ZNID 24xx Configuration Guide
ZNID 24xx Configuration Guide
                                  COPYRIGHT C2000-2012 Zhone Technologies, Inc. and its licensors. All rights reserved.
                                  This publication is protected by copyright law. No part of this publication may be copied or
                                  distributed, transmitted, transcribed, stored in a retrieval system, or translated into any human
                                  or computer language in any form or by any means, electronic, mechanical, magnetic, manual
                                  or otherwise, or disclosed to third parties without the express written permission from Zhone
                                  Technologies, Inc.
                                  Bitstorm, EtherXtend, EZ Touch, IMACS, MALC, MXK, Raptor, SLMS, Z-Edge, Zhone,
                                  ZMS, zNID and the Zhone logo are trademarks of Zhone Technologies, Inc.
                                  Zhone Technologies makes no representation or warranties with respect to the contents hereof
                                  and specifically disclaims any implied warranties of merchantability, non infringement, or
                                  fitness for a particular purpose.
                                  Further, Zhone Technologies reserves the right to revise this publication and to make changes
                                  from time to time in the contents hereof without obligation of Zhone Technologies to notify any
                                  person of such revision or changes.
Index ....................................................................................................................................................225
                       WARNING! This icon warns the user that metal surfaces can
                       become hot to touch. Avoid contact or use caution when touching
                       these surfaces.
Typographical conventions
                                    The following typographical styles are used in this guide to represent specific
                                    types of information.
                                        Fixed               Used in code examples for computer output, file names, path
                                                            names, and the contents of online files or directories.
                                        Fixed Bold          Used in code examples for variable text typed by users.
                                        Italic
                                        Italic              Used for book titles, chapter titles, file path names, notes in
                                                            body text requiring special attention, section titles,
                                                            emphasized terms, and variables.
      Related documentation
                                    Refer to the following publication for additional information:
                                          zNID 24xx Hardware Installation Guide  explains how to install the
                                           zNID, describes the variations of the zNID models in 24xx family, their
                                           LEDs and interfaces.
                                          zNID Quick Installation Instructions  There is a set of Quick
                                           Installation Instructions for GPON and GE models which describe in
                                           shorter procedures the steps for installing the zNID. These instructions
                                           are shipped with the zNID, but are also available on the Zhone website.
                                    Refer to the release notes for software installation information and for
                                    changes in features and functionality of the product (if any).
Acronyms
           The following acronyms are related to Zhone products and may appear
           throughout this manual:
Acronym Description
RF Radio Frequency
Acronym Description
Technical support
                Technical Support for this product is provided by your Internet Service
                Provider.
           This chapter describes the zNID 24xx. It includes the following sections:
              Overview, page 13
              zNID 24xx series components, page 16
              zNID 24xx models and interfaces, page 17
Overview
           The zNID 24xx Series (Zhone Network Interface Device) is a family of
           indoor, full-featured gateways for residential installations. These next
           generation zNIDs support GPON or Active Ethernet termination to meet the
           demands of multi-service network deployments to the user.
           With either GPON or Active Ethernet uplinks, the 24xx Series zNIDs deliver
           data, voice, or video (IPTV) over fiber.
           The 24xx series of zNIDs share a common software architecture with the
           42xx and 9xxx series of zNIDs, including the same intuitive Web interface
           and command line interface. The zNID can also be managed by the Zhone
           Network Management System (ZMS) which uses SNMP. Software upgrades
           and configuration backups can be handled automatically by the ZMS using
           the EZ Touch management feature.
           The zNID is a full-featured gateway supporting services such as DHCP
           server, rate limiting, filtering, comprehensive logging, and more. The zNID
           product line implements a very flexible QoS allowing the service provider to
           guarantee that services are being prioritized correctly and the end-user
           receives the Quality of Experience that is expected.
           All 24xx series Single Family Unit (SFU) ONTs provide the same voice
           features found on the 42xx series of outdoor residential SFU ONTs and the
           9xxx series of Multiple Dwelling Unit (MDU) ONTs. SIP-PLAR signaling is
           supported for connection via Zhone's Voice Gateway to traditional Class 5
           TDM switches, while both MGCP and SIP are supported for direct connection
           to a VoIP Softswitch. This flexibility allows Zhone's 9xxx, 42xx and 24xx
           Series ONTs to work in nearly all Telco networks, with interoperability
           support for a broad array of Softswitches.
           Zhones GPON ONTs are commonly are used in the 20km range with other
           GPON ONTs in the distribution network, though can reach up to 60km
           depending on the configuration of the optical distribution network (ODN).
               Figure 1: The VLAN settings page shows the VLANs and the ports which belong
               to each VLAN
Figure 2: The interfaces, displays and buttons for the zNID 24xx
                                    Depending upon the zNID model selected, the interfaces on the zNID can
                                    include:
                                       One, two, or four Gigabit Ethernet RJ45 ports
                                       Two Phone Ports (POTS)
                                       One Coax Port with RF Video
                                       USB port
The zNID 24xx series GPON models have the following interfaces:
Model Description
The zNID 24xx series Gigabit Ethernet models have the following interfaces:
Model Description
              This chapter describes the zNID 24xx. It includes the following sections:
                 Management interfaces, page 19
                 Management access control, page 31
                 System features, page 30
                 Status and statistics, page 57
Management interfaces
              The zNID 24xx products can be fully managed through any of several
              methods (CLI, Web, SNMP and OMCI).
              The device uses VLAN 7 as the default management VLAN, with DHCP
              Client enabled. This allows the ONU to automatically obtain an IP address
              when connected to an MXK.
CLI
The zNID 24xx products can be managed using a command line interface.
Web
              The zNID 24xx products can also be fully managed through the web (HTTP)
              interface. The web pages are very intuitive and they include a context
              sensitive help button for additional information. The web interface will be
              used for the configuration examples used in this document.
SNMP
                                   The zNID 24xx products can also be managed through SNMP. The zNID
                                   24xx family is compatible with any industry standard SNMP agent. However,
                                   Zhone provides a CPE manager feature that makes managing the ONUs even
                                   easier.
OMCI
                                   Another way to understand the three GPON interface types is by service and
                                   traffic forwarding.
                                   RG
                                   With RG interfaces you can configure all service modules on the zNID 24xx.
                                   RG VLANs pass through an integrated Etherswitch and are forwarded based
                                   on Destination MAC to any interface, including the integrated Router. Packets
                                   are classified on ingress and handled by the integrated Ethernet Switch and
                                   CPU routing, voice or WiFi.
                                   RG VLANs use the 5xx GEM exclusively (unless mapped to the VEIP, in
                                   Dual Managed mode, in which case any GEM can be used).
                                   See RG configured flows on page 22 for more information.
                                   OMCI
                                   OMCI configured ONU flows require a 1:1 UNI:GEM mapping.
                                   OMCI configured ONU flows are cut-through flows with no bridging, no
                                   switching, no routing.
                                   WiFi is not supported in OMCI only mode.
                                   Voice can operate as an OMCI-configured function or an RG-configured
                                   function.
                                   RG configured flows and OMCI configured flows can co-exist, but Voice
                                   must be OMCI-configured. Remember the following rule: OMCI always
                                   wins.
                                   See OMCI configured ONU flows on page 24 for more information.
                                   Dual Managed
                                   Dual Managed connections mapped to the VEIP connections may use any
                                   GEM. In this mode, RG VLANs operate as described above, but instead of
                                   using the default 5xx GEM, OMCI is used to configure the GEM and VLAN
                                   filter rule.
                                   See Dual Managed mode using the VEIP on page 27 for more information.
RG configured flows
All services are configured on a per VLAN basis. The RG interfaces can
configure data, video, and voice.
for all RG VLANs, an integrated Etherswitch is included in the data
forwarding path. This enables RG VLANs to support local Bridging and
peer-to-peer communications for LAN client devices such as PCs.
Additionally, a Bridge Table is maintained for all Bridged RG VLANs to
show learned source MACs per VLAN and per Port.
Packets are classified on ingress, then the learning and forwarding switch
determines where to send. See VLANS on page 197 for a discussion of layer 2
forwarding behaviors.
GEM ports in the 5xx - 6xx range are reserved for Residential Gateway traffic
flows.
By default, all RG VLANs map to the 5xx RG GEM. This mapping is not
configurable, and does not require any OMCI provisioning action to create the
5xx GEM on the 24xx unit.
The OLT must not send any OMCI provisioning commands for the 5xx GEM
to the 24xx ONT. The reason is that OMCI always wins. Whatever
provisioning actions that are specified by OMCI commands will occur. If
OMCI attempts to provision the 5xx GEM, the 24xx ONT will create the
specified ONU traffic flows on the 5xx GEM and disruption to RG traffic
flows may occur.
                                   OMCI configured ONU flows have a one to one mapping between the WAN
                                   side GEM port (GPON Encryption Method port) and the LAN side UNI (User
                                   Network Interface). Other than exception packets which require analysis, such
                                   as IGMP joins and leaves or ARPs, the traffic is generally a cut-through
                                   between the GEM and the UNI.
                                   OMCI configured ONU flows are handled entirely by Classification,
                                   Modification, and Forwarding (CMF) hardware functions. The GPON
                                   interface and each Ethernet LAN port of the 24xx have dedicated CMFs.
                                   Downstream packets that arrive on each GEM are classified based on the
                                   classification rules that have been created by OMCI provisioning actions.
                                   Packets that match a Classification Rule are Modified as specified by that rule
                                   and Forwarded to the egress port specified by that rule. Packets that are not
                                   classified are dropped/blocked. Exception packets that require CPU analysis
                                   (like the IGMP joins and leaves or ARPs) are classified on ingress and
                                   forwarded to the CPU for action. This ONU forwarding architecture is
                                   illustrated in the diagram below.
                                   You cannot map two UNIs to the same GEM when configuring ONU flows. If
                                   three Ethernet Ports must be configured as members of the same VLAN for
                                   High Speed Internet Access Service, three GEMs are required. The same
                                   This display is useful for troubleshooting purposes, because you can easily
                                   see how voice is configured using the Web GUI, TR-069, or Telnet/CLI
                                   interface, even when OMCI actually configured it.
                In Dual Managed mode a virtual UNI is the glue between the RG interfaces
                and OMCI. The virtual UNI is a Virtual Ethernet Interface Point (VEIP) as
                described in G.984.4 Amendment 2 and G.Impl.984.4).
                The VEIP allows the features such as Voice and WiFi which cannot be
                implemented directly by OMCI, to be configured via RG interfaces. The
                uplink is then set to O to designate an OMCI interface. This mechanism ties
                the uplink to the virtual UNI.
                Figure 5: RG and OMCI in Dual Managed mode, features via VEIP are matched
                by VLAN Identifier
                                   Figure 6: In Dual Managed mode, the VEIP provides access to the other
                                   modules including the wireless interface
                                   VLAN ID is used to automatically bind the RG VLAN and the OMCI Filter
                                   together.
                          Note: For security reasons the password should be changed from the
                          default password. To change the password see User names and
                          passwords on page 31.
                  The complete list of CLI commands can be found in the CLI guide located at:
                  www.zhone.com/support/manuals.
                  Login:admin
                  Password:zhone
                  ZNID24xx-Router>
                          Note: For security reasons the password should be changed from the
                          default password. To change the password in the CLI, see the zNID
                          Command Line Interface Reference Guide at zhone.com.
