0% found this document useful (0 votes)
1K views323 pages

COAX G.HN Access Multiplexer Manual

Uploaded by

cardenascc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views323 pages

COAX G.HN Access Multiplexer Manual

Uploaded by

cardenascc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 323

COAX G.

hn Access Multiplexer
(L10212XC/L10206XC/L11206XC)
User Manual
Rev 2.0

Copyright© Zaram Technology, Inc 2017


Issued by Zaram Technology
2nd Floor, 41, Seongnam-daero 925beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do,
Republic of KOREA
No part of this publication may be excerpted, reproduced, translated or utilized in any form or
by any means, electronic or mechanical, including photocopying and microfilm, without the
expressed written permission of Zaram Technology, Inc.
COAX G.hn Access Multiplexer User Manual

Copyright
All rights reserved.
No part of this user manual may be reproduced, transmitted, or copied in any manner
whatsoever without written permission of Zaram, Inc.

Registered Trademarks
ZARAM and Zaram logos introduced in this manual are trademarks of Zaram, Inc., registered
in Korea and other countries.

Information in this manual is subject to change without notice. Every effort has been made to
ensure that the information in this manual is accurate. Zaram, Inc. is not responsible for printing
or clerical errors.

This user manual can be updated when the product performance improves or design changes.
If user wants to receive the updated manual, or if user has questions about the product, please
contact us at any time. Just email or make a call to our customer support.

Customer Support
Zaram Technology, Inc.
Address 2nd Floor, 41, Seongnam-daero 925beon-gil, Bundang-gu, Seongnam-si,
Gyeonggi-do, Republic of KOREA
Web http://www.zaram.com
Tel. +82-31-702-6152
Fax. +82-31-702-6177

Warning
This product must be handled and serviced in accordance with the instructions introduced in
this manual. Disassembling of the product may result in electric shock, failure, malfunction, or
static electricity. Zaram Technology, Inc. is not responsible for personal injury, damage of the
product or even to poor performance of the product that caused by the disassembling.

2
COAX G.hn Access Multiplexer User Manual

Revision History

Version Date Description


Rev 1.0 2018-03-09 Initial creation.

Rev 2.0 2020-01-16 Manual revision

Note: Some functions of layer 3 are determined whether to be supported or not by the OS
version. For more questions, please contact our customer support.

3
COAX G.hn Access Multiplexer User Manual

Table of Contents
INTRODUCTION ...............................................................................11
OVERVIEW .......................................................................................................................... 11
NOTATION ........................................................................................................................... 12

FEATURES .........................................................................................13
KEY FEATURES.................................................................................................................... 14
BASIC SETTING ................................................................................................................... 16

BASIC CLI .........................................................................................17


UNDERSTANDING COMMAND SYNTAX ................................................................................... 17
CLI MODE ........................................................................................................................... 25
Privilge Exec View Mode ........................................................................................... 25
Privilege Exec Enable Mode ...................................................................................... 26
Global Configuration Mode ........................................................................................ 26
Line Configuration Mode ........................................................................................... 27
VLAN Configuration Mode ......................................................................................... 28
Interface Setting Mode .............................................................................................. 28
Policy Setting Mode ................................................................................................... 29
Ghn Configuration Mode ........................................................................................... 30
Profile Setting Mode .................................................................................................. 30
Co Setting Mode ...................................................................................................... 31

CONNECTING SYSTEM .....................................................................32


USER INTERFACE ................................................................................................................ 32
Console Connection .................................................................................................. 32
Telnet Connection...................................................................................................... 33
Connection through SNMP Network Manager .......................................................... 33
USER AUTHENTICATION ....................................................................................................... 34
Add and Delete Users ............................................................................................... 34
Password Setting ....................................................................................................... 35
Number of users limitation ......................................................................................... 37
Restricting Login Authentication attempts ................................................................. 37
Force session termination ......................................................................................... 37
Banner Setting ........................................................................................................... 38
USER AUTHENTICATION ....................................................................................................... 40
Set User Authentication Method ................................................................................ 40
Set the priority of User Authentication Methods ........................................................ 41
Check User Authentication Method Setting ............................................................... 41
RADIUS Setting ......................................................................................................... 42
TACACS+ Setting ...................................................................................................... 43
User Access Log........................................................................................................ 44

4
COAX G.hn Access Multiplexer User Manual

SYSTEM MANAGEMENT ....................................................................45


HOST NAME ..................................................................................................................... 45
INTERFACE SETTING AND MANAGEMENT ............................................................................... 47
Activate Interface ....................................................................................................... 47
Interface Setting......................................................................................................... 48
Interface Description .................................................................................................. 48
Check Interface Information ...................................................................................... 49
Monitoring Interface Traffice ...................................................................................... 51
IP SETTING ......................................................................................................................... 55
IP Setting for Interface ............................................................................................... 55
Verify Network Connection ........................................................................................ 56
Static and Default Gateway Setting ........................................................................... 58
Management Port IP Setting ..................................................................................... 61
MAC ADDRESS TABLE ......................................................................................................... 62
Static mac Setting ...................................................................................................... 62
Mac Table Check ....................................................................................................... 62
CONFIGURATION MANAGEMENT ........................................................................................... 64
Check Configuration .................................................................................................. 64
Save Configuration .................................................................................................... 65
Reset Configuration ................................................................................................... 65
Backup Configuration ................................................................................................ 66
SYSTEM UPDATE ................................................................................................................. 67
update Command ...................................................................................................... 67
Example of Software update ..................................................................................... 67
upload Command ...................................................................................................... 69
Example of Software upload ...................................................................................... 70
REBOOT SYSTEM................................................................................................................. 72
Manual System Reboot ............................................................................................. 72
Automatic System Reboot ......................................................................................... 72
NTP/CLOCK SETTING .......................................................................................................... 78
NTP Introduction ........................................................................................................ 78
NTP client mode Setting ............................................................................................ 78
NTP Server mode Setting .......................................................................................... 78
NTP Lookup .............................................................................................................. 79
Clock Setting ............................................................................................................ 79
Clock summer-time Setting ....................................................................................... 79
Clock time zone Setting ............................................................................................. 81
STORM CONTROL ................................................................................................................ 82
PORT MIRRORING .............................................................................................................. 83
SET FRAME SIZE ............................................................................................................... 84
LOOP DETECT FUNCTION .................................................................................................... 85
CPU FLOOD GUARD FUNCTION ........................................................................................... 87
MAC FLOOD GUARD FUNCTION........................................................................................... 89
ACCESS CONTROL LIST ..................................................................................................... 91
Access List Creation Rules ...................................................................................... 92

5
COAX G.hn Access Multiplexer User Manual

Permission of Access from Specified Host .............................................................. 92


MAC-FILTER ................................................................................................................... 94
NETBIOS-FILTER AND LLTD-FILTER............................................................................. 95
DHCP-FILTER................................................................................................................. 96
IP MARTIAN FILTER ....................................................................................................... 98
PORT ISOLATION ............................................................................................................... 99
SYSTEM INFORMATION CHECK ......................................................................................... 100
Command History Check ....................................................................................... 100
Boot Time Check ................................................................................................... 100
Image Version Check ............................................................................................ 101
Flash Memory Check ............................................................................................. 101
................................................................................................. 103
........................................................................................... 103
....................................................................................................... 105
TCPDUMP SETTING .......................................................................................................... 107

ARP .................................................................................................109
ARP ................................................................................................................................. 109
Static ARP-table ...................................................................................................... 109
ARP-table ageing time configuration ....................................................................... 109
Show ARP ............................................................................................................... 110
ARP PROXY CONFIGURATION ............................................................................................ 111
ARP INSPECTION .............................................................................................................. 112
ARP Inspection Activation ....................................................................................... 112
ARP access-list........................................................................................................ 113
Inspection log management .................................................................................... 114

PPPOE+ ..........................................................................................117
PPPOE+ .......................................................................................................................... 117
PPPoE+ Configuration............................................................................................. 117
PPPoE+ Trust Setting .............................................................................................. 117
PPPoE+ Option82 ................................................................................................... 118
Show PPPoE+ ......................................................................................................... 119
PPPoE+ Setting Examples ...................................................................................... 119

VLAN ...............................................................................................121
INTRODUCTION TO VLAN ................................................................................................... 121
NATIVE VLAN ................................................................................................................... 122
VLAN SETTING ................................................................................................................. 123
Command for VLAN Settings .................................................................................. 123
Command for Switch Port Settings.......................................................................... 123
Examples of VLAN Setting ...................................................................................... 124
Check of VLAN Setting Information ......................................................................... 126
QINQ SETTING .................................................................................................................. 128
QinQ Setting Command .......................................................................................... 128

6
COAX G.hn Access Multiplexer User Manual

QinQ Setting example ............................................................................................. 129


QinQ Configuration Information Checking ............................................................... 130
VLAN TRANSLATION SETTING............................................................................................ 132

PORT TRUNK ..................................................................................134


INTRODUCTION TO LACP ................................................................................................... 134
LACP Modes ............................................................................................................ 134
LACP Parameters .................................................................................................... 135
LACP SETTING ................................................................................................................. 136
Port group Setting .................................................................................................... 136
Port Priority Settings in LACP .................................................................................. 136
BPDU transmission frequency configuration ........................................................... 137
Delete LACP Statistical Information ........................................................................ 137
LACP CHECK.................................................................................................................... 138
STATIC CHANNEL-GROUP SETTINGS ................................................................................... 139
Introduction to Static Channel-Group ...................................................................... 139
Static Channel-Group Settings ................................................................................ 139
LOAD BALANCING CONTROL ............................................................................................... 140

STP ...............................................................................................141
INTRODUCTION TO STP/RSTP/MSTP .............................................................................. 141
CONFIGURING SPANNING-TREE FEATURES ....................................................................... 143
Default STP Settings ............................................................................................. 143
STP Mode Selection .............................................................................................. 143
STP Activation ....................................................................................................... 144
STP Port Priority Configuration ............................................................................. 144
STP Path Cost Configuration ................................................................................ 145
Hello Time Setting ................................................................................................. 145
Forward Delay Time Settings ................................................................................ 146
Maximum-Aging Time Settings .............................................................................. 146
Portfast(Edge port) Settings .................................................................................. 147
STP Compatibility Mode Configuration ............................................................... 147
SPANNING-TREE STATUS CHECK ..................................................................................... 148
RPVST+ ........................................................................................................................ 149
RPVST+ Activation ................................................................................................ 149
RPVST+ Status Check .......................................................................................... 149
MSTP CONFIGURATION ................................................................................................... 150
MSTP Configuration Guidelines ............................................................................ 150
MSTP Activation and MST Region Settings .......................................................... 150
MST Configuration and Status Check ................................................................... 151

IGMP .............................................................................................152
INTRODUCTION TO MULTICAST ROUTING ............................................................................ 152
IP MULTICAST ROUTING SETTINGS ................................................................................... 154
Enable IP multicast routing .................................................................................... 154

7
COAX G.hn Access Multiplexer User Manual

IP CONFIGURE IGMP FUNCTIONALITY .............................................................................. 155


Multicast Traffic Filtering Policy Setting ................................................................. 155
IGMP SNOOPING SETTINGS............................................................................................. 156
Global IGMP Snooping Activation ......................................................................... 156
IGMP Snooping Activation for each VLAN ............................................................ 156
Configure IGMP Snooping Functionality ............................................................... 157
Display System ...................................................................................................... 159
IGMP Snooping Querier Function Setting ............................................................. 160
Configure IGMP Snooping Security Setting .......................................................... 164
IGMP Snooping Proxy Settings ............................................................................. 167
IGMP Snooping Static Group ................................................................................ 167
Display IGMP Snooping information...................................................................... 169

SNMP ............................................................................................171
INTRODUCTION TO SNMP ................................................................................................ 171
SNMP COMMUNITY SETTINGS ......................................................................................... 173
SYSTEM LOCATION AND OPERATOR REGISTRATION .......................................................... 174
SNMP TRAP SETTINGS ................................................................................................... 175
SNMP VERSION 3 SETTINGS............................................................................................ 177

SYSLOG .........................................................................................180
LOGGING......................................................................................................................... 180
Syslog Message Level Settings ............................................................................. 181
Syslog Message Priority Settings .......................................................................... 182
Syslog Setting Checking ........................................................................................ 183
SYSLOG LEVEL SETTINGS ................................................................................................ 185
CPU Usage-Threshold Level Settings ................................................................... 185
Memory Usage-Threshold Level Settings ............................................................. 185
Fan Operation-Threshold Setting .......................................................................... 186
Port-Traffic Bandwidth-Threshold Settings ............................................................ 186
Temperature Threshold Settings ........................................................................... 187

TRANSCEIVER ..............................................................................188
INTRODUCTION TO TRANSCEIVER ...................................................................................... 188
DDM MONITORING CONFIGURATION ................................................................................. 188
THRESHOLD CONFIGURATION ........................................................................................... 189
DISPLAY THRESHOLD INFORMATION .................................................................................. 189

ALARM / EVENT ............................................................................192


INTRODUCTION TO ALARM / EVENT ................................................................................... 192
ALARM SETTING .............................................................................................................. 193
EVENT SETTING .............................................................................................................. 195

QOS...............................................................................................197
INTRODUCTION TO QOS .................................................................................................. 197

8
COAX G.hn Access Multiplexer User Manual

QOS OPERATION FLOW .................................................................................................. 198


Classfication .......................................................................................................... 198
Policing .................................................................................................................. 205
Counting ................................................................................................................ 208
Marking and remarking .......................................................................................... 209
Action ..................................................................................................................... 212
Scheduling ............................................................................................................. 212
802.1P, DSCP MAPPING AND REMARKING ....................................................................... 214
Mapping Commands ............................................................................................. 214
Trust Commands ................................................................................................... 215
CPU ACCESS LIST .......................................................................................................... 217
TRAFFIC SHAPING SETTINGS............................................................................................ 218
CPU PORT CONFIGURATION ............................................................................................ 219

DHCP ............................................................................................221
DHCP SERVER ............................................................................................................... 221
DHCP Address Pool .............................................................................................. 221
DHCP Network Pool Setting .................................................................................. 222
DHCP Server Activation ........................................................................................ 224
Example of DHCP Network Pool Setting ............................................................... 225
Example of DHCP server Monitoring and Management ....................................... 225
DHCP RELAY AGENT SETTING ......................................................................................... 226
................................................................................................ 226
Interface-list Setting ............................................................................................... 227
Server-list Setting .................................................................................................. 227
DHCP Relay Option82 Setting .............................................................................. 227
DHCP Relay Activation .......................................................................................... 229
DHCP Relay Monitoring ........................................................................................ 229
Example of DHCP relay agent Setting .................................................................. 229
DHCP RELAY SIMPLIFY SETTING ..................................................................................... 230
Option82 Policy Setting ......................................................................................... 230
DHCP Relay simplify Function Activation .............................................................. 231
Example DHCP Relay simplify Setting .................................................................. 231
DHCP SNOOPING ........................................................................................................... 232
DHCP Snooping Activation .................................................................................... 232
Assigned Trust Port ............................................................................................... 232
DHCP Packet rate limit .......................................................................................... 233
DHCP Snoop binding table Management ............................................................. 233
Arp-inspection start time ........................................................................................ 233
DHCP CLIENT................................................................................................................. 235
DHCP Client Activation .......................................................................................... 235
Client-id Setting ..................................................................................................... 235
Class-id Setting...................................................................................................... 235
Host name ............................................................................................................. 236
Time limitation for using IP address.................................................................. 236

9
COAX G.hn Access Multiplexer User Manual

Ask for information through DHCP server ............................................................. 236


Block the using IP address .................................................................................... 237
Reset IP address ................................................................................................... 237
Confirm the setting of DHCP Client ....................................................................... 237

G.HN MANAGE ..............................................................................240


SUMMARY OF G.HN.......................................................................................................... 240
G.HN PORT INFORMATION CHECK .................................................................................... 241
Command to check G.hn information .................................................................... 241
Command for G.hn Link Check ............................................................................. 244
G.hn Statistics Command ...................................................................................... 247
Command for G.hn firmware Check ...................................................................... 250
Other Function Check ............................................................................................ 252
G.hn Profile Information Check ............................................................................. 254
CPE Information Check ......................................................................................... 260
G.HN CO/CPE FACTORY RESET ...................................................................................... 274
G.HN CO/CPE REBOOT .................................................................................................. 275
G.HN SETTING................................................................................................................. 276
G.hn mode Switch ................................................................................................. 276
IP and Seed Index Automatic Setup...................................................................... 276
System-id Setting................................................................................................... 276
G.hn Profile Functions ........................................................................................... 277
CPE Registeration ................................................................................................. 294
FIRMWARE UPGRADE....................................................................................................... 301
fw-upgrade Command ........................................................................................... 301
Example of firmware upgrade ................................................................................ 302
AUTO FIRMWARE UPGRADE ............................................................................................. 305
Auto fw-upgrade Command ................................................................................... 305
Example of auto firmware upgrade........................................................................ 307
CO RECOVER ................................................................................................................. 313
Recovery Command .............................................................................................. 313
Recovery Process.................................................................................................. 313

RMON ...........................................................................................317
RMON ........................................................................................................................... 317
RMON alarm Configuration ................................................................................... 317
RMON event Configuration ................................................................................... 318
RMON history and stats Configuration .................................................................. 318
RMON Check......................................................................................................... 318
RMON configuration example ............................................................................... 319

REFERENCE A. ....................................................................................321

10
COAX G.hn Access Multiplexer User Manual

Introduction

Overview

This manual will help “Ethernet-based network engineers” to configure and operate the
networks effectively. And the system is introduced in this manual. In addition, this manual
provides various solutions for potential problems that may occur while running the network.

To use this manual effectively, it is assumed that the system operator has the following
knowledge.

 Local Area Networks (LAN)


 Metro Area Network (MAN)
 Wide Area Network (WAN)
 Ethernet, Fast Ethernet, Gigabit Ethernet
 Ethernet switching or bridging
 Routing
 TCP/ IP Protocol
 Simple Network Management Protocol (SNMP)
 G.hn (G.996x standard)

Inform To obtain the information about hardware installation and initial

i setup for GAM, please refer to Hardware Installation Guide for


each system.

11
COAX G.hn Access Multiplexer User Manual

Notation

The following table introduce display rules for characters and icons used in this manual.

Display Rules for


Description
Characters
Screen displays  Information that is displayed on the application terminal because of
a command execution.
 CLI Command Rules.
Screen displays
Command that a manager directly inputs on the application terminal.
bold
[Key] input For the key inputs from keyboard, square brackets are used as shown in
[Enter] or [Ctrl].
For more than two key inputs at a time, “+” is used to connect each key
input as shown in [Ctrl] + [z].
Italics  It is used to highlight part of sentences or to redefine sentences.
 It is used to indicate parameters that user inputs by following System
Command Rules.

Icon Type Description

i Inform Important function, features, commands, or tip.

Personal injury, data loss, or hazard that results in system

W
Warning
damage.

User can download the newest document and information for all products including GAM
device at our website “http://www.zaram.com”. For offline request, please call +82-31-702-
6171.

12
COAX G.hn Access Multiplexer User Manual

Features

COAX GAM is the specification for home networking with data rates up to 1Gbps over the
existing Coax cables in the old apartment. Using the existing infrastructure can efficiently reduce
the capital expense.

COAX GAM is connected to 2 port Uplinks and G.hn ports. For uplink, it supports 1G/2.5G/1OG/
speed and the auto-negotiation functions. In the condition that the connected device is not
supporting auto-negotiation function, it is allowed to set the transfer mode and speed by manual.
Besides, G.hn port is saved as 1G as its default value.

By checking the LED light signal on the COAX GAM, user is able to check the connecting
situation for each port. Furthermore, COAX GAM is also supporting SNMP and Remote control. It
can manage the switches by connecting console port or vty of Telnet. For improving the security
of the internet, it is supported STP, IGMP Snooping, VLAN, QOS and etc functions.

We have COAX GAMs including below versions. Besides, This manual is for L10212XC.

 L10212XC
 L10206XC
 L11206XC

13
COAX G.hn Access Multiplexer User Manual

Key Features

This equipment provides functions for “the following Layer 2+ switching features” and special
functions for UNI port (customer) management.

“The key features provided by GAM” shows in the following table.

Function Description

Config Backup Backup config to ftp/tftp server

Support up to 4,000 VLAN


VLAN Support Port Based VLAN
Support IEEE 802.1Q VLAN

Console, Telnet, SSH : user name/passwd, Radius, TACACS+


Authentication SNMPv1, SNMPv2 : Community String
Support CPE MAC Registration Auto/Maunal

Uplink Port Speed, Duplex Mode, Autonego, Flow Control

Client
DHCP Snooping
DHCP DHCP Relay
DHCP message Filtering
DHCP Option 82

IGMPv1/V2/V3
Query
IGMP Snooping
Multicast filtering
IGMP Snooping Proxy
Unknown Multicast Block
Multicast filtering

Spanning Tree STP, RSTP, PVST

Link Aggregation LACP

Traffic-rate Limit Control up/down traffic per ports

14
COAX G.hn Access Multiplexer User Manual

Storm Control Broadcast, Multicast, DHCP Requset 및 DLF 의 Traffic rate limit

Port Mirroring Monitor Port : Mirror Port = 1:N

PPPoE+ Support pppoe+

Config
G.hn profile(notch, ds-rate, tx-power)
Management

COS, DSCP
Support up to 8(0~7) queue per port
QoS / ACL
SPQ, WRR, SPQ + WRR scheduler
Standard ACL : up to 3K

15
COAX G.hn Access Multiplexer User Manual

Basic Setting

The following table shows the basic settings of the GAM switch.

Function Parameter Default Value


Baud Rate 115200
Data 8
Console Port
Parity 1
Stop Bits none
Default VLAN 1
VLAN
Switchport mode access mode
User name : admin
Login
password: admin
Radius Disable
Authentication
Tacacs Disable
Telnet Enable
SSH Enable
Port-type 10G
Autonego Disable
Uplink Port
Duplex Full
Flow control Disable
STP Disable
Spanning Tree RSTP Enable
PVST Enable

Mac-address-table Aging time 300초

Status Enable
Syslog
Message output level Informational(8 Level)
Status Enable
Scheduler WRR
QoS
Queue : 0 1 2 3 4 5 6 7
Queue Weight
weight : 1 2 3 4 5 6 7 8

16
COAX G.hn Access Multiplexer User Manual

Basic CLI

Understanding Command Syntax

This chapter describes the steps for the operator to enter commands for operating the system.
More information on using the command interface is provided in the following chapters.

To use the command line interface, follow the following steps :

1) Before entering commands at the command prompt, first check that you are at the prompt
level with the appropriate privileges. Most configuration commands require system
administrator level privileges.

2) Enter the command you want to execute. If the command does not need to enter
additional command (sub-command) or parameter values, go to step 3.
a. If the command has a parameter, enter the parameter name and value.
b. Numbers, strings, or addresses are set to values according to the parameters that
follow the command.

3) When you have finished entering commands clearly, press the [Return] key to execute
the command.

17
COAX G.hn Access Multiplexer User Manual

Inform Sometimes when you enter and run a command, you will get the
message "% Command incomplete." This means that the parameters
i required to execute the command are not input correctly, and the
command you entered is not executed. At this time, pressing the up
arrow will display the last command entered.

The following shows the command that parameters are not entered correctly.

L10212XC # show

% Command incomplete.

L10212XC #

Help(Command Syntax Helper)

The CLI of this device has built-in command syntax help function. If the system operator does
not know the complete grammar while typing commands, you can get help by typing '?' in
anywhere. GAM equipment provides two help functions:.

■ Full Help Function


Provides complete help for a list of possible parameters and values. Leave one space
after the command you entered.
■ Partial Help Function
After the operator enters the abbreviated parameter, it provides help for the
corresponding parameter. Do not leave a space after the command you entered.

Here’s the example of full help function. If you type '?' with a space character after the show
command, a list of parameters and values that the operator can input is displayed. Then, at the
"L10212XC # show" prompt again, the cursor blinks and waits for operator input. '?' is not
displayed on the screen.

L10212XC# show ?

access-list List IP access lists

arp Address Resolution Protocol (ARP)

auto-reset auto-reset commands

backup-config Contents of backup configuration

18
COAX G.hn Access Multiplexer User Manual

banner Login banner

barcode Display Barcode

bridge Bridge group commands

cli Show CLI tree of current mode

clock Print the system date and time

counter Counter command

cpe G.hn CPE

cpu CPU

cpu-acl CPU access-list

cpu-flood-guard Display CPU flood guard information

cpu-port Configure the CPU port

credit Display Credit infomation

debugging Debugging functions (see also 'undebug')

dhcp-filter DHCP filter

dot1x IEEE 802.1X Port-Based Access Control

environment Display environment information

etherchannel LACP etherchannel

factory-config Contents of factory default configuration

flash Contents of the flash filesystem

flash-files Contents of the flash files

flowcontrol IEEE 802.3x Flow Control

fw-upgrade-status F/W upgrade status

ghn G.hn command

history Command history

hosts IP domain-name, lookup style and nameservers

image Display image information

interface The layer2 interfaces

ip Internet Protocol (IP)

19
COAX G.hn Access Multiplexer User Manual

lacp Link Aggregation Control Protocol (LACP)

list Show command lists

login Login INFO

loop-detect loop-detect status

mac Display mac-address

mac-flood-guard Display MAC flood guard information

mac-limit Display MAC Limit

memory Memory statistics

mirror Port Mirroring

nsm NSM

ntp Network time protocol

policer Policer command

policy-map Policy map entry

port Ports

pppoeplus Configure the PPPoE+

privilege Show current privilege level

process Contents of the process

qos Quality of Service.

qos-access-list List QoS (MAC & IP) access lists

rmon Remote Monitoring Protocol (RMON)

route-map route-map information

router-id Router ID

running-config Current Operating configuration

service Setup miscellaneous service

snmp SNMP configuration

spanning-tree Display Spanning-tree Information

startup-config Contents of startup configuration

static-channel-group Static channel commands

20
COAX G.hn Access Multiplexer User Manual

syn-flood-guard Display SYN flood guard information

sync-port Sync port

syslog Display Syslog contents

system system

timezone time zone

uptime Display uptime information

user-priority Display the default user priority associated with the

layer2 interface

users Display information about terminal lines

version Display version

vlan Display VLAN information

vlan-stacking vlan-stacking

vlog Vlog show command

Here’s the example of partial help function. If you enter '?' without a space after entering the
show command, a description of the show command will be displayed as shown below and the
cursor will blink and wait for the next command.

L10212XC# show?

show Show running system information

L10212XC# show

In the above example, the operator wants to know the status of the port, but assumes that
they do not know the exact command. If you hit 'p' and type '?' without spaces, a list of
subcommands starting with 'p' is shown as belows. The command entered by the operator will
be displayed again and the cursor will blink and wait for input.

L10212XC# show p?

policer Policer command

policy-map Policy map entry

21
COAX G.hn Access Multiplexer User Manual

port Ports

pppoeplus Configure the PPPoE+

privilege Show current privilege level

process Contents of the process

Input Short Command

It’s not necessary to input full commands and parameters. Typically, you can type the first two
or three letters of a command and parameters to run.

Inform When using the short commands, you must input enough command
to distinguish the commands. Sometimes you will get the message
i "% Ambiguous command." This means that there is more than one
command with the same prefix as the character entered in that
mode.

L10212XC# show i

% Ambiguous command: "show i"

L10212XC# show i?

image Display image information

interface The layer2 interfaces

ip Internet Protocol (IP)

Command Symbol

The command symbol describes how the parameters should be entered for command execution.
Command symbol and the meanings of the symbols are shown in Table below.

Symbol Name Description

22
COAX G.hn Access Multiplexer User Manual

<> Angle brackets ■ It means one variable or value in command syntax.


These parameters must be entered.
■ Operator input integer value of 2 to 4094 for Show vlan
<2-4094> command.

() Braces ■ List of parameters or values used in command syntax


■ The operator must enter at least one entry in the list.
■ For example, Clear counter (all|IFNAME) can clear all
counter with “all” parameter or clear specific counter with
“interface name” parameter.

[] Square brackets ■ List of parameters or values used in command syntax


■ operator selectively inputs necessary items in the list.
It’s OK to enter nothing.
■ show interfaces [ifname] : Operator can input the
interface name or skip the interface name.
| Vertical bar ■ Mutually exclusive items in the parameter list
BOLD ■ Variables to Enter and Supported Fixed CLI
Italic ■ Commands that the operator must enter
A.B.C.D ■ IP address or subnet mask
A.B.C.D/M ■ IP prefix (Ex. 192.168.0.0/24)

Command line editing keys and help

The GAM provides editing functions similar to Emacs. Table describes command line edit
command and help function.

Command Description
[Ctrl] + [A] ■ Move cursor to beginning of line
[Ctrl] + [E] ■ Move cursor to end of line
[Ctrl] + [B] ■ Move cursor one word back
[Ctrl] + [F] ■ Move cursor one character forward
Backspace ■ Delete one character before the cursor
[Ctrl] + [K] ■ Delete characters from current cursor to end of line
[Ctrl] + [U] ■ Delete the character from the current cursor to the

23
COAX G.hn Access Multiplexer User Manual

beginning of the line


Tab ■ If you hit [tab] after part of the command, you will see a
list of commands available. If there’s only one command
available, complete the rest of the command.

[Ctrl] + [P] or ↑ ■ Displays the history of up to 20 command inputs in


sequence from the last input command.

[Ctrl] + [N] or ↓ ■ Show next command

? ■ Displays a list and description of available commands at


the prompt
■ If you hit '?' after the command, it displays the list of
parameters to be entered next to the command
■ Displays a list of commands with the same prefix if you
type '?' right after the partial command
Return or Spacebar or Q ■ If you press Return on –More-- then next line is displayed
■ Press the spacebar to display the next page, press Q to
quit and switch to prompt status

24
COAX G.hn Access Multiplexer User Manual

CLI Mode

GAM can set up and manage the system through the console terminal by installing a terminal
program on the user's PC.

The following CLI modes are used in the setup of the device.

 Privilege Exec View Mode


 Privilege Exec Enable Mode
 Global Configuration Mode
 Line Configuration Mode
 VLAN Configuration Mode
 Interface Configuration Mode
 Policy Configuration Mode
 Ghn Configuration Mode
 Profile Configuration Mode
 Co Configuration Mode

=i
Inform The command prompt uses the name of this equipment as the
host name before the string representing each mode. This guide
uses the 'L10212XC' prompt as a common hostname.

=i
Inform When setting up the environment of the GAM equipment, the
system operator is exposed to various kinds of prompts. The
prompt tells you where the operator is currently in configuration
mode. You must check the prompt to change the configuration of
the switch.

Privilge Exec View Mode

When the user successfully logs in to the device, it will start in Privilege Exec View mode.
Privilege Exec View mode is a read-only mode that is provided to all users.
In the Privilege Exec View mode, most of the commands are for checking the configuration of
the device. The following table shows the major commands used in Privilege Exec View mode.

25
COAX G.hn Access Multiplexer User Manual

Commands Description

enable Enter Privilege Exec Enable mode

exit Log out of the system

show Check the settings of the equipment

Privilege Exec Enable Mode

You must enter Privilege Exec Enable mode if you want to have the right to set the device,
not just the read permission. In the Privilege Exec View mode, use the "enable" command to
enter the Privilege Exec Enable mode.

When you enter Privilege Exec Enable mode, the command prompt changes from L10212XC>
to L10212XC #.

Command Description

enable In User Exec mode, enter Privilege Exec Enable mode.

Also, for security reasons, administrators can assign a password.


In Privilege Exec View mode, when the user successfully logs in to the equipment, the
Privilege Exec Enable mode is entered. The Privilege Exec Enable mode command is used to
change the terminal settings, check the network status and system information.

The following table shows the major commands used in Privilege Exec Enable mode.

Command Description

clock Enter the time and date on your system.


configure terminal Enter the Global setting mode.
reboot Reboot the system.
telnet Connect to other equipment via telnet.
terminal length Sets the number of lines printed on the terminal
screen.

Global Configuration Mode

26
COAX G.hn Access Multiplexer User Manual

Global configuration mode can be entered by entering the "configure terminal" command in
Privilege Exec Enable mode. When you enter Global configuration mode, the system prompt
changes from L10212XC # to L10212XC (config) #.

Command Description
config terminal Enter Global Configuration Mode from Privilege Exec Enable
Mode

In global configuration mode, operator can set SNMP, RMON and the overall functions which
covers the entire system before setting up a specific protocol or specific function. You can also
enter VLAN, Interface, and Ghn configuration modes in the global configuration mode. The
table below shows the major commands of the Global setting mode.

Inform Depending on the OS version, only the L2 function can be


supported
i

Command Description

access-list Set ACL.


aaa Set the AAA (Authentication, Authorization, Statistics)
function.
arp Register IP address and MAC address in ARP table.
auto-reset Set the auto-reset function.
hostname Change the host name of the system prompt.
interface Enter Interface setting mode.
ip Set various protocols using IP.
syslog Set the Syslog function.
snmp Set Snmp.
username Create a User.

Line Configuration Mode

27
COAX G.hn Access Multiplexer User Manual

Command Description
line [ console | vty ] In Global (Config) setting mode, enter Line Setting mode.

When you enter Line Setting mode, it changes from L10212XC(config)# to L10212XC(config-
line)#. In this mode, the administrator can make settings related to the serial port or Telnet.

The following table shows the major commands used in Line Setting mode.

Command Description
exec-timeout Set terminal execution time
login local Allows users to access this equipment with administrator-
defined user information.

VLAN Configuration Mode

Command Description

vlan database In Global (Config) setting mode, enter VLAN setting mode.

When you enter VLAN configuration mode, it changes from L10212XC(config)# to


L10212XC(config-vlan)#. In this mode, the administrator can configure VLAN creation and
deletion.

The following table shows the major commands used in VLAN configuration mode.

Command Description
vlan <2~4094> Create a VLAN.
no vlan <2~4094> Delete the VLAN.

Interface Setting Mode

28
COAX G.hn Access Multiplexer User Manual

Command Description

interface Ifname In Global (Config) setting mode, enter interface mode.

When you enter Interface setting mode, it changes from L10212XC(config)# to


L10212XC(config-if-name)#. In this mode, the administrator can make settings related to the
interface.

The following table shows the major commands used in Interface mode.

Command Description
ip Set various functions using IP in the interface.
port-type Set the speed
autonego Set auto-negotiation.
shutdown Disable the interface.

Policy Setting Mode

Command Description

Policy ingress name In Global (Config) configuration mode, enter Policy-ingress


(create | modify) mode.
Policy egress name In Global (Config) configuration mode, enter Policy-egress
(create | modify) mode.

When you enter Policy setting mode, it changes from L10212XC(config)# to L10212XC(config-
policy)#. In this mode, the administrator will configure what policy to use by matching Priority,
Rule, Action, etc..

The following table shows the major commands used in Policy setting mode.

Command Description

29
COAX G.hn Access Multiplexer User Manual

rule name Set the rule with the packet configuration information to
classify.
priority Set the priority.
attach Set the statistical function through Policer or counter.
service interface Ifname Set the interface to apply the policy to.
action Sets the action for classified packets.

Ghn Configuration Mode

Command Description
ghn In Global (Config) setting mode, enter ghn mode.

When you enter Ghn configuration mode, it changes from L10212XC(config)# to


L10212XC(config-ghn)#. In this mode, the administrator makes settings related to ghn.

The following table shows the major commands used in ghn configuration mode.
Command Description
co-profile Set the Co-profile.
cpe-profile Set the Cpe-profile.
cpe Register CPE as Auto / Manual.
system-id Sets the Ghn system id.
profile enable Activate the profile function.

Profile Setting Mode

Command Description
co-profile In Global (Config-ghn) configuration mode, enter co-profile
mode.
cpe-profile In Global (Config-ghn) configuration mode, enter cpe-profile
mode.

30
COAX G.hn Access Multiplexer User Manual

When you enter Profile Setting mode, it changes from L10212XC(config-ghn)# to


L10212XC(config-ghn-co-profile [name])# or L10212XC(config-ghn-cpe-profile [name])#. In this
mode, the administrator sets the ghn parameter value.

The following table shows the major commands used in Profile mode.

Command Description
notch Set Notch.
tx-power1 Set Tx-power1.

Command Description
learn-limit Sets the limit on the number of macs to be learned.
tx-power1 Set Tx-power1.
rate-limit Limit the rate of incoming or outgoing packets from CPE.

Co Setting Mode

Command Description
ghn-co ghn (Config-ghn) Enter co mode in configuration mode.

When you enter Co setting mode, it changes from L10212XC(config-ghn)# to L10212XC(config-


ghn-co [num])#. In this mode, the administrator makes settings related to co of ghn.

The following table shows the major commands used in co setting mode.

Command Description

co-profile Apply the co-profile to use.


cpe-profile Apply the cpe-profile to use.
direct-cmd Set directly on CO / CPE.

31
COAX G.hn Access Multiplexer User Manual

Connecting
System

User Interface

The manager uses the following methods to manage the EoC GAM:

 An access to CLI by connecting a terminal to a console port.


 An access to CLI by using telnet/SSH from a remote.
 A management using SNMP Network Manager.

The EoC GAM supports for the connection as shown in the followings:

 A console connection
 telnet/SSH connection

Console Connection

CLI included in the system is accessible through RJ-45 type port. The running device (or
workstation with terminal emulation software) must support 9-pins RS-232 DB9 port. The console
ports of the EoC GAM are located in front of the device. A cable accessible to the Cisco switch is
compatible with ours included in the package.

If user selects “Serial/115200/8” and “No Flow Control” for the connecting program setup,
the user can access using the serial cable included in the package..

32
COAX G.hn Access Multiplexer User Manual

Telnet Connection

The system manager can access to the EoC GAM through the workstation that has functions of
TCP/ IP and Telnet/SSH connection. The manager must set Username and Password to use
Telnet/SSH as well as have a switch with more than an IP address.

telnet (“ip_address”| “hostname”) (|”port_number”)

When the prompt requiring User Password blinks after success of Telnet/SSH connection, if the
User Password is entered, Switch User Mode starts.

Connection through SNMP Network Manager

Users can manage the EoC GAM using any type of Network Manager that supports for Simple
Network Management Protocol (SNMP). For more information about the SNMP, please refer to
“Chapter 8. SNMP”.

33
COAX G.hn Access Multiplexer User Manual

User Authentication

Add and Delete Users

The system manager can login to the Switch through the Console Port or Telnet/SSH. Before
login to the Switch, registration is required. The EoC GAM not only provides functions to add
and delete users but also allows assigning password and permissions, session timeout, and
Access List for each user.

Inform The Access List may not be provided depending on the OS version.

Command Description Mode


username userID password userID creation Config
password Receives unencrypted password
username userID password userID creation Config
7 password Receives encrypted password.
username userID privilege userID creation Config
<1-16> password password If the privilege is 15, the user has the highest
privilege (permission to go into Enable Mode).
username userID privilege userID creation Config
<1-16> password 7 password If the privilege is 15, the user has the highest
privilege (permission to go into Enable Mode).
Receives encrypted password.
username userID privilege userID creation Config
<1-16> password password If the privilege is 14, the user is required to
enter password when going into Privilege
Mode.
no username userID userID deleteion Config

Add and Delete Users

34
COAX G.hn Access Multiplexer User Manual

L10212XC# configure terminal

L10212XC(config)# username lti

L10212XC(config)# username test password test

L10212XC(config)# username admin privilege 15 password admin

L10212XC(config)# end

L10212XC# show running-config

username lti nopassword

username test password test

username admin privilege 15 password 0 admin

Password Setting

The EoC GAM uses two types of password:

 Enable Password
 It is used for security of Privileged Mode
 User Password
 It is used for accessing to User Mode through Console or Telnet/SSH

Command Description Mode


enable password It assigns Privileged Mode Password. Config
password
no enable password It deletes Privileged Mode Password. Config
service password- It sets Password Encryption Mode. Config
encryption
no service password- It deletes Password Encryption Mode. Config
encryption

35
COAX G.hn Access Multiplexer User Manual

Inform Only one admin who is super user can exist. Accound ID for the
admin cannot be deleted, and can be changed only by the

i password. If super user lost password, she/ he must contact the


place of purchase.
The privilege 2~16 can be assigned to normal users. The
privilege 2 gives access permission of <EXEC Mode (show only)
>, and the privilege 16 gives direct access permission of Enable
Mode. Default privilege for user is 16.

Privileged Mode Password Setting

L10212XC# configure terminal

L10212XC(config)# enable password lti

L10212XC(config)# end

L10212XC# show running-config

enable password lti

Password Encryption Setting


As shown in the above example, the setting password is disclosed by using the command
“show running-config”. For the prevention of the password disclosure, the EoC GAM supports
for the setting of Password Encryption Mode.

L10212XC# configure terminal

L10212XC(config)# service password-encryption

L10212XC(config)# end

L10212XC# show running-config

enable password 7 qqrrssttuu

username lti

36
COAX G.hn Access Multiplexer User Manual

username test password 7 vvwwxxyyzz

L10212XC#

Number of users limitation

The administrator of this equipment can limit the number of users who can access the
equipment. Limited number of users include users accessing through the console port and users
connecting remotely. And if it is configured as a RADIUS server or a TACACS + server as a user
authentication method, the number of users authenticated and connected through the server is
also included in the limited number of users. By default, the number of users is limited to 8.

Command Description Mode


login connect <1-8> Limit the number of users who can access the Config
equipment

Restricting Login Authentication attempts

The administrator of this equipment can restrict login authentication attempts to the users
who want to access the equipment. By default, the number of login attempts is 5, and the time
limit for login authentication is 60 seconds for all 5 failures.

Command Description Mode


login attempt <0-100> delay Configures login authentication attempts for Config
<0-10800> users who want to connect to the appliance.

Force session termination

You can force the current session to end. You can use the 'show users' command to look up
the current contact information, and force the connection of the contact to be disconnected from

37
COAX G.hn Access Multiplexer User Manual

the system.

