  • Compatible SFP transceivers
  • User list preview
  • SNMPD configuration
  • GPON interface configuration
  • DHCP Relay Agent profiles management
  • IP Source Guard configuration
  • Tunnelling configuration
Firmware version 3.36.2Issue 1208.10.2019Synchronization with firmware version 3.36.2
Firmware version 3.36.0Issue 1107.02.2019

Added:

  • Manual supplemented by LTP R3.36.0 commands

Chapter added:

  • Configuring multicast traffic between ONTs within the same tree
  • APPENDIX B. Configuring services on ONT Ericsson, Atron, CIG

Added description:

  • Configuring DHCPD issuing static routes to the network on the ONT TR-interface (option 121)

Firmware version 3.32.0

Issue 10

03.07.2018

Added:

  • Manual supplemented by LTP R3.32.0 commands

    Added sections:
  • ERPS configuration;
  • Deleting a license file from OLT
  • Automatic ONT activation

    Added description:
  • GPON interface configuration;

    Changes:
  • Active DHCP leases monitoring command;
  • IGMP Snooping enabling command

Firmware version 3.30.0

Issue 9

30.11.2017

Added:

  • Manual supplemented by LTP R3.30.0 commands

    Added sections:
  • LLDP configuration;
  • QoS WRR;
  • ARP-Inspection;
  • Storm Control in PON;
  • Configuring Access List Control and policies.

    Added description:
  • Collaboration of various types of cross-connect;
  • Upstream shaping configuration;
  • SNMPv3 users configuration;
  • SNMPv3 encryption configuration;
  • Additional RADIUS servers configuration;
  • Configuration of syslog entries for entered commands;
  • Updated logging system;
  • Configuration of description for the interface in switch;
  • Storm Control in switch;
  • Fan configuration;
  • Reset button configuration;
  • MAC Notification trap configuration;
  • %OLTMAC% parameter in option 82.

    Changes:
  • PPPoE sessions view command;
  • DHCP sessions view command;

Firmware version 3.26.1

Issue 8

13.12.2016

Added:

  • Manual supplemented by LTP R3.26.1 commands;
  • AAA (radius/tacacs+) functionality description;
  • Extended custom parameters description.

Firmware version 3.26.0

Issue 7

09.07.2016

Added:

  • Manual supplemented by LTP R3.26.0 commands;
  • Information about LTP rev.C;
  • IP Source Guard functionality description;
  • DHCP Relay (broadcast-unicast relay) functionality description;
  • Tunnel configuration description;
  • ONT licensing description;
  • Description of configuring services over IPv6;
  • RS-232 null-modem cable pin designation.

    Changes:
  • OLT. 6.3 firmware update command

Firmware version 3.24.3

Issue 6

25.04.2016

Added:

  • Manual supplemented by LTP R3.24.3 commands

Firmware version 3.24.1

Issue 5

17.12.2015

Added:

  • Manual supplemented by LTP R3.24.1 commands

Firmware version 3.24.0

Issue 4

02.09.2015

Added:

  • Manual supplemented by LTP R3.24.0 commands

Firmware version 3.20.2

Issue 3

25.07.2014

Added:

  • The manual is given to the LTP-8X R3.20.2 command system;
  • Section 3.2.5 for group operations;
  • 5.13, describing operation with ONT configuration templates.


Issue 2

24.04.2014

Changes:

  • Errors corrected.


Issue 1

21.04.2014

Added:

  • Section 4.1.2, describing the configuration structure;
  • Section 4.1.4, which describes the configuration autosave;
  • Step 7 in the MAC address lifetime configuration;
  • Added an application with an example of setting up Triple Play in the VLAN for Subscriber model;
  • Parameters of optical interfaces in table 4.1

    Changes:
  • Fixed table 24 name;
  • Section 6.4.6 is renamed to Multicast statistics.