     System features
                                   The System pages define and configure access and applications used directly
                                   by the zNID, such as DNS and Internet Time. The System pages also provide
                                   options for updating and restoring software versions, as well as rebooting the
                                   zNID.
                                   For ONUs equipped with POTS there is a power saving feature, power
                                   shedding, which cuts power to non-voice services during power outages, so
                                   essential voice services may be provided for as long as possible on battery
                                   power.
                The user name admin has unrestricted access to change and view
                configuration of your Zhone Router.
                The user name support is used to access your Zhone Router for
                maintenance and to run diagnostics.
                The user name user can access the Zhone Router, view a limited subset of
                configuration settings and statistics, as well as, update the routers software.
                        Note: For security reasons the password should be changed from the
                        default password.
                                   Registration ID
                                   Access on the GPON interface requires a Registration ID. This value must
                                   match the value programmed in the OLT. The system administrator should
                                   have programmed this value. Changing the value will disable
                                   communications with the network. The unit will reset once the Reg ID has
                                   been changed and the GPON link will not communicate with the OLT until
                                   the same password is entered in the OLT.
Default interface
                    When the ONU must send an internally generated packet (e.g., from SNMP
                    trap, SNTP, etc.) to an IP address that is not defined in the route table, the
                    selected default interface's IP address will be used as the source address.
                    This device has many internal applications such as SNMP, DHCP, DNS,
                    PING. If one of these applications sends a packet to an IP address which is not
                    defined in the route table and the application has not been directed to use a
                    particular interface to transmit the packet then the default interface's IP
                    address will be used as the source address and routing will be resolved based
                    on that source IP address.
DNS
                                   DNS client
                                   Depending on the selection of the DNS Client Source, you will need to select
                                   a source for the DNS, or enter DNS information. Selecting Static requires a
                                   Primary DNS and/or a Secondary DNS address to be entered. Selecting any
                                   other entry from DNS Client Source requires an interface to be selected.
Figure 11: The DNS client screen with DHCP as DNS Client Source
UI Label Description
                                   When DNS Proxy is selected as the DNS Relay Source on any LAN-side
                                   interface, client devices will send all DNS requests to this Router LAN side IP
                                   Address.
                                   The router checks the Local Host Table for any pre-configured Domain Name
                                   lookups, and if a matching entry is found, responds with the corresponding IP
                                   Address.
                                   When there are no matching entries in the Local Host Table, the router
                                   initiates a Proxy DNS Request using its System DNS Client, then generates a
                                   corresponding DNS response to the LAN-side client with the corresponding
                                   IP Address learned via the Proxy Request.
                                   The Host Names of locally attached devices are dynamically learned and
                                   automatically populated in the DNS Proxy Table. Domain Names must be
                                   statically configured. The entire Domain Name must be configured (e.g.
                                   discovery.microsoft.iptv.com) along with the IP Address that should be
                                   returned to the local clients to send a DNS Request for that Domain Name.
Figure 15: To add a DNS Proxy Server add the Domain Name and IP address
Internet time
                The System|Internet Time page is used to configure the time of day on the
                ONU. The time is retrieved from one of the SNTP servers configured on the
                page. The Time Zone is used to set the time to local time. Note that the ONU
                does not automatically compensate for Day Light Saving Time.
                DHCP Option 42 is supported. If a DHCP offer uses Option 42 to specify an
                SNTP server and time zone offset, it will automatically configure the SNTP
                attributes on this screen.
                The zNID 24xx maintains the time of day for applications such as Syslog. The
                time is acquired from one of five specified time servers. If no time server can
                be found, the system will default to January, 1. The system allows for up to
                five time servers to be configured. If the first server is unreachable, the ONU
                will try the next server. If that is not available, it will try the next one, and so
                on. The configuration of the time client is shown below.
UI Label Description
                 First NTP time server      Select the first NTP time server to access from the
                                            pull-down list, or select other and configure the IP
                                            address
                 Second NTP time            Select the second NTP time server to access from the
                 server                     pull-down list, or select other and configure the IP
                                            address.
UI Label Description
                                    Third NTP time            Select the third NTP time server to access from the
                                    server                    pull-down list, or select other and configure the IP
                                                              address.
                                    Fourth NTP time           Select the fourth NTP time server to access from the
                                    server                    pull-down list, or select other and configure the IP
                                                              address.
                                    Fifth NTP time server     Select the fifth NTP time server to access from the
                                                              pull-down list, or select other and configure the IP
                                                              address.
Time zone offset Select the GMT offset from the pull-down list.
System log
             The zNID 24xx supports the system log feature as defined in RFC 5424. The
             zNID 24xx supports all 8 message severities:
             The parameter, Log Level, determines what messages will be stored in the
             system log. Any message equal to or greater in priority to the log level setting
             will be stored in the syslog. The parameter, Display Level, determines what
             messages are displayed on the web or the CLI. The parameter, Mode,
             determines where the messages will be stored. The local messages can be
             stored in RAM, or they can be stored in a file for later review, or they can be
             sent to a remote syslog server. Only one remote server is allowed. The priority
             of the messages is selected by a separate parameter.
UI Label Description
                                    Log                           Enable
                                                                   Enables the system log function.
                                                                  Disable
                                                                   Disables the logging of system messages.
UI Label Description
 Server UDP Port         If remote - the UDP port for the syslog protocol.
                         Default is 514
Power shedding
UI Label Description
Backup/Restore
                 The Backup/Restore pages provide the means for backing up the current
                 configuration, restoring earlier configurations, or going back the default
                 settings of the zNID.
                 Backup
                 The Backup/Restore | Backup screen allows you to save a backup
                 configuration.
                 Clicking Backup Settings on the System|Backup/Restore|Backup page will
                 cause the current configuration to be saved on your PC. The configuration is
                 saved under the file name backupsettings.conf in a folder determined by
                 your browsers download settings. It is strongly suggested that filename be
                 changed to more meaning full name that contains the date, or the IP address or
                 the system name of the ONU. Appropriate naming of the file will be critical if
                 you are managing more than one ONU since all the devices will save their
                 configuration under the same filename.
Restore
          The Backup/Restore | Restore screen allows you to restore the ONU to a
          operate with a previously-saved configuration.
          Click Browse in the Backup/Restore | Restore screen, then select the saved
          configuration and click open.
     Restore default
                                   The Backup/Restore | Restore Default screen allows you to return to the
                                   zNID factory default configuration.
                                   Click Restore Default Settings, close the browser window and wait for the
                                   router to reboot. If the IP address had been changed from the default IP
                                   address you will need to follow the log in directions, Logging in to the 24xx
                                   series zNIDs on page 29.
SNMP agent
             The System | SNMP Agent page allows you to configure the embedded
             SNMP agent and trap manager. The SNMP agent can be disabled to prevent
             access from unknown users.
UI Label Description
              Read Community          Enter the read community name in the input box. This
                                      allows read access from SNMP clients. This field is 32
                                      characters in length, and defaults to public.
              Set Community           Enter the write community name in the input box. This
                                      allows read/write access from SNMP clients. This field
                                      is 32 characters in length, and defaults to
                                      ZhonePrivate.
              System Name             Name of this device. The system name will appear in
                                      the title bar of the browser. This is a read only field on
                                      this page. System Name can be set in System info,
                                      page 90.
UI Label Description
                                    System Contact          The person responsible for this device This is a read
                                                            only field on this page. System Contact can be set in
                                                            System info, page 90.
                                    Trap Manger IP          The IP address where traps are sent. Currently there is
                                                            only 1 trap manager allowed.
                                    Trap Filters            The following are a list of SNMP Traps. When Disable
                                                            the traps will not be sent:
                                                               Cold Start
                                                                The ONU was Powered Off and On
                                                               Warm Start
                                                                The software was rebooted
                                                               Authentication Trap
                                                                Three failed attempts in a row try to log into the
                                                                box
                                                               Link Up/Down Trap
                                                                A physical interface lost connectivity to its remote
                                                                peer
                                                               Enterprise Trap
                                                                All non-standard traps will be filtered when set to
                                                                Disabled. Enterprise traps include
                                                                Configuration-Change traps, Battery-alarm traps,
                                                                CPE-Config-Manager traps.
TR-069 Client
Figure 25:
UI Label Description
                 Bound Interface Name      Select the name of an interface to be used for com-
                                           municating with the ACS.
                 Display SOAP              Enable or Disable the logging of Simple Object
                 messages on serial        Access Protocol (SOAP) messages to the serial console
                 console                   and file system.
UI Label Description
Certificates
UI Label Description
                                   Local certificates
                                   Local certificates are used by peers to verify your identity when establishing a
                                   connection to a server or client over the secure socket layer (SSL).
                                   The System|Certificates Local screen allows you to add, view or remove
                                   Local certificates for the system. A maximum of four Local certificates can be
                                   stored.
Trusted CA
Trusted Certificate Authority (CA) certificates are used to verify peers
identity when establishing a connection to a server or client over the secure
socket layer (SSL).
The Certificates|Trusted CA screen allows you to import or view Trusted CA
certificates for the system. A maximum of four Trusted CA certificates can be
stored.
Software
                                   The Software screens provide options to restore software from the alternate
                                   bank or to use a version of software saved elsewhere.
                                   Restore software
                                   The ONU stores two sets of software. One set, the Current Software Version
                                   or active software, is the software set which is currently running the ONU.
                                   The other set is the Alternate Software Version or standby software, and is
                                   stored in the ONU's alternate (non-running) bank. Clicking Reload will cause
                                   the alternate software to run the ONU after rebooting it, thus it becomes the
                                   current software. The previously current software will then become the
                                   alternate software. After the ONU reboots the system will update its display
                                   of current and alternate Software versions automatically.The configuration
                                   remains unchanged. In other words you do not need to reconfigure the ONU
                                   after completing the restore procedure.
                                   Clicking Reload software will cause the unit to reboot as it switches to the
                                   newly active software. This will happen immediately after clicking  no
                                   extra warning message is provided.
                                   Note that when restoring an older version there can be issues with the older
                                   code running with a newer configuration data base. The configuration
                                   database stores the configuration of the interfaces (with all the services, such
                                   as tagging and rate limiting, as well as other configuration information). In
                                   some cases, the ONU will have to reset to factory defaults, and then the ONU
                                   will need to be manually re-configured.
Update software
The ONU may use a saved configuration.
Click Browse to view the file system attached to your browser's PC. Then
select the configuration file that you would like to use to upgrade the ONU.
Clicking Update Software will cause the software on the ONU to be updated
with the selected software image. The ONU will then reboot.
The ONU will verify that the software image is of the appropriate type, and
will reject the file if it is not compatible.
     Reboot
                                   Clicking Reboot will cause the unit to re-initialize as if it was power cycled.
                                   This will happen immediately after clicking  no extra warning message is
                                   provided.
                                   Close the browser window and wait to reconnect to the router.
     Device info
                                   Device Info includes information about the device, MIB-2 objects, system up
                                   time, model number, serial number, version information and the MAC
                                   addresses of the interfaces.
UI Label Description
UI Label Description
 System Date and Time     System Date and Time is drawn from SNTP (Simple
                          Network Time Protocol) servers. Multiple servers are
                          given in case access to the server is lost. Selecting the
                          SNTP server and other settings can be configure in
                          Internet time, page 37.
 System UpTime            System UpTime displays the duration of time since the
                          device was last booted. This information can be useful
                          when troubleshooting.