Command Description Mode


disconnect Session Termination Enable
(all | console | vty <0-15> | vty all) -all: Terminate all session
-console: Terminate console session
-vty: Terminate remote session
show users View currently connected users Enable

Banner Setting

Command Description Mode


Banner Set the message that appears on the screen before Config
login.
banner login Sets the message that is displayed when login is Config
successful.
banner login-fail Sets the message that is displayed when login fails. Config
no banner Delete the message that appears before login to the Config
system.
no banner login Delete the message that is displayed when login Config
succeeds.
no banner login-fail Delete the message displayed when login fails. Config
show banner View current banner Enable

An example of setting using the above command is as follows.

L10212XC# conf t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# banner
When you type a message and press Ctrl and D
Save & Exit : CTRL-D
at the same time, the banner is temporarily
L10212XC G.hn Switch saved and you are taken to the system prompt.

38
COAX G.hn Access Multiplexer User Manual

Zaram Technology Inc.

L10212XC(config)# show banner

< Login banner >

L10212XC G.hn Switch

Zaram Technology Inc.

< Login success banner >

%Login success banner not configured

< Login fail banner >

%Login fail banner not configured

After setting up and logout as above, or saving the setting and rebooting will display as follows.

L10212XC# exit

Jul 13 10:50:45 L10212XC user.warn IMI[653]: User 'admin' logout from 'console' on '/dev/console'

L10212XC G.hn Switch

Zaram Technology Inc.

L10212XC login:

banner login, banner login-fail can be configured in the same way.

39
COAX G.hn Access Multiplexer User Manual

User Authentication

This device can set various authentication methods for users accessing the system. Basically
user id and password are used for authentication. If a user authentication protocol such as
RADIUS (Remote Authentication Dial-In User Service) or TACACS + (Terminal Access Controller
Access-Control System Plus) is set up, users who can registered on the server can also
authenticate.

Set User Authentication Method

User authentication method of this equipment is to use user ID and password registered in
system and to use RADIUS or TACACS +. You can use all three of these methods, or you can
choose one of them.

Command Description Mode


aaa authentication local Set the authentication method of the Config
login user connecting through the console.
(radius/tacacs/host)
no aaa authentication Disable the authentication method you Config
local login have set for users connecting through
(radius/tacacs/all) the console.
aaa authentication remote Set the authentication method of the Config
login remote access user.
(host/radius/tacacs)
no aaa authentication Disable the authentication method you Config
remote login have set for the remote access user.
(radius/tacacs /host/all)

Warning To authenticate a user registered in RADIUS or TACACS +, the


user authentication protocol, use the username command to
W add the user. Otherwise, all users connecting via user
authentication protocol will be given privilege 16. Please refer
to '2.5.1. Adding and Deleting Users ".

40
COAX G.hn Access Multiplexer User Manual

Inform 'Host' is the connection method using the user ID and password
registered in the device. This equipment is set to use this method

i by default. You can not disable the 'host' authentication method


in the user authentication method accessed through the console,
but you can disable it in the remote access user authentication
method.

Set the priority of User Authentication Methods

If you have more than one user authentication method set, you can set the priority of the
authentication process.

Command Description Mode


aaa authentication local Set the authentication method of the Config
login primary user connecting through the console.
(radius|tacacs)
aaa authentication remote Disable the authentication method you Config
login primary have set for users connecting through
(radius | tacacs) the console.

Inform The user authentication method of this equipment is basically set

i
to the order of the last authentication of 'host'.

Check User Authentication Method Setting

After setting user authentication method, you can check the setting contents.

Command Description Mode


show login Set the authentication method of the Enable
user connecting through the console.

41
COAX G.hn Access Multiplexer User Manual

RADIUS Setting

RADIUS Server Setting


If you configured RADIUS as a system user authentication method, you must first configure
the RADIUS server to be used by the appliance.

Command Description Mode


aaa radius-server host Register the IP address and Key value Config
ipv4-address A.B.C.D key of the RAIDUS server to be used.
STRING
aaa radius-server host The RADIUS server also registers with Config
ipv4-address A.B.C.D key the authentication port.
STRING auth-port <0-
65535>
no aaa radius-server host Delete the RADIUS server that you Config
ipv4-address A.B.C.D registered.

Inform Enter the port number after auth-port as the UDP port number.

i
Set number of retransmission attempts
When user information is sent to the RADIUS server and if there is no response, retransmission
will happen. It is set to 3 times by default, you can set the number of retransmission attempts.

Command Description Mode


aaa radius-server Set the number of times to retransmit Config
retransmit <1-5> information for user authentication.
no aaa radius-server Returns the number of times the Config
retransmit information is retransmitted for user
authentication to the default setting.

Response time limit


The time to wait for a response from the server after sending the connection information to

42
COAX G.hn Access Multiplexer User Manual

the RADIUS server is set. You can set this response time. It is limited to 3 seconds by default.

Command Description Mode


aaa radius-server timeout Sets the time to wait for a response Config
<1-1000> from the RADIUS server.
no aaa radius-server Returns the time to wait for a response Config
timeout from the RADIUS server to the default
setting.

TACACS+ Setting

TACACS+ Server Setting


If you have configured TACACS as a system user authentication method, you must first
configure the TACACS server for the appliance.

Command Description Mode


aaa tacacs-server host Register the IP address and Key value Config
ipv4-address A.B.C.D key of the TACACS server to be used.
STRING
aaa tacacs-server host Register the port of the TACACS server Config
ipv4-address A.B.C.D key that is connected to the user's device.
STRING socket-port <0-
65535>
no aaa tacacs-server host Delete the TACACS server that you Config
ipv4-address A.B.C.D registered.

Authentication Method Setting


If you set the user authentication method to TACACS +, select the TACACS + authentication
method. Password Authentication Protocol (PAP) is the basic authentication method used by
TACACS +, and Challenge Handshake Authentication Protocol (CHAP) is a more secure
authentication method. This equipment basically uses PAP.

Command Description Mode


aaa tacacs-server auth- Select the authentication method of Config

43
COAX G.hn Access Multiplexer User Manual

type TACACS +.
( ascii | pap | chap)
no aaa tacacs-server Returns the authentication method of Config
auth-type TACACS + that you set to the default
setting.

Response time limit


The time to wait for a response from the server after sending the information of the user to
the TACACS + server is set for user authentication. You can set this response time, 3 seconds by
default.

Command Description Mode


aaa tacacs-server timeout Sets the amount of time to wait for a Config
<1-1000> response from the TACACS + server.
no aaa tacacs-server Returns the time to wait for a response Config
timeout from the TACACS + server to the
default setting.

User Access Log

If you select RADIUS or TACACS + as the user authentication method and authenticate with
the server and connect to the system, you can generate the log to the server.

Command Description Mode


aaa accounting Sets the user's connection history. Config
(enable | disable)

Inform ‘enable' is to set a connection log to the server that succeeded

i
authentication. 'Disable' is to disable the function. And the
connection log records the time of login success and logout time.

44
COAX G.hn Access Multiplexer User Manual

System

Management

HOST NAME

Since the Hostname can be used for identifying each system, the screen prompts of Console/
Telnet are combined with Hostname and current Command Mode. The EoC GAM uses the
system model name as its Hostname by default, and manager can change it.

Command Description Mode


hostname string Change Hostname Config
no hostname Set Hostname to default value Config

The procedures to set and change the Hostname is as follows.

L10212XC# configure terminal

L10212XC(config)# hostname Zaram

Zaram(config)# end

Zaram#

Zaram# configure terminal

Zaram(config)# no hostname

45
COAX G.hn Access Multiplexer User Manual

46
COAX G.hn Access Multiplexer User Manual

Interface Setting and Management

The interfaces supported by GAM equipment are as follows.

Interface Types
Physical interfaces Gigabit Ethernet, 10G Ethernet, Gigabit Capable G.now
port-group interfaces Port-group
VLAN Interfaces VLAN
Loopback interface Loopback
Management interface Out of band interface for management
Console interface RS-232 interface for management

 All interface configuration is as follows.

1) In Privileged mode, enter "Config" mode with "configure terminal" command.


2) Use the "interface" command to enter interface mode.
3) Use the configuration command for a specific interface.

Activate Interface

The commands that enable / disable the physical interface are as follows.

Command Description Mode


shutdown Phisycal Ports disable/enable Interface
no shutdown

L10212XC(config)# interface xe1

L10212XC(config-if-xe1)# shutdown ←Disable Port

L10212XC(config-if-xe1)# no shutdown ←Enable Port

47
COAX G.hn Access Multiplexer User Manual

Interface Setting

The commands for setting the interface are as follows.

Command Description Mode


speed 10/100/1000 It can be applied according to the Interface
duplex full-duplex/half-duplex supported OS. Speed is fixed at 1 Gbps
(Ghn1 to Ghn24 ports only) and
Cannot be changed.
flowcontrol ((send (on|off)) Flowcontrol on / off Interface
| (receive (on|off )) | both)
no flowcontrol
autonego When connected to a port that does not Interface
no autonego support Auto mode, switch to force mode.

 The speeds supported by each interface are as follows.

type auto-negotiation speed duplex


1Gbe on 1Gbe full
off 1Gbe full
10Gbe off 10Gbe full

* Please note the following when setting speed and duplex.

In case of 1Gbe, speed and duplex setting can be changed only when the autonegotiation is
turn off. When auto-negotiation is on, the link down is detected on both sides even if the optical
cable is disconnected on one side. (remote fault detection)

Inform In case of 10Gbe, you also can not change the speed and duplex

i settings. Depending on hardware and OS, there may be 10Gbe


support model.

Interface Description

48
COAX G.hn Access Multiplexer User Manual

The settings for the description of the interface are as follows.

Command Description Mode


description string Sets the description for the interface. (string of up Interface
to 80 characters)
no description Delete the description for the interface. Interface

L10212XC(config)# interface xe1

L10212XC(config-if-xe1)# description uplink

L10212XC(config-if-xe1)# no description

Check Interface Information

The commands to check the interface information are as follows.

Command Description Mode


show interface Show interface status Enable
[ifname]

L10212XC# show interface

Interface lo

Scope: both

Hardware is Loopback index 1 metric 1 mtu 0 duplex-half (force) arp-ageing-ti

meout 3000

<UP,LOOPBACK,RUNNING>

VRF Binding: Not bound

DHCP client is disabled.

inet 127.0.0.1/8

49
COAX G.hn Access Multiplexer User Manual

input packets 0, bytes 0, dropped 0, multicast packets 0

output packets 0, bytes 0, multicast packets 0 broadcast packets 0

Interface eth0

Scope: both

Hardware is Ethernet Current HW addr: 0050.b611.b74e

Physical:0050.b611.b74e Logical:(not set)

index 2 metric 1 mtu 1500 duplex-full (autonego) arp-ageing-timeout 3000

<UP,BROADCAST,MULTICAST>

VRF Binding: Not bound

Bandwidth 100M

input packets 0, bytes 0, dropped 0, multicast packets 0

output packets 0, bytes 0, multicast packets 0 broadcast packets 0

Interface xe1

Scope: both

Hardware is Ethernet Current HW addr: 0050.b611.b75c

Physical:0050.b611.b75c Logical:(not set)

index 44013 metric 1 mtu 1500 duplex-full (force) arp-ageing-timeout 3000

<UP,BROADCAST,MULTICAST>

VRF Binding: Not bound

Bandwidth 10G

input packets 0, bytes 0, dropped 0, multicast packets 0

output packets 0, bytes 0, multicast packets 0 broadcast packets 0

Interface ghn1

Scope: both

Hardware is Ethernet Current HW addr: 0050.b611.b750

Physical:0050.b611.b750 Logical:(not set)

index 44001 metric 1 mtu 1500 duplex-full (autonego) arp-ageing-timeout 3000

<UP,BROADCAST,RUNNING,MULTICAST>

50
COAX G.hn Access Multiplexer User Manual

VRF Binding: Not bound

Bandwidth 1G

input packets 9, bytes 576, dropped 0, multicast packets 0

output packets 539, bytes 299096, multicast packets 40 broadcast packets 499

Interface ghn2

Scope: both

Hardware is Ethernet Current HW addr: 0050.b611.b751

Physical:0050.b611.b751 Logical:(not set)

index 44002 metric 1 mtu 1500 duplex-full (autonego) arp-ageing-timeout 3000

<UP,BROADCAST,RUNNING,MULTICAST>

VRF Binding: Not bound

Bandwidth 1G

input packets 126, bytes 120879, dropped 0, multicast packets 0

output packets 493, bytes 267443, multicast packets 33 broadcast packets 443

(…)

Monitoring Interface Traffice

The command for querying the interface traffic is as follows.

Command Description Mode


show port statistics Show interface RX | TX Cumulative packets Enable
counter
show port statistics Show interface RX | TX Cumulative packets by Enable
counter-type type (Unicast, Multicast, Broadcast)
show port statistics Show interface RX | TX packets in Enable
avg-pkt (|IFNAME) 5sec/1min/5min
show port statistics Show interface RX | TX packets in Enable
avg-type [ IFNAME ] 5sec/1min/5min
show port Show interface RX | TX Cumulative packets by Enable
statistics if-mib IFNAME type (Unicast, Multicast, Broadcast)

51
COAX G.hn Access Multiplexer User Manual

L10212XC# show port statistics counter

Intf RX Packet TX Packet RX BCast TX BCast CRC Error

------ -------------- -------------- -------------- -------------- ------------

xe1 3995881359 2090738136 0 0 0

xe2 0 0 0 0 0

ghn1 2144441382 3726210185 0 0 0

ghn2 29157 29341079 0 0 0

(…)

ghn23 22862 29335573 0 0 0

ghn24 22862 29335573 0 0 0

-------------------------------------------------------------------------------------

L10212XC# show port statistics counter-type

Switch port counter - packet type

Interface Rx_unicast Rx_mcast Rx_bcast Tx_unicast Tx_mcast Tx_bcast

--------- ---------- -------- -------- ---------- -------- --------

xe1 3602769145 0 0 2480923516 185 0

xe2 0 0 0 0 0 0

ghn1 2534632052 8 0 3333086102 15492 0

ghn2 34416 8 0 29329828 15490 0

(…)

ghn23 26983 8 0 29323713 15485 0

ghn24 26983 8 0 29323713 15485 0

52
COAX G.hn Access Multiplexer User Manual

-------------------------------------------------------------------------------------

L10212XC# show port statistics avg-pkt xe1

Intf time Rx_Pkt/s Rx_Mbps Tx_Pkt/s Tx_Mbps

------ ------ ---------- -------- ---------- --------

xe1 5 sec 1488178 761.9 148812 78.6

1 min 1488199 762.0 148819 78.6

5 min 1488225 762.0 148822 78.6

-------------------------------------------------------------------------------------

L10212XC# show port statistics if-mib xe1

Interface Name : xe1

RX Pkts : 3891210886 TX Pkts : 2509767879

RX Octet : 1623427031424 TX Octet : 165823280876

RX Broad. Pkts : 0 TX Broad. Pkts : 0

RX Multi. Pkts : 0 TX Multi. Pkts : 185

Rx Pause frames : 0 Tx Pause frames : 0

Rx Error : 0 Tx Error : 0

Drop Event : 0

Bad CRC : 0

Collision : 0

Pkts( 64) : 806477314 Pkts( 256~ 511) : 0

Pkts( 65~ 127) : 1299534155 Pkts( 512~1023) : 0

53
COAX G.hn Access Multiplexer User Manual

Pkts( 128~ 255) : 0 Pkts(1024~ ): 0

-------------------------------------------------------------------------------------

54
COAX G.hn Access Multiplexer User Manual

IP Setting

The L2 switch does not require an IP address to forward packets, but an IP address is
required for remote access to the equipment via TCP / IP via SNMP or Telnet.

Also, since IP address is required for communication using Layer 3 function, IP is also
required to convert Switchport to Routed port or SVI (Switched Virtual Interface).

Inform The default interface, vlan1, is automatically created and all ports

i
are set to member ports in vlan1.

IP Setting for Interface

The IP address identifies the area to which the received IP datagram will be sent. Some IP
addresses are reserved for special purposes and can not be used as hosts, subnets, or network
addresses.

Inform For official descriptions of IP addresses, see RFC1166,

i
Internet Number..

This equipment supports the function of assigning multiple IP addresses to one interface.
Multiple IP addresses are useful in many situations.

To assign an IP address to a network interface, use the following command in interface


configuration mode.

Command Description Mode


ip address A.B.C.D/M Sets the primary IP address to be used for the Interface
( | lable NAME) interface.
ip address A.B.C.D/M Sets the IP address to be used for the Interface
secondary interface. (Multiple IP assignments available)

55
COAX G.hn Access Multiplexer User Manual

( | lable NAME)

L10212XC(config)# int vlan1

L10212XC(config-if-vlan1)# ip add 192.168.1.239/24

L10212XC(config-if-vlan1)# ip add 192.168.2.222/24 secondary

Inform - Prefixlen is the bit length that distinguishes the network

i
from the ip address.
- You must enter ip for the L3 interface, not the L2 interface.

Verify Network Connection

Use the ping command to verify your device is properly connected to your network. On IP
networks, the ping command sends an Internet Control Message Protocol (ICMP) echo
message.

ICMP is an Internet protocol that signals error conditions and provides IP packet destination
information. When the destination receives an ICMP Echo message, the destination sends back
an ICMP Echo response message to the sender. You can only use ping without sub CLI, and
repeat count is infinite. Extended ping allows you to use the sub-CLI as shown in Table.

Use the following command in Privilege Exec Enable mode to perform a ping test to check the
network connection with the other party.

Command Description Mode

ping [ip addressㅣhost name] Run the Ping test to check the network Enable
connection with the other party.

The following is the basic information you need to set up to run the ping test. After running
the Ping test in Enable mode, enter the following default settings.

Parameters Description
Protocol [ip] This is a supported protocol for ping test. The default is set to

56
COAX G.hn Access Multiplexer User Manual

IP.
Target IP address To check the network connection with the other party, enter
the IP address of the destination or Hostname to send the
ICMP echo message to the destination.
Repeat count [5] If you enter count, ICMP echo messages are sent as many
times as entered. Default is set to 5.
Datagram size [100] The size of the ping packet. Default is 100 bytes.
Extended commands Decide whether to display additional commands. Default is set
[n] to no.

[ Example 1 ]
Ping 5 times to check the network status with IP address 192.168.1.10.

L10212XC# ping

Protocol [ip]: ip

Target IP address: 192.168.1.1

Repeat count [5]: 5

Datagram size [100]: 100

Timeout in seconds [2]: 2

Extended commands [n]: y

Source address or interface:

PING 192.168.1.1 (192.168.1.1) from 192.168.1.222 : 100(128) bytes of data.

108 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=6.00 ms

108 bytes from 192.168.1.1: icmp_seq=2 ttl=64 time=0.667 ms

--- 192.168.1.1 ping statistics ---

2 packets transmitted, 2 received, 0% loss, time 1013ms

rtt min/avg/max/mdev = 0.667/3.336/6.005/2.669 ms

If you have multiple IP addresses set up on your machine, you may need to check the IP

57
COAX G.hn Access Multiplexer User Manual

address and the network connection of the other party. To perform a Sping test, follow the
same procedure as for the Ping test, and then enter the following items for the Sping test after
'Extended commands'. Use the following command to check the IP address of the device and
the network connection status with the other party.

Here is the information you need to set up to run Sping.

Parameter Description
Source address or Specify "source ip address" to use the IP address set by the
interface user. When the other party sends a replay message, it sends
it to the IP address. If not specified, it is automatically set to
the IP address of the device.

Warning Use "spring" when your machine has multiple IP addresses.


On a device with only one IP address, it has no meaning.
W

Static and Default Gateway Setting

A static route is a user-defined routing path that allows packets to travel along an explicit path
from the start point to the destination. Used to specify the gateways to which packets that can
not be routed are sent, and all other networks that are not connected or not in the routing table
are sent to the default gateway.

To configure a static route, use the following command in Config mode:

Command Description
ip route (IP destination-prefix | Register a static route.
destination-ipaddress mask) IP destination-prefix : Specifies the network number
(gateway-ipaddress) [distance- of the destination.
value] [ desciption NAME ] mask : Specifies the mask of the destination
[ tag <1-4294967295> ] network.
gateway-ipaddress : Specifies the IP address of the
gateway device.
distance-value : Use a number between 1 and 255

58
COAX G.hn Access Multiplexer User Manual

In global configuration mode, you can delete the static route configuration with the no ip route
command. It will remain until the setting is cleared. However, you can nest static routes with
dynamic routing information by carefully assigning administrative distance values. Each dynamic
routing protocol has a default administrative distance value, as listed in Table. If you want a static
route to overlap with information from a dynamic routing protocol, the administrative distance of
the static route must be greater than the value of the dynamic protocol.

Parameters Default Value


Route Source Default Distance
Connected interface 0
Static route 1
Exterior Border Gateway 20
Protocol(BGP)
OSPF 110
RIP 120
Interior BGP 200
Unknown 255

When an interface is down, all static routes through that interface are deleted from the IP
routing table. In addition, static routes are deleted from the IP routing table even when static
routes no longer find the next hop useful for forwarding router addresses.
To check static route information, use the following command in privileged mode.

Command Description
show ip route static Show IP route information.

The following example sets up a static route so hosts connected to the 20.10.10.0 network can
communicate with hosts on the 192.168.20.0 network.

59
COAX G.hn Access Multiplexer User Manual

20.10.10.35 192.168.20.15

20.10.10.0 192.168.20.0

192.168.12.2
192.168.12.1

Router A Router B

Figure 1. Network setting example – Static route

Router A Setting

L10212XC(config)# ip route 192.168.20.0 255.255.255.0 192.168.12.2

L10212XC(config)# exit

L10212XC# show ip route static

Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP

O - OSPF, IA - OSPF inter area

N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

E1 - OSPF external type 1, E2 - OSPF external type 2

i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area

* - candidate default

S>* 192.168.20.0/24 [1/0] via 192.168.12.2 vlan2

Router B Setting

L10212XC(config)#ip route 20.10.10.0/24 192.168.12.1

L10212XC(config)#exit

L10212XC#show ip route static

60
COAX G.hn Access Multiplexer User Manual

Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP

O - OSPF, IA - OSPF inter area

N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2

E1 - OSPF external type 1, E2 - OSPF external type 2

i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area

* - candidate default

S 20.10.10.0/24 [1/0] via 192.168.12.1 vlan2

The default gateway is Tolo which points to the other network.


The default gateway settings can be configured using the following format.

Command Description
ip route 0.0.0.0/0 {gateway-ipaddress} Forwarding packets of other networks that are
not in the routing table to the specified ip
address.

L10212XC(config)# ip route 0.0.0.0/0 192.168.1.1

Management Port IP Setting

To make a Telnet connection using the Management Port, or to connect a PC, set the IP as
shown below.

Command Description Mode


Interface mgmt Setting Management IP Config
ip address A.B.C.D/M Address

L10212XC(config)# int mgmt

L10212XC(config-if-mgmt)# ip add 192.168.1.239/24

61
COAX G.hn Access Multiplexer User Manual

MAC Address Table

Static mac Setting

This command specifies the processing for a specific MAC address on the specified port.

Command Description Mode


mac static mac-address [forward Set mac to static. Config
| discard] port_name

L10212XC(config)# mac static 0000.0000.1011 forward xe1

Mac Table Check

It is a command to check the MAC address recorded on a specific port and VLAN.

Command Description Mode


show mac [port NAME | vlan Show the MAC address. Enable
VLANNAME]
show mac count Show the number of MAC addresses. Enable
[port NAME|vlan VLANNAME]

L10212XC# show mac

bridge VLAN port mac fwd timeout type

------------ ------- ---------- -------------- ---- ------- ---------

1 1 ghn1 000c.29bf.5ba6 1 299 dynamic

1 1 ghn1 0015.5d01.6800 1 299 dynamic

1 1 ghn1 0015.5d01.6808 1 299 dynamic

1 1 ghn1 0015.9949.32aa 1 299 dynamic

1 1 ghn1 0019.d150.0ae5 1 299 dynamic

1 1 xe1 0000.0000.1011 1 static

62
COAX G.hn Access Multiplexer User Manual

mac entry count : 6

-------------------------------------------------------------------------

L10212XC# show mac count

Sum :6

Inform The above output may vary depending on the equipment..

i
Inform More than one thousand MAC addresses are registered in the MAC
table. Therefore, it is difficult to find the necessary information if it is

i output at once, so after outputting a certain amount, "-more-" is


output and it is in a standby state. However, if you press the "q" key
after getting the necessary information, you can return to the system
prompt immediately without printing the rest of the table.

63
COAX G.hn Access Multiplexer User Manual

Configuration Management

The user can confirm that the setting is correct or save the setting. In relation to managing
these settings, the following are explained:.

 Check Configuration
 Save Configuration
 Reset Configuration
 Backup Configuration

Check Configuration

You can check the settings in each mode. The following command is used to check the
setting contents.

Command Description Mode


show running-config Show configuration Enable

show running-config interface IFNAME Show configuration


for specified interface

The following shows the configuration of interface xe1.

L10212XC# show run interface xe1

Building configuration...

interface xe1

switchport

bridge-group

switchport mode access

no shutdown

64
COAX G.hn Access Multiplexer User Manual

Save Configuration

After downloading a new system image via TFTP / FTP server, you must save the settings or
changes in the flash memory when you set up the equipment or change the settings. If you do
not save, any previous settings or changes will be lost when you turn off/on the device or
reboot. Use the following command to save the settings or changes to the flash memory.

Command Description Mode


write The settings you made and the changes you Enable
made are saved in the flash memory.

The following is an example of saving settings.

L10212XC# write

Building configuration...

[OK]

Warning If you save the settings using the above command, do not
input any key until the message [OK] is displayed.
W

Reset Configuration

You can delete individual settings one by one, but you can also go back to the factory default
settings. To initialize the settings, use the following command in Privileged mode.

Commadn Description Mode


restore factory-defaults Reset the settings. Enable

Warning Be sure to reboot the machine after initializing the settings


using the "restore factory-defaults" command. It will not be
W initialized unless rebooting.

65
COAX G.hn Access Multiplexer User Manual

Backup Configuration

The user can back up the settings to the system before initializing and changing the settings.
To backup the settings, use the following command in Privileged mode.

Command Description Mode


copy running-config Backup configuration to file Enable
backup-config Filename

66
COAX G.hn Access Multiplexer User Manual

System Update

There are two memory locations (‘primary bank’, ‘secondary bank’) for storing software image
files. Only one image can be used at a time. ‘bank’ means the space where the file is stored. The
‘primary bank’ is the default storage space for the switch software image. ‘secondary bank’ is an
additional storage device for redundant or alternate switch software images.

update Command

This is the function of updating software. You can update an image file set in ‘primary’ or
‘secondary’ using FTP or TFTP. By default, the model of the device and the model of the image
file are checked and if the models do not match, the update is not possible.

If you use the 'active' option, the corresponding image file that has been updated since the
next boot will be used. With the 'no-model-check' option, the update is performed without
checking the model.

Command Description Mode


update tftp HOSTNAME Update using tftp. Enable
FILENAME (primary |
secondary) (active | )
(no-model-check | )
update ftp HOSTNAME Update using ftp. Enable
WORD WORD FILENAME
(primary | secondary)
(active | ) (no-model-
check | )

Example of Software update

First, the flash memory is inquired by ‘show flash’ command.

L10212XC# show flash

67
COAX G.hn Access Multiplexer User Manual

Space Total Used(%) Available(%)

---------------------------------------------------------------

Primary OS(ac) 33554432 23849496( 72%) 9704936( 28%) SWITCH releng-20170220

Secondary OS 33554432 23756769( 71%) 9797663( 29%) 1.1.2 R0021

Config 12447744 86016( 7%) 11689984( 93%)

Files 11624448 28672( 6%) 10969088( 94%)

---------------------------------------------------------------

Sum 91181056 47720953( 54%) 42161671( 46%)

Update ‘secondary bank’ with ‘active’ option through the following command.

L10212XC# update tftp 192.168.1.41 L10212XC-test.img secondary active

Jan 1 17:48:32 notice IMI : system update start

Transferring L10212XC-test.img using tftp protocol

L10212XC-test.img 100% |***********************************************************************| 23290k

0:00:00 ETA

Total 23849496 bytes received

Checking

Image Name: L10212XC 1.1.50 R0021

Created: Tue Jul 17 02:03:22 2018

Image Type: ARM Linux Multi-File Image (gzip compressed)

Data Size: 23849432 Bytes = 23290.46 kB = 22.74 MB

Load Address: 00008000

Entry Point: 00008000

Contents:

Image 0: 2179734 Bytes = 2128.65 kB = 2.08 MB

Image 1: 21669684 Bytes = 21161.80 kB = 20.67 MB

Updating secondary bank

68
COAX G.hn Access Multiplexer User Manual

.............Bank secondary updated

LN# 2 Jan 1 17:50:20 notice IMI : system update finish

When the update is completed, inquire the flash memory.

L10212XC# show flash

a: Active OS(OS to be executed next boot)

c: Current OS(Currently running OS)

Unit: Byte

Space Total Used(%) Available(%)

---------------------------------------------------------------

Primary OS(c) 33554432 23849496( 72%) 9704936( 28%) 1.1.50 R0021

Secondary OS(a) 33554432 23849496( 72%) 9704936( 28%) 1.1.50 R0021

Config 12447744 86016( 7%) 11689984( 93%)

Files 11624448 28672( 6%) 10969088( 94%)

---------------------------------------------------------------

Sum 91181056 47813680( 54%) 42068944( 46%)

upload Command

This is the function of uploading software. You can upload an image file set in ‘primary’ or
‘secondary’ using FTP or TFTP.

Command Description Mode


upload tftp HOSTNAME Upload using tftp. Enable
FILENAME (primary |
secondary)

69
COAX G.hn Access Multiplexer User Manual

upload ftp HOSTNAME Upload using ftp. Enable


WORD WORD FILENAME
(primary | secondary)

Example of Software upload

First, the flash memory is inquired by ‘show flash’ command.

L10212XC# show flash

a: Active OS(OS to be executed next boot)

c: Current OS(Currently running OS)

Unit: Byte

Space Total Used(%) Available(%)

---------------------------------------------------------------

Primary OS(ac) 33554432 23849496( 72%) 9704936( 28%) 1.1.50 R0021

Secondary OS 33554432 23756769( 71%) 9797663( 29%) 1.1.2 R0021

Config 12447744 86016( 7%) 11689984( 93%)

Files 11624448 28672( 6%) 10969088( 94%)

---------------------------------------------------------------

Sum 91181056 47720953( 54%) 42161671( 46%)

Upload the image file set in ‘primary’ to the file in HOST through the following command.

L10212XC# pload tftp 192.168.1.41 L10212XC-test.img primary

Uploading primary bank

Bank primary uploaded

Checking

Image Name: L10212XC 1.1.50 R0021

70
COAX G.hn Access Multiplexer User Manual

Created: Tue Jul 17 02:03:22 2018

Image Type: ARM Linux Multi-File Image (gzip compressed)

Data Size: 23849432 Bytes = 23290.46 kB = 22.74 MB

Load Address: 00008000

Entry Point: 00008000

Contents:

Image 0: 2179734 Bytes = 2128.65 kB = 2.08 MB

Image 1: 21669684 Bytes = 21161.80 kB = 20.67 MB

Transferring L10212XC-test.img using tftp protocol

L10212XC-test.img 100% |***********************************************************************| 23290k

0:00:00 ETA

Total 23849496 bytes sent

71
COAX G.hn Access Multiplexer User Manual

Reboot System

There are two methods of rebooting the system: manual system rebooting and automatic
system rebooting.

Manual System Reboot

After downloading a new system image from the TFTP / FTP server, you must reboot the
system. In addition, you may need to reboot the system again while setting up and managing
the device through a terminal program. To reboot the system, use the following command in
Privilege Exec Enable mode.

Command Description Mode


reboot Reboot the system. Enable

Warning If you reboot the system, the settings you have not saved will
be erased. Be sure to save the settings before rebooting the
W system.

If the changes of setting are not saved with "write" command, reboot confirm message will
be shown. If you want to reboot, type "y". To save the settings, type "n" and save.

The following message is displayed when you reboot without saving changes.

L10212XC# reboot

reboot system? (y/n): y

save running config? (y/n):

Automatic System Reboot

This unit automatically reboots the system according to the conditions set by the user. The
criteria for rebooting the system are as follows.

 CPU: The system reboots when the CPU usage lasts for the time set above the
specified value (high).

72
COAX G.hn Access Multiplexer User Manual

 Memory: Memory It will automatically reboot when the usage continues for the time
set above the specified value (high).
 Network monitor: Periodically check the IP connection status with the host (default,
gateway), and if the number of failures exceeds the number of consecutive counts, the
system reboots.
 CPU-Network: System will reboot when CPU usage and network monitor are met
simultaneously.
 Force reboot: It is the function to reboot the equipment at a specific time (year,
month, day, hour).
 Process monitor: The ability to reboot the system if certain processes terminate. At the
end of any other critical process, only the terminated process is restarted.

It also provides the following additional features.

 Reset count: If the unit exceed the number of reboots (default 5 times) for 24 hours
under each condition, the unit will not be rebooted anymore. The cumulative number
of reboots is reset to 0 at 00:00 every day.
 Reboot time setting : Even if the set condition is satisfied, it provides a function to
reboot at specified time.
 Dump function: It provides a function to dump a packet with tcpdump before rebooting
and store it in nonvolatile flash memory.
 Action Setting function: If the given condition is met, you can set to save only the
alarm log instead of rebooting.

The following commands are used to set the automatic system reboot function.

Command Description Mode


auto-reset enable Enable / disable auto recovery. Even if other line item Config
function is set, the automatic reboot function does not
work if disabled
auto-reset delay- When activating the auto recovery function, do not Config
time <1-100> check the condition immediately, but after the set
time.
auto-reset reset- The function to reboot within the set number of times
count <1-100> within 24 hours. Do not reboot when the number of
times is exceeded.

73
COAX G.hn Access Multiplexer User Manual

auto-reset clear Initializes the number of reboots accumulated for Config


current-count every 24 hours by condition to 0.
auto-reset action Set whether to reboot when the condition is satisfied config
(reboot|alert) or save only the alarm log. (except for force-reboot)
auto-reset poll-time Set condition check polling interval. Config
<1-100>
auto-reset Reboot if cpu / memory usage lasts for more than high Config
(cpu|memory) time.
threshold high <0- If it goes below the low value, it initializes the number
100> low <0-100> of reboots to zero.
time <1-3600> (at Provides an option to reboot in HH:MM time
HH:MM)
auto-reset network- Perform an ICMP connection check at an interval Config
monitor interval interval to the parent server (target-ip). Rebooting will
<10-86400> count be performed if the count exceeds the count value.
<1-60> (at HH:MM) Provides an option to reboot in HH:MM time
auto-reset network- Set the IP address of the remote device for network Config
monitor target-ip monitor. (If not set, use default gateway IP)
A.B.C.D
auto-reset cpu- If the cpu utilization continues above the high value Config
network cpu for a time period, and the cpu-network network setting
threshold high <0- is satisfied, reboot.
100> low <0-100> If it goes below the low value, it initializes the number
time <1-3600> of reboots to zero.
auto-reset cpu- Check the ICMP connection to the parent server Config
network network- (target-ip) at interval intervals. Rebooting will be
monitor interval performed if the count exceeds the count value.
<10-86400> count HH: Provides an option to reboot in MM time.
<1-60>
auto-reset cpu- Set the IP address of the remote device for network Config
network network- monitor. (If not set, use default gateway IP)
monitor target-ip
A.B.C.D
auto-reset cpu- Set the reboot time HH: MM for cpu-network. Config
network at (HH:MM)

74
COAX G.hn Access Multiplexer User Manual

auto-reset force- Reboot the device unconditionally at the set time. Config
reboot at <1-31> Date:1~31
(jan|feb|mar…) Month:jan,feb,mar,apr,may,jun,jul,aug,sep,oct,nov,dec
<1993-2035> Year:1993~2035, Hour(HH), Min(MM), Sec(SS)
HH:MM:SS
auto-reset process- Set the process monitor function. Config
monitor (at HH:MM) Provides an option to reboot in HH:MM time.
no auto-reset delay- Remove the auto-reset delay-time setting. Config
time
no auto-reset Remove the cpu / memory threshold setting. Config
(cpu|memory)
threshold
no auto-reset Delete the network-monitor function. Config
network-monitor
no auto-reset Delete the network-monitor target-ip configuration. Config
network-monitor
target-ip
no auto-reset cpu- Remove the cpu-network cpu threshold setting. Config
network cpu
threshold
no auto-reset cpu- Delete the cpu-network network-monitor feature. Config
network network-
monitor
no auto-reset cpu- cpu-network Delete the network-monitor target-ip Config
network network- configuration.
monitor target-ip
no auto-reset cpu- Delete the ‘auto-reset cpu-network at’ setting. Config
network at
no auto-reset force- Delete the Force-reboot feature. Config
reboot
no auto-reset poll- Delete the polling time setting. Config
time
no auto-reset Remove the process monitor function. Config
process-monitor
no auto-reset reset- Reset the reset count setting to the default value (5). Config

75
COAX G.hn Access Multiplexer User Manual

count
no auto-reset action Initializes the Action setting to default reboot. Config

You can check the automatic system recovery settings with the following command.

Command Description Mode


show auto-reset Check the Auto Recovery feature. Enable
status

The following shows a case where the memory is set to reboot when the memory usage
exceeds 90% for 100 seconds.

L10212XC# conf t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# auto-reset enable

L10212XC(config)# auto-reset memory threshold high 90 low 50 time 5

L10212XC# show auto-reset status

=====================================================================

===========

Auto Reset : enable

action : reboot

polling second : 10

limit reset-count :5

force-reboot : disable

network-monitor target : 123.1.1.1

=====================================================================

===========

function | enable | configuration

--------------------------------------------------------------------------------

process | no

--------------------------------------------------------------------------------

76
COAX G.hn Access Multiplexer User Manual

cpu-network | no

--------------------------------------------------------------------------------

cpu | no

--------------------------------------------------------------------------------

memory | yes | threshold high : 90

| threshold low : 50

| time(duration) :5

| reserved reload time : immediate

| reset-count :0

(Skip)

77
COAX G.hn Access Multiplexer User Manual

NTP/Clock Setting

NTP Introduction

NTP (Network Time Protocol) is used to synchronize system time through network. The NTP
operates on UDP (User Datagram Protocol), and all messages from the NTP has same time
information using UTC (Coordinated Universal Time) that is same as Greenwich Mean Time.

Inform The NTP may not be provided depending on OS version.

NTP client mode Setting

The EoC GAM operates in NTP Client Mode by using the following command in the Global
Setting Mode.

Command Description Mode

ntp server WORD It sets NTP server (Maximum 5 servers). Config


(minpoll <3-6>| You can set the poll interval.
maxpoll <10-17>)
no ntp server WORD Unset the NTP server. Config

L10212XC(config)# ntp server 1.1.1.11

NTP Server mode Setting

The EoC GAM operates in NTP Server Mode by using the following command in the Global
Setting Mode.

Command Description Mode

ntp master <1~15> It sets to operate as NTP master. Config

78
COAX G.hn Access Multiplexer User Manual

<1-15> : Stratum number

no ntp master Disable the NTP master. Config

L10212XC(config)# ntp master 3

NTP Lookup

명령어 설명 모드

show ntp View the NTP settings. Enable

show ntp status View the NTP status. Enable

show ntp Shows the status of NTP connections and the Enable
associations (|detail) status of all nodes being synchronized.

Clock Setting

명령어 설명 모드

Set the system date and time. Enable


clock WORD
WORD: [YYYY.] MM.DD-hh: mm [: ss]

show clock View the date and time of the system. Enable

L10224XH# show clock

Jan 13 2020 15:12:40(Mon) GMT+9

Clock summer-time Setting

Set the daylight saving time to automatically apply the changed time.

Command Description Mode

79
COAX G.hn Access Multiplexer User Manual

clock summer-time Config


dst date (<1-5>|first|last) It configure the summer-time (daylight saving
(sun|mon|tue...) time) offset. Starts daylight saving time in the
(jan|feb|mar...) preceding hours and turns off daylight savings
<2010-2037> HH:MM in the later hours.
(<1-5>|first|last) 1-5 : week of the month to start the summer-
(sun|mon|tue...) time offset.
(jan|feb|mar...) 1-1440 : daylight saving time offset (unit :
<2010-2037> HH:MM minute, default 60)
[<1-1440>]
clock summer-time dst It configure the summer-time (daylight saving config
recurring (<1-5>|first|last) time) offset every year. Starts daylight saving
(sun|mon|tue...) time in the preceding hours and turns off
(jan|feb|mar...) HH:MM daylight savings in the later hours.
(<1-5>|first|last) 1-5 : week of the month to start the summer-
(sun|mon|tue...) time offset.
(jan|feb|mar...) HH:MM 1-1440 : daylight saving time offset (unit :
[<1-1440>] minute, default 60)
It configure the summer-time (daylight saving config
time) offset every year using pre-defined data.
clock summer-time dst
eu : last sunday in March ~ last sunday in
recurring (eu|usa)
October
[<1-1440>]
usa : second sunday in March ~ first sunday in
November
config
no clock summer-time It remove the summer-time configuation.

Enable
show clock summer-time It display current summer-time information.

L11206XC(config)# clock summer-time dst recurring usa

L11206XC(config)# end

L11206XC# show clock summer-time

Summertime : enabled.

80
COAX G.hn Access Multiplexer User Manual

Recurring every year.(United States)

Begins at second sun mar 02:00

Ends at first sun nov 02:00

Offset is 60 minutes

Clock time zone Setting

It sets different timezone according to region, and displays the exact local time.

Command Description Mode


It displays current time that adds the setting time to Config
timezone TZ
the UTC (Coordinated Universal Time).
It displays current timezone and possible Timezone Config
show timezone
to be setup.

