Product Description:
BT model ONU is a user terminal device independently developed by BT-Pon in line with such industrial background. The device has built-in two-layer switching function . With compact structure and small appearance, it is a kind of FTTH EPON optical network unit with high performance and low power consumption, which is very suitable for the application requirements of various data services in FTTH networking scenarios of various operators.
Features of BT-PON FTTH:
- Compliant with IEEE 802.3ah specification and OAM protocol
- Supports the WEB configuration function
- Layer 2 Switching, support 802.1Q VLAN, 802.1P QOS, Bandwidth Control, Spanning Tree, etc
- Supports the configuration of Ethernet interface rates, working modes,MDI/ MDIX auto-negotiation mode, and Pause flow control
- Provides performance statistics on all Ethernet lines
- Support multicast IGMP snooping
- Supports the L2 wire speed forwarding
- Supports the AES-128 algorithm for data encryption of downlink data
Specification – BT-PON ONT:
BT-PON Parameters
|
Description
|
|
PON Features
|
ITU-TG.984.x standard
Maximum 20 Km PON transmission distance access 128 terminals for single fiber PON Uplink and downlink triple churning encrypted function with 128Bits ONU terminal legitimacy certification, report illegal ONU registration DBA algorithm, the particle is 1Kbit/s Standard OMCI management function ONU batch software upgrade, fixed time upgrade, real time upgrade PON port optical power detection |
|
L2 Features
|
MAC
|
MAC Black Hole
Port MAC Limit 64K MAC (packet exchange chip cache 2MB, external cache 720 MB ) |
VLAN
|
4K VLAN entries
Port-based/MAC-based/protocol/IP subnet-based QinQ and flexible QinQ (StackedVLAN) VLAN Swap and VLAN Remark PVLAN to realize port isolation and saving public-vlan resources GVRP |
|
Spanning Tree
|
STP/RSTP/MSTP
Remote loop detecting |
|
Port
|
Bi-directional bandwidth control
Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring |
|
Security
Features |
User’s Security
|
Anti-ARP-spoofing
Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binding to the port and MAC address filtering IEEE 802.1x and AAA/Radius authentication |
Device Security
|
Anti-DOS attack(such as ARP, Synflood, Smurf, ICMP attack), ARP
detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP login through Telnet Hierarchical management and password protection of users |
|
Network Security
|
User-based MAC and ARP traffic examination
Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port URPF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user’s physical location Plaintext authentication of OSPF, RIPv2 and BGPv4 packets and MD5 cryptograph authentication |
|
Service Features
|
ACL
|
Standard and extended ACL
Time Range ACL Flow classification and flow definition based on source/destination MAC address, VLAN, 802.1p, ToS, DiffServ, source/destination IP(IPv4/IPv6) address, TCP/UDP port number, protocol type, etc packet filtration of L2~L7 deep to 80 bytes of IP packet head |
QoS
|
Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color
monitor of self-defined flow Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark CAR(Committed Access Rate), Traffic Shaping and flow statistics Packet mirror and redirection of interface and self-defined flow Super queue scheduler based on port or self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR. Congestion avoid mechanism, including Tail-Drop and WRED |
|
IPv4
|
ARP Proxy
DHCP Relay DHCP Server Static Routing RIPv1/v2 OSPFv2 ECMP PBR |
|
Multicast
|
IGMPv1/v2/v3
IGMPv1/v2/v3 Snooping IGMP Filter MVR and cross VLAN multicast copy IGMP Fast leave IGMP Proxy PIM-SM/PIM-DM/PIM-SSM MLDv2/MLDv2 Snooping |
|
Reliability
|
Loop Protection
|
ERRP or ERPS
Loopback-detection |
Link Protection
|
FlexLink (recover-time <50ms)
RSTP/MSTP (recover-time <1s) LACP (recover-time <10ms) BFD |
|
Device Protection
|
VRRP host backup
1+1 power hot backup |
|
Maintenance
|
Network Maintenance
|
Port real-time, utilization and transmit/receive statistic based on Telnet
RFC3176 sFlow analysis LLDP GPON OMCI RFC 3164 BSD syslog Protocol Ping and Traceroute |
Device Management
|
CLI, Console port, Telnet and WEB
SNMPv1/v2/v3 RMON (Remote Monitoring)1,2,3,9 groups MIB NTP network management |
For more: Click here