 Interface Names          Each interface has its own unique MAC address. The
                          interface name is shown (Fiber WAN the network
                          facing interface,GE1, GE2 and so on are subscriber
                          facing interfaces).
 System Alarms            This display shows if any alarms are currently active on
                          the system if any. This example shows that no alarms
                          are now present.
Statistics
             The device maintains counters for the number of bytes and frames that are
             transmitted as well as received for every Ethernet interface on the ONU,
             including the Fiber WAN uplink interface (Either GPON or GigE) and the
             Wireless LAN interface.
             The LAN side interfaces uses Ethernet statistics and shows the number of
             received and transmitted bytes, frames, errors and drops.
             Resetting the statistics by clicking Reset Statistics is a good means of
             determining if frames are being sent or received, or if errors or drops are still
             occurring.
UI Label Description
              Received Bytes            The number of ingress bytes into the interface, since
                                        statistics were last reset. This is the data coming into
                                        the ONU from an external source.
              Received Frms             The number of ingress frames into the interface, since
                                        statistics were last reset. This is the data coming into
                                        the ONU from an external source.
UI Label Description
                                    Transmitted Drops         The number of egress frames that were dropped (not
                                                              transmitted) due to addressing errors or memory
                                                              limitations, since statistics were last reset.
UI Label Description
UI Label Description
The OLT is the centrally located aggregation point of the optical network and
Optical Network Units (ONU) or ONTs are installed at the customer
premises. The GPON GTC counters show the error statistics on the optical
network to the zNID in question.
UI Label Description
 Corrected HEC errors     Number of GEM frames with corrected HEC errors.
 GEM Frames
Table 14: PLOAM (Physical Layer Operations and Maintenance) message counters
UI Label Description
                  The Status | Interfaces | LAN screen can be used to see if the interface is up
                  (not only the interface is up, but if it has link with a downstream device).
UI Label Description
                   Admin State                 Up
                                                Port is enabled and a link has been established.
                                               Down
                                                Port is disabled (administratively down).
                                               NoLink
                                                Ethernet Port is enabled, but no device is
                                                connected
                   Max Bit Rate             Shows the bit rate of the physical layer:
                                               10  10 Mbps
                                               100  100 Mbps
                                               1000  1 Gbps
                   Pause                       Enable
                                                Port will transmit pause frames to an attached
                                                device when there is receive congestion.
                                               Disable
                                                Port will not transmit pause frames to an attached
                                                device
                                   The Status | Interfaces | GPON screen can be used to see if the interface is
                                   up, the ONU ID, and other information and alarms.
UI Label Description
                                    Link Up Transitions      Number of times the Link has transitioned from down
                                                             to up.
UI Label Description
UI Label Description
Loss of Signal No input signal detected. Make sure fiber is plugged in.
PPPoE status
                                   This table provides interface status for each PPPoE uplink tunnel. This status
                                   includes the time that the connection has been up the configured MTU size,
                                   and the last error code reported for this interface.
UI Label Description
Route
The Route page shows the essential elements of the zNIDs routing table.
UI Label Description
         Subnet Mask                The subnet mask determines the network portion of the
                                    address. The 255 in an octet masks all information
                                    from that octet.
ARP table
This table displays the IP and MAC address for each device on a VLAN.
UI Label Description
Bridge table
               The bridge table displays the MAC address for each device on a VLAN
               interface of the internal layer 2 bridge. A total of 4,096 entries are allowed in
               the bridge table, but only the 2048 most recent entries are displayed. The
               bridge table can give you an idea of the number of devices that are seen on the
               network.
UI Label Description
                Interface Alias           The name created for the interface to help the user
                                          match the port to the Linux Interface Name
DHCP status
                                   DHCP status provides a table of DHCP leases given out by the ONUs
                                   internal DHCP Server.
                                   This page shows the computers, identified by the hostname and MAC address
                                   that have acquired IP addresses by the DHCP server with the time remaining
                                   before the lease for the IP address is up.
                                   If conditional DHCP server is configured, there is a page
                                   (Status|DHCP|Bindings which shows the permanently assigned IP address.
Table 22: Table of DHCP Leases given out by the internal DHCP Server
UI Label Description
                                    Expires In              The time remaining before the lease for this IP address
                                                            runs out.
IGMP
UI Label Description
Reporter MAC The MAC address of the host in the multicast group.
Querier TBD
OMCI
                                   The OMCI bridge table displays the GPON Bridges that are mapped to GEM
                                   ports with VLAN Filter and translation rules. These are the Pure ONU
                                   traffic flows that have been configured via OMCI commands from the OLT.
                                   This information is useful for debug of OMCI-related configuration issues.
UI Label Description
                                    UNI Port                The UNI port (Ethernet, VOIP, VEIP) that is associated
                                                            with this Bridge ME.
                                    GEM Port                The GEM port on the GPON link that is associated with
                                                            this Bridge ME.
                                    GEM Video               (Optional) The Multicast GEM port on the GPON link
                                                            that is associated with this Bridge ME.
                                    Untagged VLAN           The default tag that will be applied on ingress for
                                                            untagged packets. In the egress direction, this tag will
                                                            be stripped.
UI Label Description
The OMCI IP table displays the IP Host instances that have been configured
by the OLT using OMCI commands. This information is useful for debug of
OMCI-related configuration issues.
UI Label Description
                                   The OMCI Path table displays the Managed Entity IDs that have been
                                   assigned by the OLT to each of the Physical and Virtual User-to-Network
                                   Interfaces (UNIs), along with their Administrative and Operational State.
                                   OMCI commands can Admin Down any of these interfaces. When Admined
                                   Down, they are unusable for any services. This information is useful for
                                   debug of OMCI-related configuration issues.
UI Label Description
Rate (Ethernet Only) The OMCI-configured Port Rate and Duplex Mode.
The Interfaces VEIP table displays the configured VLAN that are mapped to
an uplink GEM Port. The uplink GEM port is required to be configured via
OMCI. This table display the final mapping of the user defined RG VLANs
and the OMCI configured GEM ports and VLANs.
The OMCI mapping to the RG VLAN occurs when the OMCI dynamic
provisioning feature of the MXK is used to provision the OMCI-side of the
VEIP and it uses SNMP to create the RG side of the VEIP.
UI Label Description
 VLAN Name               The VLAN Name as defined by the user for this VLAN
                         ID.
Outer VLAN Tag The outer VLAN tag for this flow.
Inner VLAN Tab The inner VLAN tag for this flow.
Wireless
                                   The Status | Wireless pages shows the authenticated wireless stations which
                                   are access the wireless access point.
UI Label Description
                                    Associated               The wireless station has been associated with the access
                                                             point.
Voice
        Two types of voice logs are provided by the zNID. Voice Packet Log(s) and
        Call Audit log(s). The voice packet logs show signalling packets sent to and
        received from the VoIP softswitch and can be used to debug registration or
        connectivity issues. The Audit logs show completed incoming and outgoing
        calls, with date, time, duration of call and phone number and can be used to
        see calling activity and confirm normal operation.
UI Label Description
UI Label Description
UI Label Description
 Packets Sent              The cumulative count of data bytes in the packets sent
                           to the network
 Bytes Sent                The cumulative count of data bytes in the packets sent
                           to the network
RTCP Sent The number of control packets sent into the network
UI Label Description
                                    Peak Jitter (ms)          The average delay variation (Jitter) between RTP
                                                              packets
                                    Minimum Jitter            The least delay an RTP packet had passing through the
                                    Buffer (ms)               Jitter buffer
                                    Maximum Jitter            The greatest delay an RTP packet had passing through
                                    Buffer (ms)               the Jitter buffer
                                    Average Jitter Buffer     The average delay an RTP packet had passing through
                                    (ms)                      the Jitter buffer
Voice Quality Voice Quality statistics are kept from the previous call
          The following sections describe fundamental information about the zNID 24xx:
             Interfaces, page 86
             Factory default VLAN definition, page 87
          The Configuration pages section describes the interfaces and all UI elements:
             Configuration pages, page 89
          The Deployment scenarios section is a task based section which describes
          how to create data, video and voice connections, as well as set data services
          such as rate limiting, and other Network Address Translation (NAT) and
          DHCP services.
             Deployment scenarios, page 156
                 Creating data connections, page 162
                 Creating bridge connections, page 163
                 Creating routed connections, page 166
                 Creating brouted connections, page 172
                 Creating PPPoE tunnels, page 179
                 Creating wireless connections, page 188
                 Creating voice connections, page 191
          Advanced features on page 197 describes VLANs, TLS, NAT, DHCP, rate
          limiting and priority setting:
             VLANS, page 197
             S-Tagged, page 200
             TLS mode, page 202
             NAT and DHCP, page 205
             DHCP server, page 209
             Data services, page 210
                 Rate limiting, page 210
                 CoS, page 211
                 Precedence, page 212
      Interfaces
      Interface naming conventions
                                    zNID 24xx ONUs will support the following default interface names for the
                                    physical interfaces:
                                       eth0  Fiber WAN interface (either GPON or GigE)
                                       eth1  GigE port 1
                                       eth2  GigE port 2
                                       eth3  GigE port 3
                                       eth4  GigE port 4
                                       wl0  Wireless LAN SSID 0
                                       wl0_1  Wireless LAN SSID 1
                                       wl0_2  Wireless LAN SSID 2
                                       wl0_3  Wireless LAN SSID 3
                                             Note: The type and number of interfaces depends on the model of the
                                             zNID. See zNID 24xx models and interfaces on page 17 for more
                                             information.
Ethernet port
                                    The ONU has a default IP address of 192.168.1.1 on the LAN Ethernet ports.
                                    The user can connect a standard PC to the LAN ports (eth1-eth4) and
                                    configure the ONU using a standard web browser. The PC will need to have
                                    an IP address on the same subnet. Typically, 192.168.1.100 is used. Of course,
                                    if you change the IP address of the ONU, you will lose connectivity. You
                                    would then need to reconfigure your PC to be on the same subnet.
                                    See Logging in on the Ethernet ports on page 29.
                VLAN 7 is the default management VLAN. The fiber uplink ports are tagged
                members of this VLAN. The ONU is also configured to have DHCP enabled
                on VLAN 7. With this arrangement, the 24xx can be connected to the MXK
                and is ready to be remotely managed on VLAN 7 and pass data on VLAN 200
                without any further configuration needed on the 24xx.
                All downstream gigabit Ethernet interfaces have the Port VLAN ID (PVID)
                set to 200 by default. VLAN 200, the default data VLAN is also set as the
                PVID for the wireless SSID 0 (wl0).
                For more information about PVID see Edit Port Defaults on page 145.
                Figure 59 shows how the default interfaces from Figure 58 and Figure 31 are
                displayed in the Web UI.
                                    The VLAN to associate with the POTS interfaces is the Bound Interface
                                    Name parameter in the Configuration | Voice | SIP page or the
                                    Configuration | Voice | MGCP pages. The POTS interfaces are not show on
                                    the Configuration | VLAN | Settings page.
Configuration pages
               The Configuration Menu has the screens for configuring interfaces. This
               section describes the following pages of the Web user interface:
                  System info, page 90
                  Static route, page 91
                  Access control, page 92
                  Firewall, page 94
                  Interfaces, page 100
                  Wireless, page 108
                  Voice, page 134
                  VLAN, page 143
                  WAN backup, page 153
               See Deployment scenarios, page 156 for procedures for the different scenarios
               which can be configured using these configuration pages.