L10212XC(config)# timezone gmt+9

L10212XC(config)# end

L10212XC# show timezone

% current timezone : GMT+9

81
COAX G.hn Access Multiplexer User Manual

Storm Control

Storm Control is used to control Network Time Out occurred when a large volume of broadcast
packets is transmitted on the network. In other words, the Storm Control prevents excessive
amount of broadcast packets (traffic) from entering into the system.

Broadcast Storm is an event that subnet is flooded with broadcast/ multicast packets and
network performance is degraded with the excessive traffic. Errors occurred when realizing
Protocol Stack as well as when configuring network can be causes of the Broadcast Storm.

By using commands introduced in table, user can measure the quantity of broadcast packets
at input port, and dump the broadcast packets (traffic) more than the threshold after comparing
with specified threshold.

Command Description Mode


storm-control Set Strom-control(Broadcast/Registered Interface
{broadcast | dlf | Multicast / Unregistered Multicast/DLF / dhcp-
multicast-registered | request) Rate
multicast-unregistered}
rate
<1-1000000>
no storm-control Clear Strom-control(Broadcast/Registered Interface
{broadcast | dlf Multicast / Unregistered Multicast/DLF / dhcp-
multicast-registered | request) Rate
multicast-unregistered}

L10212XC(config)# interface xe1


L10212XC(config-if-xe1)# storm-control broadcast rate 400000
L10212XC(config-if-xe1)# no storm-control broadcast

82
COAX G.hn Access Multiplexer User Manual

Port mirroring

Port Mirroring is to monitor input/output traffic at specified port (source port) after copying it
to the user defined destination port. EoC GAM is able to mirror each Rx/ Tx traffic from multiple
source ports to a single destination port. EoC GAM can mirror eight ports of 1 GE to a port of 10
GE (XG port) as well as couple with IDS. However, it does not support for two ports of 10 GE as
destination ports at the same time.

Command Description Mode


mirror interface ifname It designates a port (source port) for input/ Interface
direction output ports to be mirrored.
{both/receive/transmit}
no mirror interface ifname It cancels Port Mirroring. Interface

L10212XC(config)# interface ghn1


L10212XC(config-if)# mirror interface ghn2 direction both

83
COAX G.hn Access Multiplexer User Manual

Set Frame Size

EoC GAM is able to transmit and receive bigger size of frame than the maximum size 1522
bytes defined in 802.1Q. The jumbo frame must be applied to all ports requiring it to transmit
and receive. The jumbo frame may not be supported for some transmitter. Maximum 9216
bytes is available for MTU.

Command Description Mode


mtu <68-9216> It sets frame size. Interface

L10212XC(config)# interface ghn1

L10212XC(config-if-ghn)# mtu 1522

84
COAX G.hn Access Multiplexer User Manual

Loop detect function

Once a loop is created on a network, it generates explosive traffic growth resulting in bad
network impossible to work. Although STP protocol prevents the loop from being created, since
the STP protocol is not used in many networks, additional functions to check the loop creation is
useful.

Command Description Mode


[no] loop-detect It activates/ deactivates a function of Loop- Config
Detect.
loop-detect clear-counters It initializes statistical information. Config
loop-detect probe-interval It sets Probe-Interval value. Config
<5-1000>
loop-detect restore-interval It sets Restore Interval value. Config
<5-1000>
loop-detect withstp It operates combining with STP. Config
[no] loop-detect disable It activates or deactivates the function of Interface
Loop-Detect at the corresponding interface.
loop-detect restore It sets to recover the blocked port. Interface
show loop-detect It checks information about Loop-Detect. Enable

L10212XC(config)# loop-detect

L10212XC(config)# loop-detect clear-counters

L10212XC(config)# loop-detect probe-interval 20

L10212XC(config)# loop-detect restore-interval 100

L10212XC(config)# end

L10212XC# show loop-dect

port admin loop-state loop-count tx rx

--------------------------------------------------------

xe1 Enable 0 0 0

xe2 Enable 0 0 0

ghn1 Enable 0 0 0

85
COAX G.hn Access Multiplexer User Manual

ghn2 Enable 0 0 0

ghn3 Enable 0 0 0

ghn4 Enable 0 0 0

ghn5 Enable 0 0 0

ghn6 Enable 0 0 0

(Skip)

86
COAX G.hn Access Multiplexer User Manual

CPU flood guard function

If a certain packet (broadcast / multicast / ICMP / TCP / UDP) destined for the CPU on the port
exceeds pps set, protect the CPU by notifying the information or blocking the source IP or MAC
address of the packet for a certain period of time.

Command Description Mode


cpu-flood-guard If the Multicast and Broadcast packets Interface
{multicast | broadcast} exceed pps, the selected action is
pps <1-1000000> performed for a period of time.
period <1-86400> alert ::= Notifies log (default)
{|alert|protect|shutdown} protect ::= Block that packet
shutdown ::= Block that port
cpu-flood-guard ip If the ICMP and TCP,UDP packets exceed Interface
{icmp | tcp | udp} pps, the selected action is performed for
pps <1-1000000> a period of time.
period <1-86400> alert ::= Notifies log (default)
{|alert|protect|shutdown} protect ::= Block that packet
shutdown ::= Block that port
cpu-flood-guard Changes the action taken when Multicast Interface
{multicast | broadcast} action and Broadcast packets exceed the pps
{alert|protect|shutdown} set.
cpu-flood-guard ip Changes the action taken when ICMP Interface
{icmp|udp|tcp} and TCP,UDP packets exceed the pps
action set.
{alert|protect|shutdown}
no cpu-flood-guard Disable CPU flood guard on Multicast and Interface
(multicast|broadcast) Broadcast packets.
no cpu-flood-guard ip Disable CPU flood guard for ICMP, TCP Interface
(icmp|udp|tcp) and UDP packets.
show cpu-flood-guard status Show the current status of Multicast and Enable
{multicast|broadcast|IFNAME } Broadcast packets exceeding the set pps.
{|IFNAME} IFNAME ::= show only information on
that port

87
COAX G.hn Access Multiplexer User Manual

show cpu-flood-guard status ip Show the current status of ICMP and Enable
{icmp|udp|tcp|IFNAME } TCP,UDP packets exceeding the set pps.
{|IFNAME} IFNAME ::= show only information on
that port
show cpu-flood-guard config Refer to current setting information Enable
{|IFNAME} IFNAME ::= show only information on
that

L10206XC(config)# interface xe2


L10206XC(config-if-xe2)# cpu-flood-guard multicast pps 1000 period 100 protect
L10206XC(config-if-xe2)# end
L10206XC# show cpu-flood-guard config

Interface Mode PPS Period Action


--------- ---------- -------- -------- ---------
xe2 multicast 1000 100 protect

L10206XC# show cpu-flood-guard status

Interface Mode Address Status Remain


--------- ---------- --------------- ---------- --------
xe2 multicast 0000.0000.0300 protect 69
total count: 1

88
COAX G.hn Access Multiplexer User Manual

MAC flood guard function

If a packet destined for the CPU in the port exceeds the pps set, it protects the CPU by informing
the information or blocking the source MAC address of the packet for a certain period of time.
The packets are classified by VLAN ID and source MAC address.

Command Description Mode


mac-flood-guard pps <1- If the packet exceeds pps, the set action is Interface
1000000> period <1-86400> performed for period time.
(|alert|protect|shutdown) alert :: = log output (defalut)
protect :: = block the packet
shutdown :: = shuts down the port
mac-flood-guard action Changes the action taken when a packet Interface
(alert|protect|shutdown) exceeds the set pps.
no mac-flood-guard Disable the MAC flood guard feature. Interface
show mac-flood-guard Shows the setting information currently set. Enable
config (|IFNAME) IFNAME :: = Show only the information for
that port.
show mac-flood-guard Shows the current status of packets Enable
status (|IFNAME) exceeding the set pps.
IFNAME :: = Show only the information for
that port.

Inform If the interface is shut down due to the 'mac-flood-guard pps'

i command, mac-flood-guard down will be displayed in the


'show ip interface brief' command. Also, the 'show running-
config' command displays 'no shutdown'.

L10212XC(config)# interface xe1

L10212XC(config-if-xe1)# mac-flood-guard pps 100 period 100

L10212XC(config-if-xe1)# end

L10212XC# show mac-flood-guard

89
COAX G.hn Access Multiplexer User Manual

bridge VLAN port mac fwd PPS Period Remain

------------ ------- ---------- -------------- --- ------- ------ ------

1 1 xe1 0000.c006.0102 0 100 100 77

90
COAX G.hn Access Multiplexer User Manual

Access Control List

A network manager can carefully control the traffic between networks using the Access Control
List. The manager can set up the security policy by obtaining basic statistical information of packet
transmissions state. In addition, the manager can protect the system from unauthenticated
access. The manager uses the access control list to accept or deny the packets transmitted
through routers, as well as to access of router through Telnet (vty) or SNMP.

Inform ACL may not be supported depending on OS version.

The access control list is classified into two types: standard IP access list and extended IP
access list. Numbers between 1 and 99 can be assigned to the standard IP access list, and
numbers between 100 and 199 to the extended IP access list.

Command Description Mode


access-list (<1-99>| Create a comment in the access list. Config
<100-199>|<1300-
1999>|
<2000-2699>|WORD)
remark LINE
access-list <1-99> It sets standard IP access list. Its sets only for source Config
(deny|permit) address address/ network.
address ::= (any | A.B.C.D wildcard | host A.B.C.D)
access-list <100-199> It sets extended IP access list for IP protocol. It sets Config
(deny|permit) ip both for Source address/network and for Destination
source-add wildcard address/network.
destination-add wildcard
access-list <1300- Provides an expanded range of access list <1-99>. Config
1999> (deny|permit)

91
COAX G.hn Access Multiplexer User Manual

source-add wildcard
destination-add wildcard
access-list <2000- Provides an expanded range of access list <100-199>. Config
2699> (deny|permit)
ip
source-add wildcard
destination-add wildcard
access-list WORD Set 'Prefix to match' using Zebos name-based access Config
(deny|permit) list.
A.B.C.D/M ( | exact- exact-match: Only works for exact matches of the
match) pefix.
access-list WORD Set up the Any source host using a Zebos name-based Config
(deny|permit) any access list.
no access-list <1-199> It deletes Access List. Config

Access List Creation Rules

 The Access List in a narrow range has a priority to be declared.


 The Access List that satisfies more conditions has a priority to be declared.
 “deny any” is declared by default except for the abnormal case that “permit any” is
assigned at the end of the Access List.
 Terms of the Access List can be declared on multiple lines. New filter is added at the
end of the list, and to add new filter between lines is not allowed.

Permission of Access from Specified Host

L10212XC# configure terminal

L10212XC(config)# access-list 1 permit host 192.168.0.3

L10212XC(config)# end

L10212XC# show running-config

access-list 1 permit host 192.168.0.3

92
COAX G.hn Access Multiplexer User Manual

93
COAX G.hn Access Multiplexer User Manual

MAC-FILTER

This function protects the network by preventing a specific MAC address from entering the port.

Command Description Mode


mac-filter cpu ( | port Blocks packets whose Source Mac address Config
(IFNAME| range IFNAME)) is the MAC address of the CPU.
mac-filter src-all-0 ( | port Blocks packets with Source Mac address 00: Config
(IFNAME| range IFNAME)) 00: 00: 00: 00: 00.
no mac-filter cpu ( | port Disable the ability to block packets whose Config
(IFNAME| range IFNAME)) source MAC address is the MAC address of
the CPU.
mac-filter src-all-0 ( | port Disable the ability to block packets with Config
(IFNAME| range IFNAME)) Source Mac address 00: 00: 00: 00: 00: 00

L10212XC(config)# mac-filter cpu port xe1

Jul 12 14:05:10 L10212XC user.info NSM[855]: % Set mac-filter cpu to xe1

L10212XC(config)# mac-filter src-all-0 port ghn1

Jul 12 14:05:52 L10212XC user.info NSM[855]: % Set mac-filter src-all-0 to ghn1

94
COAX G.hn Access Multiplexer User Manual

NETBIOS-FILTER and LLTD-FILTER

netbios-filter and lltd-filter are functions to block shared folders between ports. Blocks that
protocol and prevents information from the user's shared folder from being published or attacks
through that protocol.

Command Description Mode


netbios-filter port Set netbios-filter on the appropriate port. Config
(IFNAME| range IFNAME)
no netbios-filter port ( | Disable netbios-filter. Config
(IFNAME| range IFNAME))
lltd-filter port Set lltd-filter to the appropriate port. Config
(IFNAME| range IFNAME)
no lltd-filter port ( | Disable lltd-filter. Config
(IFNAME| range IFNAME))

L10212XC(config)# netbios-filter port xe1

Jan 28 04:05:33 info NSM : Set netbios-filter to xe1

L10212XC(config)# netbios-filter port ghn1

Jan 28 04:05:30 info NSM : Set netbios-filter to ghn1

95
COAX G.hn Access Multiplexer User Manual

DHCP-FILTER

The DHCP filter blocks unnecessary DHCP packets, preventing IP packets from unwanted or
moving subscriber packets to undesired locations. dhcp-discover-filter, also called dhcp-client-
filter, prevents client packets from entering the equipment. On the other hand, dhcp-offer-filter
is called dhcp-server-filter, which prevents server packets from entering the device.

Command Description Mode


dhcp-discover-filter Set the dhcp discover filter on the Interface
appropriate port.
dhcp-offer-filter Set the dhcp offer filter to the appropriate Interface
port.
no dhcp-discover-filter dhcp Disable the discover filter on the port. Interface
no dhcp-offer-filter dhcp terminate the offer filter to the Interface
appropriate port.
show dhcp-filter Show dhcp-filter configuration information. Enable

L10212XC(config)# interface range xe1,xe2

L10212XC(config-if-range)# dhcp-discover-filter

L10212XC(config-if-range)# exit

L10212XC(config)# interface range ghn1-ghn24

L10212XC(config-if-range)# dhcp-offer-filter

L10212XC# show dhcp-filter

--------+----------------+-------------+

Port | Discover Filter Offer Filter

--------+----------------+-------------+

xe1 enable disable

xe2 enable disable

ghn1 disable enable

96
COAX G.hn Access Multiplexer User Manual

ghn2 disable enable

ghn3 disable enable

ghn4 disable enable

ghn5 disable enable

ghn6 disable enable

(…)

97
COAX G.hn Access Multiplexer User Manual

IP MARTIAN FILTER

The ip martian filter prevents the ability to come in with the next Source IP. Packets coming in
with the following source IP addresses are likely to be unusual aggressive packets and should be
blocked.

Address block Present use

0.0.0.0/8 Equipment IP

10.0.0.0/8 Private IP

100.64.0.0/10 Carrier-grade NAT[

127.0.0.0/8 Loop-back IP

127.0.53.53 IP for alert Name conflict

169.254.0.0/16 Local IP

172.16.0.0/12 Private IP

192.0.0.0/24 IETF protocol

192.0.2.0/24 TEST-NET-1

192.168.0.0/16 Private IP

198.18.0.0/15 IP for network equipment benchmark testing

198.51.100.0/24 TEST-NET-2

203.0.113.0/24 TEST-NET-3

224.0.0.0/4 Multicast

240.0.0.0/4 Reserved Address

255.255.255.255/32 Broadcast

98
COAX G.hn Access Multiplexer User Manual

Command Description Mode


ip martian filter all Block if Source IP is Martian IP. Config
ip martian filter speical Block Martian IP except for this network, Config
multicast, private networks, local link and
loopback.
ip martian filter speical2 Block Martian IP except for this network, Config
multicast, local link
no ip martian filter Deactivate ip martian filter Config

Port Isolation

Port Isolation is a function that disconnects (isolated) direct communication between set ports.
If subscriber ports can communicate directly, neighbor nodes can be exposed to network
attacks and privacy breaches. The Port Isolation feature on the subscriber port allows the
subscriber to communicate only with the service port.
Command Description Mode
port-isolation { IFNAME | Activate “Port Isolation” funcion Config
range IF_RANGE }
no port-isolation { IFNAME Deactivate “Port Isolation” funcion Config
| range IF_RANGE }

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# port isolation ?

IFNAME Interface name

range Interface name or ranges

L10212XC(config)# port isolation range ghn1-ghn24

99
COAX G.hn Access Multiplexer User Manual

System Information Check

Command History Check

User is able to check the previously used commands using the command “show history”. When
rebooting the system, it is initialized.

Command Description Mode


show history Show command history Enable

L10212XC# show history

1 en

2 con t

3 ip multicast-routing

4 no ip multicast-routing

5 multicast-flood all

6 show running-config

7 multicast-flood none

8 show history

Boot Time Check

Command Description Mode


show uptime It checks time for booting. Enable

L10212XC# show uptime

[08:25:15] up 2 days, login 0

100
COAX G.hn Access Multiplexer User Manual

Image Version Check

Command Description Mode


show image [detail] It checks an image version. Enable

L10212XC# show image

[MBR information]

MBR state: synchronized

Current bank: primary

Active bank: primary

Bank count: 2

[Bank primary information]

SW version: H01.1.1 R0034

Created: Wed Feb 14 06:16:30 2018

Data Size: 23594630 Bytes = 23041.63 kB = 22.50 MB

[Bank secondary information]

SW version: H01.1.1 R0019

Created: Thu Oct 19 11:48:37 2017

Data Size: 23005131 Bytes = 22465.95 kB = 21.94 MB

Flash Memory Check

Command Description Mode


show flash Check Flash Memory. Enable

show flash-files Check the data area file of flash memory. Enable

L10212XC# show flash

a: Active OS(OS to be executed next boot)

101
COAX G.hn Access Multiplexer User Manual

c: Current OS(Currently running OS)

Unit: Byte

Space Total Used(%) Available(%)

---------------------------------------------------------------

Primary OS(ac) 33554432 23594694( 71%) 9959738( 29%) H01.1.1 R0034

Secondary OS 33554432 23003727( 69%) 10550705( 31%) H01.1.1 R0016

Config 11534336 5070848( 44%) 6463488( 56%)

Files 15728640 528384( 4%) 15200256( 96%)

---------------------------------------------------------------

Sum 94371840 52197653( 56%) 42174187( 44%)

L10212XC# show flash-files

Size Date Time Modified Name

---------- ------------------- ----

5728 2020/10/11 18:26:59 .ash_history

1749844 2020/10/18 19:27:31 co

1789952 2017/11/13 09:46:25 core.nsm

1785856 2000/02/22 14:02:19 core1.nsm

1802044 2020/10/18 19:26:47 cpe

9 2017/11/13 07:18:27 monitrc_recovery

1526 2017/11/13 04:38:34 tftp_backup

346 2020/10/18 19:01:11 tmp3

Total 8 files

1 config file

2 firmware files

11534336 bytes available, 4501504 bytes (39%) used

102
COAX G.hn Access Multiplexer User Manual

Command Description Mode


show cpu usage Show CPU usage. Enable

L10212XC# show cpu usage

-------------------------

Average CPU load

-------------------------

5 sec : 2.3%

1 min : 1.0%

5 min : 2.1%

-------------------------

cpuload threshold (high) : 70%

timer interval (high) : 60 sec

cpuload threshold (low) : 30%

timer interval (low) : 60 sec

Command Description Mode


show memory usage Show Memory Usage Enable

L10212XC# show memory usage

MemTotal: 515144 kB

103
COAX G.hn Access Multiplexer User Manual

MemFree: 327796 kB

Buffers: 700 kB

Cached: 21364 kB

SwapCached: 0 kB

Active: 64472 kB

Inactive: 17716 kB

Active(anon): 60280 kB

Inactive(anon): 136 kB

Active(file): 4192 kB

Inactive(file): 17580 kB

Unevictable: 0 kB

Mlocked: 0 kB

HighTotal: 0 kB

HighFree: 0 kB

LowTotal: 515144 kB

LowFree: 327796 kB

SwapTotal: 0 kB

SwapFree: 0 kB

Dirty: 0 kB

Writeback: 0 kB

AnonPages: 60092 kB

Mapped: 6924 kB

Shmem: 292 kB

Slab: 25992 kB

SReclaimable: 940 kB

SUnreclaim: 25052 kB

KernelStack: 624 kB

PageTables: 584 kB

104
COAX G.hn Access Multiplexer User Manual

NFS_Unstable: 0 kB

Bounce: 0 kB

WritebackTmp: 0 kB

CommitLimit: 257572 kB

Committed_AS: 92948 kB

VmallocTotal: 499712 kB

VmallocUsed: 103012 kB

VmallocChunk: 4190208 kB

515144K total, 187468K used, 327676K free, 63.61% available

Command Description Mode


show process Show Process Enable

L10212XC# show process

CPU: 0.0% usr 9.5% sys 0.0% nic 90.4% idle 0.0% io 0.0% irq 0.0% sirq

MEM: 187340K used, 327804K free, 0K shrd, 700K buff, 21368K cached

PID PPID USER STAT VSZ %VSZ CPU %CPU COMMAND

703 2 root DW 0 0.0 1 4.7 [cpssL2x]

1068 1 root S 63096 12.2 0 0.0 /usr/sbin/ghnd -d

873 1 root S 19464 3.7 0 0.0 /usr/sbin/sysmond -d

834 1 root S 5552 1.0 1 0.0 /usr/sbin/nsm -d

887 1 root S 4964 0.9 1 0.0 /usr/sbin/mstpd -d

31179 13198 root S 4660 0.9 1 0.0 -imish

105
COAX G.hn Access Multiplexer User Manual

31576 31179 root S 4660 0.9 0 0.0 -imish

13198 1 root S 4368 0.8 0 0.0 /bin/login -- admin

819 1 root S 3936 0.7 1 0.0 /usr/sbin/imi -d -f /data/conf lti

895 1 root S 3180 0.6 0 0.0 /usr/sbin/authd -d

1076 1 root S 3036 0.5 0 0.0 /usr/sbin/rmond -d

880 1 root S 3032 0.5 0 0.0 /usr/sbin/lacpd -d

1072 1 root S 3032 0.5 0 0.0 /usr/sbin/pppoeplusd -d

808 1 root S 3028 0.5 1 0.0 /usr/bin/ntpd -p /var/run/ntp.pid

829 1 root S 2996 0.5 1 0.0 /usr/sbin/alarmmanagerd -d

1130 1 root S 2832 0.5 1 0.0 /usr/sbin/vlogd -d

771 1 root S 2644 0.5 0 0.0 /usr/sbin/crond -c /etc/cron/cront

760 1 root S 2644 0.5 0 0.0 /sbin/syslogd -n -L -D -l 8 -r 7

763 1 root S 2644 0.5 0 0.0 /sbin/klogd -n

106
COAX G.hn Access Multiplexer User Manual

Tcpdump Setting

tcpdump is a function that dumps packet information of packets (eg, ARP, ICMP packet) that
are sent to the CPU, but not the packets that are switched out of packets coming in on a specific
port or VLAN interface, and output to the screen. If a special option is not used, it will dump all
packets to the CPU and set to output only the desired packets (eg IP address, Port number)
depending on the option. If you want to exit ‘tcpdump’ you can use [Ctrl] + [c].

Command Description Mode


tcpdump ( | Option) Enable the tcpdump. Enable

The available options are:

옵션 설명

interface IFNAME Set the interface to capture.


IFNAME: interface name
read WORD Read packets from file.
WORD: file name.
count <1-4294967295> Exit after receiving count packets.
write WORD Write the raw packets to file rather than parsing and
printing them out.
WORD: file name
ascii Print each packet in ASCII.
header Print the link-level header on each dump line.
no-name Don't convert addresses to names.
no-domain Don't print domain name qualification of host names.
quick Print less protocol information so output lines are shorter.
verbose <1-3> Produce verbose output.
data-hex Print the data of each packet in hex.
data-header-hex Print the data of each packet, including its link level header,
in hex.
data-hex-ascii Print the data of each packet in hex and ASCII.

107
COAX G.hn Access Multiplexer User Manual

data-header-hex-ascii Print the data of each packet, including its link level header,
in hex and ASCII.
expression LINE Select which packets will be dumped.

The main packet types used by expression are as follows.

 arp : Monitor only ARP packet


 bpdu : Monitor only Layer2 BPDU packet
 ether : Monitor only ethernet frame
 icmp : Monitor only ICMP packet
 igmp : Monitor only IGMP packet
 ip : Monitor only IP
 pim : Monitor only PIM packet
 rarp : Monitor only RARP packet
 tcp : Monitor only TCP
 udp : Monitor only UDP packet

108
COAX G.hn Access Multiplexer User Manual

ARP

ARP

ARP (Address Resolution Protocol) refers to the protocol used to map an IP address to a physical
network address on the network. That is, the MAC address of the peer port to go to the destination
through the information of the ARP-table is checked and the traffic is forwarded.

Static ARP-table

This command can bind “specific ip address with mac address” to ARP-table.

Command Description Mode


arp ip-address mac- Set a static ARP entry in the ARP table. Config
address L3_IFNAME
L2_IFNAME

L10212XC(config)# arp 10.1.1.1 0000.1010.0101 vlan1 xe1

ARP-table ageing time configuration

This command sets or disables the amount of time non-static information stays on the arp-
table.

109
COAX G.hn Access Multiplexer User Manual

Command Description Mode


arp-ageing-timeout Set a ageing time for arp information in ARP table. Interface
<20-3000>
arp-ageing-timeout Disable ageing time for arp information in ARP table. Interface
disable

Show ARP

Ths Show Arp command is used to check the information in the ARP table.

Command Description Mode

show arp Show ARP table entries. Enable


(|interface Only specific interface or vlan information can be
IFNAME | vlan output.
<1-4094>)

L10212XC# show arp

IP Address MAC Address L3_Intf L2_Intf timeout Type

--------------- --------------- -------- -------- ------- ---------

10.1.1.1 0000.1010.0101 vlan1 xe1 static

arp entry count : 1

110
COAX G.hn Access Multiplexer User Manual

ARP Proxy Configuration

In an environment with different LAN subnets, if any host sends an ARP request, the other LAN
subnet will not respond. To resolve this situation, using the ARP proxy function can be responded
to ARP-request in case of different LAN.

Command Description Mode


ip proxy-arp Change to ARP-Proxy-enable on the Interface
interface

L10212XC(config)# interface vlan1

L10212XC(config-if-vlan1)# ip proxy-arp

111
COAX G.hn Access Multiplexer User Manual

ARP Inspection

Since ARP packets are used to look up MAC addresses through IP addresses, you can trust all
hosts on the network. Because of this low security, it is also easy to forge the packets on the
network. To increase the security of the forged-ARP packets, All ARP packets are sent to the
CPU, and it is possible to remove the forged-ARP packets to avoid interrupting the network
communication. This feature is called “ARP Inspection”. To enable the ARP Inspection feature,
you must enable this feature and set the policy for ARP packets.

When setting Arp inspection enable, check the items below.


(Excluded from checking when setting trust port)

- frame header SMAC equal to arp body SMAC

- [reply only] frame header DMAC euqal to arp body DMAC

- sender ip invalid: 0.0.0.0, 255.255.255.255


[reply only] target ip invalid: 0.0.0.0, 255.255.255.255

ARP Inspection Activation

Arp inspection activation must be enabled on the Vlan interface to be used

Warning When the command can be enabled, All ARP packet can be
blocked without static-ARP entries
W
Inform Use the 'arp inspection filter' command to create and

i configure 'arp access-list' which allows dhcp-snoop table to


be referenced and allowed.

Command Description Mode


[no] ip arp inspection Arp inspection enable globally Config
[no] arp access-list Define arp access-list to be set to Filter. Config

- permit dhcp-snooping -> allow arp

112
COAX G.hn Access Multiplexer User Manual

if it is in the dhcp snoop table.

- Use the 'permit ip' command to set


ip permit

- Use the 'deny ip' command to set


ip deny
deny has a higher priority than permit
[no] arp inspection enable Enable ARP inspection per VLAN Interface
[no] arp inspection trust Configure Trust port (exclude ARP Interface
inspection)
[no] arp inspection filter Assign arp access-list to Inspection Interface
NAME enabled vlan
show ip arp inspection Show current-configured ARP inspection Enable
envrinments
show ip arp inspection trust Show port information set by arp Enable
inspection trust.

L10212XC(config)# ip arp inspection


L10212XC(config)# int vlan1
L10212XC(config-if-vlan1)# arp inspection enable
L10212XC(config-if-vlan1)# interface xe1
L10212XC(config-if-xe1)# arp inspection trust
L10212XC(config-if-xe1)# end
L10212XC# show ip arp inspection
Dynamic ARP inspection enabled.

interface enable filter trust-port


--------------- -------- -------------------- ----------
xe1 - trust
vlan1 enabled -

ARP access-list

Create an access-list used for the Arp inspection filter function. You can set policies for specific
networks in the access-list you create. In addition, you can set the dhcp-snoop table reference
and permit per access-list created.

113
COAX G.hn Access Multiplexer User Manual

Command Description Mode


arp access-list NAME Create a arp access-list. Config
no arp access-list NAME Delete a arp access-list. Config
permit dhcp-snooping Allow dhcp-snoop talbe references. arp-inspection-acl
permit ip Set permit access-list information. arp-inspection-acl
(A.B.C.D| A.B.C.D/M|any)
mac (MAC|any) MAC ::= HHHH.HHHH.HHHH
deny ip Set deny access-list information. arp-inspection-acl
(A.B.C.D| A.B.C.D/M|any)
mac (MAC|any) MAC ::= HHHH.HHHH.HHHH
no permit dhcp-snooping Disable dhcp-snoop table arp-inspection-acl
references.
no (deny|permit) ip Delete specific information set in arp-inspection-acl
(A.B.C.D| A.B.C.D/M|any) access-list
mac (MAC|any) MAC ::= HHHH.HHHH.HHHH
show arp access-list [NAME] show current information set in arp Enable
access-list.

Inspection log management

ARP inspection log command can store logs of blocked items by ARP inspection. In case of ARP
attacks, there can be huge logs. To protect huge-log case, the command can minimize the logs
with buffered logs. The operation scheme is the followings.

During specific intervals, the command prints with specific count. And more if same blocked
can be in the buffer, only increase packet count

Command Description Mode


ip arp inspection log Enable or Disable ARP Inspection Config
(enable|disable) log command
ip arp inspection log buffer- Config
Configure log buffer count
count <100-1000>
ip arp inspection log interval Configure log interval-valuie and Config
<0-1000> count <1-5> count-value

114
COAX G.hn Access Multiplexer User Manual

no ip arp inspection log Config


Initialze the log buffer
buffer-count
no ip arp inspection log Initialize the log-interval and count- Config
interval value
show ip arp inspection log Dispay current ARP inspection log Enable
status
show ip arp inspection log Enable
Show log list in the log buffer
buffer
clear ip arp inspection log Enable
Delete log list in the log buffer
buffer

In the following example, we have set up to enable arp inspection log with “buffer-count 200”
and “store 4 logs every 5 seconds”.

L10212XC(config)# ip arp inspection log enable


L10212XC(config)# ip arp inspection log buffer-count 200
L10212XC(config)# ip arp inspection log interval 5 count 4
L10212XC(config)# end
L10212XC# show ip arp inspection log
Dynamic ARP inspection log enabled.

log buffer-count : 200


log interval : 5 count :4
L10212XC# show ip arp inspection log buffer

vlanIf op sendip targetip drop-reason pkts reg-time


l2if srcmac dstmac
------- ----- --------------- --------------- ---------------- ---- --------
vlan1 req 169.254.196.151 169.254.196.151 search-fail 3 9
xe2 0022.57a7.c497 0000.0000.0000
vlan1 req 192.168.1.1 192.168.1.174 search-fail 3 10
xe2 0cc4.7a72.28d8 0000.0000.0000
vlan1 req 192.168.1.11 192.168.1.23 search-fail 9 16
xe2 408d.5c71.af43 0000.0000.0000
vlan1 req 192.168.1.11 192.168.1.193 search-fail 1 3
xe2 408d.5c71.af43 0000.0000.0000
vlan1 req 192.168.1.55 192.168.1.84 search-fail 6 3
xe2 0024.e8fb.6260 0000.0000.0000
vlan1 req 192.168.1.55 192.168.1.183 search-fail 11 0

115
COAX G.hn Access Multiplexer User Manual

……
Total Count: 12

116
COAX G.hn Access Multiplexer User Manual

PPPOE+

PPPoE+

Point-to-Point Protocol over Ethernet Plus (PPPoE +) is a protocol that performs the PPP
protocol in an Ethernet environment. When the user accesses the Internet in PPPoE + mode, this
device can combine “user port information” to PPPoE + search packet for user authentication and
report it to BRAS and bind the user account and circuit-id through this.

PPPoE+ Configuration

Enable PPPoE + function on the device and port.


Command Description Mode
pppoeplus enable Activate PPPoE+ features config

pppoeplus enable Activate PPPoE+ on the specific interface. Interface

no pppoeplus enable Disable PPPoE+ features config

no pppoeplus enable Disable PPPoE+ on the specific interface. Interface

PPPoE+ Trust Setting

By default, all ports are set to Untrust. Blocks forwarding PPPoE packets when Untrust. The
port where the PPPoE server is located needs to be set to Trust. With the above settings, client
packets can be forwarded to the server and a session can be established with each other.

117
COAX G.hn Access Multiplexer User Manual

Command Description Mode


pppoeplus trust Set the specific interface to the port to which PPPoE Interface
+ server is connected.
no pppoeplus trust Unset the specific interface to the port to which Interface
PPPoE + server is connected.

PPPoE+ Option82

The PPPoE + feature adds an Option 82 field to incoming packets from the client. The Option
82 field consists of Remote ID and Circuit ID. Remote Id indicates the information of the device
(Ex: IP address set in the device), and Circuit ID shows information identifying the interface or
port. PPPoE + adds this information to packets to help secure your server.

Circuit ID is set in several ways, with following priorities.


1. Set Manually Circuit ID
2. Identifier-string
3. Access Node ID eth PORT_NUM

- Circuit ID Command
Command Description Mode
pppoeplus circuit-id Set the Circuit ID for this port. Interface
LINE
no pppoeplus circuit- Unset the Circuit ID for this port. Interface
id
pppoeplus identifier- Set Identifier String among PPPoE Circuit ID Config
string WORD option generation rules.

{sp|sv|pv|spv}
delimiter
{#|.|,|;|/}
no pppoeplus Unset the Identifier String. Config
identifier-string
pppoeplus access- Set Access Node ID information among PPPoE Circuit Config
node-id WORD ID generation rules. (Default: MGMT Port IP)

118
COAX G.hn Access Multiplexer User Manual

no pppoeplus access- Set the Access Node ID information to default value Config
node-id (MGMT Port IP) among the PPPoE Circuit ID
generation rules.

- Remote ID Command
Command Description Mode
pppoeplus remote-id Set Remote ID on the this port. Interface
LINE
no pppoeplus Unset Remote ID on the this port. Interface
remote-id

- Other command
Command Description Mode
pppoeplus Command to remove the Option82 field of the PPPoE Interface
strip-vendor-tag Server packet from that port

no pppoeplus Disable command to remove Option82 field of PPPoE Interface


strip-vendor-tag Server packets coming from that port

Show PPPoE+

View the PPPoE + settings and PPPoE session information set on the device.
Command Description Mode
show pppoeplus info Show PPPoE+ configuration information Enable

show pppoeplus Show PPPoE+ session information Enable


session

PPPoE+ Setting Examples

Following example is set the PPPoE+ packet to pass user port informaion for PPPoE+ user
authenticaion.
 Activate PPPoE+ features.
 Defines Identifier-string options.
 Activate PPPoE+ features and bind a specific interface to PPPoE+ server-connected
port xe1.

119
COAX G.hn Access Multiplexer User Manual

 Activate PPPoE+ features port xe2.

L10212XC(config)# pppoeplus enable

L10212XC(config)# pppoeplus identifier-string test option spv delimiter .

L10212XC(config)# interface xe1

L10212XC(config-if)# pppoeplus enable

L10212XC(config-if)# pppoeplus trust

L10212XC(config-if)# exit

L10212XC(config)# interface xe2

L10212XC(config-if)# pppoeplus enable

L10212XC(config-if)# exit

120
COAX G.hn Access Multiplexer User Manual

VLAN

Introduction to VLAN

The LAN classified as a logical LAN is called VLAN (Virtual Local Area Network). A network
consists of VLANs transmits and receives packets only between ports in a VLAN. Communication
between ports in different VLANs can be supported by “routing features in the system”. VLAN
enhances “packet-transfer-performance” by reducing “repetive ethernet traffic” and strengthens
security by transmitting divided traffic into VLAN unit.

There are several configuration methods of VLAN: Port-based VLAN in port unit, MAC address-
based VLAN, and protocol-based VLAN. EoC GAM supports for the port-based VLAN.

The default VLAN set to a switch has following characteristics:

 Default VLAN uses “1” as a value of VLANid.


 Default VLAN does not use a tag
 Default VLAN set to all ports of an initialized switch is native VLAN.

121
COAX G.hn Access Multiplexer User Manual

Native VLAN

Each physical port has a PVID (Port VLAN ID). Each 802.1Q port uses its native VLAN ID as a
PVID. Each frame without a tag is sent to VLAN where PVID indicates. When a port receives a
frame with a tag, it uses the tag. However, if a port receives a frame without a tag, it uses PVID
belonged to the frame as a tag.

Infrom Default native VLAN is set to “1”. If user wants to change the
default value, it must be same as the default VLAN of
i connected device to prevent from looping as well as
unsynchronizing in LACP

122
COAX G.hn Access Multiplexer User Manual

VLAN Setting

To manage a VLAN, user must declare and create a new VLAN in VLAN Database mode at first.
The name of declared VLAN can be assigned by name option and if the name is not assigned,
“vlanid” is used as its name by default.

Command for VLAN Settings

Command Description Mode


vlan <2-4094> {mtu It creates, changes values of VLAN. Vlan
MTU_VAL (bridge <1-32> MTU_VAL range is 1 to 4294967295 (default 1500) database
|) | (bridge <1-32>|)
(name WORD|)}
no vlan <2-4094> Remove the value of the VLAN. Vlan
(mtu|) (bridge <1- database
32>|)
[no] vlan vlanid It creates, remove values of multiple VLAN. Vlan
database

no shutdown activated the created-VLAN Interface


Normally the created VLAN is defaut value with
‘‘shutdown status”

Command for Switch Port Settings

The port is set to access mod VLAN 1 by default. To configure a different setting from VLAN,
set it in interface mode.

The ingress-filter option can be set when changing the VLAN type (default Enable). If ingress
filtering is enabled and a port receives frames tagged for VLANs for which it is not a member,
these frames will be discarded. If ingress filtering is disabled and a port receives frames tagged
for VLANs for which it is not a member, these frames will be flooded to all other ports (except for
those VLANs explicitly forbidden on this port).

123
COAX G.hn Access Multiplexer User Manual

Command Description Mode


switchport mode access Access: It sets a port to Access Mode (Port-based Interface
(ingress-filter VLAN). The port set to Access Mode operates as a
{enable|disable}|) single VLAN Interface that transmits and receives
untagged frame.
switchport mode trunk Trunk: It sets a port to Trunk Mode. The port set Interface
(ingress-filter to Trunk Mode transmits and receives only tagged
{enable|disable}|) frame. The untagged frame can be handled
through default VLAN of port.
switchport mode hybrid Hybrid: It sets a port to Hybrid Mode. The port set Interface
(ingress-filter to Hybrid Mode handles both of tagged frame and
{enable|disable}| untagged frame.
acceptable-frame-type acceptable-frame: When set to receive all frame
{all|vlan-tagged}|) types, any received frames that are untagged are
assigned to the default VLAN.
switchport access It sets a port to Access Mode of VLAN. Interface
vlan <1-4094> The port set to Access Mode operates as a member
port of VLAN.
switchport trunk It sets a switch port to Trunk Mode of VLAN. Interface
allowed vlan
{(add|except|remove)
vlanid | (all|none)}
switchport trunk If a port is 802.1Q Trunk Mode, that is Trunk port Interface
native {vlanid |none} of tagged VLAN, it sets native VLAN for the traffic
without tag that transmits and receives.
If user does not set the native VLAN, the default
VLAN(VLANid = 1) is set as a native VLAN.
switchport hybrid It sets whether to tag or untag the frame to be Interface
allowed vlan add vlanid transmitted at a switch port in Hybrid Mode.

switchport hybrid vlan It sets a switch port to Hybrid Mode of VLAN. Interface
vlanid

Examples of VLAN Setting

124
COAX G.hn Access Multiplexer User Manual

Following example code creates VLAN ID 1000 and assigns IP address 132.150.120.1 to VLAN
and “ghn port 1” and “ghn port 2” to this created VLAN.

L10212XC(config)# vlan database

L10212XC(config-vlan)# vlan 1000

L10212XC(config-vlan)# exit

L10212XC(config)# interface vlan1000

L10212XC(config-if)# no shutdown

L10212XC(config-if)# ip add 132.150.120.1/24

L10212XC(config-if)# exit

L10212XC(config)# interface ghn1

L10212XC(config-if)# switchport mode access

L10212XC(config-if)# switchport access vlan 1000

L10212XC(config-if)# exit

L10212XC(config)# interface ghn2

L10212XC(config-if)# switchport mode access

L10212XC(config-if)# switchport access vlan 1000

Following example code creates VLAN ID 200 and assigns port ghn5 and ghn6 to Trunk Mode
to assign VLAN ID 200.

L10212XC# configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# vlan database

L10212XC(config-vlan)# vlan 200

L10212XC(config-vlan)# exit

L10212XC(config)# interface vlan200

L10212XC(config-if)# no shutdown

L10212XC(config-if)# exit

125
COAX G.hn Access Multiplexer User Manual

L10212XC(config)# interface ghn5

L10212XC(config-if)# switchport mode trunk

L10212XC(config-if)# switchport trunk allowed vlan add 200

L10212XC(config-if)# exit

L10212XC(config)# interface ghn6

L10212XC(config-if)# switchport mode trunk

L10212XC(config-if)# switchport trunk allowed vlan add 200

Check of VLAN Setting Information

User checks VLAN Setting Information using a command in table.

Command Description Mode


show vlan all It outputs summarized information of VLAN. Enable
 VLANid
 Member Port

L10212XC# show vlan all

Bridge Group : 1 / VLAN Count : 5

Bridge VLAN ID Name State Member ports

(u)-Untagged, (t)-Tagged

--------------- ------- ---------------- ------- -------------------------------

1 1 default ACTIVE xe1(u) ghn3(u) ghn4(u) ghn5(u)

ghn6(u) ghn7(t) ghn9(u)

ghn10(u) ghn11(u) ghn12(u)

1 200 VLAN0200 ACTIVE ghn5(t) ghn6(t) ghn7(u)

1 300 VLAN0300 ACTIVE ghn5(t) ghn6(t) ghn8(u)

1 400 VLAN0400 ACTIVE ghn7(t)

126
COAX G.hn Access Multiplexer User Manual

1 1000 VLAN1000 ACTIVE ghn1(u) ghn2(u)

127
COAX G.hn Access Multiplexer User Manual

QinQ Setting

QinQ is a feature that enables communication between networks with multiple different VLANs
as a single VLAN. It is also referred to as Double-tag, VLAN-Stacking because it attaches another
Tag to forward the packet. In a conventional network environment, if there are two devices
connected to a network composed of different VLANs, the same VLAN must be set for all devices
connecting the two devices. However, with the QinQ feature, you do not need to configure
multiple VLANs on all devices. Single-tagged port is called a customer port, and a port with
double-tagged is called a provider port.

QinQ Setting Command

Command Description Mode


switchport vlan-stacking Configure specific interface with customer- Interface
customer-edge-port edge-port
On settting with “Customer-edge-port”, All
ingress packet can be processed as PVID
regardless of tag-information, and processed as
un-taged packet
switchport vlan-stacking Configure specific interface to provider-port Interface
provider-port ethertype
This command forward to specific port with
double-tagged packet and the outer TPID is
configured as specific ethertype.
vlan-stacking cvlan vlanid This command maps “customer-port-ingress Config
svlan svlanid trans-cvlan CVLAN” to SVLAN with double tagged packet.
vlanid On setting with “customer-port-ingress
CVLAN”, it is changed to trans-CVLAN from
“customer port ingress CVLAN”
vlan-stacking svlan vlanid This command can change “CVLAN” to “trans- Config
cvlan svlanid trans-cvlan CVLAN” in case of “packet on the provider port
vlanid ingress with SVLAN, CVLAN”

128
COAX G.hn Access Multiplexer User Manual

vlan-stacking push cvlan In case of “customer port ingress untag Config


vlanid packet”, push CVLAN

vlan-stacking pop cvlan If configured CVLAN is same as “CVLAN on the Config


vlanid provider port ingress”, pop CLVAN and then,
untagged packet in the customer port can be
egress.

QinQ Setting example

Example #1:
 Setting “XE1” to customer-port, and “XE2” to provider-port
 XE1 ingress packet is double tagged with vlan 200 and egressed with XE2.
 push vlan 100 for untag packet of xe1.
 If inner vid of Xe2 is 100, delete inner and set untag packet to egress on xe1.

L10212XC(config)# interace xe1

L10212XC(config-if)# switchport mode access

L10212XC(config-if)# switchport access vlan 200

L10212XC(config-if)# switchport vlan-stacking customer-edge-port

L10212XC(config)# interace xe2

L10212XC(config-if)# switchport mode trunk

L10212XC(config-if)# switchport trunk allowed vlan add 200

L10212XC(config-if)# switchport vlan-stacking provider-port ethertype 0x9100

L10212XC(config)# vlan-stacking push cvlan 100

L10212XC(config)# vlan-stacking pop cvlan 100

Example #2:

129
COAX G.hn Access Multiplexer User Manual

 Set XE1 to “customer-port” and XE2 to “poriver-port”


 Maps XE1 “ingress CVID 20” to “SVLAN 200” and translate “CVID 20” to “CVID 200”.
 Convert “XE11 ingress cvid 30,35” to be “double-tagged SVLAN 300” and egress this
to XE2
 Set “other CVID” as Native VLAN with doube-tagged “SVLAN 500” and egress this to
XE2
 Maps “CVLAN20, SVLAN 200” to “Trans-CVLAN 2000”
 Maps “SVLAN200, CVLAN2000” to “Trans-CVLAN 20”

L10212XC(config)# interace xe1

L10212XC(config-if)# switchport mode trunk

L10212XC(config-if)# switchport trunk allowed vlan add 200

L10212XC(config-if)# switchport trunk allowed vlan add 300

L10212XC(config-if)# switchport trunk allowed vlan add 500

L10212XC(config-if)# switchport trunk native vlan 500

L10212XC(config-if)# switchport vlan-stacking customer-edge-port

L10212XC(config)# interace xe2

L10212XC(config-if)# switchport mode trunk

L10212XC(config-if)# switchport trunk allowed vlan add 200

L10212XC(config-if)# switchport trunk allowed vlan add 300

L10212XC(config-if)# switchport trunk allowed vlan add 500

L10212XC(config-if)# switchport vlan-stacking provider-port ethertype 0x9100

L10212XC(config)# vlan-stacking cvlan 20 svlan 200 trans-cvlan 2000

L10212XC(config)# vlan-stacking svlan 200 cvlan 2000 trans-cvlan 20

QinQ Configuration Information Checking

Use the following commands for checking QinQ configuration information.

130
COAX G.hn Access Multiplexer User Manual

Command Description Mode


show vlan-stacking Shows QinQ configuration information. Enable

L10212XC# show vlan-stacking

xe1 : customer-edge-port

xe2 : provider-port

131
COAX G.hn Access Multiplexer User Manual

VLAN Translation Setting

VLAN Translation features adjusts the traffic-flow by replacing the packet with a user-specified
VID. This equipment has a VLAN translation table for each ingress and egress port. And more
this translation can be activated on each port-enable/disable command.

Command Description Mode


vlan translation Configure a specific ingress/egress port to VLAN Config
{ingress|egress} Translation features.
<1-4095> <1-4095>
no vlan translation Disable VLAN translation Configuration on Config
{ingress|egress} specific egress port.
<1-4095>
switchport vlan-translation Activate VLAN translation on specific port. Interface
{ingress|egress}

no switch port vlan- De-activate VLAN translation on specific port Interface


translation
{ingress/egress}

The following example sets up to vlan 200 for vlan 100 ingress traffic on xe1. When traffic is
injected, the traffic is applied to ghn1 with vlan200.

L10212XC(config)# vlan translation ingress 100 200

L10212XC(config)# interface xe1

L10212XC(config-if-xe1)# switchport mode trunk

L10212XC(config-if-xe1)# switchport trunk allowed vlan add 100

L10212XC(config-if-xe1)# switchport trunk allowed vlan add 200

L10212XC(config-if-xe1)# switchport vlan-translation ingress

L10212XC(config-if-xe1)# interface ghn1

L10212XC(config-if-ghn1)# switchport mode trunk

L10212XC(config-if-ghn1)# switchport trunk allowed vlan add 200

132
COAX G.hn Access Multiplexer User Manual

133
COAX G.hn Access Multiplexer User Manual

Port Trunk

When user wants to configure a network coupling with devices specified in higher level, it is
possible to organize multiple physical links into a logical link to prevent bottlenecks and to
distribute traffic. This is called link aggregation, and the ports for the link aggregation is called
port group. G.hn Access Multiplex System supports for the link aggregation by providing functions
of Static Aggregation and LACP of IEEE 802.3ad.

Introduction to LACP

LACP Modes

The GAM system can be configured manually as well as by automatic. For the automatic
configuration, user uses IEEE 802.3ad LACP (link aggregation Control Protocol) in Active Mode or
Passive Mode. At least one end (or the other end) of link must be set as an Active Mode. Ports in
Passive Mode do not transmit first but start to transmit LACP packets when it receives LACP
packets.

Mode Description
passive It sets ports to Passive Negotiation Mode.
Ports in Passive Mode do not start the negotiation by transmitting
LACP packets first, but only response when it receives LACP packets.
active It sets ports to Active Negotiation Mode.
Ports in Active Mode start the negotiation by transmitting LACP
packets.

134
COAX G.hn Access Multiplexer User Manual

LACP Parameters

Parameters used for LACP are introduced in the following list:

 System Priority: By automatic or by using CLI, the System Priority must be assigned to
each switch on which LACP is enabled. The System Priority is used to constitute a System
ID together with a MAC address as well to negotiate with other systems.

 Port Priority: By automatic or by using CLI, the Port Priority must be assigned to each
port of a switch. The Port Priority constitutes Port Identifiers together with Port Numbers.
Port Priority is used to specify a port to be Standby Mode, when all proper ports cannot
be grouped because of hardware constraints.

 Administrative key: By automatic or by using CLI, the Administrative Key must be


assigned to each port of a switch. Using following rules, the Administrative Key decides
capability of a port to be combined with other ports.
 Data rate, Duplex Mode, physical characteristics of a port such as point-to-point and
sharing medium
 Setting constraints

When LACP is activated, it always tries to group the maximum number of ports that can be
grouped. If it is not possible to group all ports that can be grouped, the rest of the ports is placed
in the Hot Standby and used only when other ports in the group cannot work.

135
COAX G.hn Access Multiplexer User Manual

LACP Setting

Port group Setting

Commands Description Mode


channel-group <1-12> Create Port-Group using LACP Interface
mode (active|passive) operation
no channel-group Delete an existed LACP-Port group Interface

The Following example shows, “How to configure LACP with active mode”

L10212XC(config)# int range ghn1,ghn2

L10212XC(config-if-range)# switchport mode trunk

L10212XC(config-if-range)# switchport trunk all vlan add 100

L10212XC(config-if-range)# channel-group 2 mode active

Port Priority Settings in LACP

Value of Port Priority must be an integer from 1 to 65535. A higher number has a lower priority
and Default priority is 32768.

Commands Description Modem


lacp system-priority <1- Configure system priority Config
65535>
lacp port-priority <1-65535> Configure port priority. Interface
no lacp system-prirority Delete an existed system-priority. Config
no lacp port-prirority Delete an existed port-priority. Interface

The Following example shows, “How to configure system priority with 20000”.

136
COAX G.hn Access Multiplexer User Manual

L10212XC(config)# lacp system-priority 20000

The Following example shows, “How to configure XE1’s port priority with 10”.

L10212XC(config)# interface xe1

L10212XC(config-if)# lacp port-priority 10

BPDU transmission frequency configuration


When set to a port group, the port advertises its status by sending BPDU packets at regular
intervals to ports in the same group. To set the transmission period of bpdu packet, use the
following command.

Commands Description Mode


lacp timeout (long|short) Set the transmission period of BPDU Interface
packet of port (default: long).

Delete LACP Statistical Information

Commands Description Mode


clear lacp [aggregator-id] Delete LACP statistical information on Enable
counters specific port group.
clear lacp counters Delete “whole LACP statistical Enable
information”.

The Following example shows, “How to delete LACP statistical information”.

L10212XC# clear lacp 1 counters

137
COAX G.hn Access Multiplexer User Manual

LACP Check

The group for LACP is defined as etherchannel. To display the etherchannel configuration status,
use the show etherchannel command. Bandwidth can be checked through ‘show interfafce
IFNAME’.

Commands Description Mode


show etherchannel Check the Etherchannel configuration Enable
<1~12>
{summary|load-
balance|detail}
show lacp counter Check the lacp packet counter Enable
[<1-12>]
show lacp sys-id Check the LACP system id and priority Enable

138
COAX G.hn Access Multiplexer User Manual

Static channel-group Settings

Introduction to Static Channel-Group

Static Channel-Group groups the ports designated by interface_mode using static method. It
includes maximum eight ports in a group. The specified interface works as an aggregation
interface and is considered the same as the interface.

Static Channel-Group Settings

Commands for Static Channel-Group Settings are introduced in table.

Commands Description Mode


static-channel-group <1-12> creates static port group. Interface
no static-channel-group ungroups from Port-Group. Interface
show static-channel-group displays the settings of port group. Enable

139
COAX G.hn Access Multiplexer User Manual

Load Balancing Control

The Aggregation Interface provides Load Balancing resulted from the use of multiple Physical
Links as well as Fail-Over. To set rules of Load Balancing, user can use the following commands
in table.

Commands Description Mode


lacp load-balance sets Load Balance by following Config
{all | l2 | l2-l3 | l3 | l3-l4 } specified rule.
show ethercannel load-balance display the existing Load Balance Rule. Enable

140
COAX G.hn Access Multiplexer User Manual

STP
(Spanning Tree Protocol)

Introduction to STP/RSTP/MSTP

EoC GAM supports for STP (Spanning Tree Protocol)/ RSTP (Rapid Spanning Tree Protocol) to
prevent Switching Loop occurrences and to duplicate paths. In addition, EoC GAM supports for
MSTP (Multi Spanning Tree Protocol) configuring various topologies considering VLAN as well as
for RPVST+ (Per Vlan Spanning Tree).

Multiple paths bounding for a single destination in a network is possible, however multiple
paths in a same broadcast domain may be a cause of loops and result in traffic congestion to
make network unstable. STP (Spanning Tree Protocol) is a protocol that prevents loop
occurrences in a network that has multiple paths. In addition, the STP defines TREE as a route
consisting of a switch. EoC GAM sets STP as a default protocol to prevent loops. EoC GAM is able
to deactivate STP in accordance with topology or to change to one of the other modes.

RSTP (Rapid Spanning Tree Protocol) has an advantage of providing rapid recovery of point-
to-point Spanning Tree. It takes less than 1 second (comparing with the fact that IEEE 802.1D
sets the maximum 50 seconds for Spanning Tree by default) to reconfigure Spanning Tree. This
is valid for the network transmitting traffic sensitive to delay such as voice or image.

141
COAX G.hn Access Multiplexer User Manual

RPVST+ (Per Vlan Spanning Tree) has separate Spanning Trees per VLAN, and the existing
CTS (Common Spanning Tree) consists of a single tree because it is based on a physical structure
regardless of VLAN. For this reason, the CTS may have unstable structures in multiple VLANs.
RPVST+ solves this problem and the system is compatible with Cisco Switch.

MSTP is a protocol that makes spanning-tree operate by grouping multiple VLANs into one
Instance group. This has the advantage of reducing the load on the switch operation and ensuring
safety.

Warning Please be careful that it may not be connected if trying to


connect to the existing RPVST+ Switch. Because it is allowed
W to connect to another RPVST+ Switch only when CTS
(Common Spanning Tree) Switch is connected, although
RPVST++ is supported by an option

142
COAX G.hn Access Multiplexer User Manual

Configuring Spanning-Tree Features

This section introduces methods how to configure spanning trees.

Default STP Settings

Feature Default Setting


Enable state It can activate maximum 63 Spanning Tree
Instances.

Spanning-tree mode RSTP.


System priority 32768
Spanning-tree port priority 128.

Spanning-tree port path-cost When method is long,


1 Gbps: 20000
10 Gbps: 2000
Hello time 2 sec.
Forward-delay time 15 sec.
Maximum-aging time 20 sec.

Inform MSTP may not be supported depending on OS version.

STP Mode Selection

To change Spanning Tree Mode of a switch, follow the procedures introduced in table in
privileged exec mode.

Commands Description Mode


spanning-tree mode It changes Spanning Tree Mode of a switch. config
{stp-vlan-  stp operates in IEEE 802.1D.
bridge|rstp-vlan-  rstp operates in IEEE 802.1w.

143
COAX G.hn Access Multiplexer User Manual

bridge|rpvst+|mstp}  mstp operates in IEEE 802.1S.


 RPVST+p may not be supported depending
on OS version.

STP Activation

STP is activated for all VLANs by default. Since loops are possible to exist in the network, user
must be careful when deactivating the STP.

Warning Excessive traffic and infinite packet duplications may occur to


decrease network performance, if STP is deactivated and loops
W exist in the network.

To activate STP under the state of deactivated STP, follow the procedures introduced in table
in privileged exec mode.

Commands Description Mode


spanning-tree enable Activate Spanning-Tree config

STP Port Priority Configuration

If a loop occurs, Spanning Tree decides forwarding interface using Port Priority. It can assign
higher priority (low value) to the interface selected first, and lower priority (high value) to the
interface selected later. If all interfaces have the same value of priority, Spanning Tree assigns
an interface with low interface number under forwarding state and blocks other interfaces.

To set priority of interfaces, follow the procedures introduced in table in privileged exec mode.

Commands Description Mode


spanning-tree It sets port priority of interfaces. Interface
priority <0-240>  It ranges from 0 to 240 for priority.

144
COAX G.hn Access Multiplexer User Manual

STP Path Cost Configuration

Default value of Path Cost in Spanning Tree is decided by interface speed. If a loop occurs,
Spanning Tree uses cost at a port to decide forwarding interface. It can assign low cost to the
interface selected first, and high cost to the interface selected later. If all interfaces have the
same value of cost, Spanning Tree assigns an interface with low interface number under
forwarding state and blocks other interfaces.

Inform In the case of port group, Path Cost value is not decided by

i interface speed. Each member port may have different speed.


Thus please set Path Cost manually for port group.

To set Path Cost of interfaces, follow the procedures introduced in table in privileged exec
mode.

Commands Description Mode


spanning-tree path- It sets cost of interfaces. Interface
cost <0- 200000000> If a loop occurs, Spanning Tree uses Path Cost to
decide forwarding port. The lower Path Cost value
is, the faster transmission is possible.
 It ranges from 0 to 200000000 for cost.
Default value is decided by interface
transmission speed.

Hello Time Setting

By changing hello yime, user can set the period of configuration BPDU that a root switch
transmits. To set hello time for VLAN, follow the procedures introduced in table in privileged exec
mode.

Commands Description Mode

145
COAX G.hn Access Multiplexer User Manual

spanning-tree It sets Hello Time of STP. config


hello-time <1-10> The Hello Time is a transmission cycle when a root
switch sends Configuration Messages. The
Configuration Message means that the switch is
still working.
 It ranges from 1 to 10 for seconds. Default
value is 2.

Forward Delay Time Settings

To set forwarding delay time for VLAN, follow the procedures introduced in table in privileged
exec mode.

Commands Description Mode


spanning-tree It sets STP Forward Time. config
forword-time <4- Forward Delay is the time when a port waits to
30> transfer to the state of forwarding from the state
of listening or learning of Spanning Tree.
It ranges from 4 to 30 for seconds. Default value is
15.

Maximum-Aging Time Settings

To set maximum aging yime for VLAN, follow the procedures introduced in table in privileged
exec mode.

Commands Description Mode


spanning-tree It sets STP Maximum Aging Time. config
max-age Maximum Aging Time is the time when it waits
<6-40> without receiving Spanning Tree information
before reconfiguration of a switch.
It ranges from 6 to 40 for seconds. Default value is
20.

146
COAX G.hn Access Multiplexer User Manual

Portfast(Edge port) Settings

When using RSTP, a port connected to a single host must be set as portfast port. If the port is
not set as portfast, delay will occur during state transition.

Warning A port connected to a device must be set as edge port. If not,


STP state of the port is affected when STP protocol in a
W network has changed

To set a port as a portfast port, follow the procedures introduced in table in privileged exec
mode.

Commands Description Mode


spanning-tree It sets a port as a portfast port. Interface
portfast

STP Compatibility Mode Configuration

Protocol operation mode can be configured for the spanning tree instance of each VLAN. In a
general RSTP, the Spanning Tree is configured by using only STP BPDU. 802.1D BPDU is used
only when receiving 802.1D BPDU for compatibility. However, only 802.1D BPDU can be used in
the STP Compatibility Mode. In addition, the function of rapid recovery provided by RSTP cannot
be used.

To change Protocol Mode of RSTP Instance, follow the procedures introduced in table in
privileged exec mode.

Commands Description Mode


spanning-tree It ranges from 0 to 3, and each number has a Config
force-version setting value as shown below:
<0-3> 0: STP
1: Not supported.
2: RSTP
3: MSTP

147
COAX G.hn Access Multiplexer User Manual

Spanning-Tree Status Check

To check spanning tree status, use one of privileged exec commands introduced in table.

Commands Description Mode


show spanning-tree Display the existing Spanning-Tree Information Enable
brief
show spanning-tree Display Spanning-Tree Information at the Enable
interface IFNAME specific Interface.
show spanning-tree Display Spanning-Tree Information at all Enable
Interface

148
COAX G.hn Access Multiplexer User Manual

RPVST+

RPVST+ Activation

Commands Description Mode


spanning-tree Activate RPVST+ of bridge Config
mode rpvst+

Warning Please be careful that the existing RPVST+ Switch may not be
connected when changing RPVST+ Mode to RPVST++ (ISL
W Format). Default value is sRPVST+(BPDU Format).

RPVST+ Status Check

To check RPVST+ Status that operates for each VLAN, use commands introduced in table.

Commands Description

show spanning-tree rpvst+ Shows RPVST+ information of whole VLANs.

show spanning-tree rpvst+ Shows RPVST+ information of specified VLAN


vlan <1-4094>

149
COAX G.hn Access Multiplexer User Manual

MSTP Configuration

MSTP Configuration Guidelines

If MSTP is activated, RSTP is activated automatically.

MSTP Activation and MST Region Settings

If two or more switches are in the same MST region, they must have same VLAN-to-instance
mapping, same revision number, and same name.

Region accommodates one or more members having same MST settings. Each member must
be able to process RSTP BPDU. A number of members that MST region of a single network
accommodates is infinite, however, each region must support for 16 Spanning Tree Instances. A
VLAN is allowed to assign only a single spanning tree instance at a time.

To set MST region as well as to activate MSTP, follow the procedures introduced in table.

Commands Description Mode


spanning-tree It activates MSTP. Config
mode mstp

spanning-tree Goes into MST Setting Mode Config


mst configuration

instance instance- It sets MST instance map of VLAN. MST


id vlan vlan-range It ranges from 1 to 63 for instance-id.
It ranges from 1 to 4094 for vlan-range.
region It sets Region Name: Maximum 32 characters and MST
REGION_NAME case-sensitive.

revision It sets Revision Number ranging from 0 to 65535. MST


REVISION_NUM

Following example code activates MSTP and maps VLAN 1 to MST instance 1.

150
COAX G.hn Access Multiplexer User Manual

L10212XC(config)# spanning-tree mode mstp

L10212XC(config)# spanning-tree mst configuration

L10212XC(config-mst)# instance 1 vlan 1

L10212XC(config-mst)# region Region1

L10212XC(config-mst)# revision 100

MST Configuration and Status Check

To check spanning tree status, use one of privileged exec commands introduced in table.

Commands Description Mode


show spanning-tree mst It displays information of MST Region Enable
config Settings.
show spanning-tree mst It displays MST information of the Enable
instance instance-id corresponding instance.
show spanning-tree mst It displays MST information of the Enable
interface interface-id corresponding interface.
Show spanning-tree mstp It displays detailed information of Enable
detail mstp.

151
COAX G.hn Access Multiplexer User Manual

IGMP
(Internet Group Management Protocol)

Introduction to multicast routing

IP Multicasting enables a single IP host to send packets to a group that consists of multiple IP
hosts. IGMP is a protocol used for an IP host to register IP multicast group membership to a
device. The device inquires about a membership by periods to renew a membership of a
registered group. Once the IP host answers for the inquiry, the registration of the group is
maintained.

Class D IP address is used as a multicast group address in IP multicast. This is defined in


RFC1112.

The GAM provides the following functions for IP multicasting:

 IGMP Snooping
 IGMP (Internet Group Management Protocol version 1,2)

Warning A part of features and functions may not be provided


depending on the version of Operating System.
W
152
COAX G.hn Access Multiplexer User Manual

153
COAX G.hn Access Multiplexer User Manual

IP Multicast Routing Settings

Enable IP multicast routing

To forward multicast packets from layer 3, basically IP multicast routing must be enabled. For
this, command introduced in table is used in global configuration mode. In addition, not for the
multicast routing but for layer 2 switching, default mode “no ip multicast-routing” must be set.

Commands Description Mode


ip multicast-routing It enables Multicast Routing Config
With Default Mode, this system is configured
L2 switch Mode and in this mode, all multicast
frame can be flooded.
no ip multicast-routing Disables Multicast Routing features Config

L10212XC(config)# ip multicast-routing

L10212XC(config)# no ip multicast-routing

Warning If multicast routing is not supported because of OS version,


default mode “no multicast-routing” must be set for layer 2
W switch. If not, multicast packets will not be flooded for the
layer 2 switch.

154
COAX G.hn Access Multiplexer User Manual

IP Configure IGMP Functionality

Multicast Traffic Filtering Policy Setting

The GAM system establishes a policy deciding how to process the traffic at a port in a VLAN
depending on a validity of a membership of the corresponding multicast group, when multicast
traffic comes in.

Basic policy (initial policy) for multicast traffic is set to flood to all ports in a VLAN (including
the port which traffic comes in), if the corresponding multicast group does not have a valid
membership.

Without consideration that ports have a multicast group membership, GAM can establish a
policy to flood to all ports in a VLAN by using “no ip unknown-multicast block”. In addition, GAM
can establish a policy to forward traffic only to member ports and to drop the rest by using “ip
unknown-multicast block”.

To change multicast traffic policies for each VLAN, use commands introduced in table in Config
Mode.

Commands Description Mode


ip unknown-multicast It forwards only the multicast traffic of the Group Config
block registered to L2MC Table to the corresponding ports,
and drops the rests.
no ip unknown- It floods multicast traffic to all ports in a VLAN. Config
multicast block

155
COAX G.hn Access Multiplexer User Manual

IGMP Snooping Settings

Generally, multicast traffic at a switch is processed as an unknow MAC address or a broadcast


frame to be flooded to all ports in a VLAN.

When the GAM operates as a layer 2 switch, it checks information of received IGMP packets
and configures L2 Multicast Table. By doing this, GAM can send the corresponding multicast traffic
only to the ports requiring them without bandwidth waste. This is called IGMP Snooping.

Global IGMP Snooping Activation

To enable IGMP snooping globally, use commands introduced in table in global configuration
mode.

Commands Description Mode


ip multicast-routing Sets L3 multicast routing Config
ip igmp snooping Enables Global IGMP Snooping. Config
no ip igmp snooping Disable Global IGMP Snooping. Config

L10212XC(config)# ip igmp snooping

Warning To activate IGMP snooping the L2 Multicast, L3 Multicast must be


disabled (Default Mode).

W
If IGMP snooping is disabled in the state level of System, IGMP
snooping does not operate when it is enabled in the level of
VLAN. In addition, all existing settings for the Snooping are
deleted.

IGMP Snooping Activation for each VLAN

The GAM is able to enable/ disable IGMP snooping for each VLAN. To set each VLAN applying
IGMP Snooping, use commands introduced in table in VLAN interface mode.

156
COAX G.hn Access Multiplexer User Manual

Commands Description Mode


ip igmp snooping Enables IGMP Snooping in a specific VLAN Config
vlan VLAN_ID
no ip igmp snooping Disables IGMP Snooping in a specific VLAN Config
vlan VLAN_ID

Configure IGMP Snooping Functionality

Version Settings
GAM work with IGMP version 3 as default. To change the IGMP version as follow.

Commands Description Mode


ip igmp snooping Set IGMP version for each VLAN_ID. Config
version <1-3> vlan
VLAN_ID
no ip igmp snooping Deactivate version for each VLAN_ID Config
version vlan VLAN_ID

Fast-Leave Settings
If GAM can be configured with IGMP Snooping Fast-Leave Mode, when the switch receives an
IGMPv2 leave message from the host, it immediately deletes the membership without sending a
last-member-query message to each port. And Fast-Leave features can be applied to each VLAN.

The following shows “How to Set Fast-Leave” in table.

Commands Description Mode


ip igmp snooping Enables Fast-Leave for system Config
fast-leave
no ip igmp snooping Deactivate Fast-Leave features for system Config
fast-leave
ip igmp snooping Enables Fast-Leave for each VLAN ID Config
fast-leave
vlan VLAN_ID
no ip igmp snooping Enables Fast-Leave features for each VLAN ID Config

157
COAX G.hn Access Multiplexer User Manual

fast-leave
vlan VLAN_ID

Report-Suppression Settings
With enabling “Report-Suppression” of IGMP Snooping, only the report responsed first is
forwarded to upper layer to reduce processing load on the devices of upper layer. This function
is valid only in Snooping Active Mode.

Commands Description Mode


ip igmp Sets “Report-Suppresion” for system Config
snooping report-
suppression
no ip igmp snooping Deactivate “Report-Suppresion” for system Config
report-suppression
ip igmp snooping Sets “Report-Suppresion” for specific VLAN ID Config
report-suppression
vlan VLAN_ID
no ip igmp snooping Deactivate “Report-Suppresion” for specific VLAN Config
report-suppression ID
vlan VLAN_ID

mrouter Setting
A switch forwards all multicast traffic in a VLAN to other networks by transmitting all multicast
traffic to multicast router. Therefore, the ports connected to multicast router are added to
Multicast Forwarding Table Entry as outgoing ports.

Basically, IGMP snooping snoops only for IGMP traffic and detects ports connected to multicast
router. In addition, IGMP snooping detects mrouter port by enabling PIM/ DVMRP protocol
manually.

The mrouter ports known by the above method are registered to the Multicast Forwarding
Table Entry as outgoing ports whenever new Multicast Forwarding Table Entry is created. IGMP
Join messages transmitted from a host as well as multicast traffic are forwarded to Mrouter.

If the router does not receive Query message or receives IGMP report message from port of

158
COAX G.hn Access Multiplexer User Manual

lower layer before receiving Query message, IGMP report may not be sent to multicast router
because the Mrouter port is not specified. Therefore, it is recommended to specify the Mrouter
port manually.

To set multicast router port manually, use commands introduced in table.

Commands Description Mode


ip igmp snooping Sets mrouter port manually Config
mrouter vlan For this setting, Interface name must be “Member-
VLAN_ID Port in specified VLAN”
port IFNAME
no ip igmp snooping Delete the existing mrouter port Config
mrouter vlan
VLAN_ID
port IFNAME

Display System

Commands Description Mode


show ip igmp interface Shows IGMP Snooping Status for All VLANs Enable

show ip igmp interface Shows IGMP Snooping Status for specific Enable
IFNAME VLAN

Checking IGMP Snooping Information


Following example code checks IGMP snooping Settings using “show ip igmp interface”.

159
COAX G.hn Access Multiplexer User Manual

L10212XC# show ip igmp interface

Interface vlan1 (Index 101)

IGMP Enabled, Active, Non-Querier, Version 3 (default)

Internet address is 10.1.1.1

IGMP interface has 0 group-record states

IGMP activity: 0 joins, 0 leaves

IGMP querying router is 0.0.0.0

IGMP query interval is 125 seconds

IGMP Startup query interval is 31 seconds

IGMP Startup query count is 2

IGMP querier timeout is 255 seconds

IGMP max query response time is 10 seconds

Group Membership interval is 260 seconds

IGMP Last member query count is 2

Last member query response interval is 1000 milliseconds

IGMP Snooping is globally enabled

IGMP Snooping is enabled on this interface

IGMP Snooping querier is not enabled

IGMP Snooping drop igmp TTL over 1 not enabled

IGMP Snooping fast-leave is not enabled

IGMP Snooping report suppression is disabled

IGMP Snooping Querier Function Setting

If IGMP Querier does not exist, or a switch cannot receive any IGMP Query messages, the
switch can operate as an IGMP Querier to maintain group membership.

Querier Activation

160
COAX G.hn Access Multiplexer User Manual

Querier can operate for each VLAN. To activate and check IGMP Querier for each VLAN, use
commands introduced in table.

Commands Description Mode


ip igmp snooping querier It activates IGMP Querier for a VLAN. Config
vlan VLAN_ID
no ip igmp snooping It deactivates IGMP Querier for a VLAN. Config
querier vlan VLAN_ID

querier-timeout Settings
If IGMP snooping querier is enabled, operator can specify a timeout for the query. The
command to set and clear Queriy timeout is as follows.

Commands Description Mode


ip igmp querier-timeout It activates IGMP Querier Timeout for a Config
<60-300> vlan VLAN_ID VLAN
no ip igmp querier-timeout It deactivates IGMP Querier Timeout for Config
vlan VLAN_ID a VLAN

query interval Settings


If IGMP snooping querier is enabled, operator can specify the transmission period of the query
message. The command to set and clear the transmission period of the query message is as
follows.

Commands Description Mode


ip igmp query interval It activates IGMP Querier Interval for a Config
<1-18000> vlan VLAN_ID VLAN
no ip igmp querier interval It deactivates IGMP Querier Interval for Config
vlan VLAN_ID a VLAN

startup query Settings


If the system is selected as IGMP querier, operator can specify the transmission interval and

161
COAX G.hn Access Multiplexer User Manual

the number of transmission of the query message. The command to set and clear the transmission
interval of the query message is as follows.

Commands Description Mode


ip igmp startup-query-interval It activates IGMP Startup Query Config
<1-18000> vlan VLAN_ID for a VLAN
no ip igmp startup-query-interval It deactivates IGMP Startup Config
vlan VLAN_ID Query for a VLAN
ip igmp startup-query-count It activates IGMP Startup Query Config
<2-10> vlan VLAN_ID Count for a VLAN
no ip igmp startup-query-count It deactivates IGMP Startup Config
vlan VLAN_ID Query Count for a VLAN

Startup Query-Max-Response-Time Setting


The system support “Host’s Max-Response-Time Setting” features. The following show “How
to Set “Query-Max-Response-Time” for query message in table.

Commands Description Mode


ip igmp query-max-response- It activates IGMP Query-Max- Config
time <1-240> vlan VLAN_ID Response-Time for a VLAN
no ip igmp query-max-response- It deactivates IGMP Query-Max- Config
time vlan VLAN_ID Response-Time for a VLAN

Last member query Settings


When a host sends an IGMP Leave message to leave a specific group membership, the multicast
router immediately does not delete the port from table, which the host is connected directly.
Instead, multicast mrouter but sends a “Specific Query Message” to the corresponding port to
check “Group Membership Other Host”. If there is no response, group membership will delete
the corresponding port. In this case, the time to wait for a response after sending a Specific
Query is “Last Member Query Interval”. By default, this system is set to 1000ms for this value.
And operator can specify the number of responses waiting for a last member query. By default,
this system is set to 2 for this number.

162
COAX G.hn Access Multiplexer User Manual

The command for changing and querying this value is as follows.

Commands Description Mode


ip igmp It changes “Last-Member-Query-Interval” Config
last-member-query- with 1000~25500 for a VLAN
interval <1000-25500>
vlan VLAN_ID
no ip igmp It deletes “Last-Member-Query-Interval” for Config
last-member-query- a VLAN
interval
vlan VLAN_ID
ip igmp It changes “Last-Member-Query-Count” Config
last-member-query-count with 2~7 for a VLAN
<2-7> vlan VLAN_ID
no ip igmp It deletes “Last-Member-Query-Count” for a Config
last-member-query-count VLAN
vlan VLAN_ID

L10212XC# show ip igmp interface

Interface vlan2 (Index 102)

IGMP Enabled, Inactive, Version 3 (default)

IGMP interface has 0 group-record states

IGMP activity: 0 joins, 0 leaves

IGMP query interval is 125 seconds

IGMP Startup query interval is 31 seconds

IGMP Startup query count is 2

IGMP querier timeout is 200 seconds

IGMP max query response time is 10 seconds

Group Membership interval is 260 seconds

IGMP Last member query count is 2

Last member query response interval is 1000 milliseconds

IGMP Snooping is globally enabled

163
COAX G.hn Access Multiplexer User Manual

IGMP Snooping is not enabled on this interface

IGMP Snooping querier is not enabled

IGMP Snooping drop igmp TTL over 1 not enabled

IGMP Snooping fast-leave is not enabled

IGMP Snooping report suppression is disabled

Configure IGMP Snooping Security Setting

Packet Discarding by TTL-Value Changes


Operator can configure the function to drop “Multicast Control Packets” except “TTL=1” in the
IGMP Snooping.

Commands Description Mode


ip igmp snooping It sets “Drop-IGMP-TTL-Over” for system. Config
drop-igmp-ttl-over
no ip igmp snooping It deletes “Drop-IGMP-TTL-Over” features for Config
drop-igmp-ttl-over system.
ip igmp snooping It sets “Drop-IGMP-TTL-Over” for a VLAN. Config
drop-igmp-ttl-over
vlan VLAN_ID
no ip igmp snooping It deletes “Drop-IGMP-TTL-Over” features for a Config
drop-igmp-ttl-over VLAN.
vlan VLAN_ID

Setting Max-Group-Count
Operator can configure “Max Allowable Number of IGMP Join Groups” in system.

Commands Description Mode


ip igmp snooping It sets “Max-Group-Count” with 1~2097152 for Config
max-group-count system.
<1-2097152>

164
COAX G.hn Access Multiplexer User Manual

no ip igmp snooping It deletes “Max-Group-Count” for system. Config


max-group-count
ip igmp snooping It sets “Max-Group-Count” with 1~2097152 for Config
max-group-count Interface.
<1-2097152>
port IFNAME
no ip igmp snooping It deletes “Max-Group-Count” with 1~2097152 for Config
max-group-count Interface.
port IFNAME

IGMP-Join-Group-Address Filtering Functions


Operator can set the filtering function for “IGMP Join Group Address”. Normally an “IGMP
Snooping Profile” is required to filter IGMP join group addresses. For this case, it can be several
settings in “IGMP Snoop Profile”.

Commands Description Mode


ip igmp snooping It cretates “IGMP Snooing Profile” for a “Specific Config
profile <1-99> IP Address Range” with Deny or Permit option.
{deny|permit}
A.B.C.D/M
(|range A.B.C.D/M)
no ip igmp snooping It deletes “IGMP Snooing Profile”. Config
profile <1-99>
{deny|permit}
A.B.C.D/M
(|range A.B.C.D/M)

Several configurations are possible for the same “IGMP Snooping Profile”.

Commands Description Mode


ip igmp snooping It cretates “IGMP Snooing Profile” for a “Specific Config
profile <1-99> IP Address Range” with Deny or Permit option.
{deny|permit}
A.B.C.D/M

165
COAX G.hn Access Multiplexer User Manual

(|range A.B.C.D/M)
no ip igmp snooping It deletes “IGMP Snooing Profile”. Config
profile <1-99>
{deny|permit}
A.B.C.D/M
(|range A.B.C.D/M)

The CLI for setting “the IGMP Snooping Filter Profile” on the interface is as follows.

Commands Description Mode


ip igmp snooping It sets “IGMP Snooping Profile” for system. Config
filter profile
<1-99>
ip igmp snooping It sets “IGMP Snooping Profile” for a specific Config
filter profile interface.
<1-99> interface
IFNAME
no ip igmp snooping It deletes “IGMP Snooping Profile” for system. Config
filter profile
<1-99>
no ip igmp snooping It deletes “IGMP Snooping Profile” for a specific Config
filter profile interface.
<1-99> interface
IFNAME

Host-Query-Message Block Functions


Operator can configure the ability to block “IGMP-Query-Messages” from the subscriber port.

Commands Description Mode


ip igmp snooping Block “All Host-Queries” for VLAN or allow “Host- Config
ignore host-query Queries” that are passed in a specific interface.
(all|except
port IFNAME)
vlan VLAN_ID

166
COAX G.hn Access Multiplexer User Manual

no ip igmp snooping Deletes “Blocking All Host-Queirys for VLAN” or Config


ignore host-query Deletes “Allow Host-Query” for a specific interface.
(all|except
port IFNAME)
vlan VLAN_ID

IGMP Snooping Proxy Settings

IGMP proxy has a system operate as a single host for multicast router of upper layer, and as a
multicast router for hosts of lower layer. IGMP proxy manages hosts membership by sending
Query messages periodically as multicast router does. Then if IGMP proxy receives a Query
message from multicast router of upper layer, it sends a report as a single host does by referring
membership table that it is managed by itself.

IGMP Snooping Proxy Activation


Table shows commands that activate IGMP snooping Proxy.

Commands Description Mode


ip igmp snooping proxy vlan It sets “IGMP Snooping Proxy Mode” Config
VLAN_ID for a specific VLAN.
no ip igmp snooping proxy vlan It deletes “IGMP Snooping Proxy Config
VLAN_ID Mode” for a specific VLAN.

IGMP Snooping Static Group

Generally, if IGMP snooping is activated, Hosts can be registered to or leaved from “The
Multicast Group” dynamically (automatically) in accordance with IGMP message. If needed,
operator can register a desired port for a specific group or set for specific multicast traffic to
transmit to the system.

IGMP Snooping Static Group Setting

167
COAX G.hn Access Multiplexer User Manual

A host in system registers ports to static group using a command “IP IGMP Snooping Static
Group”. If the host specifies only group address, the host transmits multicast traffic of the
corresponding group to the system by sending IGMP report message to multicast router of upper
Layer. In addition, if assigning a specific port, the group membership table can be created with
“traffic flow for a specific port”. Table introduces commands registering for/ leaving to static
group.

Commands Description Mode


ip igmp static-group It registers “IGMP Static Grouip”, Config
A.B.C.D vlan VLAN_ID “Source IP”, and “Reporter IP”, for a
[port <IFNAME>] VLAN
[source A.B.C.D]
[reporter A.B.C.D]
no ip igmp static-group It deletes “IGMP Static Group” for as Config
A.B.C.D vlan VLAN_ID VLAN
[port <IFNAME>]
ip igmp static-group range It registers “IGMP Static Grouip” with Config
A.B.C.D A.B.C.D vlan VLAN_ID the ramge of “Source IP”, and
[port <IFNAME>] “Reporter IP”, for a VLAN
[source A.B.C.D]
[reporter A.B.C.D]
no ip igmp static-group range It deletes “IGMP Static Group” with IP Config
A.B.C.D A.B.C.D vlan VLAN_ID range for as VLAN
[port <IFNAME>]
show ip igmp static-group Shows the registered static groups. Enable

IGMP Snooping Access-List Settings

The command to set IGMP static join function to the IGMP group by specifying Access-list is as
follows.