System info
                                    The Configuration | System Info page provides the mechanism for setting
                                    the MIB-2 SNMP objects for System Name, System Location and System
                                    Contact. The System Name is also in the screen banner. If you change the
                                    System name, to get the System Name to update in the banner click refresh
                                    on the browser.
UI Label Description
Static route
               The Configuration | Static Route page provides the mechanism for adding
               static routes to the zNID.
Figure 62: The Static Route page has a table of static routes
UI Label Description
                Destination IP address    The IP address of the destination device. This field will
                                          accept an IP address/n notation where the /n
                                          represents the number of bits for creating a network
                                          mask. For example a net mask of 255.255.255.0 is 24
                                          bits and would be designated by a /24
                Gateway IP Address        The IP address of the default gateway for the subnet in
                                          which the zNID resides.
Access control
                                    Lists
                                    There are three options for defining whether packets/frames will be allowed
                                    in on an interface  disabled, black list and white list. An interface may only
                                    have one of the three listing options:
                                       Black list defines a set of source IP addresses/MAC addresses which will
                                        not be allowed. All other packets will be allowed.
                                       White list defines a set of source IP addresses/MAC addresses which will
                                        be allowed. All other packets will be blocked.
                                       Disabled allows all packets/frames.
                                    The Fiber WAN uplink is unsupported because filtering is not allowed on this
                                    interface.
                                    Figure 64: Defining whether the interface will be disabled, have a black list or a
                                    white list
Rules
The Configuration|Access Control|Rules page defines the access control list rules.
UI Label Description
 Rule Name                 A required user defined identifier for the rule. This
                           identifier must be unique per interface rule.
 Source MAC Address        The MAC address to filter. MAC addresses have the
                           format AA:BB:CC:DD:EE:FF.
Firewall
                                    Global
                                    The Firewall | Global page mainly enables the firewall options 
                                    management access and port forwarding. The Firewall dropdown must have
                                    Enable selected for management access and port forwarding to be active.
Management access
The Firewall Management Access table lists all the interfaces for which
management traffic can be received. A check under the protocol indicates that
this protocol is Allowed on the interface.
The firewall global option must be enabled before this screen will take effect.
UI Label Description
                                    Port forwarding
                                    The top table of the Port Forwarding screen reflects the existing port
                                    forwarding rules. As Rules are added, the top table displays those changes.
                                    The Delete Rule(s) button allows one or more rules to be removed from the
                                    ONU.
                                    The bottom table reflects the values that have been configured
                                    (Configuration/Interfaces/Routed or Configuration/Interfaces/PPPoE) for the
                                    selected interface. The table is refreshed when a new interface is selected.
                                    Figure 68: The table at the top shows the current port forwarding rules. Define
                                    the port forwarding rules at the bottom of the page
UI Label Description
 Type                        DMZ
                              When DMZ is chosen it is the only rule allowed on
                              that interface. A DMZ rule is effectively the same
                              as a Range rule with all ports included.
                             Range
                              Range rules are more secure than setting a DMZ
                              rule, because Range rules allow specific ports or
                              groups of ports to be opened up. Range indicates
                              that any traffic on those ports will be sent to the
                              private IP address.
                             Remap
                              Remap indicates that any traffic on those ports will
                              be sent to the private IP address at the private port.
 Port End                 Highest value port number for the range. This can be
                          equal to Port Start if there is only one port.
The Add Rule button will save the configured rule if valid. NOTE: these rules
have no effect until the global firewall option is enabled.
Interfaces
                                    Bridged
                                    Bridges are ISO layer two functions which connect network segments and
                                    direct traffic based on Ethernet Media Access Control (MAC) addresses.
                                    MAC addresses are a unique address per physical device. Routers are layer
                                    three devices which use IP Addresses to direct packets.
                                    Bridges direct packets based on address information in the packets as well as
                                    information learned from the processing and directing of other packets.
                                    The Interfaces | Bridged page displays the bridged interfaces which have
                                    been defined and the IP address assigned to that interface.
                                    To create bridge interfaces see Creating bridge connections, page 163.
Figure 72: The Configuration | Bridges page, shows existing bridges by VLAN.
To edit a bridge, enter a check in the bridged interface in the select row at the
top of the table, then click Edit Selected Interface.
The table displays Bridged Interfaces along with any IP Addresses that have
been assigned to them for the purposes of enabling management access or
supporting SIP, SIP-PLAR or MGCP clients. The naming convention for
Bridged Interfaces is brvlan followed by the VLAN ID. Bridged Interfaces
are automatically sorted and displayed in ascending VLAN ID order.
Routed
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains
addressing information and some control information that enables packets to
be routed. IP is documented in RFC 791 and is the primary network-layer
protocol in the Internet protocol suite.
The Interfaces | Routed page displays the routed interfaces which have been
defined and the IP address assigned to that interface.
To create routed interfaces see Creating routed connections, page 166
To edit a routed interface, enter a check in the routed interface in the select
row at the top of the table, then click Edit Selected Interface.
                                    Brouted
                                    Brouted VLANs have two IP interfaces  one for the Routed uplink interface
                                    and a second for the Bridged LAN-side interface. A Brouted VLAN may have
                                    multiple LAN ports as members, and all ports will use the same IP subnet. So
                                    Brouted means that the LAN side is like a bridge, but has a routed interface
                                    for the WAN side.
                                    To create brouted interfaces see Creating brouted connections, page 172.
PPPoE
The Point-to-Point Protocol over Ethernet (PPPoE) encapsulates PPP frames
inside Ethernet frames to create a PPPoE tunnel between hosts connected to
the ZNID and other devices out in the cloud. While Ethernet is packet-based
(so no direct connection is opened), PPP is a direct connection where one
device directly connects to another using the protocol. PPPoE is a virtual
connection (usually called tunnel) between two devices.
On the Configuration | Interfaces | PPPoE page you can add a PPPoE on a
port by VLAN, either as PPPoE Routed or PPPoE Bridged.
To create PPPoE tunnels see Creating PPPoE tunnels, page 179
To edit a routed interface, enter a check in the routed interface in the select
row at the top of the table, then click Edit Selected Interface.
Ethernet
UI Label Description
                                     Admin State                 Enable - Port is enabled and a link has been established
                                                                 Disable - Port is disabled (administratively down)
                                                                 NoLink - Ethernet Port is enabled, but no device is
                                                                  connected
                                     Max Bit Rate           The maximum possible bit rate of the physical layer
                                                                 10 - 10 Mbps
                                                                 100 - 100 Mbps
                                                                 1000 - 1000 Mbps
                                                                 Auto
UI Label Description
 LAN Follows WAN        When enabled, the LAN port is forced to a physical down
                        state when the WAN uplink has been down for 15 seconds.
                        This mechanism is used to signal to attached devices that
                        they need to initiate a backup connection. When the WAN
                        uplink has been back up for 30 seconds, the LAN port is
                        re-enabled to restore service.
GPON
                                    The Interfaces | GPON page allows you to enable RF video on models which
                                    support RF video.
Rate Limits
Rate limiting can be configured on the WAN uplink, LAN Ethernet interfaces,
HPNA coax and HPNA phone ports.
UI Label Description
Wireless
                                    Basic
                                    The Wireless | Basic page sets the name for the network (SSID, service set
                                    identifier) which identifies the AP to clients. You also can set basic
                                    functionality such as setting the maximum number of clients which can be
                                    connected to the AP.
                                    Other general security features such as hiding the SSID and isolating clients
                                    are also controlled from this page. More specific security measures such as
                                    defining authentication and encryption methods are described in Security on
                                    page 110.
UI Label Description
                                     Hide Access Point        Hides the Access Point SSID from scans. To connect to
                                                              the Access Point the SSID must be entered from the
                                                              client.
UI Label Description
                                    Security
                                    The main items for wireless security are authentication and encryption.
                                    Authentication methods which are secure allow the clients (also called
                                    stations or STA) you want onto the network, while keeping others off of the
                                    network. Encryption is used, both in some of the authentication methods and
                                    in the regular transmission of data once the client has successfully completed
                                    the authentication process.
UI Label Description
 Select SSID      Selects the SSID to associate with the Network Authorization
                  mode.
UI Label Description
                                     Network             Open
                                     Authentication
                                                          Open access to the network. Anyone can access. See Open,
                                                          page 114.
                                                         Shared
                                                          WEP encryption strength may be 64 or 128 bit. Up to four
                                                          different keys can be set, though only one it active at any
                                                          time. See Shared, page 115.
                                                         802.1x
                                                          An IEEE standard which designed for enterprise use which
                                                          has an authentication server. See 802.1x, page 116.
                                                         WPA
                                                          WPA strengthens authentication and implements most of
                                                          the IEEE 802.11i standard, notably adding TKIP
                                                          encryption. See WPA, page 117.
                                                         WPA-PSK
                                                          WPA-PSK is for small offices and home offices and is
                                                          mainly WPA without the authentication server. PSK is
                                                          sometimes referred to the personal edition rather than the
                                                          enterprise edition. See WPA-PSK, page 118.
                                                         WPA2
                                                          WPA2 is an upgrade to WPA whose main enhancement is
                                                          AES encryption, though AES has since been added to
                                                          WPA. See WPA2, page 119.
                                                         WPA2-PSK
                                                          WPA2-PSK is enabled by default. WPA2-PSK, like WPA,
                                                          is mainly WPA2 without the authentication server. See
                                                          WPA2-PSK, page 120.
                                                         Mixed WPA2/WPA
                                                          Mixed WPA2/WPA supports both WPA2 and WPA in the
                                                          same environment, and is useful when upgrading between
                                                          the two authentication methods. See Mixed WPA2/WPA,
                                                          page 121.
                                                         Mixed WPA2/WPA-PSK
                                                          Like Mixed WPA2/WPA, Mixed WPA2/WPA-PSK
                                                          supports both WPA2 and WPA-PSK in the same
                                                          environment, and is the personal edition. Mixed WPA2/
                                                          WPA-PSK is useful when upgrading between the two
                                                          authentication methods. See Mixed WPA2/WPA-PSK,
                                                          page 122.
WEP Encryption X X X X X
Encryption Strength X X
Network Key 1 X X
Network Key 2 X X
Network Key 3 X X
Network Key 4 X X
 RADIUS Server IP                            X         X
 Address
RADIUS Port X X
RADIUS Key X X
 WPA/WAPI                                              X        X
 Passphrase
 WPA/WAPI                                                       X
 Encryption
WEP Encryption X X
Encryption Strength
Network Key 1
Network Key 2
Network Key 3
Network Key 4
RADIUS Port X X
RADIUS Key X X
WPA/WAPI Passphrase X X
WPA/WAPI Encryption X X X X
WPA2 Preauthentication X X
                                    Open
                                    With Network Authentication open and no authentication, anyone can access
                                    the network. With WEP Encryption disabled, communication is sent in clear
                                    text, so this configuration has no security protection. WiFi Protected Setup
                                    (WPS) can be added as an easy yet secure authentication process. WEP
                                    encryption can also be added to provide secure communication between the
                                    wireless access point (AP) and the clients.
                                    See
                                         WPS, page 123 for information about WPS setup
                                         WEP Encryption, page 124 for information about WEP Encryption setup
Shared
Shared network authentication uses WEP encryption that must be shared
between the AP and the STA. The initial request from the STA is in clear text,
as is the challenge from the AP. The STA replies to the challenge with the
Network Key in an encrypted message.