Commands Description Mode


ip igmp static-group list Specify the IGMP group as an Config

168
COAX G.hn Access Multiplexer User Manual

[<1-99>|WORD] vlan VLAN_ID IGMP static join function by


[port <IFNAME>] specifying Access-list.
no ip igmp static-group Deletes “IGMP Group with Config
A.B.C.D vlan VLAN_ID specific Access-list”.
[port <IFNAME>]
show ip igmp static-group acl Shows the registered static Enable
group access-list.

Display IGMP Snooping information

The following commands are used to check the settings related to IGMP snooping or to check
the information.

Command Description Mode


show ip igmp snooping groups Displays igmp snooping groups Enable
(|IFNAME) (|A.B.C.D) (|detail) information by interface or
group address.
show ip igmp snooping groups Displays igmp snooping groups Enable
count count.
show ip igmp snooping explicit- Display igmp snooping groups Enable
tracking groups (|IFNAME) for all hosts by interface or
(|A.B.C.D) group address.
show ip igmp snooping explicit- Display all hosts igmp snooping Enable
tracking groups count groups.

show ip igmp snooping mrouter Displays igmp snooping Enable


(|IFNAME) mrouter..

show ip igmp snooping profile <1- Display igmp snooping profile Enable
99> configurations.

show ip igmp snooping filter Display igmp snooping filter Enable


(|system|interface IFNAME|profile configurations.
<1-99>) If system or interface profile

169
COAX G.hn Access Multiplexer User Manual

index is set, information


matching the condition is
queried.

170
COAX G.hn Access Multiplexer User Manual

SNMP
(Simple Network Management Protocol)

Introduction to SNMP

SNMP Network Manager manages switches with “Management Information Base (MIB)”. SNMP
Network Manager can provide “Graphical User Interface” for easy management. To use a SNMP
manager, a system can be configured as introduced in table. And to access a SNMP agent in
system, operator can assign one or more IP addresses for this system.

Command Description Mode


snmp enable It activates SNMP Agent. Config
no snmp enable It deactivates SNMP Agent. Config
snmp syslocation string It changes information of System Location. Config
no snmp syslocation Deletes System Location. Config
snmp syscontact string It changes information of System contact- Config
information.
no snmp syscontact Deletes System contact-information. Config
snmp community [ro|rw] It sets SNMP Community. Config
string [A.B.C.D /mask]  ro : read only
 rw : read write
 A.B.C.D /mask : IP address / prefix
length
no snmp community [ro|rw] Deletes “SNMP Community” Config
string [A.B.C.D /mask]
snmp trapcommuity string It assigns “Default Community String" when Config
it sends Trap.

171
COAX G.hn Access Multiplexer User Manual

no snmp trapcommunity It change the community to the default value. Config

snmp trapsink inform A.B.C.D On sending “Information Notification”, it Config


[COMMUNITY] assigns “IP Address” and “Community Name”.
no snmp trapsink inform Deletes snmp trapsink inform configuration. Config
A.B.C.D [COMMUNITY]
snmp trapsink trap A.B.C.D On sending “SNMP V1 Trap”, it assigns “IP Config
[COMMUNITY] Address” and “Community Name”.
no snmp trapsink trap A.B.C.D Deletes snmp trapsink trap configuration. Config
[COMMUNITY]
snmp trapsink trap2 A.B.C.D On sending “SNMP V2 Trap”, it assigns “IP Config
[COMMUNITY] Address” and “Community Name”.
no snmp trapsink trap2 Deletes snmp trapsink trap2 configuration. Config
A.B.C.D [COMMUNITY [PORT]]

Warning The snmp agent’s IP address configuration uses the IP address


configured among the switch’s interfaces. If the interface with

W the configured IP address is in a shutdown state, the IP address


of the snmp agent cannot be set.

172
COAX G.hn Access Multiplexer User Manual

SNMP Community Settings

“Community String” provides a simple Mutual-Authentication between a system and a remote


network manager. The system supports for two types of Community Strings:

 Read community strings


 Read-only access to the system
 The default read-only setting is public
 Read-write community strings
 Read and write access to the system
 The default read and write settings are private

L11206XC(config)# snmp community ro public

L11206XC(config)# snmp community rw private

L11206XC(config)# snmp community ro host 192.168.100.0/24

L11206XC# show snmp community

----------------------------------------------

Type | Community | Source

----------------------------------------------

ro | public |

rw | private |

ro | host | 192.168.100.0/24

Inform If a host is specified, the corresponding community is used

i
only in the specified Sub-Network.

173
COAX G.hn Access Multiplexer User Manual

System Location and Operator

Registration

Following example show “How to setup System-Location and Operator”

L11206XC(config)# snmp syscontact “gdhong@zaram.com”

L11206XC(config)# snmp syslocation “289-11 Yangjaedong Seochogu Seoul”

L11206XC# show snmp syscontact

system contact : gdhong@zaram.com

L11206XC# show snmp syslocation

system location : "289-11 Yangjaedong Seochogu Seoul"

174
COAX G.hn Access Multiplexer User Manual

SNMP Trap Settings

The SNMP agent can send traps to the administrator. A trap is a warning message of the
network which notify to the SNMP manager. Traps information are such as “Invalid User
Authentication”, “System Reboot”, “System Connection Status (enabled or disabled)”, “System
Operation Status”, and “Communication Failure with Neighboring Switches”.

ZARAM system provide “Three Kinds of Trap settings”: “Inform”, SNMP V1 Trap”, and “SNMP
V2 Trap”.

L11206XC(config)# snmp trapsink trap2 192.168.2.184

L11206XC# show snmp trap host

------------------------------------------------------

Type | Host | Community | Port

------------------------------------------------------

trap2 | 192.168.2.184 | |

Inform Supports “Multiple Host Registrations” to send traps to

i
multiple hosts.

When operator set snmp on the system, the following traps are sent by default:

SNMP Trap Desciptions


CPE attach / detach CPE attach or detached information Trap message, in case of
attaching or detaching status.
CPE dying-gasp If the CPE power can be shutdown in short time, it notifys Trap
of “CPE-Dying-Gasp Status”.
cpu threshold A trap message that is sent when the user-configured CPU

175
COAX G.hn Access Multiplexer User Manual

usage threshold is exceeded. In addition, if the CPU usage drops


below the threshold again, it will notify you with a trap message.
fan status Trap messages sent when there is a fan failure in the
equipment. It will also notify you with a trap message if the fan
of the equipment is operating normally again.
ghn factory reset This is the trap message sent when G.hn is factory reset.
ghn firmware upgrade It is a trap message sent when G.hn's firmware is upgraded.
ghn reboot Trap messages sent when G.hn is rebooted.
loop-detect This is a trap message sent when loop-detect is detected or
released on the port.
memory threshold Trap messages sent when memory usage exceeds the memory
threshold set by the operator. In addition, when the memory
usage drops below the threshold again, a trap message is
issued.
System restart This is a trap message sent when the system is rebooted.

user access login/logout Trap message sent when user logged in / out

176
COAX G.hn Access Multiplexer User Manual

SNMP version 3 Settings

SNMPv3 is a standards-based protocol for interoperable network management. SNMPv3


combines packet authentication and encryption technology over the network to provide secure
access to devices. The security features provided by SNMPv3 are:
 Message Integrity – Prevents packets from being tampered with during transmission.
 Authentication – Checks if the message is from a valid source.
 Encryption – Encrypt packet contents so that packets cannot be seen from unauthorized
sources.
SNMPv3 provides both a security model and a level of security. The security model is an
authentication strategy that is set up for users and the groups they belong to. Security level is
the level of security allowed within the security model. The combination of security model and
security level determines the security mechanisms applied when processing SNMP packets.

Command Description Mode


snmp view VIEW Add snmp view. Config
(included|excluded) OID If included, specifies the OID containing the
(|MASK) sub-tree as view. If MASK is not specified, it
is allowed for all specified OIDs.
no snmp view VIEW (|OID) Delete snmp view. Config
snmp group GROUP v3 Addsnmp group. Config
(auth|noauth|priv) (|read Security level can be specified when creating
READ_VIEW) (|write snmp group. ‘noauth’ is for username and
WRITE_VIEW) (|notify ‘auth’ and ‘priv’ are for authentication by
NOTIFY_VIEW) MD5/SHA algorithm. For priv, additionally use
DES encryption.
When creating an snmp group, you can
specify the view to allow for the group. When
specifying a view, ‘all’ or a specific view
name can be set. If not set, ‘none’ is
operated.
no snmp group GROUP Deletes snmp group. Config
snmp user USER (|group Add snmp user. Config
GROUP) (md5|sha) If no group is specified when creating the
AUTH_KEY (|des snmp user, all oids have privileges.
PRIVATE_KEY) The authentication key can be set from a
minimum of 8 characeters to maximum of 32
characters.

177
COAX G.hn Access Multiplexer User Manual

no snmp user USER Deletes snmp user. Config


show snmp view (|VIEW) Displays snmp view configuration. Enable
show snmp group (|GROUP) Displays snmp group configuration. Enable
show snmp user (|USER) Displays snmp user configuration. Enable

L11206XC(config)# snmp view view_system included .1.3.6.1.2.1.1

L11206XC(config)# snmp group g_system v3 noauth read view_system write view_system notify all

L11206XC(config)# snmp user u_system group g_system md5 asdf1234

L11206XC(config)# end

L11206XC# show snmp view

-----------------------------------------------------------------------------

View name | Type | SubTree | Mask

-----------------------------------------------------------------------------

view_system | included | .1.3.6.1.2.1.1 |

L11206XC# show snmp group

-----------------------------

Group name : g_system

-----------------------------

Security model : usm

Security level : noauth

Read view : view_system

Write view : view_system

Notify view : all

178
COAX G.hn Access Multiplexer User Manual

L11206XC# show snmp user

-----------------------------

User name : u_system

-----------------------------

Group name : g_system

Authentication protocol : MD5

Authentication passphrase : asdf1234

Privacy protocol : <no priv specified>

179
COAX G.hn Access Multiplexer User Manual

Syslog

Logging

The Syslog shows all configuration information and alarm occurrence information. “System
Logging Software” stores log messages in the system’s memory and can send this log messages
to other devices.

This system basically stores and sends “Debugging Level Logs” to the internal buffer and the
system console. Operator can use the CLI to control which system messages are logged. And
the system stores up to approximately “1000 Syslog Messages” in the system buffer. System
administrators can remotely monitor system status “Telnet”, “Console”, or “By monitoring system
logs in the syslog server”.

This equipment has severity levels from 0 to 7.

The lower the severity level, the higher the importance.

Severity Level Description


Emergencies (0) System unavailable
Alerts (1) Conditions requiring immediate action
Critical (2) Critical state.
Errors (3) Error message state
Warnings (4) Warning message state
Notifications (5) Normal state but important information.

180
COAX G.hn Access Multiplexer User Manual

Informational (6) An informational message to provide to the user.


Debugging (7) Debugging message

Syslog Message Level Settings

To set the sending location and level of the Syslog message, follow the steps below.

Commands Description Mode


syslog output Sends “Syslog Config
(emerg|alert|crit|err|warning|notice|info|debug) Messages” to
console console.
syslog output Sends “Syslog Config
(emerg|alert|crit|err|warning|notice|info|debug) Messages” to
local {volatine|non-volatile} Internal-System.
syslog output Sends “Syslog Config
(emerg|alert|crit|err|warning|notice|info|debug) Messages” to
remote ip-address specific Hosts with
defined IP-
Address.

To disable Syslog message location and level setting, follow the steps below.

Commands Description Mode


no syslog output Release “the Config
(emerg|alert|crit|err|warning|notice|info|debug) syslog setting”
console which sent to
console.
no syslog output Release “the Config
(emerg|alert|crit|err|warning|notice|info|debug) syslog setting”
local (volatine|non-volatile) which sent to
Internal-System.
no syslog output Release “the Config
(emerg|alert|crit|err|warning|notice|info|debug) syslog setting”
remote ip-address which sent to
specific host with

181
COAX G.hn Access Multiplexer User Manual

defined IP-
address.

Syslog Message Priority Settings

This system can be configed with “Priority of Syslog Message”. The followings show “How to
set the priority of Syslog message” in table.

Commands Description Mode


syslog output priority Sends “Syslog Config
(auth|authpriv|daemon|kern|syslog|user Messages which
emerg|alert|crit|err|warning|notice|info|debug) defined in priority
console levels” to console.
syslog output priority Sends “Syslog Config
(auth|authpriv|daemon|kern|syslog|user Messages which
emerg|alert|crit|err|warning|notice|info|debug) defined in priority
local (volatine|non-volatile) levels” to Internal-
System.
syslog output priority Sends “Syslog Config
(auth|authpriv|daemon|kern|syslog|user Messages which
emerg|alert|crit|err|warning|notice|info|debug) defined in priority
remote ip-address levels” specific
Hosts with defined
IP-Address.

To disable “Syslog Message Priority” and “Level Settings”, follow the steps below.

Commands Description Mode


no syslog output priority Release “the Syslog Config
(auth|authpriv|daemon|kern|syslog|user with Priority
emerg|alert|crit|err|warning|notice|info|debug) Setting” which sent
console to console.
no syslog output priority Release “the Syslog Config
(auth|authpriv|daemon|kern|syslog|user with Priority
emerg|alert|crit|err|warning|notice|info|debug) Setting” which sent

182
COAX G.hn Access Multiplexer User Manual

local (volatine|non-volatile) to Internal-System


no syslog output priority Release “the Syslog Config
(auth|authpriv|daemon|kern|syslog|user with Priority
emerg|alert|crit|err|warning|notice|info|debug) Setting” which sent
remote ip-address to specific host with
IP-address

Syslog Setting Checking

The following commands are used to check syslog related settings or to check syslog messages.

Commands Description Mode


show syslog Show the existing Syslog- Enable
Settings.
show syslog local (volatile|non-volatile) Show “Local Syslog Message Enable
in volatile or non-volatile
memory”
show syslog local (volatile|non-volatile) Show “Local Syslog Message Enable
number in volatile or non-volatile
memory” up to user-defined
message-number
show syslog local (volatile|non-volatile) Show “Local Syslog Message Enable
reverse in volatile or non-volatile
memory” with latest
sequence.
show syslog information (volatile|non- Show “Syslog Memory Usage Enable
volatile) in volatile or non-volatie
memory”.

The command to delete the syslog messages stored in the system is as follows.

Commands Description Mode


clear syslog all Clear “All Local Syslog Enable
Messages in system”
clear syslog {volatile|non-volatile} Clear “All Local Syslog Enable

183
COAX G.hn Access Multiplexer User Manual

Messages in Volatile memory


or Non-volatile memory”

184
COAX G.hn Access Multiplexer User Manual

Syslog Level Settings

CPU Usage-Threshold Level Settings

When this threshold is set for CPU-Usage, this system generates Syslog and snmp traps at
interval intervals when the CPU-Usage exceeds or falls below the threshold. When returning to
normal value, snmp trap does not occur.

If operator do not set a threshold for CPU usage, the default-value is high (70) - low (30) -
interval (60 seconds).

Commands Description Mode


Sets “the CPU usage-threshold Level”. Config
threshold cpu
<31-100> : threshold high
<31-100> (5|60|300)
(5|60|300) :time interval
((<20-100> (5|60|300)|)
<20-100> : threshold low
Release “the CPU usage-threshold Level”. Config
no threshold cpu

Memory Usage-Threshold Level Settings

When this threshold is set for Memory-Usage, this system generates Syslog and snmp traps at
interval intervals when the CPU usage exceeds or falls below the threshold. When returning to
normal value, snmp trap does not occur.

If Memory-Usage-Threshold cannot be set, the default-value is 80.

Commands Description Mode


Sets “the Memory-Usage-threshold Level”. Config
threshold memory VALUE
VALUE : threshold[%] (default: 80%)

no threshold memory Release “the Memory-Usage-threshold Level”. Config

185
COAX G.hn Access Multiplexer User Manual

Fan Operation-Threshold Setting

The system can be set with “FAN Operation Temperature Range”. Operator can assigne the
temperature which FAN operation can start, and for setting with temperature, the margin value
of temperature range also can be set. And more, if the FAN operation mode can be chaned, the
system can notify “Syslog and SNMP Traps”

Normally, margin value set of temperature is provided as option. If not set, the default value
is 5C degree.

Fan in the system can operate two different mode, fast and slow. In normal temperature
copndiotion case, the GAM operates with slow-mode. And if temperature in the system can exceed
20C more, then the GAM operatres with fast-mode.

Commands Description Mode


Sets “Fan Threshold-Operation Values” Config
threshold fan
VALUE : temperature threshold (-40 ~ 100 'C)
VALUE (|margin VALUE)
VALUE : set margin degree (0 ~ 10 'C)

no threshold fan Release “Fan Threshold-Operation” Config

Port-Traffic Bandwidth-Threshold Settings

This equipment can set a threshold value for port traffic. If the port-traffic-bandwidth exceeds
the threshold value set or returns to a normal value (equal to or less than the threshold), Syslog
is generated.

In addition, when the threshold value is exceeded, the corresponding port can be blocked. If
the port traffic exceeds the configured threshold value, the corresponding port is blocked for the
“Expire Timer Time”, and if the 'show ip interface brief' is executed, the port information that is
down is output as 'port-load down'. After “the Expire Timer Time” has elapsed, the port will
operate normally.

Commands Description Mode

threshold port Sets “Port-Traffic-Bandwidth-Threshold” with Config

186
COAX G.hn Access Multiplexer User Manual

(IFNAME | all) THRES time-interval as the followings.


{5sec | 1min | 5min} THRES : Threshold(Kbps), range: 1-
{rx | tx} 10,000,000
(In case of 10G, the range can be configured
to 10,000,000)
(5sec | 1min | 5min) : time interval
(rx | tx) : mode
no threshold port Config
Release “Port-Traffic-Bandwidth-Threshold”
(IFNAME | all) {rx | tx}
Display “the existing Port-Traffic Threshold Config
show port threshold
Value”
threshold port Sets “Port-Traffic-Bandwidth-Threshold” with Config
(IFNAME | all) “Expire-Time-Time” as the followings.
block timer <10-3600> <10-3600> : Expire timer (Second)
no threshold port Release “Blocked Port with Port-Traffic- Enable
(IFNAME | all) block Bandwidth-Threshold”

Temperature Threshold Settings

This equipment provides a function to inform the syslog and snmp trap when the equipment
temperature exceeds the upper threshold value and falls below the lower threshold value once
the equipment temperature threshold is set.

It also provides the capability to notify you via syslog and snmp traps when falling below the
upper threshold in case of “above the upper threshold stage”, and beyond the lower threshold in
case of “below the lower threshold stage”.

Commands Description Mode


Sets “Temperaure Threshold” with the Config
threshold temperature following value.
VALUE VALUE VALUE : overload threshold (-40 ~ 100 'C)
VALUE : underload threshold (-40 ~ 100 'C)

no threshold temperature Release “Temperature Threshold” Config

187
COAX G.hn Access Multiplexer User Manual

Transceiver

Introduction to transceiver

This equipment has an optical module transceiver that supports the DDM (Digital Diagnostic
Monitoring) function in the SFP (Small Form Factor Pluggable) module type port. If the DDM
information of the module or DDM Threshold value set by the user is out of the range, the relevant
information is informed for quick response.

DDM (Digital Diagnostic Monitoring) is a function that monitors the module's status information
such as transceiver's temperature, power and bias.

DDM Monitoring configuration

To monitoring DDM information in the SFP module type transceiver, set the following command.

Commands Description Mode


threshold transceiver Config
Enable monitoring DDM information in the SFP
ddm-monitoring
module. (default: disable)
(enable|disable)

Inform If the ddm-monitoring feature is enabled but is not

i
monitored if the transceiver does not support the DDM
feature or if the port to which the SFP module is connected
is in the shutdown state.

188
COAX G.hn Access Multiplexer User Manual

Threshold configuration

If the DDM feature is enabled and supports the feature, you can monitor the status by setting
a threshold value for each port to which the transceiver is connected.

Commands Description Mode


threshold transceiver Instead of the transceiver DDM threshold, it is Config
IFNAME monitoring with the DDM threshold value set
(temp|vcc|bias| by the user.
tx-power|rx-power)
(alarm|warn)
OVER UNDER
no threshold transceiver Clears the DDM threshold set by the user and Config
IFNAME monitoring with the DDM threshold of the
(temp|vcc|bias| transceiver.
tx-power|rx-power)
(|alarm|warn)
threshold transceiver Config
The all alarm or warn value is monitoring by
IFNAME
the DDM threshold value of the transceiver.
default (alarm|warn)

Inform When the transceiver DDM-monitoring function is activated,

i
the DDM threshold information set by the user is monitored
with high priority, and monitoring is performed with the DDM
threshold information set in the transceiver only when there
is no user setting.

Display threshold information

To check the currently connected transceiver information, use the following command. In
addition to DDM information, you can check the transceiver information such as type and
connector type.

189
COAX G.hn Access Multiplexer User Manual

Commands Description Mode


Display information on all transceivers Enable
show port transceiver connected to the SFP module port of the
device.

To check only the DDM threshold information of the transceiver and the information set by the
user, use the following command.

Commands Description Mode


Display the DDM threshold information of the Enable
show threshold transceiver transceiver connected to the SFP module
port and the user set information.

L10212XC (config)# show threshold transceiver

Threshold transceiver monitoring enable


Warning Alarm
port type current under over under over mode
----- ----------------- --------- -------- -------- -------- -------- -----
xe1 Temperature('C) 47.00 0.00 70.00 -5.00 75.00 SFP
- - - - USER
Vcc(V) 3.32 3.10 3.48 3.08 3.50 SFP
- - - - USER
Bias(mA) 18.75 4.00 80.00 2.00 90.00 SFP
- - - - USER
Tx-Power(dBm) -4.50 -8.50 1.00 -9.00 2.00 SFP
- - - - USER
Rx-power(dBm) N/A -19.00 1.00 -20.00 2.00 SFP
- - - - USER

xe2 Not Supported

Inform If the transceiver does not support the DDM function or if

i
the port to which the SFP module is connected is in the
shutdown state, no information is display.
If the transceiver is in the Loss state, the Rx-power value is
displayed as 'N/A' and is not monitored.

190
COAX G.hn Access Multiplexer User Manual

191
COAX G.hn Access Multiplexer User Manual

Alarm / Event

Introduction to Alarm / Event

Alarm or Event information informs the operator of a system failure, allowing for rapid
processing and repair. The system outputs alarm and event information to the system console
and, if snmp is set, snmp trap informs you of a failure.

Alarm and Event information have the following severity level.

Category Severity
critical
Alarm major
minor
critical
major
Event
minor
informational

192
COAX G.hn Access Multiplexer User Manual

Alarm Setting

Alarm information generated by this system is as follows.

Alarm Name Description


link-down Alarm that occurs when port is no shutdown and link is down.
loop-detect Alarm that occurs when loop-detect is detected on the port.
cpu-threshold-over Alarm that occurs when CPU usage over the CPU usage
threshold set by the user.
mem-threshold-over Alarm that occurs when memory usage over the memory
usage threshold set by the user.
temp-threshold-over Alarm that occurs when temperature usage over the
temperature usage threshold set by the user.
temp-threshold-under Alarm that occurs when temperature usage under the
temperature usage threshold set by the user.
fan-fail Alarm that occurs when there is an error in the fan.
cpe-loop-detect Alarm that occurs when loop-detect is detected on the CPE
port.
config-write-fail Alarm that occurs when a user fails to save settings or changes
to flash memory.
transceiver-unequip Alarm that occurs when a transceiver is not connected to the
equipment.
transceiver-los Alarm that occurs when there is no rx signal from the optical
transceiver.
transceiver-temp Alarm that occurs when the temperature of a transceiver that
supports DDM is higher or lower than the alarm value.
transceiver-vcc Alarm that occurs when the vcc of a transceiver that supports
DDM is higher or lower than the alarm value.
transceiver-bias Alarm that occurs when the bias of transceiver supporting
DDM is higher or lower than alarm value.
transceiver-tx-power Alarm that occurs when the tx-power of a transceiver
supporting DDM is higher or lower than the alarm value.
transceiver-rx-power Alarm that occurs when the rx-power of a transceiver
supporting DDM is higher or lower than the alarm value.

193
COAX G.hn Access Multiplexer User Manual

port-threshold-over Alarm that occurs when port traffic exceeds the threshold you
set and is set to block.
cpu-flood-guard-detect Alarm that occurs when a packet destined for the CPU exceeds
the pps set by the user.
mac-flood-guard-detect Alarm that occurs when a packet destined for the CPU on a
particular port exceeds the pps you set.

Checking the current alarm information on the system is as follows.

Commands Description Mode


Check the currently generated alarm Enable
show alarm current
information.

You can set the current system to not generate specific alarm information or to pass it to a
specific server in snmp trap messages.
disabled alarm information is not displayed in the current alarm information generated by the
system, and no occurrence or release information is passed to the snmp trap. If alarm information
already generated on the system is disabled, the alarm release information is passed to the snmp
trap. If the alarm is not disabled when enabled, alarm information is passed to snmp trap. If you
change severity, the alarm information is cleared before the change and the changed alarm
information is passed to the snmp trap.

Commands Description Mode


alarm generate {enable | Enable or disable alarm. Config
disable} alarmName alarmName : Alarm Name
alarm severity alarmName Config
Sets alarm severity.
{critical | major | minor}

To view information about the currently set alarm entries, use the following command.

Commands Description Mode

show alarm list View the current alarm. Enable

194
COAX G.hn Access Multiplexer User Manual

Event Setting

Event information generated by this system is as follows.

Event Name Description


link-up / down Event trap messages that occur when the state of a port is either
in shutdown state or no shutdown state.
fan-on / off Event trap message that occurs when equipment fan is on or
off.
sys-reboot / Event trap messages that occur when the instrument is
restore-factory rebooted or factory reset.
log-in / out Event trap message when user login or logout occurs.
sys-connection / Event Trap Messages Occur When a Is snmp connected or
disconnection Disconnected.
sync-master / slave Event trap message that occurs when a G.hn connection
changes to master or slave.
ghn-reboot / Event trap message that occurs when G.hn is rebooted or
factory-reset factory reset.
ghn-firmware-upgrade Event trap message that occurs when G.hn firmware is
upgraded.
ghn-dying-gasp Event trap message that occurs when G.hn loses power.

ghn-co-attach / detach Event trap message that occurs when co is attached or


detached.
ghn-cpe-attach / detach Event trap message that occurs when a cpe is attached or
detached.
sys-update-start / Event trap messages that occur when a system update to start
finish / fail / shut down / fail.
fw-auto-update start / Event trap messages that occur when a firmware auto-update
finish / fail to start / shut down / fail.
fw-manual-update start/ Event trap messages that occur when a firmware manual-
finish / fail update to start / shut down / fail.
transceiver-temp / vcc / Event trap message that occurs when the current value of a
bias / tr-power / transceiver that supports DDM is lower than over or below the
rx-power warn set in DDM.

195
COAX G.hn Access Multiplexer User Manual

port-threshold-over Event trap messages that occur when traffic on a particular


port exceeds a threshold you set and is un-block.

You can set the event information generated by the equipment to not pass the event
information that is lower than the level set using the Criteria. For example, if you set Criteria to
minor, no information is passed to the information that Evnet server is lower than minor. Setting
the Criteria for an Event is as follows.

Commands Description Mode


snmp trap criteria event Config
{critical | major | minor Sets criteria level.
| informational}

You can also set whether to send event information to snmp trap with the following command.

Commands Description Mode


snmp trap {enable | Config
Enable or disable event.
disable} event eventName

The severity of event can be set with the command.

Commands Description Mode


snmp trap severity event Config
Sets severity of evnet.
eventName

Use the following command to view the currently set Criteria information and event
information.
Commands Description Mode
View current criteria and event settings Enable
show snmp trap event list
information.

196
COAX G.hn Access Multiplexer User Manual

QOS
(Quality of Service)

Introduction to QOS

QoS (Quality of Service) of a network is a capability to set priorities of packets passing through
the network, and to ensure transmission performance for important data.

Generally, “control packet” running over the network must be processed with the highest
priority. If the control packet is processed incorrectly, network crisis may be occurred and more
data may not be transmitted.

VOIP and IPTV require “immediacy” and sufficient bandwidth to ensure seamless telephone
conversation/ broadcasting. The most used data on the current internet is HTTP web information,
and this requires sufficiently rapid transmission to use the internet at ease.

P2P packets for file sharing require less bandwidth to have no effect on the use of internet and
prevent viral packets to protect a network.

197
COAX G.hn Access Multiplexer User Manual

QOS Operation Flow

QoS in a general network device operates in the following order:

1. Classification
2. Policing
3. Marking & remarking
4. Scheduling

Classfication

To identify if a certain packet is more important than the others among the packets over a
network, various methods are needed to classify them. In a TCP/ IP based network, headers of
L2, L3, and L4 are used to identify the packet type.

For example, Telnet is connected to TCP port number 23, HTTP to TCP port number 80, DHCP
to UDP port number 67/ 68. Packets can be classified by this information, or using IP addresses
of servers and switches or MAC address. COS field in the MAC header and DSCP field in the IP
header are assigned for QoS. If other devices fill the field, it is possible to use the value for QoS.

Information introduced in table can be used for QoS classification. In addition, combination of
the information is available for the QoS classification. As mentioned previously Telnet uses TCP
port number 23. If a protocol type of L3 is TCP and a source port (or destination port) of L4 is
23, then the network is based on Telnet.

Layer 1 Interface (port)


Layer 2 Destination MAC address
Source MAC address
Ethertype
VLAN ID
COS (class of service, 802.1q)
Layer 3 Source IP address
Destination IP adress
DSCP(Differentiated Services Code Point)

198
COAX G.hn Access Multiplexer User Manual

Protocol Type (TCP / UDP / etc)


Layer 4 TCP/UDP source port
TCP/UDP destionation port

Use QOS classification, first need a rule. Create a rule is use "rule NAME create" command,
move to rule mode. Move to rule mode, create rule must use "apply" command. Modify a rule
once created, must use the "rule NAME modify" command.

Commands Description Mode


rule NAME create Create "rule" config

rule NAME modify Modify "rule" config

apply Apply current configure in a rule config-rule

no rule NAME Release "rule" config

The following command set QOS classification. You can set only one QOS classification
information in one rule. IPv4 and IPv6 cannot be set together.

Commands Description Mode


mac Set "MAC address" config-rule
{MAC | any} Source MAC address
{MAC | any} Destination MAC address
mac mask Set "MAC address" and "MASK" config-rule
{MAC MASK | any} Source MAC address / Source MAC Mask
{MAC MASK | any} Destination MAC address / Destination MAC Mask
no mac Release "MAC address" config-rule

ip Set "IP address" config-rule


{A.B.C.D | A.B.C.D/M | Source IP address
any} Source IP address/Source IP Mask
{A.B.C.D | A.B.C.D/M | Destination IP address
any} Destination IP address/Destination IP Mask
ip Set "IP address" and "IP protocols number" config-rule
{A.B.C.D | A.B.C.D/M | IP protocol (Dec) :: = <0-255>
any} IP protocol mask (Hex) ::= MASK
{A.B.C.D | A.B.C.D/M |

199
COAX G.hn Access Multiplexer User Manual

any} <0-255> {|MASK }

ip Set "IP address" and "specific IP protocol" config-rule


{A.B.C.D | A.B.C.D/M |
any}
{A.B.C.D | A.B.C.D/M |
any}
{igmp | icmp | tcp | udp}
ip Set "IP address" and "message type of icmp config-rule
{A.B.C.D | A.B.C.D/M | protocol ", "Code value of icmp protocol "
any} icmp Message type ::= {<0-255>|any}
{A.B.C.D | A.B.C.D/M | icmp Code value ::= {<0-255>|any}
any} icmp
{<0-255>|any}
{<0-255>|any}
ip Set "IP address" and "port number of tcp or udp config-rule
{A.B.C.D | A.B.C.D/M | protocols"
any} Source port number ::= {< 0-65535>|any}
{A.B.C.D | A.B.C.D/M | Destination port number ::= {< 0-65535>|any}
any} {tcp | udp}
{< 0-65535>|any}
{< 0-65535>|any}
ip Set "IP address" and "port number range of tcp config-rule
{A.B.C.D | A.B.C.D/M | or udp protocols"
any} rule l4-port-range index ::= {<1-4>|any}
{A.B.C.D | A.B.C.D/M | rule l4-port-range index ::= {<1-4>|any}
any} {tcp | udp} range Warrning: Use to port range, first set "rule l4-
{<1-4>|any} port-range" command.
{<1-4>|any}
no ip Release "IP address" config-rule

ipv6 Set "IPv6 address" config-rule


{X:X::X:X | X:X::X:X/M | Source IP address
any} Source IP address/Source IP Mask
{X:X::X:X | X:X::X:X/M | Destination IP address
any} Destination IP address/Destination IP Mask
ipv6 Set "IPv6 address" and "IPv6 next header" config-rule

200
COAX G.hn Access Multiplexer User Manual

{X:X::X:X | X:X::X:X/M | IPv6 protocol (Dec) :: = <0-255>


any} IPv6 protocol mask (Hex) ::= MASK
{X:X::X:X | X:X::X:X/M |
any} <0-255> {|MASK }
ipv6 Set "IPv6 address" and " specific IPv6 next config-rule
{X:X::X:X | X:X::X:X/M | header"
any}
{X:X::X:X | X:X::X:X/M |
any} {hop-by-hop |
routing | fragment |
authentication |
destination | esp |
mipv6 | icmpv6 | tcp
| udp}
ipv6 Set "IPv6 address" and "port number of tcp or config-rule
{X:X::X:X | X:X::X:X/M | udp protocols"
any} Source port number ::= {< 0-65535>|any}
{X:X::X:X | X:X::X:X/M | Destination port number ::= {< 0-65535>|any}
any} {tcp | udp}
{< 0-65535>|any}
{< 0-65535>|any}
ipv6 Set "IPv6 address" and "port number range of config-rule
{X:X::X:X | X:X::X:X/M | tcp or udp protocols"
any} rule l4-port-range index ::= {<1-4>|any}
{X:X::X:X | X:X::X:X/M | rule l4-port-range index ::= {<1-4>|any}
any} {tcp | udp} range Warrning: Use to port range, first set
{<1-4>|any} "rule l4-port-range" command.
{<1-4>|any}
no ipv6 Release "IPv6 address" and "IPv6 next header" config-rule

ipv6 traffic-class Set "IPv6 traffic class value" config-rule


<0-255> Warrning: It cannot be used with the dscp
command.
no ipv6 traffic-class Release "IPv6 traffic class value" config-rule

cos <0-7> Set "802.1q CoS value" config-rule

201
COAX G.hn Access Multiplexer User Manual

no cos Release "CoS value" config-rule

dscp <0-63> Set "DSCP value" config-rule

no dscp Release "DSCP value" config-rule

vlan <1-4094> Set "vlan id" config-rule

no vlan Release "vlan id" config-rule

ethertype {arp | ipv4 | Set "specific ethernet-type" config-rule


ipv6 | lldp | loopback |
ppp|pppoe-discovery |
pppoe-session | rarp}
ethertype ETHERTYPE Set "ethernet-type value" and "Mask" config-rule
{|MASK} ETHERTYPE (Hex) ::= ETHERTYPE
MASK (Hex) ::= MASK
no ethertype Release "ethernet-type value" config-rule

Inform The rule with ethertype information set cannot be set in the

i
egress policy. Also, you cannot set ethertype information in the
rule included in the policy.
The port information in the ip protocol is matched only in
packets with an IP address set.

To use port number range of TCP or UDP, use the following CLI.

Commands Description Mode


rule l4-port-range Set "port range of TCP or UDP protocols" config
{tcp | udp} <1-4> Starting port number ::= <0-65535>
{source | destination} Ending port number ::= <0-65535>
<0-65535> <0-65535>
no rule l4-port-range Release "port range of TCP or UDP protocols" config
{tcp | udp} <1-4>

To check information of rule, use the following CLI.

Commands Description Mode

202
COAX G.hn Access Multiplexer User Manual

show current-rule Display current information of rule. config-rule

show rule {|NAME} Display information of specific rule or set all rule. enable

After created a rule to set QoS classification, must first create a policy to classify the packets
according to the rule setting. The policy can set Ingress or Egress. The following command create
policy CLI.

Commands Description Mode


policy {ingress | Create ingress or egress "policy" config
egress} NAME create
policy {ingress | Modify ingress or egress "policy" config
egress} NAME modify
apply Apply current configure in a policy of ingress or policy-mode
egress.
no policy {ingress | Release ingress or egress "policy" config
egress} NAME

Use the following CLI to view the currently set information for an ingress or egress policy.

Commands Description Mode


show current-policy Display current information of policy. policy-mode

show policy {ingress | Display information of specific policy or set all enable
egress} {|NAME} policy.

Create an ingress or egress policy and set the rule and interface for which QOS classification
information is set. This performs the classification of packets received in the following structure:

203
COAX G.hn Access Multiplexer User Manual

When a packet is received, classification is performed in three categories according to the


packet type. If any IPv4 information (ip, dscp) is set in the set rule, only IPv4/ARP packet type is
matched. If IPv6 information (ipv6, traffic-class) is set, only IPv6 packet type is matched. If there
is no IPv4 information and IPv6 information, a match is performed for all packet types.
Use the following CLI to set the rule and interface in an ingress or egress policy.

Commands Description Mode


rule NAME Set "specific rule" policy-mode

no rule NAME Release "specific rule" policy-mode

service interface Set "specific interface" policy-mode


{WORD | all} WORD : single or range interface name
all : available all interface
no service interface Release "specific interface" policy-mode
{WORD | all}

Inform Flooded packets that do not have a destination address or

i
that have not been learned by the device will not match the
egress policy.

For the egress policy, you can specify and use CPU ports using the following commands instead
of the interface.

Commands Description Mode


service cpu Set "CPU port" in policy policy-egress

no service cpu Release "CPU port" in policy policy-egress

One policy can have mutiple rule. And if after set the rule in policy, it can modify any time a
rule. However, if delete the rule set in the policy, it only by releasing the rule from the set policy.

204
COAX G.hn Access Multiplexer User Manual

For example, to can classify a packet that has an IP Source address of 10.1.1.1, a Destination
address of 10.1.1.0/24, and a MAC Source address of 0000.0000.0101 among the packets that
are input to interface xe1 and xe2.

L10212XC(config)# rule ip-rule create


L10212XC(config-rule[ip-rule])# ip 10.1.1.1 10.1.1.0/24
L10212XC(config-rule[ip-rule])# apply
L10212XC(config-rule[ip-rule])# exit
L10212XC(config)# rule mac-rule create
L10212XC(config-rule[mac-rule])# mac mask 0000.0000.0101 0000.0000.ffff any
L10212XC(config-rule[ip-rule])# apply
L10212XC(config-rule[ip-rule])# exit
L10212XC(config)# policy test create
L10212XC(config-policy[test])# rule ip-rule
L10212XC(config-policy[test])# rule mac-rule
L10212XC(config-policy[test])# service interface xe1,xe2
L10212XC(config-policy[test])# apply

Policing

Policy is a setting that is used as a plan for classified traffic. General meaning of a policy in a
narrow sense is a setting to assign the bandwidth.

Bandwidth can be fixed or guaranteed (guaranteed + best effort), and if it is available, it is


guaranteed to work only below the specified value (rate limit). This depends on how many
different functions the provided network control module offers. Generally, policing or rate limit
dumps the excessive traffic over the setting value without question.
To adjust the bandwidth of the packets classified by the rule set in the policy, a policer must
be created and set. To create policer, use the following CLI.

Commands Description Mode


policer {ingress | Create ingress or egress "policer" config
egress} NAME create
policer {ingress | Modify ingress or egress "policer" config
egress} NAME modify
apply Apply current configure in a policer of ingress policer-mode
or egress.

205
COAX G.hn Access Multiplexer User Manual

no policer {ingress | Release ingress or egress "policer" config


egress} NAME

Policer uses Metering for bandwidth control. Metering uses the Token Buckets method. This
method constantly fills the token buckets at a constant rate. When a packet arrives, if there is a
Token equal to the size of the packet, it is allowed to transmit the packet and subtract the used
Token. If a packet does not have enough tokens to use, it will not allow packet transmissions.
There are SRTCM and TRTCM methods that work this way.

 SRTCM (Single Rate Three Color Marking): Fills Token with two Token Buckets called
CBS (Committed Burst Size) and EBS (Excess Burst Size) at the rate of CIR (Committed
Information Rate). When a packet arrives, if the Token in the CBS is available for the
size of the packet, it is marked Green. If Token of CBS can not be used and Token of
EBS is available, it is marked Yellow. If Token is not available for CBS and EBS, it is
marked Red.

 TRTCM (Two Rate Three Color Marking) : Instead EBS of SRTCM, use Token Buckets
called PBS (Peak Burst Size). Fills token with PBS at the rate of PIR (Peak Information
Rate), CBS at the rate of CIR. When a packet arrives, if the Token in the PBS can not
be used by the size of the packet, it is marked Red. If it can use a Token in PBS but not
Token in CBS, it is marked Yellow. If both the tokens in PBS and CBS are available, it is
marked Green.

One policer can be set to only one meter mode. To set the Metering on the policer, use the
following CLI.

Commands Description Mode


meter srtcm Set meter mode to "srtcm" policer-mode
cir <1-10000000> cir (kbps) ::= <1-10000000>
cbs <12-1000000> cbs (kbyte) ::= <12-1000000>
ebs <12-1000000> ebs (kbyte) ::= <12-1000000>
meter trtcm Set meter mode to "trtcm" policer-mode
cir <1-10000000> cir (kbps) ::= <1-10000000>
cbs <12-1000000> cbs (kbyte) ::= <12-1000000>
pir <1-10000000> pir (kbps) ::= <1-10000000>
pbs <12-1000000> pbs (kbyte) ::= <12-1000000>

206
COAX G.hn Access Multiplexer User Manual

meter rate-limit Set meter mode to "rate-limit" policer-mode


<1-10000000> Warrning: Unable to set color marking packets.
no meter Release meter mode policer-mode
Warrning: The setting for the color marking
packet that has been set is also released
color {red | yellow} Set packet drop red or yellow marked packets. policer-mode
action drop
no color {red | yellow} Release packet drop red or yellow marked policer-mode
action packets.

To check information of policer, use the following CLI.

Commands Description Mode


show current-policer Display current information of policer. policer-mode

show policer {ingress | Display information of specific policer or set all enable
egress} {|NAME} policer.

To use the policer, you must first set the policy using the following CLI. Only one policer can
be set in one policy.

Commands Description Mode


attach policer NAME Set "specific policer" config-policy

no attach policer NAME Release "specific policer" config-policy

Inform The policy and the policer you want to set can only be set if

i
the ingress / egress type is the same.

For example, can adjust the bandwidth to 100 megabits using the srtcm method for packets
with a destination address of 10.1.1.0/24 among the packets coming into interface xe1.

207
COAX G.hn Access Multiplexer User Manual

L10212XC(config)# rule ip create


L10212XC(config-rule[ip])# ip any 10.1.1.0/24
L10212XC(config-rule[ip])# apply
L10212XC(config-rule[ip])# exit
L10212XC(config)# policer 100m create
L10212XC(config-policer[100m])# meter srtcm cir 100000 cbs 100 ebs 100
L10212XC(config-policer[100m])# color red action drop
L10212XC(config-policer[100m])# apply
L10212XC(config-policer[100m])# exit
L10212XC(config)# policy test create
L10212XC(config-policy[test])# rule ip
L10212XC(config-policy[test])# service interface xe1
L10212XC(config-policy[test])# attach policer 100m
L10212XC(config-policy[test])# apply

Counting

Counting allows the counter to check the information that packets are classified according to
the set policy.

There are a total of three lookup engines in the policy engine, each separated by a policy
priority. The priority of the policy is the default value of medium when it is created and can be
set to high using the command. For low, reserved information is being used by the system.
Lookup engine performs action on packets that match packet classification information and
matches packet classification information set in the next Lookup engine. If packet drop is set in
the action of a Lookup engine set to high, the matching packet may drop and the packet
classification may not be performed in the next Lookup engine.
In the ingress policy, you can set the following command to prevent the lookup command from
performing packet classification for the next lookup engine.

Commands Description Mode

lookup {enable | disable} Set the next lookup engine action policy-ingerss
enable : Checked next lookup engine
disable : Do not checked next lookup engine
no lookup Do not checked next lookup engine policy-ingerss

Counting only works on the lookup engine of high and medium. The counter must be attached

208
COAX G.hn Access Multiplexer User Manual

to the policy before the counter can operate. Use the following CLI for counting.

Commands Description Mode


priority high Set Lookup Engine priority to high in policy policy-mode

no priority Modify Set Lookup Engine priority to medium in policy-mode


policy
attach counter Set "counter" policy-ingress

no attach counter Release "counter" policy-ingress

show policy counter Display specific counter in policy or set all enable
{|NAME} counter in policy
clear policy counter Clear specific counter in policy or set all counter enable
{|NAME} in policy

Inform Counting does not work in the egress policy.

i
A policer can also set a counter. The counter of the policer is classified by policy and checks
the packet information for the color marking through the meter setting. To use counter in policer,
use the following CLI.

Commands Description Mode


attach counter Set "counter" policer-mode

no attach counter Release "counter" policer-mode

show policer counter Display specific counter in policer or set all enable
{|NAME} counter in policer
clear policer counter Clear specific counter in policer or set all enable
{|NAME} counter in policer

Marking and remarking

L2 Ethernet header of the 802.1q tagged frame includes 3-bit long COS field. The COS field is
set with the number ranging from 0 to 7, and the COS value can be utilized by the next network

209
COAX G.hn Access Multiplexer User Manual

device. For this reason, filling the COS field is called “Marking”. In the case that a number is
already existed in the COS field, replacing with a new number is called “Remarking”.
L3 IP header includes 8-bit long field having the same purpose. Upper 6-bit is used for DSCP
mapping and lower 2-bit for congestion control. The upper 6-bit is set using more advanced
options ranging from 0 to 63, because the field is 6-bit long. Filling or replacing this DSCP field is
called “Marking or Remarking” as well. The lower 2-bit is used to control the congestion and
called ECN.
Generally, QoS of network devices has a function that identifies COS or DSCP to classify and
can utilize this function in Classification. In addition, QoS is able to perform the classification by
itself regardless of this function. However, because malicious user may set high value to COS or
to DSCP which a part of a viral packet is, the corresponding information cannot be trusted without
question.

Commands Description Mode


action cos <0-7> Sets “Specified Packet with 802.1q CoS value” policy-mode
Warning: When set, it is egress with “Queue 0.
If operator want egress to another queue, use
“Modify queuing operation”.
no action cos Release “Specified Packet with 802.1q CoS policy-mode
value”
action dscp <0-63> Sets “Specific Packet with DSCP value” policy-mode
Warning: When set, it is egress with “Queue 0.
If operator want egress to another queue, use
“Modify queuing operation”.
no action dscp Release “Specific Packet with DSCP value” policy-mode

action vlan <1-4094> Sets “Specific Packet with VLAN ID” policy-mode

no action vlan Release “Specific Packet with VLAN ID” policy-mode

action queuing <0-7> Let the corresponding packet egress to a policy-ingress


particular queue
no action queuing Release egress to a particular queue policy-ingress

Inform Action queuing commands are not available in the egress

i
policy.

210
COAX G.hn Access Multiplexer User Manual

If only the egress policer is set, you can use the remarking cos and dscp values for the color
marking packets that are metered. But, the cos and dscp remarking cannot be used together.

Commands Description Mode


remark dscp Set the dscp value of a color-marked packet policer-egress
{green|yellow|red} to the specified value.
<0-63> to <0-63>
remark dscp Set the dscp value for the range of color- policer-egress
{green|yellow|red} marked packets to the specified value.
<0-63> <0-63> to
<0-63>
remark dscp Set all dscp values for the color-marked policer-egress
{green|yellow|red} packets to the specified value.
all to <0-63>
no remark dscp Release dscp remarking of color-marked policer-egress
{green|yellow|red} packets
remark cos Set the cos value of a color-marked packet to policer-egress
{green|yellow|red} the specified value.
<0-7> to <0-7>
remark cos Set the cos value for the range of color- policer-egress
{green|yellow|red} marked packets to the specified value.
<0-7> <0-7> to
<0-7>
remark cos Set all cos values for the color-marked policer-egress
{green|yellow|red} packets to the specified value.
all to <0-7>
no remark cos Release cos remarking of color-marked policer-egress
{green|yellow|red} packets

Warning If remarking is set in the policer in which the policy for which
you set marking is set, policy marking may be performed first
W and the policer marking action may not be performed properly.

211
COAX G.hn Access Multiplexer User Manual

Action

In addition to marking / remarking, operator can additionally specify the following commands
for classified packets.

Commands Description Mode


action “drop” discards packets. policy-ingress
{drop| “mirror-to-cpu” replicates and forwards the
mirror-to-cpu| packet to the CPU port.
trap-to-cpu} “trap-to-cpu” will only forward packets to the
CPU port.
no action Release packet action policy-ingress
{drop|
mirror-to-cpu|
trap-to-cpu}
action redirect IFNAME “redirect” sends the packet to another interface policy-ingress
which is different port, not its original
destination.
no action redirect Release "redirect" policy-ingress

For the progress policy, you can specify additional actions using the CLI.

Commands Description Mode


action drop “drop” discards packets. policy-egress

no action drop Release packet action. policy-egress

Scheduling

Packets with classification, can be assigned “specific priority”. In case of this, it is necessary to
process it in the egress part first. To do this, operator assigns several packet queues in egress
and put them in a queue with a high priority according to their importance so that they can be
processed quickly. Normally, two, four, or eight queues are created in egress.

The rule about “how to process each queue at this time” is called scheduling. Sometimes called

212
COAX G.hn Access Multiplexer User Manual

queuing.

 Strict Priority Queuing (SPQ): If there is even one packet in a queue with a high priority,
it is a method to process the packet with high priority first and unconditionally. The top
high priority queues must be processed and after that, next priority queues are
processed as queue-priority-order.
 RR (Round Robin): It is a way to process all the queues with equal priority and round -
robin-scheme
 Weighted Round Robin (WRR): the high priority queue can be processed to get more
frequently processing by assigning a weight to each queue. This is the most popular
method.
 Weighted Fair Queuing (WFQ): Normally IP packet has different size, for example, there
is “a short packet with 64 bytes” and “long packet size with 1518 bytes”. If all these
packets are treated as one, then there is un-fair packet processing with different size of
packet. To modify this issue, WFQ is a method designed to handle packets considering
“the length of a packet” and “weight with precedence” by mathematical algorithm.
 DRR or DWRR (Deficit Weighted Round Robin): Like the WFQ, this schedule is
considering on packet length to get effective-fairness-queueing. Each queue in DRR have
unqiue “deficit-parameter” and use this parameter with specific algorithm to get packet-
classification.
 Hybrid: A mix of the above mentioned methods is used. For example, if there are 8
queues, the upper queues 7 and 6 operate as SPQ, and the lower queues 5 through 0
may use WRR, DWRR, or WFQ.

Commands Description Mode


qos algorithm <0-7> Sets the algorithm for egress scheduling. Interface
(strict|wrr|disable)
no qos algorithm <0-7> Release the algorithm for scheduling Interface

qos wrr-weight <0-7> Set the Weight-parameter for WRR scheduling Interface
<0-32>
no qos wrr-weight Release the Weight-parameter Interface
<0-7>

213
COAX G.hn Access Multiplexer User Manual

802.1p, DSCP Mapping and Remarking

Operator can configure the egress queue with “CoS”, “DSCP” with Remarking of the packet
from the ingress port.

Mapping Commands

Commands Description Mode


qos cos-queue Maps “Egress Queue” according to “Ingress CoS Config
Value”
The default value for CoS-mapping is the
followings.
0 -> 0 , 1 -> 1 ,2 -> 2

214
COAX G.hn Access Multiplexer User Manual

3 -> 3 , 4 -> 4 ,5 -> 5


6 -> 6 , 7 -> 7
qos dscp-dscp Maps “Egress Queue with DSCP” from “Ingress Config
Queue with DSCP”.
Default mapping is same DSCP-value with both-
Queue.
qos dscp-queue Maps the dscp value of the incoming packet to a Config
specific dscp value.
Default mapping is the followings
0 ~7 ->0
8 ~ 15 ->1
16 ~ 23 ->2
24 ~ 31 ->3
32 ~ 39 ->4
40 ~ 47 ->5
48 ~ 55 ->6
56 ~ 63 ->7
show qos Display “QoS Set Value” Enable

show qos interface Query “QoS Set Value “ for each interface. Enable
IFNAME

After assigning DSCP conversion and COS, DSCP to QUEUE, set up “Trust Setting” on a specific
interface to make “QoS Operation”.

Trust Commands

Commands Description Mode


qos trust In config mode, operator can assign “QoS Interface
{cos | dscp-cos} mapping policy” on “specific interface ingress
packet” and after, to make “QoS Operator”, is is
required to command “QoS Trust”.
qos cos <0-7> Make “QoS” on “specific interface ingress packet” Interface
with CoS value, if there is untagged-packet or “No
Trust condition”

215
COAX G.hn Access Multiplexer User Manual

qos trust path-through For specific interface ingress packet, don’t Interface
{cos | dscp} remarking with “CoS” and “DSCP”

216
COAX G.hn Access Multiplexer User Manual

CPU Access List

This equipment supports “filtering features” before packets are going to “Forwarding Engine”.
To prevent “Switch Access” such as Telnet, SSH, and SNMP, this feature can be applied.

Commands Description Mode


cpu-acl <1-199> port To prevent “Switch Access” using Telnet, Config
{telnet | ssh | snmp | SSH, and SNMP, the switch CPU-ACL can
snmp-trap} be configured.
cpu-acl <1-199> port {tcp Set using the TCP or UDP port number. Config
| udp} <0-65535>
no cpu-acl port It releases “CPU-ACL operation”. Config
{telnet | ssh | snmp |
snmp-trap | tcp |udp}
show cpu-acl Display “the existing CPU-ACL settings” Enable

Warning “CPU-ACL” is subset command of “access-list”. Therefore, be


sure to set 'access-list' first. Also, be careful that the range of
W 'access-list' that can be applied is <1-199>. And operator can
not delete 'access-list' from 'cpu-acl'.

217
COAX G.hn Access Multiplexer User Manual

Traffic Shaping Settings

This device supports the traffic shape function which allows the user to set a specific bandwidth
to a specific port. To set the bandwidth of the port, use the following command in interface mode.

Commands Description Mode


traffic-shape ingress rate Specifies a constant bandwidth for Interface
<1-10000000> packets ingress of the port with “Traffic
Shaping Functions”. The unit is kbits /
sec.
no traffic-shape ingress It releases “Traffic Shaping Setting” for Interface
ingress port.
traffic-shape egress rate Specifies a constant bandwidth for Interface
<1-10000000> ( | burst <1- packets egress of the port with “Traffic
16777216>) Shaping Functions”. The unit is kbits /
sec.
no traffic-shape egress It releases “Traffic Shaping Setting” for Interface
egress port.

218
COAX G.hn Access Multiplexer User Manual

CPU Port Configuration

If the CPU has many packets to process, it will reduce system performance and support the
ability to limit or set the traffic for packets processed by the CPU.

Commands Description Mode


cpu-port algorithm <0-7> Set the scheduling algorithm for the Config
(strict|wrr) cpu queue.
no cpu-port algorithm Set the scheduling algorithm for the Config
<0-7> cpu queue to the default value.
(default: wrr)
cpu-port wrr-weight Set the wrr scheduling algorithm Config
<0-7> <0-255> weight for the cpu queue.
no cpu-port wrr-weight Set the wrr scheduling algorithm Config
<0-7> weight for cpu queues to their default
value.
cpu-port traffic-shaper Specifies a constant bandwidth for Config
queue <0-7> packets ingress to the cpu queue.
rate <1-1000000> rate ::= PPS
burst <1-4000> burst ::= value * 4KB
no cpu-port traffic-shaper Set the bandwidth set for the cpu Config
queue <0-7> queue to the default value.
cpu-port cos When a specific packet is received on Config
(arp-broadcast|arp-reply| the cpu port, it is sent to the set cpu
bpdu|dhcp|ftp|ghn|icmp| queue.
igmp|lacp|rmu|snmp|ssh|
tcp-syn|telnet|tftp)
<0-7>
no cpu-port cos Set the cpu queue mapping of the Config
(arp-broadcast|arp-reply| configured packet to the default value.
bpdu|dhcp|ftp|ghn|icmp|
igmp|lacp|rmu|snmp|ssh|
tcp-syn|telnet|tftp)
<0-7>

219
COAX G.hn Access Multiplexer User Manual

cpu-port rate Limit the traffic that certain packets Config


(arp-broadcast|arp-reply| receive on the cpu.
bpdu|dhcp|ftp|ghn|icmp|
igmp|lacp|rmu|snmp|ssh|
tcp-syn|telnet|tftp)
<0-65535> rate ::= PPS
no cpu-port rate Disable traffic restriction of the set Config
(arp-broadcast|arp-reply| packet.
bpdu|dhcp|ftp|ghn|icmp|
igmp|lacp|rmu|snmp|ssh|
tcp-syn|telnet|tftp)
<0-65535>

220
COAX G.hn Access Multiplexer User Manual

DHCP
(Dynamic Host Configuration Protocol)

DHCP Server

DHCP (Dynamic Host Configuration Protocol) is a protocol providing IP addresses and other
related configuration information such as subnet mask and default gateway. Common functions
associated with DHCP are listed as follows:

 DHCP server: It assigns IP addresses.


 DHCP Block: It blocks to use fixed IP in DHCP environment.

Available parameters are listed in RFC 2131. Important parameters among them are listed as
follows:

 Subnet mask
 Router
 Domain
 Domain Name Server(DNS)

DHCP Address Pool

DHCP server provides two pools listed as follows:

 Network Pool: It is used for Automatic Allocation and Dynamic Allocation. A group

221
COAX G.hn Access Multiplexer User Manual

consisting of multiple network pools can share IP pools with other subnets.
 Host Pool: It is used for Manual Allocation. Multiple hosts containing common
information can be set to a Host Pool.

DHCP Network Pool Setting

Before activating DHCP server, DHCP Pool must be created to assign IP addresses to DHCP
Client. Use CLI “ip dhcp pool <POOL NAME>” to create the DHCP Pool. Then set IP Subnet
Network Number and Mask to assign IP addresses to DHCP Client. Finally, set the IP ranges
included in the configured subnet.

Information A Host Pool is useful for Clients that want to apply


common parameters. Multiple hosts may be assigned to
i a single Host Pool. In addition, parameters are applied to
all hosts in a Host Pool by setting the parameters once.

Command Description Mode


ip dhcp pool WORD  It creates a name for DHCP Network Config
Pool.
 It goes into DHCP Network Pool
Setting Mode identified by the prompt
“dhcp-config”.
no ip dhcp pool WORD  It removes DHCP Network Pool Config

Basic Router Setting for a Client


The Client transmits packets to its Basic Router after booting DHCP Client. IP address of the
Basic Router must belong in the same subnetwork as the Client. To set the Basic Router for DHCP
Client, use a command introduced in table in DHCP Network Pool Setting Mode.

Command Description Mode


default-router address It specifies IP address of Basic Router for Dhcp-onfig
DHCP Client.
no default-router address It removes IP address of Basic Router for Dhcp-onfig
DHCP Client.

222
COAX G.hn Access Multiplexer User Manual

DNS IP Server Setting for a Client


If DHCP client needs to convert a host name to IP address, the Client asks at DNS IP Server.
To set DNS IP server that DHCP client can use, use a command introduced in table in DHCP Pool
Setting Mode.

Command Description Mode


dns-server A.B.C.D It sets IP address of DNS Server that Dhcp-config
DHCP client can use.
no dns-server A.B.C.D It unsets IP address of DNS Server that Dhcp-config
DHCP client can use.

Domain Name Setting for a Client


A DHCP client is included in the Network Group, which has same name as the specified Domain
Name. To set a domain name string for a Client, use a command introduced in table in DHCP
Pool Setting Mode.

Command Description Mode


domain-name WORD It specifies a domain name for a Client. Dhcp-config
no domain-name It removes a domain name for a Client. Dhcp-config

Address Lease Time Setting


Basically, each IP address assigned by DHCP server is leased for 24 hours. To change lease
time of IP address, use a command introduced in table in DHCP Address Pool Mode.

Command Description Mode


lease  It specifies Lease Time. Dhcp-config
{<days><hours><minutes>}|  infinite: It sets Automatic
Assignment System that
<infinite>}
permanently leases IP address to a
host.
no lease  It removes Lease Time. Dhcp-config

DHCP Subnet Mask and Network Mask Settings


To set a Mask of an IP address that will be used for newly created DHCP Address Pool or to set
a Mask of a Server Network, use a command introduced in table in DHCP Network Pool Setting

223
COAX G.hn Access Multiplexer User Manual

Mode.

Command Description Mode


network  It sets a subnetwork number that will Dhcp-config
network-number/prefix-length be included in DHCP Network Pool,
and a Mask.
no network  It unsets a subnetwork number that Dhcp-config
will be included in DHCP Network
Pool, and a Mask.

IP address Range Setting


It sets IP address ranges that restricts to DHCP Network Pool. It is possible to assign
discontinuous address ranges within a single network.
Command Description Mode
range lowest-address highest-  Assign the corresponding address Dhcp-config
address range to Client in the subnet
no range lowest-address  Remove the corresponding address Dhcp-config
highest-address range to Client in the subnet
no range  Remove all address range Dhcp-config

Assign a fixed IP to a specific DHCP Pool


The fixed IP address can be assigned to DHCP Clients by DHCP Server. Refer to the table for
command instructions.
Command Description Mode
fixedaddr <Hostname>  It sets to assign a fixed IP address to Dhcp-config
<MAC address> <IP DHCP Client.
address>
no fixedaddr <Hostname>  It unsets to assign a fixed IP address Dhcp-config
to DHCP Client.

DHCP Server Activation

A function of DHCP server at a switch is deactivated by default. To activate the DHCP server,
use a command introduced in table in Config Setting Mode.
Command Description Mode

224
COAX G.hn Access Multiplexer User Manual

service dhcp  It activates DHCP server at a switch. Config


no service dhcp  It deactivates DHCP server at a Config
switch.

Example of DHCP Network Pool Setting

Following example code composes the DHCP server using only Primary IP address without
configuring the Shared Net. The Default Router of a Client is set as 103.1.1.1, and a Domain
Name is korea.com. The IP address of the Client is leased for an hour (60 minutes). Address
assigned ranges from 103.1.1.10 to 103.1.1.100 and from 103.1.1.150 to 103.1.1.230. For the
DNS Server, both of 1.2.3.4 and 1.2.3.5 are used.

L10212XC(config)# ip dhcp pool 103net


L10212XC(config-dhcp)# domain-name korea.com
L10212XC(config-dhcp)# network 103.1.1.0 255.255.255.0

L10212XC(config-dhcp)# default-router 103.1.1.1

L10212XC(config-dhcp)# range 103.1.1.10 103.1.1.100

L10212XC(config-dhcp)# range 103.1.1.150 103.1.1.230

L10212XC(config-dhcp)# dns-server 1.2.3.4


L10212XC(config-dhcp)# dns-server 1.2.3.5
L10212XC(config-dhcp)# lease 0 1 0

Information The above example code shows that the IP addresses of


a single VLAN use a Primary IP address to compose the
i DHCP server. In the case of using the Secondary IP
address, there are restrictions on composing multiple
DHCP servers.

Example of DHCP server Monitoring and Management

Following example code shows IP addresses that the DHCP server assigned to a client.

225
COAX G.hn Access Multiplexer User Manual

L10212XC# show ip dhcp binding-list

IP Address MAC Address Interface Notifier Expire time

106.1.1.114 7806.1725.1db8 vlan1 server Fri Jul 20 10:46:21 2007

Following example code deletes the binding information at the DHCP server. Once the binding
information has been deleted, the DHCP server can use the IP address for other client again.

L10212XC# show ip dhcp binding-list

IP Address MAC Address Interface Notifier Expire time

106.1.1.114 7806.1725.1db8 vlan1 server Fri Jul 20 10:46:21 2007

Switch#clear ip dhcp binding-list 106.1.1.114

Switch#show ip dhcp binding-list

IP Address MAC Address Interface Notifier Expire time

DHCP Relay agent Setting

DHCP Relay function relays DHCP packets between server and client.
DHCP Relay replaces broadcast communications between subscriber ports and servers with
unicast, reducing unnecessary broadcast packets on the network.
If this equipment relays DHCP packets, the packets can be forwarded even if the server and
client are on different subnets. For example, if you have a Client on Vlan1 and a Server on Vlan2,
they will communicate with each other if you specify an interface. In addition, the subscriber does
not know the address of DHCP directly. And by supporting Option82 setting function, it helps
DHCP Server authenticate subscriber. DHCP Relay setting function is as follows.

Command Description Mode

226
COAX G.hn Access Multiplexer User Manual

ip dhcp-relay Access DHCP relay Mode Config

no ip dhcp-relay Initialize DHCP relay setting. Config

Interface-list Setting

Set the interface for DHCP Relay to operate.


Command Description Mode
 It registers an interface that is connected to a
interface-list IFNAME dhcp-relay
Server and a Client.
 Unset the L3 interface to be the DHCP Relay
no interface-list IFNAME dhcp-relay
target.

Server-list Setting

Set the DHCP server information.


Command Description Mode
server-list
It sets DHCP server Name. dhcp-relay
name NAME
server-list
It sets DHCP server IP. dhcp-relay
ip A.B.C.D
no server-list
It unsets DHCP server Name. dhcp-relay
name NAME
no server-list
It unsets DHCP server IP. dhcp-relay
ip A.B.C.D

DHCP Relay Option82 Setting

DHCP Option82 consists of Remote Id and Circuit ID. Remote ID shows device's unique
information and Circuit ID shows device's port information. The relay agent adds the Option82
field to the DHCP client packet coming from the client and sends it to the server. The DHCP server
looks at the Option82 field to authenticate and manage subscribers.

Option82 Policy Setting


Basic policy of a relay is to replace the existing relay information in a received packet with the

227
COAX G.hn Access Multiplexer User Manual

relay information of EoC GAM.


Command Description Mode
It sets a policy in the DHCP relay Option82 field.
 append: It adds relay information of a
switch to the existing relay
information.
option82 policy
 forward: It forwards a packet including
{append | forward dhcp-relay
relay information (default).
| replace|drop}
 replace: It replaces the existing relay
information with the information set at
a switch.
 Drop: It drops a packet.
Change the DHCP relay option82 field policy to
no option82 policy dhcp-relay
default(forward).

Option82 Remote-id Setting


By default, the Option82 Remote ID is the MAC Address of the switch. The Remote ID is
recorded in a DHCP packet to indicate which device a subscriber comes in.
Command Description Mode
option82 remote-id
Set the option82 remote-id to hex dhcp-relay
hex HexString
option82 remote-id
Set the option82 remote-id to ip dhcp-relay
ip A.B.C.D
option82 remote-id
Set the option82 remote-id to text dhcp-relay
text WORD

no option82 remote-id Remove the option82 remote-id dhcp-relay

Option82 Circuit-id Setting


The Option82 circuit-id is set to the port number of the switch by default. For example, the
circuit-id of the ghn7 port has a value of 07. You can change the Circuit ID of the interface with
the following command.
Command Description Mode
option82 circuit-id
Set the option82 circuit-id to hex dhcp-relay
interface PORTNAME

228
COAX G.hn Access Multiplexer User Manual

hex HexString

option82 circuit-id
interface PORTNAME Set the option82 circuit -id to ip dhcp-relay
index <0-65535>
option82 circuit-id
interface PORTNAME Set the option82 circuit-id to text dhcp-relay
text WORD
no option82 circuit-id
Turn the option82 circuit-id to the default value dhcp-relay
[interface PORTNAME]

DHCP Relay Activation

By default, the DHCP relay of a switch is deactivated. To activate the DHCP Relay, use
commands introduced in table in Config Setting Mode.
Command Description Mode

service dhcp-relay It activates DHCP Relay. Config

no service dhcp-relay It deactivates DHCP Relay. Config

DHCP Relay Monitoring

Command Description Mode


show ip dhcp-relay It outputs information about operating status of
Enable
the DHCP server/ Relay.

Example of DHCP relay agent Setting

Following example code shows the DHCP server receiving a request that the DHCP relay agent
transmitted after receiving from a Client. If any DHCP Address Pool does not satisfy a request
from a Client, a switch transmits the request to the DHCP server located in another subnetwork.

L10212XC(config)# ip dhcp-relay
L10212XC(dhcp-relay)# interface-list vlan1

229
COAX G.hn Access Multiplexer User Manual

L10212XC(dhcp-relay)# interface-list vlan20

L10212XC(dhcp-relay)# server-list ip 2.2.2.2

L10212XC(dhcp-relay)# server-list name DHCP_SERV1

L10212XC(dhcp-relay)# exit
L10212XC(config)# service dhcp-relay
L10212XC(config)# end
L10212XC# show ip dhcp-relay

Information To transmit the DHCP message to the DHCP server


located in other Subnetwork, the Routing Path Information
i must be set to the corresponding network.

DHCP Relay Simplify Setting

DHCP Relay Simplify function operates only Option82 field operation function in DHCP Relay
function.

Option82 Policy Setting

DHCP Relay Simplify Option82 setting function is the same as above Relay.
Command Description Mode

ip dhcp-relay Access on DHCP relay Mode Config

DHCP relay option82 Policy Setting


 append: Add the relay information for switch
on the existing relay information.
option82 policy
 forward: Packages contained relay
{append | forward dhcp-relay
information called forward (default)
| replace|drop}
replace: Replace the relay information by the
establilshed information in the switch.
 drop: Packet is called drop.
Change the DHCP relay option82 field policy to
no option 82 policy Config
default(forward).

no ip dhcp-relay Initialize DHCP relay function. Config

230
COAX G.hn Access Multiplexer User Manual

DHCP Relay simplify Function Activation

Option82 remote-id is set to the switch's MAC Address by default. Remote-id is recorded in the
DHCP packet to indicate which equipment the subscriber is coming from.
Command Description Mode
service dhcp-relay
It activates DHCP relay simplify. Config
simplify

no service dhcp-relay It deactivates DHCP relay. Config

Example DHCP Relay simplify Setting

Following example shows the command when operating DHCP Relay simplify by Option82 Field
on DHCP Packet. It behaves like a normal DHCP broadcast and only the Option 82 field is added
and removed.

L10212XC(config)# ip dhcp-relay

L10212XC(dhcp-relay)# option82 policy replace

L10212XC(dhcp-relay)# exit

L10212XC(config)# service dhcp-relay simplify

231
COAX G.hn Access Multiplexer User Manual

DHCP Snooping

DHCP Snooping filters DHCP messages forwarded to an untrusted interface and manages the
DHCP binding table to ensure DHCP security.
The port connected with DHCP server called trust port, and other ports are called untrust
ports. Through the trust port, only the assigned IP address can be distinguished pass the
corresponded server, which finally be recognized as the assigned IP address.

DHCP Snooping will record these assigned IP addresses in the DHCP binding table. The contents
include the vlanid according to the assigned interface, the number of receiving port, the receiving
IP address and Client MAC.

DHCP Snooping can works with DHCP Server/DHCP Relay/L2.

DHCP Snooping Activation

Dhcp binding and rate-limit are supported when DHCP snooping globally. Dhcp snooping (per
Vlan) enable can support not only these two functionws but also trust.
Command Description Mode
[no] ip dhcp snooping enable Dhcp snooping enable globally. Config
[no] dhcp snooping enable Dhcp snooping enable (per Vlan). Interface
show ip dhcp snooping It shows DHCP snooping status for Enable
all VLANs.

Assigned Trust Port

Trust port is the port connecting to the DHCP server. DHCP messages in the untrust port will
be dropped in the preceding order under the Vlan-specific DHCP Snooping Activation.
Command Description Mode
[no] dhcp snooping trust It set the trust port. Interface
show ip dhcp snooping trust Enable
It shoes the trust port.
(interface INTERFACE|)
[no] dhcp snooping trust It can decide whether to send the Interface

232
COAX G.hn Access Multiplexer User Manual

filter egress-broadcast-req" broadcast DHCP packet through the


trust port.
show ip dhcp snooping trust Enable
It can check the broadcast DHCP
filter egress-broadcast-req
filter in the trust port.
(interface INTERFACE|)

DHCP Packet rate limit

By restricting the DHCP Packet on the receiving, it can prevent the CPU overload.
Command Description Mode
dhcp snooping rate-limit <1- It only allow the ingress dhcp Interface
1024> packet in the assigned port.
no dhcp snooping rate-limit It removes Rate-limit. Interface
show ip dhcp snooping rate- Enable
It allows Rate-limit to be checked.
limit (interface INTERFACE|)

DHCP Snoop binding table Management

Managing the assigned list in the DHCP Client.

Command Description Mode


ip dhcp snooping binding It adds the statistic data in the Config
INTERFACE PORT A.B.C.D MAC DHCP snooping binding.
no ip dhcp snooping binding It removes the statistic data in the Config
PORT (A.B.C.D|all) DHCP snooping binding table.
clear ip dhcp snooping It removes the dynamic data in the Enable
binding (PORT|all) DHCP snooping binding table.
show ip dhcp snooping It can check the current binding Enable
binding table.

Arp-inspection start time

DHCP Snooping can be checked in the ARP Inspection. Under rebooting, all Clients will be
blocked when checking DHCP binding table in the arp-inspection until the DHCP snooping finished.

233
COAX G.hn Access Multiplexer User Manual

DHCP binding table reference is not allowed for seconds, and even if the receiving arp fails to
find it in arp access-list or static arp, it will pass normally. Start time default value is 0.
Command Description Mode
ip dhcp snooping arp- Arp-inspection reference start time Config
inspection start <1-500000>
no ip dhcp snooping arp- Set start time to 0 Config
inspection start

234
COAX G.hn Access Multiplexer User Manual

DHCP Client

It is a function to make DHCP server receive the assigned IP address. Howerver, it is unable to
set its static IP address when it is saved as a DHCP Client.

DHCP Client Activation

To start DHCP Client, it is necessary to make the IP address able to be received automatically,
which can be set from Interface Setting Mode. Check table for commands to make the IP address
received automatically by DHCP server.
Command Description Mode
ip address dhcp It makes the interface IP address Interface
can be received correspondently.
no ip address dhcp It removes DHCP Client. Interface

Client-id Setting

It is necessary to get the Client-id to receive the assigned IP address with recognizing as a
DHCP Client. Refer to the Table for command setting Client-id. Normally, the hardware address
for Client-id of DHCP Client comes out like XX:XX:XX:XX:XX:XX.
Command Description Mode
ip dhcp client client-id hex Interface
It sets DHCP Client-id as hex.
HEXSTRING
ip dhcp client client-id text STRING It saves DHCP Client-id as text.
no ip dhcp client client-id It removes the saved DHCP Client-id. Interface

Class-id Setting

Class-id is applied to categorize the IP address to the requested Client based on the Vendor
type. To set the class-id, use commands in table below. The default value of Class-id is saved as
“Zaram”

235
COAX G.hn Access Multiplexer User Manual

Command Description Mode


ip dhcp client class-id hex Interface
It saves DHCP Class-id as hex.
HEXSTRING
ip dhcp client class-id text STRING It saves DHCP Class-id as text. Interface
no ip dhcp client class-id It removes the saved DHCP Interface
Class-id.

Host name

DHCP Client can change Host name, refer to Table for setting command. Host name of DHCP
Client is saved as same as its model name.
Command Description Mode
ip dhcp client host-name HOSTNAME It allows to change the host name Interface
of the client.
no ip dhcp client host-name It removes the saved host name. Interface

Time limitation for using IP address

DHCP Client can decide the time for using the assigned IP address. The system will ask for
whether to extend the time before running out of them. Refer to the Table to check the commands
using in the Interface setting mode to set up the using time limitation for the assigned IP address.
The unit used here is second. Default value is 3600 seconds.
Command Description Mode
ip dhcp client lease-time It allows to set the limited Interface
<120-2147483637>
time of the Client’s IP
address.
no ip dhcp client lease-time It removes the saved lease Interface
time.

Ask for information through DHCP server

It shows Default Gateway, the amount of accessed using time, available DNS server, domain
name and IP address when DHCP Clients accessing DHCP server.

236
COAX G.hn Access Multiplexer User Manual

There is a way to prevent domain name and DNS server not to sent when DHCP Client accesses
on the DHCP server. Refer to the Table to check the commands used to block the information of
Domain Name and DNS server.
Command Description Mode
no ip dhcp client request Block the request of domain name and Interface
{domain-name | dns} DNS server.

To work this function again, please use Table command.


Command Description Mode
ip dhcp client request {domain- It requests the needed information Interface
name | dns} from DHCP server.

Block the using IP address

To stop the service of the receiving IP address, refer to Table for valid commands.
Command Description Mode
release dhcp IFNAME Block the using IP address on the Enable
receiving.
- IFNAME: name of Interface

Reset IP address

To reset the unconnected IP address, refer to the commands in Table.


Command Description Mode
renew dhcp IFNAME Re-ask for IP address. Enable
- IFNAME: name of interface

Confirm the setting of DHCP Client

Using the commands in Table to check the related setting options of DHCP Client.
Command Description Mode
show ip dhcp client (IFNAME |) It confirms the setting of DHCP client. Enable
IFNAME: name of Interface

237
COAX G.hn Access Multiplexer User Manual

238
COAX G.hn Access Multiplexer User Manual

239
COAX G.hn Access Multiplexer User Manual

G.hn Manage

Summary of G.hn

G.hn is a specification for home networking with data rates up to 1 Gbit/ sec. The G.hn is next
generation technology of the xDSL that has provided internet service using telephone wires. The
G.hn operates over three types of wires: telephone wiring, coaxial cables, and power lines. In
addition, the G.hn supports for MIMO (Multiple Input Multiple Output) that increases data rates
using two pairs (four wires) of telephone wires.

240
COAX G.hn Access Multiplexer User Manual

G.hn Port Information Check

Command to check G.hn information

Show ghn pairing


Check the connected information with GAM and CPE.
Command Description Mode
show ghn
pairing
[interface
It displays Port Pairing.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn pairing


Interface Pair Mac address Sd IP-address Version ModelName
------------ ---- -------------- --- --------------- ---------------- ---------
ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C
ghn1.cpe1 YES 000b.6f20.01c7 1 10.10.1.1 v7_6_r589+5_7 L32104CP
ghn1.cpe2 YES 000b.6f20.01c0 1 10.10.1.2 v7_6_r589+5_6 L32104CP
ghn2.co NO 000b.6ffb.01c9 2 10.10.2.0 v7_6_r589+5_6 DCP962C
ghn3.co NO 000b.6ffb.01b2 3 10.10.3.0 v7_6_r589+5_6 DCP962C

show ghn basic-Config


Command to check the basic setting of the ghn ports.
Command Description Mode
show ghn
basic-config
[interface
It displays G.hn MAC/ Node Type/ Domain Name.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

Node Type : This muchine must be set as DOMAIN_MASTER, and CPE (Customer Premises
Equipment) must be set as END_POINT

241
COAX G.hn Access Multiplexer User Manual

Device ID : Automatically distributed under the auto pairing mode.


Domain Name: Domain Name must have same CPE information at the corresponding port.

L10212XC# show ghn basic-config


Interface MAC Address Device ID Force Node Node Type Domain Name
------------ -------------- --------- ------------- ------------- -----------
ghn1.co 000b.6ffb.01c6 1 DOMAIN_MASTER DOMAIN_MASTER HomeGrid
ghn1.cpe1 000b.6f20.01c7 2 END_POINT END_POINT HomeGrid
ghn1.cpe2 000b.6f20.01c0 3 END_POINT END_POINT HomeGrid
ghn2.co 000b.6ffb.01c9 2 DOMAIN_MASTER DOMAIN_MASTER HomeGrid
ghn3.co 000b.6ffb.01b2 3 DOMAIN_MASTER DOMAIN_MASTER HomeGrid

show ghn line-config


Check the main setting options of the G.hn.
Command Description Mode
show ghn
line-config
[interface
It shows the value of ghn Config.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn line-config

Domain Pairing Seed Access TX SNR ISOLA

Interface ID Mode Index Policy POWER OFFSET TION

------------ ------ ------- ----- ------ ----- ------ -----

ghn1.co 1 Auto 1 MDU 2 1.0db CPE

ghn1.cpe1 1 Auto 1 MDU 2 1.0db CPE

ghn1.cpe2 1 Auto 1 MDU 2 1.0db CPE

show ghn ip-config


Using a command in table, user can check the IP Configuration of the G.hn.
Command Description Mode
show ghn It displays settings of the G.hn IP/ Subnet Mask/
Enable
ip-config Default Gateway.