                                    802.1x
                                    802.1X network requires mutual authentication between a client station and
                                    the router by including a RADIUS-based authentication server. Information
                                    about the RADIUS server such as its IP address, port and key must be entered.
                                    WEP encryption is enabled by default with default encryption strength and
                                    network keys.
                                    See RADIUS authentication, page 125.
WPA
WPA (WiFi Protected Access) is usually used for the larger Enterprise
environment, it uses a RADIUS server and TKIP (Temporal Key Integrity
Protocol) encryption (instead of WEP encryption which is disabled).
TKIP+AES uses 128-bit dynamic session keys (per user, per session, and per
packet keys). Dynamically creating a new key for each packet prevents
collisions.
AES (Advanced Encryption Standard) is stronger than TKIP. However, the
options provided by the zNID 24xx are TKIP+AES and AES. AES is a later
addition to WPA.
Network re-authorization interval is the time in which another key needs to be
dynamically issued.
                                    WPA-PSK
                                    WPA-PSK (WiFi Protected Access  Pre-Shared Key) is basically WPA for
                                    home and small office/home office (SOHO) environments. WPA-PSK uses
                                    the same strong TKIP+AES encryption which is used for WPA, per-packet
                                    key construction, and key management that WPA provides in the enterprise
                                    environment. However unlike WPA which uses a RADIUS server, WPA-PSK
                                    uses a password (WPA/WAPI passphrase) which is entered manually. A group
                                    re-key interval time is also required.
WPA2
WPA2 (WiFi Protected Access 2)  second generation WPA which uses AES
(Advanced Encryption Standard) instead of TKIP as its encryption method.
Network re-authorization interval is the time in which another key needs to be
dynamically issued.
                                    WPA2-PSK
                                    WPA2-PSK (WiFi Protected Access 2  Pre-Shared Key)  suitable for
                                    home and SOHO environments, it also uses AES encryption and requires you
                                    to enter a password and a re-key interval time.
Mixed WPA2/WPA
Mixed WPA2 / WPA  useful during transitional times for upgrades in the
enterprise environment, this mixed authentication method allows upgraded
and users not yet upgraded to access the network via the router. RADIUS
server information must be entered for WPA and a as well as a group re-key
interval time. Both TKIP and AES are used.
                                    Mixed WPA2/WPA-PSK
                                    Mixed WPA2 / WPA-PSK  useful during transitional times for upgrades in
                                    the home or SOHO environment, a pre-shared key must be entered along with
                                    the group re-key interval time. Both TKIP and AES are also used.
WPS
With WiFi Protected Setup (WPS)  available for WPA-PSK, WPA2-PSK,
Mixed WPA2/WPA-PSK and Open Network Authentication methods  the
wireless zNID 24xx can add clients via three different methods:
   push button certification
    With push button certification you must simultaneously push the WPS
    button on the rear panel of the wireless zNID 24xx and click the virtual
    button for push button registration on the client device.
   entering the STA PIN
    For STA PIN, a personal identification number (PIN) which matches the
    PIN from the wireless network client (also called station) is entered into
    the text box beneath the WPS add client radio buttons. Unlike most
    situations where the server provides the password, in this situation the
    client provides the password and the AP acknowledges it.
   entering the AP PIN
    For AP setup, a device PIN is entered in the Device PIN text box. The
    clients must match the device PIN to access.
                                    WEP Encryption
                                    WEP (Wire Equivalent Privacy) is encryption based on an encryption key
                                    strength of 64 or 128 bits. Up to 4 different keys can be set and you can come
                                    back to select which one to use at anytime.
UI Label Description
                                     Current Network Key           Allows you to select one of the four Network
                                                                   keys.
Network Key 1, 2, 3, 4 Provide the network key input for the RC4 key.
RADIUS authentication
Remote Access Dial-Up Service (RADIUS) is not only for WiFi applications.
The RADIUS server requires identity and credentials (username and
password) from the user and is used for enterprise security.
UI Label Description
 RADIUS Key              Key which is being used to authenticate the zNID 24xx
                         with the RADIUS server
                                    MAC filter
                                    To restrict wireless access to an AP by SSID, you can add a MAC Filter which
                                    filters for the MAC address. The filter defines whether a client can connect to
                                    the AP based on the MAC address of the client.
                                    The list of MAC addresses can allow a list of devices to use the AP or the list
                                    can be denied use.
Figure 94: The MAC filter page with no MAC addresses entered
Figure 96: The MAC filter list can allow or deny a group of devices
Wireless bridge
The Wireless Bridge page allows you to configure wireless bridge (also
known as Wireless Distribution System (WDS)) functionality. WDS allows
for the expansion of the wireless network across multiple access points
without wired connections. Wireless bridge refers to the connection between
the AP and a wireless repeater device which extends the reach of the AP.
A key to setting up the wireless repeater is to use the same SSID and login
credentials.
UI Label Description
UI Label Description
Figure 98: Wireless bridge page with Bridge Restrict set to Enabled
UI Label Description
UI Label Description
                                    Advanced
                                    The Wireless | Advanced page configure wireless signal settings.
                                             Note: Do not change the settings on this page if you are not familiar
                                             with WiFi settings.
UI Label Description
UI Label Description
 Auto Channel            Defines the refresh time in minutes for rescans which
 Timer(min)              finds the best available channel for use on your
                         wireless network. When configured for auto mode, the
                         timer value specifies how often to re-analyze the
                         spectrum to select a low interference channel. Note:
                         auto channel rescan will only occur when there are no
                         actively connected devices.
 802.11n Rate            The transfer rate from the zNID to the wireless client.
                         When Auto is selected the zNID uses the fastest
                         mutually support rate which can be used with the
                         current signal strength and noise levels. Fixed rates
                         limit the maximum rate to the specified value. Auto is
                         the recommended setting.
UI Label Description
                                     Basic Rate              The set of data transfer rates that all the stations will be
                                                             capable of using to receive frames from a wireless
                                                             medium. The default setting (Default) transmits at all
                                                             standard wireless rates (1-2Mbps, 5.5 Mbps, 11 Mbps,
                                                             18 Mbps, and 24 Mbps).
                                     Global Max Clients      Sets the maximum limit on the total number of client
                                                             which can connect to the AP. Global Max Clients is
                                                             the sum of all clients connected to all SSIDs. The Max
                                                             Clients parameter in the Wireless | Basic page sets the
                                                             maximum number of clients per the selected or named
                                                             SSID. The sum of all Max Clients per SSID must be
                                                             less than or equal to the Global Max Clients value.
                                     Transmit Power          Select from 20%, 40%, 60%, 80% and 100%. The
                                                             default value is 100%.
UI Label Description
Voice
SIP
The SIP configuration connects via network to a SIP softswitch.
Define the changes to the configuration and click Apply/Restart SIP client,
The SIP client will be restarted. Existing phone calls will be terminated.
                                    SIP-PLAR
                                    The Zhone SIP-PLAR implementation has a voice gateway which connects to
                                    the Class V switch.
                                    Define the changes to the configuration and click Apply/Restart SIP client,
                                    The SIP client will be restarted. Existing phone calls will be terminated.
UI Label Description
                                     Bound Interface          A list displaying all the interfaces in the box which
                                     Name:                    have been assigned an IP address. Select the Interface
                                                              for the switch to address with the changes from this
                                                              page.
UI Label Description
 Locale Selection:        Select the country. This field sets the phone to respond
                          as expect in the selected country.
 SIP domain name          The information you add in the SIP domain name
                          depends on the selection for the Domain Name Mode
                          dropdown. The IP address or the domain name for the
                          VoIP client.
 SIP or SIP-PLAR          Select SIP or SIP PLAR. Note that the selection adjusts
 checkboxes               the screen to the items that are needed for the protocol.
SIP Proxy: SIP Mode Only: the address of the SIP Proxy Switch.
 SIP Proxy port:          SIP Mode Only: the port number of the SIP Proxy
                          Switch. Enter 0 to enable DNS SRV mode.
 Use SIP Outbound         SIP Mode Only: the address number of the SIP
 Proxy:                   Outbound Proxy Switch.
 SIP Outbound Proxy:      SIP Mode Only: the address number of the SIP
                          Outbound Proxy Switch. Enter 0 to enable DNS SRV
                          mode.
 SIP Outbound Proxy       SIP Mode Only: the port of the SIP Outbound Proxy
 port:                    Switch.
 SIP Registar:            SIP Mode Only: the address number of the SIP
                          registar Switch.
 SIP Registar port:       SIP Mode Only: the port number of the SIP registar
                          Switch. Enter 0 to enable DNS server mode.
 SIP PLAR Gateway         SIP PLAR Mode Only: the address number of the SIP
                          PLAR Switch.
 SIP PLAR Port            SIP PLAR Mode Only: the port number of the SIP
                          PLAR Switch.
 Head Start Value         Seconds prior to registration time out to start new
                          registration. If Registration Expire Timeout is 3600 and
                          Head Start Value is 3540 then (3600 - 3540) the router
                          would re-register every minute.
 Voip Dial Plan Setting   SIP Mode Only: Regular Grammar describing valid
                          phone number.
UI Label Description
                                     InterDigit Timeout      SIP Mode Only: In Dial plan the T value is a timeout
                                                             value. This is the duration of the T value.
MGCP
The MGCP configuration connects via network to a MGCP softswitch.
Define the changes to the configuration and click Apply/Restart SIP client,
The SIP client will be restarted. Existing phone calls will be terminated.
UI Label Description
 Bound Interface Name     A list displaying all the interfaces in the box which
                          have been assigned an IP address. Select the Interface
                          for the switch to address with the changes from this
                          page.
 Locale Selection         Select the country. This field sets the phone to respond
                          as expect in the selected country
 Client Addressing        IP and Bracketed will cause the MGCP Client name to
 Mode                     be the Bound Interface IP address. Name will allow the
                          user to input any text field, usually a Domain Name
MGCP Client Name The IP address of the VoIP call stack in this ONU
UI Label Description
                                    Lines
                                    The Configuration | Voice | Lines page selects which physical POTS
                                    interfaces are made active as well as setting signal information for the lines.
UI Label Description
 Line Name or Display      Text Field that identifies the port to the switch. This
 Name                      must match what the Service Provider has set.
 Password (SIP only)       Security passkey for connecting to the SIP server,
                           assigned by voice service provider
 Voice Sample Size         The time that the DSP will encode voice before
 (ms)                      sending. The longer the time the more propagation
                           delay in the data stream, but also the more efficient the
                           packetization.
UI Label Description
                                     Hotline Enable            When enabled the phone will immediately dial the
                                                               Hotline number.
                                     Hotline Number            The only number this phone will dial, if Hotline is
                                                               enabled
                                     Phone Follows WAN         When enabled the phone will lose power any time the
                                                               WAN is operation status of down. This will allow line
                                                               monitoring equipment to detect loss of service.
                                     Tx Path Gain (dB)         Transmit Gain of the upstream analog to digital path for
                                                               phone to network.
                                     Rx Path Gain (dB)         Receive Gain of the downstream analog to digital path
                                                               for network to phone.
VLAN
       The VLAN page both creates and defines VLANs as well as assigns VLANs
       to available ports.
       The VLAN screen has two tables  port defaults and VLANs and port
       membership.
       For information about VLAN taggings, see VLANS on page 197.
       Settings
       The first table displays the configured Port Defaults including which
       interface has been configured to be the uplink, the default VLAN ID and
       802.1p priority tag which will be applied to untagged traffic on ingress of
       each port, and the Port Filtering enable/disable per port.
UI Label Description
UI Label Description
                                     Default PVID             The VLAN ID that will be inserted for any non tagged
                                                              frames received on this interface. To remove tags in the
                                                              upstream direction the port must be an untagged
                                                              member of the same VLAN.
                                     Default 802.1p           The default Quality of Service value for the PVID
                                                              frames
                                     IGMP PVID                The Vlan ID used in the VLAN tag that will be added
                                                              to all non-tagged IGMP frames received on this
                                                              interface.
                                     IGMP 802.1.p             The default Class of Service value used in the VLAN
                                                              tag that will be added to all non-tagged IGMP frames
                                                              received on this interface.
                                    The second table displays all configured VLANs in ascending order. For each
                                    VLAN, the configured Port Membership is displayed, along with configured
                                    VLAN Name, Connection Type, and Secure Forwarding Enable/Disable
                                    status.
UI Label Description
                                     VLAN Name                The VLAN Name as defined by the user for this VLAN
                                                              ID
                                     Connection Type          The type of VLAN the ONU was instructed to create
                                                              during the add VLAN operation for this ID. This value
                                                              CAN NOT be changed once created. The only option is
                                                              to delete and recreate.
                                     Port Membership          For each interface listed it indicates if this port is active
                                                              for the configured VLAN
UI Label Description
 PVID                      The VLAN ID that will be inserted for any non tagged
                           frames received on this interface.
 Default 802.1p            The default Quality of Service value for the PVID
                           frames
 IGMP PVID                 The Vlan ID used in the VLAN tag that will be added
                           to all non-tagged IGMP frames received on this
                           interface.
 IGMP 802.1.p              The default Class of Service value used in the VLAN
                           tag that will be added to all non-tagged IGMP frames
                           received on this interface.
                                    To add a new VLAN you define the name, the ID, whether secure forwarding
                                    is applied to the VLAN and whether the VLAN is bridged, routed, or for
                                    PPPoE.
UI Label Description
                                     Connection Type          The type of VLAN the ONU was instructed to create
                                                              during the add VLAN operation for this ID. This value
                                                              CAN NOT be changed once created. The only option is
                                                              to delete and recreate.
                                                              VLAN types:
                                                                 Bridged (See Bridged on page 157)
                                                                 Bridged via CPU or CPU-Bridged. (Bridging
                                                                  option for Dual Managed mode with VEIP, See
                                                                  Bridged on page 157)
                                                                 Routed (See Routed on page 158)
                                                                 Brouted (See Brouted on page 159)
                                                                 PPPoEBridged (See PPPoE Bridged or Routed
                                                                  on page 160)
                                                                 PPPoERouted (See PPPoE Bridged or Routed on
                                                                  page 160)
                 Once a VLAN is created, you cannot change the name or VLAN ID, interface
                 type and whether secure forwarding is applied to the VLAN. You can define
                 port membership for an existing VLAN.
                                    Table 55: In the VLAN editing screen, only the port membership for the VLAN
                                    may be defined
UI Label Description
                                     VLAN Name                The user defined name for this VLAN. Once the
                                                              VLAN is created this name cannot be changed. You
                                                              must delete the VLAN and recreate it with a
                                                              different name.
                                     VLAN ID                  The VLAN ID. Once the VLAN is created the VLAN
                                                              ID cannot be changed. You must delete the VLAN
                                                              and recreate it with a different VLAN ID.
                                     Connection Type          The type of VLAN the ONU was instructed to create
                                                              during the add VLAN operation for this ID. This value
                                                              CAN NOT be changed once created. The only option is
                                                              to delete and recreate.
                                     Port Membership          Assigns which ports will have the VLAN shown in
                                                              VLAN ID.
Modes
The Transparent LAN Service Settings screen allows the TLS parameters to
be set or modified.
Table 56: In the VLAN editing screen, only the port membership for the VLAN
may be defined
UI Label Description
 S-Tag Ethernet Type      When S-Tag is selected, the S-Tag service type may be
                          selected. The outer S-Tag is identified by a unique Tag
                          Protocol Identifier (TPID). The IEEE standard value
                          for the TPID is 88A8 (hex), however older product may
                          use 8100, 9100, 9200, or 9300. The zNIDs provide
                          support for interaction with these older devices.
                             8100
                             88A8
                             9100
                             9200
                             9300
                                    Table 56: In the VLAN editing screen, only the port membership for the VLAN
                                    may be defined
UI Label Description
WAN backup
             With the WAN backup feature configured, if the WAN (uplink) has gone
             down, data for one VLAN can be rerouted to the USB wireless modem. WAN
             backup requires that at least one VLAN on the uplink has NAT enabled.
UI Label Description
UI Label Description
                                     WAN Failover Timer     The WAN Failover timer is used to determine how
                                                            long (in seconds) the Fiber uplink interface must
                                                            be operationally DOWN before a USB Cellular
                                                            WAN Backup connection will be initiated. The
                                                            Default value is 0 seconds, which DISABLES this
                                                            feature. Recommended value to enable this feature
                                                            is 60 seconds.
                                     WAN Restoral Timer     The WAN Restoral timer is used to determine how
                                                            long (in seconds) the Fiber uplink interface must
                                                            remain in an operational UP condition before the
                                                            Cellular Backup connection will be terminated
                                                            and the traffic that was being forwarded out the
                                                            USB interface is forwarded to the 5xx GEM
                                                            instead. The Default value is 60 seconds.
                                     Connection Timeout     Specifies the duration of inactivity in seconds
                                                            before the cellular data call will automatically ter-
                                                            minate. A new call will be initiated automatically
                                                            when a packet must be sent upstream on the desig-
                                                            nated VLAN if the WAN uplink is still Operation-
                                                            ally DOWN. A value of 0 will DISABLE the
                                                            Connection Timeout feature (Nailed Up mode).
                                                            The default value is 360 seconds.
                                     WAN Backup IP          The WAN IP Address, Default Gateway IP, Subnet
                                     Address Mode           Mask, and DNS Server IP must all be defined for
                                                            the USB Cellular Backup connection. When IP
                                                            Address Mode is set to DHCP, a DHCP Request
                                                            will be sent upstream after the Cellular Data Con-
                                                            nection has been established to acquire this infor-
                                                            mation dynamically. When the WAN Backup IP
                                                            Address Mode is set to Static, this information
                                                            must be statically configured.
                                     WAN Backup Default     The IP Address to be used on the WAN uplink interface
                                     Gateway                of a Cellular Backhaul connection. Acquired
                                                            dynamically in DHCP mode.
                                     WAN Backup Subnet      The Subnet Mask to used on the WAN uplink interface
                                     Mask                   of a Cellular Backhaul connection. Acquired
                                                            dynamically in DHCP mode.
                                     WAN Backup Primary     The Subnet Mask to used on the WAN uplink interface
                                     DNS                    of a Cellular Backhaul connection. Acquired
                                                            dynamically in DHCP mode.
UI Label Description
      Deployment scenarios
                                    The connection type for each VLAN can be configured for Bridged, Routed,
                                    Brouted, PPPoE Bridged, or PPPoE Routed.
                                    For a discussion of the differences among the connection types please see IP
                                    configuration options, page 157.
                                    Creating data connections follows a different procedure than voice
                                    connections.
                                       Creating data connections on page 162
                                       Creating bridge connections on page 163
                                       Creating routed connections on page 166
                                       Creating brouted connections on page 172
                                       Creating PPPoE tunnels on page 179
                                            PPPoE Bridged on page 179
                                            PPPoE Routed on page 184
                                       Creating wireless connections on page 188
                                       Creating voice connections on page 191
                                            SIP on page 191
                                            SIP-PLAR on page 192
                                            MGCP on page 193
                                       Creating Dual Managed connections on page 194
                                    Other features: more information and additions
                                       VLANS on page 197
                                       NAT and DHCP on page 205
                                       DHCP server on page 209
                                       Data services on page 210
                                            Rate limiting on page 210
                                            Priority on page 211
                                            CoS on page 211
IP configuration options
                  The different bridge types which the zNID 24xx supports provides present
                  different options for assigning IP addresses.
                     Bridged
                      For bridged VLANs, an IP Address can be assigned if the zNID will be a
                      host in a particular IP subnet.
                          IP addresses for LAN-side client devices can be statically assigned or
                           assigned by an upstream DHCP server.
                          Any number of Ethernet ports or WiFi SSIDs can be members of the
                           Bridged VLAN
                          All clients in a bridged VLAN will be in the same IP subnet, and the
                           zNID 24xx will enable direct local peer-to-peer communications
                           between all clients unless the Secure Forwarding option has been
                           enabled.
                           If Secure Forwarding is enabled, all broadcast traffic is forwarded
                           upstream and not flooded out the other local ports in the VLAN. This
                           prevents local peer-to-peer communications, and is equivalent to the
                           ONU operating mode
                          Bridged with CPU or CPU-Bridged must be selected for using
                           bridged VLANs in Dual Managed mode with VEIP
Figure 117: For bridged connections all the interfaces are in the same subnet
                      See Creating bridge connections, page 163 for the procedures for creating
                      bridged connections.
                                       Routed
                                        For Routed VLANs, an IP Address will be assigned per physical port that
                                        is assigned to the VLAN. The minimum configuration will have the
                                        uplink interface and at least one LAN-side interface. When there are
                                        multiple LAN ports in the same Routed VLAN, each one must be
                                        assigned its own IP subnet.
                                            In the illustration below, a NAT Routed VLAN has been configured
                                             that contains three LAN ports and one SSID. A total of six IP
                                             addresses are assigned to the 2426 for this configuration. A WAN IP
                                             address is assigned to the uplink, and four LAN-side IP addresses
                                             must be assigned, each in a separate subnet, plus an IP subnet for the
                                             WiFi interface.
                                            All Wi-Fi connected client devices will be in the same subnet. An RG
                                             configuration item called Isolate Clients in the Wireless / Basic
                                             menu determines if these devices will be able to communicate locally
                                             with each other, or if all traffic will be forwarded upstream. When
                                             Isolate Clients is enabled, all traffic is forwarded upstream, blocking
                                             local peer-to-peer communications.
                                            The example below shows a Routed VLAN with NAT. When NAT is
                                             enabled, the Router performs Network Address Translation, mapping
                                             each LAN side IP address and source port to a unique protocol port
                                             used with the WAN IP Address for communications across the
                                             network.
Figure 118: For routed connections each interface is in its own subnet
                                        See Creating routed connections, page 166 for the procedures for creating
                                        routed connections.
   Brouted
    For Brouted VLANs, there are only two IP interfaces - one for the Routed
    uplink interface and a second for the Bridged LAN-side interface. A
    Brouted VLAN may have multiple LAN ports as members, and all ports
    will use the same IP subnet. So Brouted means that the LAN side is like a
    bridge, but has a routed interface for the WAN side.
       Brouted VLANs enable local peer-to-peer communications between
        all client devices, just like Bridged VLANs do. All clients will have
        IP Addresses in the same subnet.
       A DHCP Server may be configured in the zNID 24xx to
        automatically assign local IP addresses in the assigned subnet.
       NAT is typically enabled on a Brouted VLAN, using private IP
        Addresses locally and a single public IP address on the uplink
        interface
Figure 119: For brouted all LAN side interfaces are in one subnet. The uplink is
in another subnet
    See Creating brouted connections, page 172 for the procedures for
    creating brouted connections.
                                    Figure 120: For PPPoE bridged the LAN side interfaces are all in the same
                                    subnet. The WAN side is in its own subnet and a PPPoE tunnel is created to an
                                    upstream BRAS
Figure 121: For PPPoE routed the LAN side interfaces are all their own subnets.
The WAN side is in its own subnet and a PPPoE tunnel is created to an upstream
BRAS
    See Creating PPPoE tunnels, page 179 for the procedures for creating
    PPPoE tunnels.
                                    All connections, including voice and video, are based on the VLAN and all
                                    follow a general procedure:
                                    1   Create VLAN
                                        This first step is the same for all data connections, except for choosing
                                        which connection type. You name the connection and give it a VLAN ID
                                        as well as defining the connection type.
                                        For voice configurations you select Bridged as the connection type and
                                        bind the POTS interface to the VLAN later in the process.
                                    2   Select ports and set port defaults
                                        This step is also the same for all connection types.
                                        For wireless you would select the wireless interface as one of the ports,
                                        then later configure the wireless.
                                        For OMCI & RG combined VEIP connections select O for the uplink
                                        port member.
                                    3   Adjust WAN settings (Routed, Brouted and PPPoE connections)
                                        This step configures the upstream interface.
                                        For routed connections it defines the zNID devices addressing and
                                        whether NAT (Network Address Translation) or DHCP Relay is used for
                                        the client devices on the LAN side.
                                        For video connections you would enable IGMP snooping in this step.
                                        For PPPoE connections this step has a PPPoE address mode used for
                                        defining the IP address for the zNID side of the PPPoE tunnel.
                                    4   Adjust LAN settings (Routed, Brouted and PPPoE connections)
                                        This step configure the downstream interface
                                        For routed connections it defines whether the zNID is acting as a DHCP
                                        server for the client devices and creating a subnet.
                                        For PPPoE connections Network Address Translation is required.
                                    5   Configure wireless (Wireless connections only)
                                        Set port membership, authentication and encryption features as well as
                                        other wireless options.
                                    6   Select voice connection (Voice connections only)
                                        For voice connections you select which of the configured VLANs to
                                        which to bind the POTS interface.
        Note: Bridged connections for use with VEIP must use the
        CPU-Bridged type. See Creating Dual Managed connections on
        page 194 for an example creating
                                    VLANs can be configured as Routed. With this connection type, packets are
                                    forwarded based on the destination IP address. Explicit routes can be
                                    configured or the system can use the default route, which is the next hop
                                    gateway for the VLAN. A total of 32 routes can be defined.
                                    When in the Routed mode, additional features are enabled such as filtering
                                    (See MAC filter on page 126), and the DHCP server function (See DHCP
                                    server on page 209).
Figure 128: Selecting the fiber WAN interface for the VLAN
Figure 129: Adjusting WAN settings: device addressing and NAT and DNS
    relay for clients
    For this example the ZNID will be getting its address from an
    upstream DHCP server.
    Other options for device addressing:
       To assign a permanent IP to the zNID, select Static from the
        Address Mode dropdown
        You will need to get the IP Address from your ISP as well as the
        Subnet Mask, Default Gateway address and DNS.
       Unconfigured
c   From the NAT/NAPT dropdown select NAPT
    For this example we are going to have private addresses for the
    downstream devices using Network Address Translation/ Network
    Address and Port Translation.
        For this example we are defining the IP address for the downstream
        interface, by selecting Static.
Figure 131: Selecting the fiber WAN interface for the VLAN
Figure 135: Selecting the fiber WAN interface for the VLAN
Figure 136: Adjusting WAN settings: device addressing and NAT and DNS
    relay for clients
    For this example the ZNID will be getting its address from an
    upstream DHCP server.
    Other options for device addressing:
       To assign a permanent IP to the zNID, select Static from the
        Address Mode dropdown
        You will need to get the IP Address from your ISP as well as the
        Subnet Mask, Default Gateway address and DNS.
       Unconfigured
c   From the NAT/NAPT dropdown select NAT
    For this example we are going to have private addresses for the
    downstream devices using Network Address Translation/ Network
    Address and Port Translation.
    For this example we are defining the IP address for the downstream
    interface, by selecting Static.
Figure 138: Selecting the fiber WAN interface for the VLAN
                                                Proxy
                                                 When set to Proxy, all DNS Requests are sent to the zNID's
                                                 LAN-side IP Address, and the zNID uses its Local Host Table
                                                 and its System DNS Client to resolve all DNS requests. The
                                                 zNID's LAN-side IP Address will be provided as the DNS IP
                                                 Address to the LAN-side clients in the DHCP Offer. In this case,
                                                 the Gateway Router IP and the DNS Server IP address will be the
                                                 same.
                                    5   Configure Wireless (Wireless connections only)
                                        Set port membership, authentication and encryption features as well as
                                        other wireless options. See Creating wireless connections, page 188.
                 PPPoE is defined for the uplink port of a VLAN. In this mode, the zNID
                 24xx will establish a PPPoE session with a server on behalf of the client
                 connected to the configured port. Each VLAN can have 1 PPPoE session.
                 The configuration of the PPPoE session requires only a few parameters:
                    user name
                    password
                    authentication method
                 When in the PPPoE mode, the uplink port will always perform the NAT
                 function. This means that the LAN portion will also have the DHCP server
                 enabled. Depending on how the LAN ports need to be configured, the PPPoE
                 connection will be defined to be either Bridged or Routed.
                 The zNID 24xx supports PAP, CHAP or MS CHAP. The zNID 24xx can be
                 set to auto in which case it will use what ever method the server uses.
                    PPPoE Bridged Mode
                     In PPPoE Bridged Mode mode, a single DHCP server will provide
                     addresses for the devices connected to any of the LAN ports. All ports
                     will be members of the same IP subnet. They are also all members of the
                     same VLAN.
                    PPPoE Routed Mode
                     In PPPoE Routed Mode mode, there is a DHCP server for each LAN port.
                     Each port is on a different IP subnet. This method should be used when
                     the ports are connected to different customers, such as different
                     apartments that are served from a single zNID 24xx.
                 PPPoE Bridged
                 1   Create VLAN
                                        Figure 142: For PPPoE you just need to add the username, password and
                                            authentication type
Figure 143: Defining the subnet for the PPPoE bridged VLAN
    d   In the Subnet Range Start Address text box enter a start address for
        the subnet (192.168.100.10)
    e   In the Stop Address text box enter an ending address for the subnet
        range (192.168.100.100)
    f   In the Lease Duration (sec) text box enter 86400.
        86400 is 24 hours (in seconds, 60 x 60 x 24)
5   Configure Wireless (Wireless connections only)
    Set port membership, authentication and encryption features as well as
    other wireless options. See Creating wireless connections, page 188.
                                    PPPoE Routed
                                    1   Create VLAN
                                        Figure 147: For PPPoE you just need to add the username, password and
                                            authentication type
Figure 148: Defining the subnet for the PPPoE bridged VLAN
    d   In the Subnet Range Start Address text box enter a start address for
        the subnet (192.168.102.10)
    e   In the Stop Address text box enter an ending address for the subnet
        range (192.168.102.100)
    f   In the Lease Duration (sec) text box enter 86400.
        86400 is 24 hours (in seconds, 60 x 60 x 24)
5   Configure Wireless (Wireless connections only)
    Set port membership, authentication and encryption features as well as
    other wireless options. See Creating wireless connections, page 188.
                                    Wireless connections are created just like other connections in that the
                                    wireless interface is selected for port membership
                 Voice connections require that the proper version of the software is loaded
                 onto the zNID. SIP and SIP-PLAR versions are S versions, such as S2.4.112.
                 MGCP versions are M versions, such as M2.4.112.
                 If you do not have the proper version of the software consult your Zhone
                 representative.
                 To load the upload the software onto the zNID, see Update software on
                 page 55.
                 SIP
                 1   The SIP version of the software must be loaded on the zNID
                     See Update software, page 55
                 2   Create the voice VLAN
                     Select Bridged for the Connection Type.
                 3   Bind the POTS interface to the VLAN
                     a   Select Configuration|Voice|SIP
                     b   From the Bound Interface Name dropdown, select the VLAN
                         created for voice.
                 4   Configure SIP
                     See SIP on page 135 for a description of the configuration parameters
                                    SIP-PLAR
                                    1   The SIP version of the software must be loaded on the zNID (includes SIP
                                        PLAR
                                        See Update software, page 55
                                    2   Create the voice VLAN
                                        Select Bridged for the Connection Type.
                                    3   Bind the POTS interface to the VLAN
                                        a    Select Configuration|Voice|SIP
                                        b    From the Bound Interface Name dropdown, select the VLAN
                                             created for voice.
4   Configure SIP-PLAR
    See SIP-PLAR on page 136 for a description of the configuration
    parameters
5   Select Admin State and define....
6   Configure line settings....
7   Click Apply/Restart SIP client
MGCP
1   The MGCP version of the software must be loaded on the zNID
    See Update software, page 55
2   Create the voice VLAN
    Select Bridged for the Connection Type.
3   Bind the POTS interface to the VLAN
    a   Select Configuration|Voice|MGCP
    b   From the Bound Interface Name dropdown, select the VLAN
        created for voice.
4   Configure MGCP
    See MGCP on page 139 for a description of the configuration parameters
5   Select Admin State and define....
6   Configure line settings....
7   Click Apply/Restart SIP client
                                    Dual Managed connections using the virtual UNI (VEIP) between the RG and
                                    OMCI are created in the same manner as other connections. The only
                                    difference is that in the port selection process, rather than select T (for
                                    tagged) or U (for untagged) for the uplink, you select O (for OMCI).
Figure 151:
    b   In the VLAN Name text box enter a name for the VLAN
    c   In the VLAN Tag ID text box enter a VLAN ID
    d   <Optional> From the Secure Forwarding dropdown select either
        Enable or Disable
        See Add New VLAN on page 148 for more information
    e   From the Connection Type dropdown select Bridged
    f   Click Apply/Save
2   Select ports and set port defaults
    a   From the Configuration - VLAN Settings => Edit Selected VLAN
        page (which you should be on automatically after completing the
        previous step) Select the port members.
                                        d    In the PVID text box for GE1 - GigE eth1, enter 410 (the same as the
                                             ID for the VLAN)
Advanced features
VLANS
              The zNID 24xxs support VLAN-based services. This section describes the
              types of VLANs that are supported on this device. When configured for
              normal single-tagged mode, all ports are members of a VLAN. They can be
              untagged or tagged members. Alternatively, ports can be double tagged
              members of an S-VLAN.
              Ethernet frames that are tagged have a VLAN ID and priority as part of the
              Ethernet frame. In this product that is called the C tag or the Customer tag.
              This family of products also supports the double tagging feature. The outer
              tag is called the S-Tag or the Service Provider tag. This double tag
              capability is an advanced feature that allows traffic from multiple clients to be
              sent through the network in a common VLAN.
              Once the S-Tag mode has been selected from the VLAN Mode page, traffic
              leaving the port designated as the S-Tag port, will have the outer S-tag added
              to the frame.
              The S-Tag mode only works with ports that been defined as TLS members for
              the S-LAN, where all tagged traffic on a port is accepted without having to
              configure each individual VLAN. When this traffic leaves the system, it will
              have the outer S-tag applied to the packets.
              This configuration is valid only when all ports are members of the same
              VLAN. Otherwise, there is no way to separate traffic. This configuration
              would not typically be used when the zNID 24xx is connected to an MXK.
              The MXK expects the traffic to be tagged, as described in the next section.
                                    This is the most common configuration of the zNID 24xx. The MXK expects
                                    tagged traffic on the uplink, while most PCs and set top boxes only use
                                    untagged traffic.
                                    The VLAN configuration web page shows an example of the uplink port
                                    being tagged and the LAN ports being untagged. This is the standard
                                    configuration when connected to an MXK.
                                    If a tagged frame is received on the LAN port, it will be forwarded upstream
                                    unmodified. However, in the downstream direction the VLAN tag will be
                                    removed before sending the frame out the LAN port. This could lead to
                                    undesirable results, since the device sending tagged frames probably expects
                                    to receive tagged frames.
                                    The diagram below shows an example where the traffic is received on the
                                    LAN port with a VLAN tag (C-3) already included. In this case the VLAN tag
                                    remains on the frame as it is sent to the network on the port that has been
                                    designated as the Uplink port. Traffic that is received from the network is
                                    expected to have the C-3 VLAN tag. That traffic is prioritized and forwarded
                                    based on that VLAN tag. In this case the LAN Ethernet port is tagged,
                                    therefore the C-3 VLAN tag is not stripped from the frame before being sent
                                    to the LAN port as described in the previous example. In this case, the VLAN
                                    tag is preserved.
                                    Each Ethernet port can be a member of a different VLAN. The ports can be
                                    tagged or untagged. For this example both Ethernet ports are tagged. The web
                                    page below shows the configuration for a zNID 24xx that is configured for
                                    tagged Ethernet ports and tagged uplink port.
                                    In this mode, if an untagged frame is received on the LAN port, a VLAN tag
                                    will be added as defined by the PVID and the frame will be forwarded
                                    upstream. In the downstream direction, the tagged frame will be passed to the
                                    LAN port without any modifications. This could lead to undesirable results
                                    since the device that sent untagged frames probably expects to receive
                                    untagged frames.
                                    S-Tagged
                                    S-Tag or QinQ is a method of adding a second VLAN tag to an Ethernet
                                    frame. This can be useful for Service providers that have multiple clients on
                                    the same ONU, or for business applications in which the client has their
                                    network segmented with multiple private VLANs that may conflict with
                                    VLANs in use by other customers of the same service provider. The S-Tag
                                    concept allows the service provider to take tagged traffic from a customer
                                    network and transport that traffic though through the network on a single
                                    VLAN without the traffic from one client interfering with the traffic from
                                    another client. The client ports are unaware of the double tag, since it is
                                    stripped before the Ethernet frame is sent to the LAN port.
                                    The outer S-tag is identified by a unique Tag Protocol Identifier (TPID).
                                    Typical values for the TPID are 88A8, 8100, 9100, 9200, or 9300. The default
value is 8100. This family of products allows that field to be specified by the
user.
On the web interface, the S-tag feature is defined on the VLAN mode page as
shown below. Once enabled, all VLAN traffic being sent upstream will have
the outer S-tag applied to the packet.
Figure 160: Stag is set from the VLAN Service Mode dropdown
TLS mode
                                    Once the ONU has been set for S-tag mode, individual ports can be
                                    configured for TLS (Transparent LAN Services) mode, where all the tagged
                                    traffic received on a TLS port is tagged with an outer S-Tag and forward
                                    upstream. The web page below shows an example of a configuration that has
                                    tagged traffic on both Ethernet ports, and the upstream traffic has an
                                    additional S-tag on the packet. In this example, the traffic on each Ethernet
                                    port could be from different service providers. The service providers could be
                                    using the same VLAN IDs, but the traffic would remain segregated since they
                                    have unique S-tag IDs.
                                    Based on the figure below, in this example, port 1 is set to be in TLS mode. In
                                    that mode, all of the data received on port 1 will have an outer tag of
                                    101added each packet. Data received on the uplink port is expected to have an
                                    outer S-tag of 101, which will be stripped on input.
                   e   In the PVID text box for GE1 - GigE eth1, enter 500 (the same as the
                       ID for the VLAN)
                   f   From the Uplink eth0 should be selected
                       Selecting the Fiber WAN interface adds this VLAN to the uplink.
                   g   Click Save/Apply
               In this example the ONU will have all ports as untagged. The ONU will
               provide the IP addresses to the connected devices through DHCP. Note the
               each port has its own DHCP server. The addresses given out on each port
               must be in a different subnet. In this example, each port is set to give out 10 IP
               addresses. The ONU will perform NAT on the uplink interface to translate the
               public IP address to one of the private addresses.
               With this configuration, the subscriber should be able to connect a PC to the
               Ethernet port, obtain an address and be ready to surf the Internet.
DHCP server
Data services
                                    Rate limiting
                                    Rate limiting is done on a per-physical-port basis, not on a per-VLAN basis.
                                    Rate limiting is a mechanism for controlling traffic and can include policing
                                    (dropping packets). Use rate limiting to control the rate of traffic sent or
                                    received on a physical port. Received traffic that is less than or equal to the
                                    specified rate is forwarded and traffic that exceeds the rate plus the max burst
                                    size is dropped.
                                    After configuring an interface with rate limiting, the inbound traffic rate is
                                    monitored and if the rate exceeds the specified rate, a pause frame will be sent
                                    to the device connected to the port to stop the incoming traffic. If the
                                    connected device does not support pause frames, then the excessive data will
                                    be dropped.
                                    The inbound and outbound rates are independent. This allows for symmetric
                                    or asymmetric rates (to emulate ADSL for example). The rate limiting in
                                    either direction can be disabled by entering 0 (zero) for the data rate.
                                    For rate limits less than 100 Mbps, the rate can be set in 1Mbps increments.
                                    For rate limits greater than 100 Mbps, the rate must be set in 8 Mbps
                                    increments. The system will automatically adjust the value entered to an
                                    appropriate rate if necessary.
                                    For the outbound direction, the data will be sent at the rate specified.
                                    Outbound data is mapped into different queues based on priority. Strict
                                    Priority scheduling is used for the Critical priority queue and WRR
                                    scheduling is used for the High, Medium and Low priority queues. The ratio
                                    is 16 packets from the high priority queue, 8 from the medium queue and 4
                                    from the low priority queue.
                                     The max Burst Size parameter specifies how much a single burst of data can
                                    exceed the inbound rate before packets are dropped. The default setting is
                                    500k bytes.
Priority
The system can be configured to prioritize traffic based on either the layer 2
VLAN CoS bits or the layer 3 ToS bits. The prioritization method is selected
on the VLAN Mode page as shown below.
The zNID 24xx products support the prioritization of traffic based on either
the ToS (Type of Service) values in IP packets or CoS (Class of Service)
values in Ethernet VLAN headers as defined by IETF RFC1349 and IEEE
802.1p respectively. The configured ToS or CoS levels specify packet priority
and queuing used to transport the packet through the Ethernet and IP
networks.
CoS
The VLAN header in Ethernet packets contains a CoS field for queuing
priority or Class of Service (CoS) values based on eight (0-7) levels of
service, with the lowest priority being 0 and the highest priority 7.
The eight priority values are mapped to 4 queues. The highest priority queue
(Critical) uses strict priority. All the packets in that queue will be sent before
any packets in the other queues. If there is a large amount of data in the strict
priority queue, it is possible that the lower priority queues never get serviced.
A weighted round robin approach is used for the remaining queues. The
packets are sent in a ratio of 16 high priority, 8 Medium, and 4 Low priority.
                                    Packets which require the highest throughput or are sensitive to latency (the
                                    amount of time between received packets) should be in higher priority queues.
                                    Normally video and voice are more sensitive to throughput and latency issues.
                                    Precedence
                                    IP packets have a ToS byte in their headers that contains information about
                                    relative priority. The IP Precedence field contains a 3-bit priority designation.
                                    Most normal traffic has an IP Precedence value of zero. Higher values in this
                                    field indicate that traffic is more important and that it requires special treatment.
                                    IP Precedence values greater than 5 are reserved for network functions.
                                    The format of the ToS byte:
                                             Note: Data is prioritized using only the Precedence bits, not the
                                             entire Diffserv field.
              This chapter describes troubleshooting tests for the zNID 24xx. It includes the
              following sections:
              Zhone supports the Microsoft Media Room (MMR) application in many
              deployments for GPON, ADSL and VDSL. Zhones IPTV deployment
              includes support for integrated residential gateway functionality required by
              MMR to significantly reduce the complexity and cost of deployments.
              With any port, any service there is no need to designate some Ethernet Ports
              as data ports and others as video ports. IPTV streams can be watched
              from PCs using media streaming applications, or VoD and Pay per view
              content may be viewed. Set top boxes (STBs) can join IPTV streams, access
              VoD content or browse the Internet. Game consoles can access online gaming
              over the Internet, browse the Internet, watch IPTV streams or access VoD
              content.
              This chapter includes the following sections
                 Microsoft Media Room support, page 213
                 Any port, any service, page 217
                                    Figure 168: MMR provides live, recorded, and on demand programming for PCs,
                                    media servers (like the Xbox) and TV
                                    The wire speed NAT Routing capabilities of Zhones zNID product family are
                                    required to support multiple concurrent High Definition IP TV streams with
                                    low latency and no packet loss. This is just one of the key attributes of the
                                    zNID product line required to support the integrated MMR Home Gateway
                                    capability.
                                    There are several Residential Gateway requirements introduced by the MMR
                                    application, and Zhones zNID 24xx supports them all.
                                    The Zhone MMR application described in this document shows the high level
                                    configuration items and describes how the zNID 24xx ONT provides data and
                                    IPTV services to downstream set top boxes and media servers.
                                    The MXK aggregates the services for Internet, IP video, and Video on
                                    Demand (VoD) segregating the services by VLAN. The zNID uses the VLAN
                                    segregation to provide video services to IPTV, Media server and PCs.
Figure 169: The zNID 24xx includes integrated support for the MicroSoft Media
Room 2.0 Application
                Figure 170: Zhone zNID products include integrated support any port and
                service on the GE LAN ports
              This chapter describes troubleshooting tests for the zNID 24xx. It includes the
              following sections:
                 Diagnostics, page 219
                 Ping, page 221
                 Trace route, page 222
                 Hardware reset, page 224
Diagnostics
              The Diagnostics page runs tests on each interface. If a test shows FAIL, click
              the Hints link to diagnose the issue.
              The Ethernet connection test checks whether the zNID detects a device
              connected, so the hints will be cabling and whether the device is running
              properly. Restarting most devices will put them in a known state.
Figure 172: Example of the hints for failing an Ethernet connection test.
Ping
       The Ping test sends an IP ping to an IP address. The ping can be used to
       determine if another device can be accessed from the zNID.
Parameter Description
      Trace route
                                    The Trace Route test issues an ICMP echo command to the destination
                                    address. The result shows the path (hops) it took to reach the destination
                                    address.
Parameter Description
                                     Max Time to Live         Max Time to Live is the maximum number of hops
                                                              or nodes that the packet is allowed to traverse before
                                                              quitting the test. The default is 30.
                                     Queries Per Hop          The number of times the test will go to each hop count.
                                                              The Queries Per Hop number must be greater than 1.
                                                              The default is 3.
                                     Wait Per Response        The number of seconds to wait for the echo response.
                                                              The default is 3.
Voice
Figure 175:
Hardware reset
A C