242
COAX G.hn Access Multiplexer User Manual

[interface ifname : ghn1-ghn12


(ifname | range IFRANGE)]
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn ip-config interface ghn1

Interface IP Address Subnet Mask Default Gateway

------------ --------------- --------------- ---------------

ghn1.co 10.10.1.0 255.255.0.0 10.10.1.254

ghn1.cpe1 10.10.1.1 255.255.0.0 10.10.1.254

ghn1.cpe2 10.10.1.2 255.255.0.0 10.10.1.254

show ghn mac-address


Using a command in table, user can check the information of Interface Status / Attached / MAC
/ Count / Cache of the G.hn.
Command Description Mode
show ghn
mac-address
[interface
It displays the information of G.hn interface.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn mac-address interface ghn1


Interface Status Attached MAC Address Count Cache
------------ ------ -------- -------------- ----- -----
ghn1.co UP YES 000b.6ffb.01c6 594 594
ghn1.cpe1 UP YES 000b.6f20.01c7 67 728
ghn1.cpe2 UP YES 000b.6f20.01c0 722 722

show ghn bft


Using a command in table, user can check the Bridge Forwarding Table of the G.hn.
Command Description Mode

243
COAX G.hn Access Multiplexer User Manual

[interface
(ifname | range IFRANGE)]
It desplays the information of G.hn Interface.
[ local | ( remote Enable
ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn bft interface ghn1


Interface Count MAC Address Port Type DID MCSTI Multiport
------------ ----- -------------- ---- ---------- --- ----- ---------
ghn1.co 9 000b.6f10.0031 3 Ethernet B 0 NO NO
000b.6f20.01c0 14 G.hn 3 NO NO
000b.6f20.01c7 11 G.hn 2 NO NO
000b.6ffb.01c6 4 Firmware 0 NO NO
0050.c212.01c0 14 G.hn 3 NO NO
0050.c212.01c7 11 G.hn 2 NO NO
0180.c200.0001 4 Firmware 0 NO NO
3333.0000.0001 4 Firmware 0 NO NO
3333.fffb.01c6 4 Firmware 0 NO NO
ghn1.cpe1 7 000b.6f10.0031 7 G.hn 1 NO NO
000b.6f20.01c7 4 Firmware 0 NO NO
000b.6ffb.01c6 7 G.hn 1 NO NO
0050.c212.01c7 2 Ethernet A 0 NO NO
0180.c200.0001 4 Firmware 0 NO NO
3333.0000.0001 4 Firmware 0 NO NO
3333.ff20.01c7 4 Firmware 0 NO NO
ghn1.cpe2 7 000b.6f10.0031 13 G.hn 1 NO NO
000b.6f20.01c0 4 Firmware 0 NO NO
000b.6ffb.01c6 13 G.hn 1 NO NO
0050.c212.01c0 2 Ethernet A 0 NO NO
0180.c200.0001 4 Firmware 0 NO NO
3333.0000.0001 4 Firmware 0 NO NO
3333.ff20.01c0 4 Firmware 0 NO NO

Command for G.hn Link Check

show ghn line-rate


Using a command in table user can see data rates at each port: Phy-Rate, Payload-Rate.
Command Description Mode
show ghn
line-rate
[interface
It displays the G.hn BPS, phy-rate, payload-rate.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

244
COAX G.hn Access Multiplexer User Manual

L10212XC# show ghn line-rate interface ghn1


Interface Phy-Rate Payload-Rate
Rx Tx Rx Tx
------------ ------------- -------------
ghn1.co 1840 1853 695 700
ghn1.cpe1 1627 1556 614 588
ghn1.cpe2 1853 1840 700 695

show ghn snr


Use a command in table to check the value of SNR.
Command Description Mode
show ghn snr
[interface
(ifname | range IFRANGE)] Check the value of SNR(Signal Noise Ratio)
Enable
[ remote ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn snr interface ghn1

Space Start End Channel 1 (dB) Channel 2 (dB)

Interface (KHz) (MHz) (MHz) LB HB Min Max LB HB Min Max

------------ ----- ----- ----- ------ ------ ------ ------ ------ ------ ------ ------

ghn1.co

ghn1.cpe1 195.3 11.0 198.9 26.5 38.2 -4.0 45.8

ghn1.cpe2 195.3 11.0 198.9 44.2 45.1 8.0 53.5

show ghn psd


Use a command in table to check the value of PSD.
Command Description Mode
show ghn psd
[interface
(ifname | range IFRANGE)] Check the value of PSD(Power Spectral Density).
Enable
[ remote ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

245
COAX G.hn Access Multiplexer User Manual

L10212XC# show ghn psd

|Space Start End| Channel 1 (dBm/Hz) |

Interface|(KHz) (MHz) (MHz)| TX | RX |

| | | LB HB Min Max|

------------|----- ----- -----|------|------ ------ ------ ------|

ghn1.co - - - -68.0 - - - -

ghn1.cpe2 195.3 11.0 198.9 -68.0 -124.3 -99.2 -144.3 -96.8

ghn1.cpe3 195.3 11.0 198.9 -68.0 -126.0 -98.7 -144.3 -96.5

ghn1.cpe4 195.3 11.0 198.9 -68.0 -119.7 -100.5 -144.3 -97.5

ghn1.cpe5 195.3 11.0 198.9 -68.0 -125.1 -98.7 -144.3 -96.5

ghn1.cpe6 195.3 11.0 198.9 -68.0 -124.3 -98.8 -144.3 -96.5

ghn1.cpe7 195.3 11.0 198.9 -68.0 -124.4 -98.7 -144.3 -96.5

ghn1.cpe8 195.3 11.0 198.9 -68.0 -123.2 -99.1 -144.3 -96.8

ghn1.cpe16 195.3 11.0 198.9 -68.0 -124.8 -99.0 -144.3 -96.5

ghn2.co - - - -68.0 - - - -

ghn3.co - - - -68.0 - - - -

show ghn noise


Use a command in table to check the value of Noise.
Command Description Mode
show ghn noise
[interface
(ifname | range IFRANGE)] Check the value of Noise
Enable
[ local | ( remote ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn noise

Space Start End Channel 1 (dBm/Hz) Channel 2 (dBm/Hz)

Interface (KHz) (MHz) (MHz) LB HB Min Max LB HB Min Max

246
COAX G.hn Access Multiplexer User Manual

------------ ----- ----- ----- ------ ------ ------ ------ ------ ------ ------ ------

ghn1.cpe1 195.3 11.0 198.9 -131.9 -122.4 -152.5 -118.3

ghn1.cpe2 195.3 11.0 198.9 -97.7 -96.8 -118.5 -95.5

show ghn wire-length


Using a command in table, user can check cable length connected at each port.
Command Description Mode
show ghn wire-length
[interface
(ifname | range IFRANGE)] It displays cable length connected at each port.
Enable
[ local | ( remote ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn wire-length interface ghn1


Interface Wire-length
============ =============
ghn1.co
ghn1.cpe1 4m
ghn1.cpe2 3m
============ =============

G.hn Statistics Command

show ghn statistics


Use a command in table to check statistics of G.hn port.
Command Description Mode
show ghn statistics avg-
It displays the average G.hn number of packets
pkt [IFRANGE] [co|cpe <1-
and bits per second. Enable
16>] [all | 5sec | 1min |
ifname : ghn1-ghn12
5min ] [both-co-cpe]
show ghn statistics
It displays the G.hn statistics of packets.
counter Enable
ifname : ghn1-ghn12
[IFRANGE [co|cpe <1-16>]]
show ghn statistics if-mib It displays IF-Mib information of RFC2233.
Enable
[IFRANGE [co|cpe <1-16>]] ifname : ghn1-ghn12

247
COAX G.hn Access Multiplexer User Manual

L10212XC# show ghn statistics avg-pkt

G.HN CO/CPE throughput

Interface time Rx_Pkts/s Rx_Mbps Tx_Pkts/s Tx_Mbps

------------ ---- ---------- ---------- ---------- ----------

ghn1.co 5s 2 0.0 2 0.0

1m 2 0.0 2 0.0

5m 2 0.0 2 0.0

------------ ---- ---------- ---------- ---------- ----------

ghn2.co 5s 3 0.0 3 0.0

1m 3 0.0 3 0.0

5m 3 0.0 3 0.0

ghn2.cpe 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

------------ ---- ---------- ---------- ---------- ----------

L10212XC# show ghn statistics counter

G.HN CO/CPE counter

Interface Rx_pkts Rx_bytes Tx_pkts Tx_bytes

------------ ------------ -------------- ------------ --------------

ghn1.co 12563 2606967 12567 1858668

------------ ------------ -------------- ------------ --------------

ghn2.co 20748 4919303 20744 2554192

248
COAX G.hn Access Multiplexer User Manual

ghn2.cpe 5841 350528 5825 1711400

------------ ------------ -------------- ------------ --------------

L10212XC# show ghn statistics if-mib ghn2 co

G.HN CO/CPE statistics IF-MIB based info

ghn2.co

InOctets : 4944465 OutOctets : 2567218

InPackets : 20854 OutPackets : 20850

Queue Full : 2

L10212XC# show ghn statistics if-mib ghn2 cpe 1

G.HN CO/CPE statistics IF-MIB based info

ghn2.cpe

InOctets : 352328 OutOctets : 1720220

InPackets : 5871 OutPackets : 5855

Queue Full : 0

show ghn line-stats


Display line status of G.hn port
Command Description Mode
show ghn
line-stats
[interface
Check the value of Line statistic.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

249
COAX G.hn Access Multiplexer User Manual

L10212XC# show ghn line-stats

Interface Throughput FRAMES LPDUS ERROR ABORT LINK OFF LINK DOWN CAUSE

------------ ---------- ---------- ---------- ----- ----- -------- --------------------

ghn1.co 1437 2643 2666 4 0 0 None

ghn1.cpe1 1271 1107 1446 0 0 0 None

ghn1.cpe2 1447 632 1384 0 0 0 None

ghn2.co 0 0 0 0 0 0 None

ghn3.co 0 0 0 0 0 0 None

Command for G.hn firmware Check

show ghn fw-upgrade


Check the firmware upgrate information.
Command Description Mode
show ghn fw-upgrade
[interface
(ifname | range IFRANGE)] Check the firmware upgrate information.
Enable
[ local | ( remote ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn fw-upgrade interface ghn1

Interface Source Section Secure Size Loaded Status

------------ ------ --------- ------ -------- -------- ------

ghn1.co NONE YES 0 0 Ready: initial status

ghn1.cpe1 NONE YES 0 0 Ready: initial status

ghn1.cpe2 NONE YES 0 0 Ready: initial status

show ghn flash-recover


Check the firmware recovery status of G.hn co port.

250
COAX G.hn Access Multiplexer User Manual

Command Description Mode


Check the Recovery status of G.hn
show ghn flash-recover Enable
ifname : ghn1-ghn12

L10212XC# show ghn flash-recover

firmware file :

Interface recovery-status

------------ ---------------------

ghn1.co no

ghn2.co no

ghn3.co no

ghn4.co no

ghn5.co no

ghn6.co no

ghn7.co no

ghn8.co no

ghn9.co no

ghn10.co no

ghn11.co no

ghn12.co no

251
COAX G.hn Access Multiplexer User Manual

Other Function Check

show ghn notch


Using a command in table, user can check a Notch Filter of the G.hn.
Command Description Mode
show ghn
notch
[interface
(ifname | range IFRANGE)] It displays settings of the ghn Notch Filter.
Enable
[ local | ( remote ifname : ghn1-ghn12
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]
[detail]

 Start: Start Freq (KHz)


 Stop: End Freq (KHz)
 Depth: Notch Filter Attenuation Value (dB)

L10212XC# show ghn notch


Interface Enable Type Count Number Start freq Stop freq Depth
============ ====== ========== ===== ====== ========== ========== =====
ghn1.co NO user 0
ghn1.cpe1 NO user 0
ghn1.cpe2 NO user 0
============ ====== ========== ===== ====== ========== ========== =====

L10212XC# show ghn notch interface ghn1 detail


Interface Enable Type Count Number Start freq Stop freq Depth
============ ====== ========== ===== ====== ==========
========== =====
ghn1.co YES regulation 1 1 0 1954 100
ghn1.co NO vendor 0
ghn1.co NO user 0
------------ ------ ---------- ----- ------ ---------- ---------- -----
ghn1.cpe1 YES regulation 1 1 0 1954 100
ghn1.cpe1 NO vendor 0
ghn1.cpe1 NO user 0
------------ ------ ---------- ----- ------ ---------- ---------- -----
ghn1.cpe2 YES regulation 1 1 0 1954 100
ghn1.cpe2 NO vendor 0
ghn1.cpe2 NO user 0
============ ====== ========== ===== ====== ==========
========== =====

show ghn cvlan


Check the G.hn cvlan information.

252
COAX G.hn Access Multiplexer User Manual

Command Description Mode


show ghn
cvlan
[interface
Display the seeting options of ghn cvlan.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10212XC# show ghn cvlan interface ghn1

Interface Enable Filter Mgmt PVID Data PVID Tags

------------ ------ ------ ------ ---- ------ ---- ----

ghn1.co NO NO NONE 0 NONE 0

ghn1.cpe1 NO NO NONE 0 NONE 0

ghn1.cpe2 NO NO NONE 0 NONE 0

show ghn rate-limit


Check the rate-limit setting value of g.hn port.
Command Description Mode
show ghn
rate-limit
[interface
It displays settings of the ghn rate-limit.
(ifname | range IFRANGE)] Enable
ifname : ghn1-ghn12
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH) ]

L10206XC# show ghn rate-limit

Interface Ingress Egress

================= ============== ==============

253
COAX G.hn Access Multiplexer User Manual

ghn1.co

ghn2.co

ghn3.co

ghn3.cpe1 - -

ghn3.cpe2 - -

ghn4.co

ghn4.cpe1 - -

ghn5.co

ghn6.co

G.hn Profile Information Check

show ghn default-profile


Check the g.hn default-profile infromation.
Command Description Mode
Check the profile settings that apply to CO and
show ghn default-profile Enable
CPE by default.

L11206XC# show ghn default-profile

Name Type ID Applied Source Value

---------------- ---- ------------------ ------- ------- ----------------

default-profile none phy-mode no default eoc

ds-rate no default 50

pairing no default auto

seed-index no auto -

tx-power1 no default 4

254
COAX G.hn Access Multiplexer User Manual

gateway no default 10.10.1.254

ip-address no auto -

netmask no default 255.255.0.0

notch no default none

isolation no default enable

rate-limit egress no default none

rate-limit ingress no default none

uni-uplink rate-limit egress no default none

uni-uplink rate-limit ingress no default none

shutdown no default auto

speed no default auto

duplex no default auto

mtu no default none

flow-control no default none

learn-limit no default none

qos sched no default wrr-all

qos priority no default 0

qos queue no default 0

qos initial-priority no default tag-ip

rate-limit egress no default none

rate-limit ingress no default none

vlan pvid no default none

vlan add no default none

loop-detect no default none

cpe-rule no default none

255
COAX G.hn Access Multiplexer User Manual

qos dscp-queue no default 0 0 1 1 2 2 3 3

qos queue-weight no default 1 2 4 8

storm-control broadcast no default 1

storm-control dlf no default 1

storm-control unknown-multicast no default 1

show ghn profile


Check the g.hn profile information on the device.
Command Description Mode
show ghn profile Check the generated profile information.
Enable
[co|cpe] [NAME] ifname : ghn1-ghn12

L11206XC# show ghn profile

Name Type ID Applied Source Value

---------------- ---- ------------------ ------- ------- ----------------

co co phy-mode yes default eoc

ds-rate yes default 50

pairing yes default auto

seed-index yes auto -

tx-power1 yes default 4

gateway yes default 10.10.1.254

ip-address yes auto -

netmask yes default 255.255.0.0

notch yes default none

isolation yes default enable

rate-limit egress yes default none

256
COAX G.hn Access Multiplexer User Manual

rate-limit ingress yes default none

Name Type ID Applied Source Value

---------------- ---- ------------------ ------- ------- ----------------

cpe cpe phy-mode yes master -

ds-rate yes master -

pairing yes default auto

seed-index yes auto -

tx-power1 yes default 4

gateway yes default 10.10.1.254

ip-address yes auto -

netmask yes master -

notch yes master -

isolation yes master -

rate-limit egress yes default none

rate-limit ingress yes default none

uni-uplink rate-limit egress yes default none

uni-uplink rate-limit ingress yes default none

shutdown yes default auto

speed yes default auto

duplex yes default auto

mtu yes default none

flow-control yes default none

learn-limit yes default none

qos sched yes default wrr-all

257
COAX G.hn Access Multiplexer User Manual

qos priority yes default 0

qos queue yes default 0

qos initial-priority yes default tag-ip

rate-limit egress yes default none

rate-limit ingress yes default none

vlan pvid yes default none

vlan add yes default none

loop-detect yes user Enable: YES

Interval: 3

Period: 60

cpe-rule yes default none

qos dscp-queue yes default 0 0 1 1 2 2 3 3

qos queue-weight yes default 1 2 4 8

storm-control broadcast yes default 1

storm-control dlf yes default 1

storm-control unknown-multicast yes default 1

show ghn profile applied


Check the profile information applied to the port.
Command Description Mode
show ghn profile applied
Check profile information applied to each port. Enable
status
show ghn profile applied
interface IFNAME Check profile information applied to the port in
Enable
(local | remote id detail.
<1-16> )

258
COAX G.hn Access Multiplexer User Manual

L11206XC# show ghn profile applied status

Interface Profile Name Method Status

------------ -------------------------------- ---------- ------

ghn1.co0 default-profile default OK

ghn2.co0 default-profile default OK

ghn3.co0 default-profile default OK

ghn3.cpe1 default-profile default OK

ghn3.cpe2 default-profile default OK

ghn4.co0 default-profile default OK

ghn4.cpe1 default-profile default OK

ghn5.co0 default-profile default OK

ghn6.co0 default-profile default OK

L11206XC# show ghn profile applied interface ghn1 local

Profile Name : default-profile (attached)

[5153 side]

Profile ID Source Profile value Switch value

------------------------ ------- ---------------- ----------------

phy-mode default eoc eoc

ds-rate default 50 50

pairing default auto auto

seed-index auto 1 1

259
COAX G.hn Access Multiplexer User Manual

tx-power1 default 4 4

gateway default 10.10.1.254 10.10.1.254

ip-address auto 10.10.1.0 10.10.1.0

netmask default 255.255.0.0 255.255.0.0

notch default - -

isolation default enable enable

[notch information]

Profile ID Source Value Index Start freq Stop freq Depth

------------------------ ------- ------- ------ ---------- ---------- -----

notch default profile - - - -

switch - - - -

CPE Information Check

CPE port-status Check


Check the status of uni-port.
Command Description Mode
show cpe port-status Check the uni-port setting options of CPE. Enable
[interface IFNAME] ifname : ghn1-ghn12
[id <1-16> |
mac HHHH.HHHH.HHHH]
[detail]

L10212XC# show cpe port-status

260
COAX G.hn Access Multiplexer User Manual

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

ghn1.cpe1 Link Down Down Down Down

Speed 10 10 10 10

Duplex Half Half Half Half

Force link Auto Auto Auto Auto

Force speed Auto Auto Auto Auto

Force duplex Auto Auto Auto Auto

ghn1.cpe2 Link Down Down Down Down

Speed 10 10 10 10

Duplex Half Half Half Half

Force link Auto Auto Auto Auto

Force speed Auto Auto Auto Auto

Force duplex Auto Auto Auto Auto

CPE registration Check


Check the cpe registration information.
Command Description Mode
show cpe add Check the Mac address and registered Enable
[interface IFNAME] information with the connected CPE.
[brief] ifname : ghn1-ghn12
show cpe add request Check the MAC address of CPE requesting Enable
[interface IFNAME] the connection.

L10212XC# show cpe add

GHN cpe registration status

261
COAX G.hn Access Multiplexer User Manual

Interface Pair Mode Cached Mac address

------------ ---- ------ ------ --------------

ghn1.co - - - 000b.6ffb.01c6

ghn1.cpe1 YES Auto - 000b.6f20.01c7

ghn1.cpe2 NO - NO -

ghn1.cpe3 NO - NO -

ghn1.cpe4 NO - NO -

ghn1.cpe5 NO - NO -

ghn1.cpe6 NO - NO -

ghn1.cpe7 NO - NO -

ghn1.cpe8 NO - NO -

ghn1.cpe9 NO - NO -

ghn1.cpe10 NO - NO -

ghn1.cpe11 NO - NO -

ghn1.cpe12 NO - NO -

ghn1.cpe13 NO - NO -

ghn1.cpe14 NO - NO -

ghn1.cpe15 NO - NO -

ghn1.cpe16 NO - NO -

------------ ---- ------ ------ --------------

L10212XC# show cpe add request

Interface MAC

------------ --------------

ghn1.co

ghn2.co 000b.6f20.01c0

262
COAX G.hn Access Multiplexer User Manual

ghn3.co

CPE Flow-control Check Command


Check the flow-control staus of uni-port.
Command Description Mode
show cpe flow-control It displays the CPE flow-control setting Enable
[interface IFNAME] options.
[detail] ifname : ghn1-ghn12

L10212XC# show cpe flow-control

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

ghn1.cpe1 Flow control enable NO NO NO NO

ghn1.cpe2 Flow control enable NO NO NO NO

CPE IGMP-snoop Check Command


Check the IGMP-snoop staus of uni-port.
Command Description Mode
show cpe igmp-snoop It displays the CPE IGMP-snooping setting Enable
[interface IFNAME] options.
[detail] ifname : ghn1-ghn12

L10212XC# show cpe igmp-snoop

Interface IGMP snooping

------------ -------------

ghn1.cpe1 YES

ghn1.cpe2 YES

263
COAX G.hn Access Multiplexer User Manual

CPE Learn-limit Check Command


Check the learn-limit staus of uni-port.
Command Description Mode
show cpe learn-limit It desplays CPE Learn-limit. Enable
[interface IFNAME] ifname : ghn1-ghn12
[detail]

L10212XC# show cpe learn-limit

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

ghn1.cpe1 Learn limit NO NO NO NO

Learn count 0 0 0 0

ghn1.cpe2 Learn limit NO NO NO NO

Learn count 0 0 0 0

CPE Mac-address-table Check Command


Check the Mac-address-table of CPE.
Command Description Mode
show cpe mac-address It displays CPE Mac address table. Enable
[interface IFNAME] ifname : ghn1-ghn12
[detail]
show cpe mac-count It displays the number of the running CPE Enable
[interface IFNAME] Mac address.
[detail] ifname : ghn1-ghn12

L10212XC# show cpe mac-address

Interface Count State MAC address Port-1 Port-2 Port-3 Port-4

------------ ----- ----- -------------- ------- ------- ------- -------

264
COAX G.hn Access Multiplexer User Manual

ghn1.cpe1

ghn1.cpe2

L10212XC# show cpe mac-count

Interface Total MC Static Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- ------- ------- ------- -------

ghn1.cpe1 0 0 0 0 0 0 0

ghn1.cpe2 0 0 0 0 0 0 0

CPE MTU Check Command


Check the MTU staus of uni-port.
Command Description Mode
show cpe mtu It displays the CPE MTU setting. Enable
[interface IFNAME] ifname : ghn1-ghn12
[detail]

L10212XC# show cpe mtu

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

ghn1.cpe1 MTU size 10240 10240 10240 10240

ghn1.cpe2 MTU size 10240 10240 10240 10240

CPE Statistics Check Command


Check the statistics of CPE.

265
COAX G.hn Access Multiplexer User Manual

Command Description Mode


show cpe statistics It displays the value of CPE statistics. Enable
(avg-pkt | avg-type | ifname : ghn1-ghn12
counter | counter-type)
[interface IFNAME]
[detail]
show cpe port-counters It displayed the setting options of CPE Enable
[interface IFNAME] PVLAN.
[detail] ifname : ghn1-ghn12

L10212XC# show cpe statistics avg-pkt ghn1

CPE port throughput

Interface port time Rx_Pkts/s Rx_Mbps Tx_Pkts/s Tx_Mbps

----------- ----- ---- ---------- ---------- ---------- ----------

ghn1.cpe1 ghn 5s 132 0.1 132 0.1

1m 132 0.1 132 0.1

5m 132 0.1 132 0.1

port0 5s 132 0.1 132 0.1

1m 132 0.1 132 0.1

5m 132 0.1 132 0.1

port1 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

port2 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

port3 5s 0 0.0 0 0.0

266
COAX G.hn Access Multiplexer User Manual

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

port4 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

ghn1.cpe2 ghn 5s 132 0.1 132 0.1

1m 132 0.1 132 0.1

5m 132 0.1 132 0.1

port0 5s 132 0.1 132 0.1

1m 132 0.1 132 0.1

5m 132 0.1 132 0.1

port1 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

port2 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

port3 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

port4 5s 0 0.0 0 0.0

1m 0 0.0 0 0.0

5m 0 0.0 0 0.0

267
COAX G.hn Access Multiplexer User Manual

L10212XC# show cpe port-counters

Interface Port-1 Port-2 Port-3 Port-4

------------ ---------- ---------- ---------- ----------

ghn1.cpe1 Total 0 0 0 0

InGoodOctetsLo 0 0 0 0

InUnicasts 0 0 0 0

InBroadcasts 0 0 0 0

InMulticasts 0 0 0 0

Octets64 0 0 0 0

Octets127 0 0 0 0

Octets511 0 0 0 0

OutOctetsLo 0 0 0 0

OutUnicasts 0 0 0 0

InAccepted 0 0 0 0

InDaUnknown 0 0 0 0

InMGMT 0 0 0 0

OutMGMT 0 0 0 0

ghn1.cpe2 Total 0 0 0 0

InGoodOctetsLo 0 0 0 0

InUnicasts 0 0 0 0

InBroadcasts 0 0 0 0

InMulticasts 0 0 0 0

Octets64 0 0 0 0

268
COAX G.hn Access Multiplexer User Manual

Octets127 0 0 0 0

Octets511 0 0 0 0

OutOctetsLo 0 0 0 0

OutUnicasts 0 0 0 0

InAccepted 0 0 0 0

InDaUnknown 0 0 0 0

InMGMT 0 0 0 0

OutMGMT 0 0 0 0

CPE VLAN Check Command


Check the vlan staus of uni-port.
Command Description Mode
show cpe vlan It displays the CPE VLAN setting options. Enable
[interface IFNAME] ifname : ghn1-ghn12
[detail]
show cpe pvlan It displays the CPE PVALN setting options. Enable
[interface IFNAME] ifname : ghn1-ghn12
[detail]

L10212XC# show cpe vlan interface ghn1

Interface Port-1 Port-2 Port-3 Port-4

------------ ------ ----------- ----------- ----------- -----------

ghn1.co

ghn1.cpe1 PVID 0 0 0 0

------------ ------ ----------- ----------- ----------- -----------

ghn1.cpe2

CPE QOS Check Command


Check the QOS staus of uni-port.

269
COAX G.hn Access Multiplexer User Manual

Command Description Mode


show cpe qos It displays the setting options of CPE QOS. Enable
[interface IFNAME] ifname : ghn1-ghn12
[detail]

L10212XC# show cpe qos

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

ghn1.cpe1 Scheduling mode wrr-all wrr-all wrr-all wrr-all

Default priority 0 0 0 0

Default queue 0 0 0 0

Initial priority tag-ip tag-ip tag-ip tag-ip

ghn1.cpe2 Scheduling mode wrr-all wrr-all wrr-all wrr-all

Default priority 0 0 0 0

Default queue 0 0 0 0

Initial priority tag-ip tag-ip tag-ip tag-ip

CPE Rate-limit Check Command


Check the rate-limit status of uni-port.
Command Description Mode
show cpe rate-limit It displays the setting options of CPE Rate- Enable
(egress | ingress) limit.
[interface IFNAME] ifname : ghn1-ghn12
[detail]

L10212XC# show cpe rate-limit egress

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

270
COAX G.hn Access Multiplexer User Manual

ghn1.cpe1 Egress rate limit enable No No No No

Egress rate limit 1000000 1000000 1000000 1000000

ghn1.cpe2 Egress rate limit enable No No No No

Egress rate limit 1000000 1000000 1000000 1000000

CPE Storm Control Check Command


Check to Limits the amount of broadcast / dlf / unknown-multicast in CPE.
Command Description Mode
show cpe storm-control Check Storm control setting in CPE Enable
[interface IFNAME] ifname : ghn1-ghn12
[ id <1-16> | mac
HHHH.HHHH.HHHH]

L11206XC# show cpe storm-control

Interface rate limit

------------ -----------

ghn3.cpe1

ghn3.cpe2

ghn4.cpe1

CPE Rule Check Command


Check the CPE rule setting information.
Command Description Mode
show cpe rule Check the CPE rule setting information. Enable
[NAME] ifname : ghn1-ghn12

L11206XC# show cpe rule

271
COAX G.hn Access Multiplexer User Manual

Rule : ip-any

-Classify-

[MAC] : none

[IP] : source any

destination any

[PORT] : none

[PROTOCOL] : none

[ETHER-TYPE] : none

[TOS] : none

[PRECEDENCE] : none

[DSCP] : none

[VLAN] : 2

[COS] : none

-Action-

[DROP] : none

[COS] : none

[Queue] : none

[VLAN] : none

CPE Loop detect Check command


Check loop-detect infromaiton in CPE.
Command Description Mode
show cpe loop-detect Check loop-detect infromaiton in CPE. Enable
[interface IFNAME] ifname : ghn1-ghn12
[id <1-16> | mac
HHHH.HHHH.HHHH]

272
COAX G.hn Access Multiplexer User Manual

[detail]

L11206XC# show cpe loop-detect

Interface Port-1 Port-2 Port-3 Port-4

------------ ------- ------- ------- -------

ghn4.cpe1 Interval 3 3 3 3

Period 60 60 60 60

Enabled NO NO NO NO

Detected NO NO NO NO

273
COAX G.hn Access Multiplexer User Manual

G.hn CO/CPE Factory Reset

Using a command in table, user can change the settings of G.hn parameters and G.hn gdotnow
to the initial values.
Command Description Mode
ghn factory-reset It initializes values of ghn Parameters. Enable
[interface ifname : ghn1-ghn12
(IFNAME |
range IFRANGE)]
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH)

L10212XC# ghn factory-reset

Mar 07 05:55:46 notice G.HN : G.hn factory reset - ghn1 remote id 11

Mar 07 05:55:46 notice G.HN : G.hn factory reset - ghn1 remote id 10

Mar 07 05:55:46 notice G.HN : G.hn factory reset - ghn1 local

274
COAX G.hn Access Multiplexer User Manual

G.hn CO/CPE Reboot

Using the command in Table to reboot the G.hn port.


Command Description Mode
ghn reboot It reboots the G.hn ports. Enable
[interface ifname : ghn1-ghn12
(IFNMAE |
range IFRANGE)]
[ local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH)]

L10212XC# ghn reboot interface ghn1

Mar 07 05:54:14 notice G.HN : G.hn reboot - ghn1 remote id 11

Mar 07 05:54:14 notice G.HN : G.hn reboot - ghn1 remote id 10

Mar 07 05:54:14 notice G.HN : G.hn reboot - ghn1 local

275
COAX G.hn Access Multiplexer User Manual

G.hn Setting

G.hn mode Switch

Switch to G.hn Mode.


Command Description Mode
ghn Switch from Global Mode to ghn Mode. config

L10206XC# con t
Enter configuration commands, one per line. End with CNTL/Z.
L10206XC(config)# ghn
L10206XC(config-ghn)#

IP and Seed Index Automatic Setup

This is a function to automatically set G.hn IP and Seed-index of the device. G.hn refers to
G.hn Seed Index when linking CO and CPE. Each CO and CPE's IP address is used for firmware
upgrades and some CPE information lookups. IP-Config must be on for the equipment to be used
normally.

Command Description Mode


ip-config enable It sets IP and Seed Index Auto Setup config-ghn
no ip-config enable It unsets IP and Seed Index Auto Setup config-ghn

L10206XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+11_5 DCP962C

ghn1.cpe14 YES 000b.6f20.14a6 1 10.10.1.14 v7_6_r589+11_5 L32101CP

System-id Setting

276
COAX G.hn Access Multiplexer User Manual

Assign the ID for the devices. G.hn Seed-index changes when changing System ID.

Command Description Mode


system-id <1-4> Change to G.hn system ID. config-ghn

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# show ghn pairing

ghn1.cpe1 NO 000b.6f20.01b0

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- --------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+11_S2 DCP962C

ghn1.cpe2 YES 000b.6f20.01d8 1 10.10.1.2 v7_6_r589+18_s1 L32104CP

L10212XC(config-ghn)# system-id 2

L10212XC(config-ghn)# show ghn pairing

ghn1.cpe1 NO 000b.6f20.01b0

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- --------------- ---------

ghn1.co YES 000b.6ffb.01c6 13 10.10.1.0 v7_6_r589+11_S2 DCP962C

ghn1.cpe2 YES 000b.6f20.01d8 13 10.10.1.2 v7_6_r589+18_s1 L32104CP

G.hn Profile Functions

The setting options of CO/CPE can be changed in the G.hn Profile. Users can change the G.hn
setting options by making a new profile and applying the new profile in each port. Default profile

277
COAX G.hn Access Multiplexer User Manual

will be automatically applied in each port when there is no setting options in the profile.

G.hn profile Function Setting


G.hn profile is changable(ON/Off.) The initial status of G.hn profile is always enable.

Command Description Mode


profile enable It allows to use ghn profile. config-ghn
no profile enable It denied using ghn ghn. config-ghn

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# profile enable

G.hn profile Create and Modify


To create a CO profile, it is necessary to get the co-profile Name create commands under the
CO profile Mode. Only submit the apply command in the CO profile mode, the profile will be
created. In terms of modification, the co-profile NAME changecommand is using to change CO
profile. The setting process of CPE profile is same with CO profile.
Command Description Mode
co-profile NAME create Creat the G.hn profile(CO). config-ghn
cpe-profile NAME create Creat the G.hn profile(CPE). config-ghn
co-profile NAME modify Change the G.hn profile(CO). config-ghn
cpe-profile NAME modify Change the G.hn profile(CPE). config-ghn
apply Apply the changed G.hn profile(CO) config-ghn-co-
profile
apply Apply the changed G.hn profile(CPE) config-ghn-cpe-
profile

L10212XC(config)# ghn

L10212XC(config-ghn)# co-profile testco create

278
COAX G.hn Access Multiplexer User Manual

L10212XC(config-ghn-co-profile[testco])# apply

L10212XC(config-ghn-co-profile[testco])# end

L10212XC # show ghn profile

Name Type ID Applied Source Value

---------------- ---- ------------------ ------- ------- ----------------

co-test co phy-mode no default eoc

ds-rate no default 50

pairing no default auto

seed-index no auto -

tx-power1 no user 3

gateway no default 10.10.1.254

ip-address no auto -

netmask no default 255.255.0.0

notch no default none

isolation no default enable

rate-limit egress no default 800

rate-limit ingress no default 800L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# co-profile testco modify

L10212XC(config-ghn-co-profile[testco])# tx-power1 4

L10212XC(config-ghn-co-profile[testco])# apply

L10212XC(config-ghn-co-profile[testco])# end

L10212XC# show ghn profile

Name Type ID Applied Source Value

---------------- ---- ------------------ ------- ------- ----------------

co-test co phy-mode no default eoc

ds-rate no default 50

279
COAX G.hn Access Multiplexer User Manual

pairing no default auto

seed-index no auto -

tx-power1 no user 4

gateway no default 10.10.1.254

ip-address no auto -

netmask no default 255.255.0.0

notch no default none

isolation no default enable

rate-limit egress no default 800

rate-limit ingress no default 800

Delete G.hn profile


Delete the created profile. Noticed that if the current using profile can’t be removed. Only if
the user stops to applying the profile, it can be removed.
Command Description Mode
no co-profile NAME Remove the G.hn profile(CO) config-ghn
no cpe-profile NAME Remove the G.hn profile(CPE) config-ghn

G.hn co-profile Setting


Below is the commands for G.hn co-profile setting. Only after applying the needed functions,
the profile can be modified.
Command Description Mode
co-profile NAME Creat and change the G.hn profile(CO). config-ghn
{ create | change}
apply Apply the modified G.hn profile. config-ghn-co-
profile
tx-power1 <1-7> Set the value of Tx-Gain of Channel 1 config-ghn-co-
profile
notch <1-10> Set the Notch. config-ghn-co-
<0-200000> Notch Index_number Freq_start Freq_end profile

280
COAX G.hn Access Multiplexer User Manual

<0-200000> <0-100> Depth

G.hn cpe-profile Setting


Below are the commands to set G.hn CPE-profile. Only after applying the needed functions,
the profile can be modified successfully.
Command Description Mode
cpe-profile NAME Creat and change G.hn profile(CPE) config-ghn
( create | change)
apply Apply the modified contents on G.hn config-ghn-cpe-
profile. profile
tx-power1 <1-> Set the value of Tx-Gain of Channel1 config-ghn-cpe-
profile
rate-limit egress Limit the egress speed of cpe. (Mbps) config-ghn-cpe-
<10-800> profile
rate-limit ingress Limit the ingress speed of cpe. (Mbps) config-ghn-cpe-
<10-800> profile
loop-detect Set the loop-detect function. config-ghn-cpe-
Monitor every 3 seconds, and the port profile
block is released after 60 seconds.
loop-detect Set the loop-detect function. config-ghn-cpe-
interval <1-65525> Monitor every interval seconds, and the profile
period <1-65525> port block is released after period
seconds.
qos dscp-queue <0-7> Map the DSCP Group (0 ~ 7) value to config-ghn-cpe-
<0-3> Queue (0 ~ 3).0~7 : DSCP Group 0 profile
8~15 : DSCP Group 1
16~23 : DSCP Group 2
24~31 : DSCP Group 3
32~39 : DSCP Group 4
40~47 : DSCP Group 5
48~55 : DSCP Group 6
56~63 : DSCP Group 7
qos queue-weight <0-3> Sets the WRR weights for the Queue. config-ghn-cpe-
<1-12> profile

281
COAX G.hn Access Multiplexer User Manual

storm-control Limit the CPE's broadcast / unknown- config-ghn-cpe-


(broadcast | unknown- multicast packet rate.. profile
multicast)
<1-10>
storm-control dlf Limit the CPE's dlf packet rate.. config-ghn-cpe-
<1-1000> profile
uni-uplink rate-limit Set the speed limit of the uplink. config-ghn-cpe-
(ingress | egress) profile
<64-1000000>
uni-uplink block Block uni-uplink port config-ghn-cpe-
profile
igmp snoop It sets IGMP snoop. config-ghn-cpe-
profile
igmp snoop fast-leave It sets IGMP snoop Fast Leave. config-ghn-cpe-
profile
igmp snoop filter <1-8> It set the feature to block specific config-ghn-cpe-
address A.B.C.D mask multicast address packets. profile
A.B.C.D
igmp snoop max-group- It set the feature to limit the number of config-ghn-cpe-
count <1-32> multicast groups. profile
igmp snoop report- It sets IGMP snoop report suppression. config-ghn-cpe-
suppression profile
igmp snoop vid config-ghn-cpe-
<1-4094> profile
no rate-limit egress Disable egress speed limit of cpe config-ghn-cpe-
profile
no rate-limit ingress Disable ingress speed limit of cpe config-ghn-cpe-
profile
no tx-power1 Default the value of Tx-Gain of Channel1 config-ghn-cpe-
profile
no loop-detect Disable the Loop-detect setting. config-ghn-cpe-
profile
no qos dscp-queue Change the DSCP-Queue mappings to config-ghn-cpe-
<0-7> their default values. profile
0, 1 Group -> Queue 0

282
COAX G.hn Access Multiplexer User Manual

2, 3 Group -> Queue 1


4, 5 Group -> Queue 2
6, 7 Group -> Queue 3
no qos queue-weight <0- Change the Wrr weigth setting of the config-ghn-cpe-
3> Queue to the default value. profile
Queue 0: 1
Queue 1: 2
Queue 2: 4
Queue 3: 8
no storm-control Unset Storm-control. config-ghn-cpe-
(broadcast | dlf | profile
unknown-multicast)
no uni-uplink rate-limit Unset the speed limit of the uplink.. config-ghn-cpe-
(ingress | egress ) profile
no uni-uplink block UnBlock uni-uplink port config-ghn-cpe-
profile
no igmp snoop It unsets IGMP snoop. config-ghn-cpe-
profile
no igmp snoop fast-leave It unsets IGMP snoop Fast Leave. config-ghn-cpe-
profile
no igmp snoop filter <1- It unset the feature to block specific config-ghn-cpe-
8> multicast address packets. profile
no igmp snoop max- It unset the feature to limit the number of config-ghn-cpe-
group-count multicast groups. profile
no igmp snoop report- It unsets IGMP snoop report suppression. config-ghn-cpe-
suppression profile
no igmp snoop vid config-ghn-cpe-
profile

G.hn cpe-profile uni-port Setting


User port can be modified by running CPE profile uni-port command. The modified contents in
the profile can only work after being applied.
Command Description Mode
uni-port ( <1-4> | Creat and change G.hn profile(CPE). config-ghn-cpe-
range UNI_RANGE) profile

283
COAX G.hn Access Multiplexer User Manual

apply Applied the modified G.hn profile. config-ghn-cpe-


profile
duplex (full | half) Change the duplex setting of user port. config-ghn-cpe-
profile-uni
cpe-rule NAME Applies the rule to the uni port. config-ghn-cpe-
profile
flow-control Acticate the flow-control function of user config-ghn-cpe-
port profile-uni
learn-limit <1-255> Limit the number of Mac- address learning config-ghn-cpe-
by user port. profile-uni
mtu (1522|2011) Change the MTU setting in the user port. config-ghn-cpe-
profile-uni
qos initial-priority Change the initial-piority setting way in config-ghn-cpe-
(default | ip |tag | tag- the user port. profile-uni
ip)
qos priority <0-7> Change the priority of user port. config-ghn-cpe-
profile-uni
qos queue <0-3> Change the default queue value. config-ghn-cpe-
profile-uni
qos sched (spq-all|wrr- Change the Qos scheduling in the user config-ghn-cpe-
10|wrr-210|wrr-all) port. profile-uni

rate-limit Set the Egress/Ingress limitation on the config-ghn-cpe-


(egress|ingress) user port. profile-uni
<64-1000000>
shutdown Block the link of user port. config-ghn-cpe-
. profile-uni
speed Set the transfer spped of user port. config-ghn-cpe-
(10m|100m|1g|auto) profile-uni
vlan add <1-4094> Add VLAN ID of the uni port. config-ghn-cpe-
(tag | untag | unmodify) profile-uni
vlan add <1-4094> Add VLAN ID of the uni port. config-ghn-cpe-
(tag | untag | profile-uni
unmodify)
fid <0-4094>

284
COAX G.hn Access Multiplexer User Manual

vlan pvid <1-4094> Set the PVID of uni port. config-ghn-cpe-


If an untagged packet or a packet with a
profile-uni
Vlan ID of 0 is received, the PVID value
is transmitted and transmitted.

Command Description Mode


no duplex Modified the duplex setting to qito mode config-ghn-cpe-
in the user port. profile-uni
no flow-control Remove the flow-control function of user config-ghn-cpe-
port. profile-uni
no learn-limit Remove the limitation on Mac Learning in config-ghn-cpe-
the user port. profile-uni
no mtu Default the MTU of user port. config-ghn-cpe-
profile-uni
no qos initial-priority Change the initial-priority to the default config-ghn-cpe-
value (tag-ip) in the user port. profile-uni
no qos priority Set the priority as default value (0) in the config-ghn-cpe-
user port. profile-uni
no qos queue Set the queue with default value (0) in the config-ghn-cpe-
user port. profile-uni
no qos sched Change the Qos schedule to the default config-ghn-cpe-
value. (all port WRR) profile-uni
no rate-limit Remove the limitation on the user port config-ghn-cpe-
(egress|ingress) speed. profile-uni
no shutdown Remove the setting which blocks link of config-ghn-cpe-
user port profile-uni
no speed Adapt the auto mode to the teansfer config-ghn-cpe-
speed in the user port. profile-uni
no vlan add It removes all VLAN setting of subscriber config-ghn-cpe-
port. profile-uni
no vlan add <1-4094> It removes a specific VLAN on the config-ghn-cpe-
subscriber port. profile-uni
no vlan pvid It unsets PVID setting of subscriber port. config-ghn-cpe-
profile-uni
no igmp snoop filter <1- It unsets function to block specific config-ghn-cpe-
8> multicast address packets on the profile-uni

285
COAX G.hn Access Multiplexer User Manual

subscriber port.
no igmp snoop max- It unsets function to limit the number of config-ghn-cpe-
group-count multicast groups on a subscriber port. profile-uni

L10212XC> en

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# cpe-profile cpe modify

L10212XC(config-ghn-cpe-profile[cpe])# uni-port range 1-4

L10212XC(config-ghn-cpe-profile[cpe]-uni[1-4])# shutdown

CPE rule Setting


The CPE Rule function classifies incoming packets into each Uni-port of the CPE and then
decides what to process the classified packets.
The command to create / modify / delete CPE Rule is as follows.
Command Description Mode
cpe-rule NAME create Create CPE-Rule. ghn
cpe-rule NAME modify Modify CPE-Rule. ghn
no cpe-rule NAME Remove CPE-Rule. ghn

L11206XC(config-ghn)# cpe-rule test create

L11206XC(config-ghn-rule[test])#

The commands to classify packets are as follows. When multiple settings are made in one rule,
only those packets which satisfy all conditions are grouped by AND.

Command Description Mode


cos <0-7> Set Cos value. ghn-rule
dscp <0-63> Set DSCP value. ghn-rule
ethertype Set Ethertype value. ghn-rule

286
COAX G.hn Access Multiplexer User Manual

(arp|ipv4|ipv6|lldp|
loopback|ppp|pppoe-
dsicovery | pppeo-session
| rarp)
ethertype 0xXXXX 0xXXXX Set Ethertype value. ghn-rule
ip src ( A.B.C.D | any ) Set IP address. ghn-rule
dst ( A.B.C.D | any )
mac src Set MAC address ghn-rule
(HHHH.HHHH.HHHH|any)
dst
(HHHH.HHHH.HHHH|any)
port Set port number ghn-rule
src ( <0-65535> | any)
dst ( <0-65535> | any)
precedence <0-7> Set Precedence value. ghn-rule
protocol ( icmp | igmp | Set Protocol value. ghn-rule
tcp | udp)
protocol <0x00-0xFF> Set Protocol number. ghn-rule
tos <0-255> Set Tos value. ghn-rule
vlan <1-4094> Set vlan value. ghn-rule

L11206XC(config-ghn)# cpe-rule test create

L11206XC(config-ghn-rule[test])# exit

How to turn off the setting Classification is as follows:


Command Description Mode
no cos Unset Cos value. ghn-rule
no dscp Unset DSCP value. ghn-rule
no ethertype Unset Ethertype value. ghn-rule
no ip Unset IP address. ghn-rule
no mac Unset MAC address ghn-rule
no port Unset port number ghn-rule
no precedence Unset Precedence value. ghn-rule
no protocol Unset Protocol value. ghn-rule

287
COAX G.hn Access Multiplexer User Manual

no tos Unset Tos value. ghn-rule


no vlan Unset vlan value. ghn-rule

How to handle the packet classification is as follows:


Command Description Mode
action cos <0-7> Sets the cos value of the classified packet. ghn-rule
action drop Discard all classified packets. ghn-rule
action queue <0-3> Maps the classified packets to the set ghn-rule
queues
action vlan <1-4093> Change the vlan tag of the classified ghn-rule
packet.

Command Description Mode


no action cos Do not change cos of classified packets. ghn-rule
no action drop Do not drop classified packets. ghn-rule
no action queue Change the queue mapping of the ghn-rule
classified packets to the default value.
no action vlan It does not change the vlan value of the ghn-rule
classified packet.

L11206XC(config-ghn)# cpe-rule test create

L11206XC(config-ghn-rule[test])# ip src 192.168.1.1 255.255.255.255 dst any

L11206XC(config-ghn-rule[test])# cos 7

L11206XC(config-ghn-rule[test])# dscp 5

L11206XC(config-ghn-rule[test])# ethertype ipv4

L11206XC(config-ghn-rule[test])# port src 10 dst any

L11206XC(config-ghn-rule[test])# protocol tcp

L11206XC(config-ghn-rule[test])# vlan 2

L11206XC(config-ghn-rule[test])# action drop

L11206XC(config-ghn-rule[test])# exit

L11206XC(config-ghn)# cpe-profile cpe-rule-test create

288
COAX G.hn Access Multiplexer User Manual

L11206XC(config-ghn-cpe-profile[cpe-rule-test])# uni-port range 1-4

L11206XC(config-ghn-cpe-profile[cpe-rule-test]-uni[1-4])# cpe-rule test

L11206XC(config-ghn-cpe-profile[cpe-rule-test]-uni[1-4])# exit

L11206XC(config-ghn-cpe-profile[cpe-rule-test])# apply

L11206XC(config-ghn-cpe-profile[cpe-rule-test])# exit

L11206XC(config-ghn)# ghn-co 1

L11206XC(config-ghn-co[1])# cpe-profile all cpe-rule-test

L11206XC(config-ghn-co[1])# exit

Apply G.hn profile on the assigned port


Make the profile being applied in the corresponding port.

Command Description Mode


ghn-co (<1-24> | range Switch to G.hn CO Mode ghn
CONUMBER)
co-profile NAME Apply the CO profile to the corresponding ghn-co
port.
cpe-profile all NAME Apply the CPE profile to all cpe of ghn-co
corresponding port.
cpe-profile Apply the CPE profile to selected CPE of ghn-co
( <1-16> | range corresponding port.
NUMRANGE )
NAME
no co-propfile Remove the CO profile from the port. ghn-co
no co-propfile NAME Remove the assigned CO profile from the ghn-co
port.
no cpe-propfile Remove CPE profile from all cpe of the port. ghn-co
no cpe-profile Remove the CPE profile from selected cpe ghn-co
( <1-16> | range of the port.
NUMRANGE )
no cpe-profile NAME Reomeve the assigned CPE Profile from the ghn-co

289
COAX G.hn Access Multiplexer User Manual

port.

Apply Ghn cpe-profile based on mac-address


Operators can manage Cpe-profiles based on Mac-address. This feature has a higher priority
than the port-based commands. When applying port-based profile and applying Mac-address
based profile, set profile based on Mac-address is applied.
Command Description Mode
mac-attach Apply cpe-profile based on cpe's Mac- ghn
HHHH.HHHH.HHHH address.
NAME
no mac-attach Disable cpe-profile applied based on Mac- ghn
HHHH.HHHH.HHHH address. Port-based profile is applied
when disabled. If this is not set, the
default profile is applied.

Ghn cpe-profile RADIUS based application


Operators can manage the cpe-profile using a RADIUS server. This feature has priority over
port-based and Mac-based enforcement.

When you set the RADIUS server address and enable the feature, it uses the MAC address of
the CPE to authenticate to the RADIUS server. The authenticated MAC address is responded to
from the server by the corresponding profile name. The name of the response profile is saved
and applied by priority.

Also, when the function is activated, a new authentication request is made to the RADIUS
server every time the CPE is attached.

At the end of the retry, servers that do not respond for a period are registered as 'dead servers'
and are excluded from the RADIUS server list for 'deadtime'. The number of retries, the time to
wait for a response, and 'deadtime' can be set with the command.

The time to try and wait for all registered servers is called 'maintime'. By default, it will wait for
two minutes. After 'maintime' ends, it will try again from the first server. 'Maintime' can be set by
command.

290
COAX G.hn Access Multiplexer User Manual

When enabled, the RADIUS server sends a request message until it is authenticated. If you want
to stop sending messages, you must disable the function.

Command Description Mode


radius-server host Register the RADIUS server address, ghn
HOSTNAME key STRING shared key, and port number.
(port PORT | )
no radius-server host Delete the RADIUS server with the ghn
HOSTNAME (port corresponding address and port number.
PORT| )
radius-server Set the number of retries for non- ghn
retransmit RETRIES responding servers. (default: 3 sec)
radius-server timeout Sets the maximum time to wait for a ghn
SEC response from the server. (default: 5 sec)
radius-server deadtime Sets the amount of time that an ghn
MIN unresponsive server remains as a dead
server. (default: 0 min) It is also used as
the delay time value before attempting all
servers and trying again from the
beginning. In this case, if it is set to 0, the
delay time is 1.
radius-server maintime Set maintime. (default: 2min) ghn
MIN
radius-cpe-profile Enables the ability to apply CPE profiles ghn
enable based on RADIUS.
no radius-cpe-profile Disable the ability to apply CPE profile ghn
enable based on RADIUS.

Check G.hn profile


Display a list of G.hn profiles
Command Description Mode
show ghn profile [NAME] Display G.hn Profile Enable
show ghn profile Display G.hn CO Profile Enable
co [NAME]

291
COAX G.hn Access Multiplexer User Manual

show ghn profile Display G.hn CPE Profile Enable


cpe [NAME]
show ghn profile Display applied G.hn profile information Enable
applied interface IFNAME detail.
( local |
remote id <1-16> )
show ghn profile Display applied G.hn profile status. Enable
applied status
show ghn mac-attach Display applied G.hn profile status by Enable
Mac-attach function
show ghn radius-cpe- Display the RADIUS server information. Enable
profile
show ghn radius-cpe- Display profile information received from Enable
profile list the RADIUS server.

L10212XC# show ghn profile

Name Type ID Applied Source Value

---------------- ---- ------------------ ------- ------- ----------------

testco co phy-mode no default eoc

ds-rate no default 50

pairing no default auto

seed-index no auto -

tx-power1 no default 4

gateway no default 10.10.1.254

ip-address no auto -

netmask no default 255.255.0.0

notch no default none

isolation no default enable

L10212XC# show applied profile interface ghn1 local

Profile Name : default-profile (attached)

292
COAX G.hn Access Multiplexer User Manual

[5153 side]

Profile ID Source Profile value Switch value

------------------------ ------- ---------------- ----------------

phy-mode default eoc eoc

ds-rate default 50 50

pairing default auto auto

seed-index auto 3 1

tx-power1 default 2 2

gateway default 10.10.1.254 10.10.1.254

ip-address auto 10.10.3.0 10.10.1.0

netmask default 255.255.0.0 255.255.0.0

notch default - -

isolation default enable enable

[notch information]

Profile ID Source Value Index Start freq Stop freq Depth

------------------------ ------- ------- ------ ---------- ---------- -----

notch default profile - - - -

switch - - - -

Example of G.hn profile Apply


Saved all TX-Power1 with value 3.

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

293
COAX G.hn Access Multiplexer User Manual

L10212XC(config)# ghn

L10212XC(config-ghn)# co-profile co-test create

L10212XC(config-ghn-co-profile[co-test])# tx-power1 3

L10212XC(config-ghn-co-profile[co-test])# apply

L10212XC(config-ghn-co-profile[co-test])# exit

L10212XC(config-ghn)# ghn-co range 1-12

L10212XC(config-ghn-co[1-12])# co-profile

L10212XC(config-ghn-co[1-12])# co-profile co-test

L10212XC(config-ghn-co[1-12])# end

L10212XC# show ghn line-config

Domain Pairing Seed Access TX SNR ISOLA

Interface ID Mode Index Policy POWER OFFSET TION

------------ ------ ------- ----- ------ ----- ------ -----

ghn1.co 1 Auto 1 MDU 3 1.0db CPE

ghn2.co 1 Auto 2 MDU 3 1.0db CPE

ghn3.co 1 Auto 3 MDU 3 1.0db CPE

CPE Registeration

CPE registrates with its MAC. The CPE registration will be blocked when its Mac is not confirmed.
If you manually register the CPE, the link will not be established for CPEs other than the registered
MAC address.
Command Description Mode
ghn-co (<1-24> | range Switch to G.hn-co Mode. config-ghn
NUMBERRANGE)
cpe add <1-16> Enter the mac address of CPE manually. Co ghn-co
HHHH.HHHH.HHHH is not able to connect with CPE when the
( |manual) mac address is not confirmed.
cpe add <1-16> Enter the CPE automatically if it doesn’t be ghn-co
HHHH.HHHH.HHHH fill manually.

294
COAX G.hn Access Multiplexer User Manual

auto

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# ghn-co 2

L10212XC(config-ghn-co[2])# cpe add 16 0000.1111.2222 manual

L10212XC(config-ghn-co[2])# end

L10212XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co NO 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C

ghn2.co NO 000b.6ffb.01c9 2 10.10.2.0 v7_6_r589+5_6 DCP962C

ghn2.cpe16 NO 0000.1111.2222

ghn3.co NO 000b.6ffb.01b2 3 10.10.3.0 v7_6_r589+5_6 DCP962C

L10212XC# show cpe add

GHN cpe registration status

------------ ---- ------ ------ --------------

ghn2.co - - - 000b.6ffb.01c9

ghn2.cpe1 NO - NO -

ghn2.cpe2 NO - NO -

ghn2.cpe3 NO - NO -

ghn2.cpe4 NO - NO -

295
COAX G.hn Access Multiplexer User Manual

ghn2.cpe5 NO - NO -

ghn2.cpe6 NO - NO -

ghn2.cpe7 NO - NO -

ghn2.cpe8 NO - NO -

ghn2.cpe9 NO - NO -

ghn2.cpe10 NO - NO -

ghn2.cpe11 NO - NO -

ghn2.cpe12 NO - NO -

ghn2.cpe13 NO - NO -

ghn2.cpe14 NO - NO -

ghn2.cpe15 NO - NO -

ghn2.cpe16 No Manual - 0000.1111.2222

Command Description Mode


cpe add write Manually write the CPE on the connected ghn-co
CO.

L10212XC# show cpe add interface ghn1 brief

GHN cpe registration status

Interface Pair Mode Cached Mac address

------------ ---- ------ ------ --------------

ghn1.co - - - 000b.6ffb.01c6

ghn1.cpe1 YES Auto - 000b.6f20.01c0

ghn1.cpe2 YES Auto - 000b.6f20.01c7

L10212XC#

296
COAX G.hn Access Multiplexer User Manual

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# ghn-co 1

L10212XC(config-ghn-co[1])# cpe add write

L10212XC(config-ghn-co[1])# end

L10212XC# show cpe add interface ghn1 brief

GHN cpe registration status

Interface Pair Mode Cached Mac address

------------ ---- ------ ------ --------------

ghn1.co - - - 000b.6ffb.01c6

ghn1.cpe1 YES Manual - 000b.6f20.01c0

ghn1.cpe2 YES Manual - 000b.6f20.01c7

CPE manual registration mode


The CPE manual registration mode is that only CPE which registered the Mac with the cpe add
command can be linked. CPEs that do not register with Maunal will also be automatically linked
if you disable this mode.
Command Description Mode
cpe add mode manual Set CPE registration mode to manual. ghn-co
CPEs that are not registered with the cpe
add command isn’t linked
no cpe add mode Disable CPE manual registration mode. ghn-co
manual
cpe add Manually register the CPE with the MAC ghn-co
HHHH.HHHH.HHHH address currently entered in CO.
<1-16> ( |manual)
show cpe add request Display list of CPEs requesting links. Enable

297
COAX G.hn Access Multiplexer User Manual

L10212XC# show cpe add brief

GHN cpe registration status

Interface Pair Mode Cached Mac address

------------ ---- ------ ------ --------------

ghn1.co - - - 000b.6ffb.01c6

ghn1.cpe1 YES Auto - 000b.6f20.01c0

ghn1.cpe2 YES Auto - 000b.6f20.01c7

------------ ---- ------ ------ --------------

ghn2.co - - - 000b.6ffb.01c9

ghn2.cpe16 No Manual - 0000.1111.2222

------------ ---- ------ ------ --------------

ghn3.co - - - 000b.6ffb.01b2

L10212XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C

ghn1.cpe1 YES 000b.6f20.01c0 1 10.10.1.1 v7_6_r589+5_6 L32104CP

ghn1.cpe2 YES 000b.6f20.01c7 1 10.10.1.2 v7_6_r589+5_7 L32104CP

ghn2.co NO 000b.6ffb.01c9 2 10.10.2.0 v7_6_r589+5_6 DCP962C

ghn2.cpe16 NO 0000.1111.2222

ghn3.co NO 000b.6ffb.01b2 3 10.10.3.0 v7_6_r589+5_6 DCP962C

298
COAX G.hn Access Multiplexer User Manual

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# ghn-co 1

L10212XC(config-ghn-co[1])# cpe add mode manual

L10212XC(config-ghn-co[1])# end

L10212XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co NO 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C

ghn2.co NO 000b.6ffb.01c9 2 10.10.2.0 v7_6_r589+5_6 DCP962C

ghn2.cpe16 NO 0000.1111.2222

ghn3.co NO 000b.6ffb.01b2 3 10.10.3.0 v7_6_r589+5_6 DCP962C

L10212XC# con t

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# cpe-profile

L10212XC(config-ghn)# ghn-co 1

L10212XC(config-ghn-co[1])# show cpe add request

Interface MAC

------------ --------------

ghn1.co 000b.6f20.01c0

000b.6f20.01c7

ghn2.co

ghn3.co

299
COAX G.hn Access Multiplexer User Manual

L10212XC(config-ghn-co[1])# cpe add 10 000b.6f20.01c0

L10212XC(config-ghn-co[1])# cpe add 11 000b.6f20.01c7

L10212XC(config-ghn-co[1])# end

L10212XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C

ghn1.cpe10 NO 000b.6f20.01c0

ghn1.cpe11 NO 000b.6f20.01c7

ghn2.co NO 000b.6ffb.01c9 2 10.10.2.0 v7_6_r589+5_6 DCP962C

ghn2.cpe16 NO 0000.1111.2222

ghn3.co NO 000b.6ffb.01b2 3 10.10.3.0 v7_6_r589+5_6 DCP962C

L10212XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C

ghn1.cpe10 YES 000b.6f20.01c0 1 10.10.1.10 v7_6_r589+5_6 L32104CP

ghn1.cpe11 YES 000b.6f20.01c7 1 10.10.1.11 v7_6_r589+5_7 L32104CP

ghn2.co NO 000b.6ffb.01c9 2 10.10.2.0 v7_6_r589+5_6 DCP962C

ghn2.cpe16 NO 0000.1111.2222

ghn3.co NO 000b.6ffb.01b2 3 10.10.3.0 v7_6_r589+5_6 DCP962

300
COAX G.hn Access Multiplexer User Manual

Firmware Upgrade

fw-upgrade Command

Manual upgrade of Co and CPE firmware. Upgrade methods include OSUP (One-step Upgrade)
and Raw method. In case of Raw, all the information of flash is initialized and unique information
such as Mac and Model information is also initialized. OSUP keeps the unique values mentioned
above and only upgrades the functionality. We recommend upgrading to OSUP. We recommend
that you do not use upgrade to Raw unless you have a special case.
Among the upgrade options, the no-model-check option compares the model names of the CPE
and firmware files to prevent you from accidentally upgrading the firmware of another device.
The upgrade method is to move the firmware file to the device using tftp / ftp first and then
upgrade the file using the upgrade command below.
Command Description Mode
ghn fw-upgrade Upgrate the firmware of G.hn CO/CPE Enable
simple FILENAME through osup by using ftp.
[interface
ifname | range IFRANGE]
(local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH))
[no-model-check]
ghn fw-upgrade Upgrate the firmware of G.hn CO/CPE Enable
ousp FILENAME through osup.
( l2 | tftp A.B.C.D
| ftp A.B.C.D ID
PASSWORD )
[interface
IFNAME | range
IFRANGE]
(local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH))
[no-model-check]

301
COAX G.hn Access Multiplexer User Manual

ghn fw-upgrade Upgrate the firmware of G.hn CO/CPE Enable


raw FILENAME through raw.
( l2 | tftp A.B.C.D
| ftp A.B.C.D ID
PASSWORD )
[interface
IFNAME | range
IFRANGE]
(local | ( remote
(| id <1-16> |
mac HHHH.HHHH.HHHH))
[no-model-check]

Example of firmware upgrade

 Change from v7_6_r589+5_5 to v7_6_r589+5_6

 Confirm the current Image Version

Current Image version is v7_6_r589+5_5

L10212XC# show ghn pairing interface ghn1

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_5 DCP962C

ghn1.cpe10 YES 000b.6f20.01c0 1 10.10.1.10 v7_6_r589+5_6 L32104CP

ghn1.cpe11 YES 000b.6f20.01c7 1 10.10.1.11 v7_6_r589+5_7 L32104CP

 Local(DM) Image upgrade

First, get the flash memory data. Bring the flash memory of external image file by using tftp or
ftp.

302
COAX G.hn Access Multiplexer User Manual

L10212XC# copy tftp 192.168.1.41 dcp962c_v1_x-HE-P2MP_osup-SPIRIT.v7_6_r589+5_5.ftp firmware

dcp962c_v1_x-HE-P2MP_osup-SPIRIT.v7_6_r589+5_6.ftp 100% |*******************************| 1721k

0:00:00 ETA

L10212XC# show flash-files

Size Date Time Modified Name

---------- ------------------- ----

1749240 2018/03/07 06:46:47 dcp962c_v1_x-HE-P2MP_osup-SPIRIT.v7_6_r589+5_6.ftp

Total 1 file

1 firmware file

15728640 bytes available, 2396160 bytes (15%) used

Upgrade Firmware ...

L10212XC# ghn fw-upgrade simple dcp962c_v1_x-HE-P2MP_osup-SPIRIT.v7_6_r589+5_6.ftp interface ghn1

local

Mar 07 06:54:08 notice G.HN : Port firmware upgrade - ghn1 local

L10212XC# show ghn flash-upgrade

Interface Source Section Secure Size Loaded Status

------------ ------ -------------- ------ -------- -------- ------

ghn1.co FTP OSUP YES 0 0 Running: downloading image

Loading …

L10212XC# show ghn fw-upgrade

Interface Source Section Secure Size Loaded Status

303
COAX G.hn Access Multiplexer User Manual

------------ ------ -------------- ------ -------- -------- ------

ghn1.co FTP OSUP YES 0 1526784 Running: downloading image

Data transfered.

L10212XC# show ghn fw-upgrade

Interface Source Section Secure Size Loaded Status

------------ ------ -------------- ------ -------- -------- ------

ghn1.co FTP OSUP YES 0 4194304 Ready: finished correctly

 Reboot

Firmware will be modified when rebooting the ghn.

L10212XC# ghn reboot interface ghn1 lo

Mar 07 06:55:59 notice G.HN : Port reboot - ghn1 local

 Comfrimed the modified firmware Version

By entering the below command, it is able to check the modified v7_6_r589+5_6 image version.

L10212XC# show ghn pairing interface ghn1

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co YES 000b.6ffb.01c6 1 10.10.1.0 v7_6_r589+5_6 DCP962C

ghn1.cpe10 YES 000b.6f20.01c0 1 10.10.1.10 v7_6_r589+5_6 L32104CP

ghn1.cpe11 YES 000b.6f20.01c7 1 10.10.1.11 v7_6_r589+5_7 L32104CP

304
COAX G.hn Access Multiplexer User Manual

Auto Firmware Upgrade

Auto fw-upgrade Command

It is a function that automatically upgrades the firmware at a desired point for the convenience
of the administrator. You must assign a file to the desired CPE model so that the function can be
executed, and the file must be downloaded in flash beforehand. It operates based on firmware
version and model. It can be set not to check version and model, but it is not recommended
because it can perform wrong operation. When performing an automatic firmware upgrade, it
performs two actions: downloading and rebooting. The reboot action is performed after
downloading, and you can set the desired point for each of the two actions.

At the time of download, there are 4 points of view. The first is 'always'. Always check CPE
version and download if version is different. If you set this point, you can not disable the version
check function. The second is 'attach'. Performs the download whenever the CPE is attached. The
third is 'at'. You can specify the time of day or specific day of the week, and you can set the
desired point in time. Fourth is 'attach-at'. At the time of 'attach' and 'at', download is performed.

At the time of reboot, there are three points. The first is 'immediately'. Allows you to reboot
immediately after downloading. The second is 'none'. It is set to end the upgrade operation
without performing a reboot operation after downloading. If the reboot operation is not performed,
the firmware upgrade will not be completed. Therefore, if the 'auto fw-upgrade reboot none' is
set, a manual reboot is required. The third is 'at'. You can specify the day or the day of the week
to set the desired point in time.

Command Description Mode


auto fw-upgrade {start|stop} Start or stop the automatic config-ghn
firmware upgrade function.
auto-fw-upgrade target cpe (l31101hp | Specify the CPE model to config-ghn
l31101hps | l33104hp | l36104hpw | perform the automatic
l32101hp | dcp962p | MODELNAME) firmware upgrade function
FILENAME and set the desired file.
no auto-fw-upgrade target cpe Specifies a CPE model that config-ghn
(l31101hp | l31101hps | l33104hp | does not require automatic

305
COAX G.hn Access Multiplexer User Manual

l36104hpw | l3210hp | dcp962p | firmware upgrade and


MODELNAME) unconfigures the files that
are set in the model.
auto fw-upgrade download {always | Set the point at which the config-ghn
attach} firmware download will run
always or when the CPE is
attached.
auto fw-upgrade download at Set the point at which the config-ghn
{every|sun|mon|tue|wed|thu|fri|sat} firmware download will be
<0-23> <0-59> run on daily or at a specific
time on a specific day of the
week.
auto fw-upgrade download attach-at Set the point at which the config-ghn
{every|sun|mon|tue|wed|thu|fri|sat} firmware download will be
<0-23> <0-59> run on a daily basis or at a
specific time on a specific
day of the week and when
the CPE is attached.
auto fw-upgrade reboot {immediately | Reboot the downloaded CPE config-ghn
none} immediately or set it to wait
without rebooting.
auto fw-upgrade reboot at Set the downloaded CPE to config-ghn
{every|sun|mon|tue|wed|thu|fri|sat} reboot every day or at a
<0-23> <0-59> specific time on a specific
day of the week.
auto fw-upgrade version-check Set whether or not to check config-ghn
{on | off} version when performing
download.
auto fw-upgrade model-check {on | off} Set whether or not to check config-ghn
the model when
downloading.
show ghn auto-fw-upgrade-status brief It briefly displays the status Enable
(|(interface IFNAME)) of automatic firmware
upgrade setting and
operation progress.
show ghn auto-fw-upgrade-status Displays only the status of Enable

306
COAX G.hn Access Multiplexer User Manual

global automatic firmware upgrade


setting.
show ghn auto-fw-upgrade-status Detailed information about Enable
automatic firmware upgrade
setting status and operation
progress.

Example of auto firmware upgrade

The default settings are shown below.

 Status : stop

 Download : attach

 Reboot : Immediately

 Version Check : on

 Model Check : on

By default, the auto-upgrade feature is disabled. When you set up the CPE target file and start
the function, check the model every time the CPE is attached and download if the version is
different. After downloading, reboot immediately to proceed with the upgrade.

L11206XC# show ghn auto-fw-upgrade-status brief

Auto F/W upgrade status

Status : stop

Download : attach

Reboot : Immediately

Version check : on

Model check : on

307
COAX G.hn Access Multiplexer User Manual

CPE target file : not set.

F/W upgrade interface status

Interface Current_FW_ver Model Upgrade_status

------------ ---------------- ------------- ------------------------------

ghn5.cpe v7_6_r511+8+6 L31101HP No action

ghn7.cpe v7_8_r590+6_3 L31101HP No action

If you want to automatically upgrade your CPE at any time, you will need to change it using
the commands in the default settings. To do this, first download the CPE file to flash, and then
set the point at which you want to upgrade the CPE. Set this example as follows.

 Status : Use auto-upgrade feature

 Download : Download files to CPE every day at 11:35

 Reboot : Reboot immediately after download

 Version Check : Download only if the version is different.

 Model Check : Make sure the files and models match before downloading.

L10212XC# show flash-files

Size Date Time Modified Name

---------- ------------------- ----

1772631 2017/11/19 10:18:12 L31101HPS_osup-SPIRIT.v7_6_r511+15_4.ftp

1772646 2018/01/19 10:53:25 L31101HP_osup-SPIRIT.v7_6_r511+15_4.ftp

1763916 2018/01/02 08:58:46 L36104CPW_osup-SPIRIT.v7_6_r589+11_5.ftp

1789884 2018/01/02 06:40:55 L36104HPW_osup-SPIRIT.v7_8_r590+6_3.ftp

1771994 2017/11/19 10:28:11 dcp962p_v1_x-GAM-GNOW_siso_osup-SPIRIT.v7_6_r511+15_4.ftp

1789128 2017/12/31 10:03:40 dcp962p_v1_x-GAM-GNOW_siso_osup-SPIRIT.v7_8_r590+6_3.ftp

308
COAX G.hn Access Multiplexer User Manual

Total 6 files

6 firmware files

11624448 bytes total, 10571776 bytes (90%) used

L11206XC# configure terminal

L11206XC(config)# ghn

L11206XC(config-ghn)# auto-fw-upgrade target cpe l31101hp L31101HP_osup-SPIRIT.v7_6_r511+15_4.ftp

L11206XC(config-ghn)# auto-fw-upgrade download at every 11 35

L11206XC(config-ghn)# auto-fw-upgrade reboot immediately

L11206XC(config-ghn)# auto-fw-upgrade start

L11206XC(config-ghn)# end

L11206XC# show ghn auto-fw-upgrade-status brief

Auto F/W upgrade status

Status : Started.

Download : at Everyday 11:35

Reboot : Immediately

Version check : on

Model check : on

CPE target file

L31101HP

File : L31101HP_osup-SPIRIT.v7_6_r511+15_4.ftp

Version : v7_6_r511+15_4

Model name : L31101HP

F/W upgrade interface status

309
COAX G.hn Access Multiplexer User Manual

Interface Current_FW_ver Model Upgrade_status

------------ -------------------- ------------- ------------------------------

ghn5.cpe v7_6_r511+8+6 L31101HP Waiting for download

ghn7.cpe v7_8_r590+6_3 L31101HP Waiting for download

L10212XC#

The download takes place at 11:35, and the reboot is performed immediately after the
download ends. The following shows the log associated with it.

L11206XC# Jan 19 11:35:06 notice G.HN : Port firmware upgrade - ghn5 remote

Jan 19 11:35:06 notice G.HN : FW_UP - interface ghn5 remote upgrade status [F/W download & write]

Jan 19 11:35:06 info pure-ftpdY : (?@10.10.15.1) [INFO] New connection from 10.10.15.1

Jan 19 11:35:06 notice G.HN : Port firmware upgrade - ghn7 remote

Jan 19 11:35:06 notice G.HN : FW_UP - interface ghn7 remote upgrade status [F/W download & write]

Jan 19 11:35:06 info pure-ftpdY : (?@10.10.1.69) [INFO] New connection from 10.10.1.69

Jan 19 11:35:08 info pure-ftpdY : (?@10.10.15.1) [INFO] admin_ftp is now logged in

Jan 19 11:35:08 info pure-ftpdY : (?@10.10.1.69) [INFO] admin_ftp is now logged in

Jan 19 11:35:45 notice pure-ftpdY : (admin_ftp@10.10.15.1) [NOTICE] /files//L31101HP_osup-

SPIRIT.v7_6_r511+15_4.ftp downloaded (1772646 bytes, 48.67KB/sec)

Jan 19 11:35:54 info pure-ftpdY : (admin_ftp@10.10.15.1) [INFO] Logout.

Jan 19 11:36:07 notice pure-ftpdY : (admin_ftp@10.10.1.69) [NOTICE] /files//L31101HP_osup-

SPIRIT.v7_6_r511+15_4.ftp downloaded (1772646 bytes, 29.92KB/sec)

Jan 19 11:36:19 info pure-ftpdY : (admin_ftp@10.10.1.69) [INFO] Logout.

Jan 19 11:36:26 notice G.HN : Port reboot - ghn5 remote

Jan 19 11:36:34 notice G.HN : CPE detach - ghn5, MAC 000b.6f20.05a3

Jan 19 11:36:34 notice G.HN : Link Down - ghn5

Jan 19 11:36:46 notice G.HN : Port reboot - ghn7 remote

Jan 19 11:36:50 notice G.HN : CPE detach - ghn7, MAC 000b.6f20.056e

Jan 19 11:36:50 notice G.HN : Link Down - ghn7

310
COAX G.hn Access Multiplexer User Manual

Jan 19 11:37:03 notice G.HN : Link Up - ghn5

Jan 19 11:37:03 notice G.HN : CPE attach - ghn5, MAC 000b.6f20.05a3

Jan 19 11:37:04 notice G.HN : FW_UP - interface ghn5 remote upgrade status [Unnecessary]

Jan 19 11:37:21 notice G.HN : Link Up - ghn7

Jan 19 11:37:21 notice G.HN : CPE attach - ghn7, MAC 000b.6f20.056e

Jan 19 11:37:22 notice G.HN : FW_UP - interface ghn7 remote upgrade status [Unnecessary]

You can check the upgrade status as below.

L11206XC# show ghn auto-fw-upgrade-status brief

Auto F/W upgrade status

Status : Started.

Download : at Everyday 11:35

Reboot : Immediately

Version check : on

Model check : on

CPE target file

L31101HP

File : L31101HP_osup-SPIRIT.v7_6_r511+15_4.ftp

Version : v7_6_r511+15_4

Model name : L31101HP

F/W upgrade interface status

Interface Current_FW_ver Model Upgrade_status

------------ ------------------- ------------- ------------------------------

ghn5.cpe v7_6_r511+15_4 L31101HP Unnecessary

311
COAX G.hn Access Multiplexer User Manual

ghn7.cpe v7_6_r511+15_4 L31101HP Unnecessary

312
COAX G.hn Access Multiplexer User Manual

CO Recover

G.hn CO provides the function to detect and recover when firmware is abnormal.

Recovery Command

Command Description Mode


ghn flash-recover files Recover the assigned CO flash firmware. Enable
firmware FILENAME
ghn flash-recover Force to run the recovery mode. Enable
execute IFNAME: ghn1-ghn12
(|interface IFNAME) *Some hardware versions may not work
with this feature.
show ghn flash-recover Check the recovery. Enable

Recovery Process

1) Use copy (tftp/ftp) ••• firmware to download the image for flash.

ex) copy tftp 1.1.1.1 dcp960p_v1_x-GAM-GNOW_flash-SPIRIT.v7_6_r500+5 firmware

2) Use ghn flash-recover files firmware ••• to assign the flash files received from tftp as

recovery firmware.
3) Recovery will recover the needed CO automatically when the recovery firmware has been
assigned.
4) Use the I2 command “ghn fw-upgrade raw (downloaded flash file) to run the upgrate.
Mac needs to be modify.
5) Use ghn reboot to reboot.

A port that requires recovery are expected to come up with the following error.

L10212XC#

Dec 12 12:50:15 err G.HN : FLUP recovery needed on ghn1.co0

313
COAX G.hn Access Multiplexer User Manual

If the port is not checked and the following error does not occur, use the following command
to enter Recovery mode.

L10212XC # ghn flash-recover excute interface ghn1

Dec 12 12:50:15 err G.HN : FLUP recovery needed on ghn1.co0

L10212XC# show ghn pairing interface ghn1 local

L10212XC#

Firmware recovery and setting.

L10212XC # copy 192.168.1.206 dcp962p_v1_x-P2MP-GNOW_siso_osup-SPIRIT.v7_7_r582+1_1_cvs.ftp

firmware firmware.ftp

L10212XC# ghn flash-recover files firmware firmware.ftp

Dec 12 12:57:33 info G.HN : FLUP recovery finished on ghn1.co0

L10212XC# show ghn pairing

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co NO 0013.9d00.0500 0 10.10.1.69 v7_6_r582+1_1

L10212XC# ghn fw-upgrade raw firmware l2 interface ghn1 local

Dec 12 13:11:29 notice G.HN : Port firmware upgrade - ghn1 local

L10212XC# show ghn fw-upgrade

Interface Source Section Secure Size Loaded Status

------------ ------ --------- ------ -------- -------- ------

ghn1.co NONE YES 0 0 finished

L10212XC# ghn set mac-address 000b.6ffb.0000 interface ghn1 local

L10212XC# ghn reboot interface ghn1 local

L10212XC# con t

314
COAX G.hn Access Multiplexer User Manual

Enter configuration commands, one per line. End with CNTL/Z.

L10212XC(config)# ghn

L10212XC(config-ghn)# profile

L10212XC(config-ghn)# end

L10212XC# show ghn pairing interface ghn1 local

Interface Pair Mac address Sd IP-address Version ModelName

------------ ---- -------------- --- --------------- ---------------- ---------

ghn1.co NO 000b.6ffb.0000 1 10.10.1.0 v7_6_r582+1_1 DCP962C

315
COAX G.hn Access Multiplexer User Manual

316
COAX G.hn Access Multiplexer User Manual

RMON
(Remote Monitoring)

RMON

RMON (Remote Monitoring) is a feature that allows you to remotely check information about
the Ethernet segment.

RMON alarm Configuration

Sampling is performed at user-defined intervals. If the value exceeds the threshold, an RMON
event is sent.

Command Description Mode


rmon alarm <1-65535> WORD Configure RMON alarm. config
interval <1-2147483647> -WORD: Specifies the object identifier of the
{absolute|delta} rising- MIB variable to sampled.
threshold RISING_THRES event (Only variables of type “etherStatsEntry.n.n”
<1-65535> falling-threshold may be sampled.)
FALL_THRES event <1-65535> -Interval: the polling interval.(seconds)
(owner WORD |)
no rmon alarm <1-65535> Delete the RMON alarm configuration with config
that number.

317
COAX G.hn Access Multiplexer User Manual

RMON event Configuration

When RMON sends an Alarm, user can configure it to send trap or log message.

Command Description Mode


rmon event <1-65535> (log Configure RMON event. config
|)(trap WORD |)(description
WORD |)(owner WORD |)
no rmon event <1-65535> Delete the RMON event configuration with config
that number.

RMON history and stats Configuration

RMON history is a function to periodically sample the statistical information of various traffic
occurrence from the Ethernet port. By default, the cycle is 30 minutes and is set up to store 50
statistical information per interface.

Command Description Mode


rmon collection history <1- Configure RMON event. Interface
65535> (buckets <1-65535> |)
(interval <1-3600> |) (owner
WORD |)
rmon collection stats <1- Activate statistics collection. Interface
65535> (owner WORD |)
rmon clear counters Clears all RMON statistics information. Interface

no rmon collection Delete the RMON history or stats Interface


{history|stats} <1-65535> configuration with that number.

RMON Check

Check RMON configuration and statistics information set.

Command Description Mode


show rmon alarm Check the settings for all configured alarms. Enable

318
COAX G.hn Access Multiplexer User Manual

show rmon event Check the settings for all configured events. Enable

show rmon history Check the settings for all configured Enable
historys.
show rmon statistics Check the settings for all configured Enable
statistics.

RMON configuration example

The following example configures RMON alarms and events.


 Configure RMON event index 5, community “passwd”.
 RMON alarm index 1, MIB object values are etherStatsPkts.1.1, cycle 100 seconds,
upper threshold 200, lower threshold 0. All configured to send to event 5.
 Check RMON alarm and RMON event.

L11206XC(config)# rmon event 5 trap passwd

L11206XC(config)# rmon alarm 1 etherStatsPkts.1.1 interval 100 delta rising-threshold 200 event 5

falling-threshold 0 event 5

L11206XC# show rmon alarm

alarm Index = 1

alarm status = VALID

alarm Interval = 100

alarm Type is Delta

alarm Value =5

alarm Rising Threshold = 200

alarm Rising Event = 1

alarm Falling Threshold = 0

alarm Falling Event = 5

319
COAX G.hn Access Multiplexer User Manual

alarm Owner is RMON_SNMP

L11206XC# SHOW rmon event

event Index = 5

event status = VALID

Description RMON_SNMP

Event type SnmpTrap

Event community name passwd

Last Time Sent = 00:00:00

Owner RMON_SNMP

320
COAX G.hn Access Multiplexer User Manual

Reference A.
IP Internet Protocol
MAC Media Access Control
CSMA/CD Carrier sense multiple access with collision detection
LAN Local Area Network
WAN Wide Area Network
MAN Metropolitan Area Network
PAN Personal Area Network
NAN Neighborhood Area Network
VLAN Virtual LAN
ARP Address Resolution Protocol
DHCP Dynamic Host Configuration Protocol
IGMP Internet Group Management Protocol
ICMP Internet Control Message Protocol
STP Spanning Tree Protocol
RSTP Rapid STP
MSTP Multiple STP
PVST Per VLAN STP
RPVST Rapid PVST
RPVST+ Rapid PVST Plus
LACP Link Aggregation Control Protocol
TCP Transmission Control Protocol
UDP User Datagram Protocol
BGP Border Gateway Protocol
RIP Routing Information Protocol
OSPF Open Shortest Path First
IS-IS Intermediate System to Intermediate System
ECMP Equal-cost multi-path routing
SNMP Simple Network Management Protocol
DNS Domain Name System

321
COAX G.hn Access Multiplexer User Manual

PPP Point-to-Point Protocol


P2P Peer-to-Peer
HTTP HyperText Transfer Protocol,
NTP Network Time Protocol
FTP File Transfer Protocol
SMTP Simple Mail Transfer Protocol
PON Passive optical network
EPON Ethernet PON
GEPON Gigabit Ethernet PON
10GEPON 10Gigabit Ethernet PON
GPON Gigabit-capable PON
XGPON 10 Gigabit-capable PON
XGSPON 10 Gigabit-capable Symmetric PON
FTTx Fiber To the X
FTTH Home
FTTO Office
FTTB Building
FTTC Cabinet
G.hn home networking with data rates up to 1 Gbit/s
DLF Destination Lookup Fail
RMON Remote Monitoring

322
COAX G.hn Access Multiplexer User Manual

G.hn Access Multiplexer


User Manual
Zaram Technology, Inc 2017.
All right reserved.

No part of this user’s manual may be reproduced, transmitted,


or copied in any manner whatsoever without written permission
of Zaram, Inc.

323

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy