Home

juma/forsete-ii series user guide

image

Contents

1. AVISO Risco de ferimento nos olhos Ao inspecionar um conector verifique se as fontes luminosas est o desligadas A fonte luminosa usada nos cabos de fibra tica pode causar danos a seus olhos Para evitar que seus olhos sejam atingidos por res duos use culos de seguranca ao trabalhar com lata de ar comprimido Para evitar irritac o dos olhos use culos de seguranca ao trabalhar com lcool isopropilico AVVISO Rischio di lesioni agli occhi Quando si esamina un connettore assicurarsi che le sorgenti di luce siano spente La sorgente di luce utilizzata nei cavi a fibre ottiche potrebbero danneggiare gli occhi Per evitare l accidentale introduzione di detriti negli occhi indossare gli occhiali di sicurezza quando si lavora con un impolveratrice ad aria compressa Per evitare irritazioni oculari da contatto indossare gli occhiali di sicurezza quando si lavora con alcool isopropilico PRODUCT SAFETY Please refer to http dkt dk safety 15
2. 5 Option 54 DHCP Server Identifier Length 4 DHCP Server Identifier 192 168 10 9 192 168 10 9 option 51 IP Address Lease Time Length 4 IP Address Lease Time 1505 2 minutes 30 seconds 5 Option 1 Subnet Mask Length 4 Subnet Mask 255 255 0 0 255 255 0 0 5 Option 3 Router Length 4 Router 192 168 10 9 192 168 10 9 Option 255 End Option End 255 Padding m EE m u 3 CPE reguests in its LINUX Boot up process where configuration file is reguested Option 1 3 6 12 43 54 66 67 Please make sure that DHCP Server responds to these option re guests as it will influence on the booting seguence if these are not correctly answered and may cause inproper booting of the device 22 96 2680340 192 168 10 9 255 255 255 255 DHCP 406 DHCP offer Transaction ID 0x1990fcdb 23 96 2693720 0 0 0 0 255 255 255 255 DHCP 590 DHCP Request Transaction ID 0x1990fcdb 24 96 3450520 192 168 10 9 192 168 10 97 DHCP 406 DHCP ACK Transaction ID 0x1990fcdb Frame 23 590 bytes on wire 4720 bits 590 bytes captured 4720 bits on interface 0 Ethernet II Src Dkt_33 44 55 00 19 9f 33 44 55 Dst Broadcast ff ff ff ff ff ff Internet Protocol Version 4 Src 0 0 0 0 0 0 0 0 Dst 255 255 255 255 255 255 255 255 User Datagram Protocol Src Port 68 68 Dst Port 67 67 Bootstrap Protocol Request Message type Boot Request 1 Hardware type Ethernet 0x01 Hardware address length 6
3. Hops 0 Transaction ID 0x1990fcdb Seconds elapsed 0 Bootp flags 0x0000 Unicast Client IP address 0 0 0 0 0 Your client IP address 0 0 0 0 E 0 0 0 0 0 0 0 Next server IP address 0 0 0 0 0 0 Relay agent IP address 0 0 0 0 0 0 Client MAC address Dkt_33 44 55 00 19 9f 33 44 55 Client hardware address padding 00000000000000000000 Server host name not given Boot file name not given Magic cookie DHCP Option 53 DHCP Message Type Request Length 1 ooo coos ooo DHCP Request 3 5 Option 61 Client identifier Length 7 Hardware type Ethernet 0x01 Client MAC address Dkt_33 44 55 00 19 9f 33 44 55 Option 12 Host Name Length 22 Host Name dktcomega 00199f334455 E Option 60 vendor class identifier Length 30 vendor class identifier DKT_Forsete_Firmware_v20141119 6 Option 43 vendor specific Information Length 10 Value 6d056261736534700130 5 Option 50 Requested IP Address Length 4 Requested IP Address 192 168 10 97 192 168 10 97 Option 54 DHCP Server Identifier Length 4 DHCP Server Identifier 192 168 10 9 192 168 10 9 Option 55 Parameter Request List Length 8 Parameter Reguest List Item 1 Subnet Mask Parameter Reguest List Item 3 Router Parameter Reguest List Item 6 Domain Name Server Parameter Reguest List Item 12 Host Name Parameter Request List Item 43 vendor Specific Information Parameter Request List Item 54 DHCP Server I
4. 2 101 einen Glasfaserleiter oder Verbindungsanschluss Gehen Sie immer davon aus dass Glasfaserkabel mit einer Lichtquelle verbunden sind ADVERTENCIA Riesgo de lesi n en los ojos por l ser El equipo de fibra ptica puede emitir una luz l ser o infrarroja que da e sus ojos Nunca mire un puerto de fibra ptica o conector Siempre asuma que los cables de fibra ptica est n conectados a una fuente de luz AVISO O laser pode causar ferimentos no olho O equipamento de fibra tica pode emitir laser ou luz infravermelha que pode causar danos a sua vista Nunca olhe para dentro da fibra tica ou da porta do conector Tenha sempre em mente que os cabos de fibra tica est o ligados a uma fonte de luz AVVISO Rischio di ustioni agli occhi dovute al laser Le apparecchiature con fibre ottiche possono emettere raggi laser o infrarossi in grado di provocare ferite agli occhi Non guardare mai all interno di una porta di connessione o una fibra ottica Tenere sempre presente che i cavi a fibra ottica sono collegati a una sorgente luminosa 13 DKTCOMEGA 14 Laser eye safety connector inspection warning statement Warning Risk of eye injury When inspecting a connector ensure that light sources are off The light source used in fiber optic cables can damage your eyes AVERTISSEMENT Risques de blessure oculaire Assurez vous que toutes les sources de lumi re ont t d sactiv es avant de proc der au contr le d un conn
5. 6 2693720 0 0 0 0 255 255 255 255 590 DHCP Request Transaction ID 0x1990fcdb 24 96 3450520 192 168 10 9 192 168 10 97 DHCP 406 DHCP ACK Transaction ID 0x1990fcdb 5 00 1 3 5 DS ast Internet Protocol version 4 Src 0 0 0 0 0 0 0 0 Dst 255 255 255 255 255 255 255 255 User Datagram Protocol src Port 68 68 Dst Port 67 67 3 Bootstrap Protocol Discover Message type Boot Request 1 Hardware type Ethernet 0x01 Hardware address length 6 Hops 0 Transaction ID 0x9f33a3d2 Seconds elapsed 24 eae Bootp flags 0x0080 Unicast Client IP address 0 0 0 0 0 0 0 0 Your client IP address 0 0 0 0 0 0 0 0 Next server IP address 0 0 0 0 0 0 0 0 Relay agent IP address 0 0 0 0 0 0 0 0 Client MAC address Dkt_33 44 55 00 19 9f 33 44 55 Client hardware address padding 00000000000000000000 Server host name not given Boot file name not given Magic cookie DHCP Option 43 vendor specific Information Option 53 DHCP Message Type Discover option 57 Maximum DHCP Message Size Option 60 vendor class identifier Option 55 Parameter Request List Length 2 Parameter Request List Item 1 subnet Mask Parameter Request List Item 3 Router m Option 255 End Padding 2 DHCP Server offers in its response Option 53 54 51 1 3 Protocol Length Info 343 DHCP Transaction 0x9f33a3d2 5 1 00149100 192 168 10 97 352 DHCP Transaction 0x9f 33a3d2 6 1 05924900 192 16
6. 8 10 9 192 168 10 97 342 DHCP ACK Transaction ID 0x9f33a3d2 7 1 08169300 192 168 10 97 192 168 10 9 352 DHCP Release Transaction ID 0x9f33a3d2 19 95 26598700 0 0 0 255 255 255 255 590 DHCP Discover Transaction ID 0x1990fcdb 22 96 2680340 192 168 10 9 255 255 255 255 DHCP 406 DHCP Offer Transaction ID 0x1990fcdb 23 96 2693720 0 0 0 0 255 255 255 255 DHCP 590 DHCP Reguest Transaction ID 0x1990fcdb 24 96 3450520192 168 10 9 192 168 10 97 DHCP 406 DHCP ACK Transaction ID 0x1990fcdb Frame 4 342 bytes on wire 2736 bits 342 bytes captured 2736 bits on interface 0 Ethernet II Src Realteks_68 01 4d 00 e0 4c 68 01 4d 051 Dkt 33 44 55 00 19 9f 33 44 55 Internet Protocol version 4 Src 192 168 10 9 192 168 10 9 Dst 192 168 10 97 192 168 10 97 User Datagram Protocol Src Port 67 67 Dst Port 68 68 Bootstrap Protocol offer Message type Boot Reply 2 Hardware type Ethernet 0x01 Hardware address length 6 Hops 0 Transaction ID 0x9f33a3d2 seconds elapsed 24 Bootp flags 0x0080 Unicast Client IP address 0 0 0 0 0 0 0 0 Your client IP address 192 168 10 97 192 168 10 97 Next server IP address 192 168 10 9 192 168 10 9 Relay agent IP address 0 0 0 0 0 0 0 0 Client MAC address Dkt_33 55 00 19 9f 33 44 55 Client hardware address padding 00000000000000000000 Server host name 192 168 10 9 Boot file name not given Magic cookie DHCP option 53 DHCP Message Type offer Length 1 DHCP offer 2
7. ass traffic through the switch engine the switch enable lan command must be provisioned to the device Also telnet daemon must be started with the use of telnetd l bin sh command in the script DHCP Discover vendor class id DKT_B2_firstboot DHCP Offer IP Address firmware info network info DHCP Request parameter list network info file name If DHCP offer doesn t include any firmware file name m then the device will release the IP Address and a 1 continue to next step Linux start up lt DHCP ACK respond parameter list network info etc o gt E TFTP Request file name Q TETP Transfer file name DHCP Release release IP address and boot 4 DHCP Discover vendor class id DKT F2 firmware vXX XX reguest configuration option 66 67 DKT 797xx DHCP Offer IP Address configuration info network info DHCP Server Z gt DHCP Request parameter list network info conf file If DHCP offer end with instead of specific file name 5 then CPE will try to make TFTP Request for 2 DHCP ACK respond parameter list conf file network info etc lt CFG DIR gt dkt config lt MAC gt sh lt CFG DIR gt dkt config lt Hostname gt sh lt CFG DIR gt dkt config lt Model gt sh TFTP Request conf file lt CFG DIR gt dkt config sh TFTP Transfer conf file gt gt gt At device start up configuration is provi
8. dentifier Parameter Request List Item 66 TFTP Server Name Parameter Request List Item 67 Bootfile name B Option 255 End custom configuration When the OS issue a dhcp request a filename of a configuration file can be sent to the device This configuration file is then downloaded by tftp during the boot process and issued instead of the default configuration In this way it is possible to persist settings for each customer by mapping the hardware address of the node and the customer number The server and the filename of the configuration file should be sent in respective tftp server name op tion 66 and bootfile name option 67 from the dhcp server Notice these options are different from the bootfile bootserver used in the bootp response If it is not feasible that the dhcp server distinguish the customer s configurations base on the hardware address an alternative method can be used The dhcp server sends out the name of a generic configura tion This configuration can then include instruction to the node of fetching a node specific configure by tftp where the requested filename is a combination of the node hardware address In the generic configuration script which is common for all devices and that will provisioned during boot up the following instructions can be inserted source etc dhcp vars export WAN_MACADDR ip addr show dev eth0 grep ether cut d f6 tr d tftp g r my_conf WAN MACADDR l
9. e configuration to be saved to flash memory and this will be restore if dhcp service is out save_configuration dhcp option 32 DHCP Option 82 relay feature will be supported in a future release DHCP Relay Agent Information Option 82 is an extension to the Dynamic Host Configuration Protocol DHCP and is defined in RFC 3046 and RFC 3993 DHCP Option 82 can be used to send information about DHCP clients to the authenticating DHCP server DHCP Option 82 can as an example identify the VLAN number port number as well as a customer ID of a client during any IP address allocation When DHCP Option 82 is enabled on the CPE it inserts the per port defined information into the DHCP packets as they pass through the CPE on their way to the DHCP server The DHCP server stores the IP allocation record The CPE will strip off the DHCP reply from the DHCP server so the clients will never see the DHCP option 82 information The DHCP Option 82 information can hold a 32 char string per port Syntax is switch set port dhcp option82 PORT enable Circuit ID Remote ID switch set port dhcp option82 1 1 7DKT 797xx LAN port 1 Client XYZ switch set port dhcp option82 2 1 7DKT 797xx LAN port 2 Client XYZ switch set port dhcp option82 3 1 7DKT 797xx LAN port 3 Client XYZ switch set port dhcp option82 4 1 7DKT 797xx LAN port 4 Client XYZ 1 DHCP Client sends request gt 2 Layer 2 Relay Agent appends 8 3 Opti
10. ecteur La source de lumiere utilis e dans les cables de fibres optiques risque de provoquer des l sions oculaires Translations of Safety Messages WARNUNG Verletzungsrisiko der Augen Achten Sie bei der Kontrolle der Anschl sse darauf dass die Lichtquellen abgeschaltet sind Die fur die Glasfaserkabel verwendeten Lichtquellen k nnen Augenschaden hervorrufen ADVERTENCIA Riesgo de lesiones oculares Cuando inspeccione un conector controle que las fuentes de luz est n apagadas La fuente de luz que utilizan los cables de fibra ptica puede ocasionar da os en la vista AVISO Risco de ferimento nos olhos Ao inspecionar um conector verifique se as fontes luminosas est o desligadas A fonte luminosa usada nos cabos de fibra tica pode causar danos a seus olhos AVVISO Rischio di lesioni agli occhi Quando si esamina un connettore assicurarsi che le sorgenti di luce siano spente La sorgente di luce utilizzata nei cavi a fibre ottiche potrebbero danneggiare gli occhi Connector cleaning safety warning statement Warning Risk of eye injury When inspecting a connector ensure that light sources are off The light source used in fiber optic cables can damage your eyes To avoid getting debris in your eyes wear safety glasses when working with the canned air duster To avoid eye irritation on contact wear safety glasses when working with isopropyl alcohol AVERTISSEMENT Risques de blessure oculaire Connector cleaning sa
11. fety warning statement Installation SFP SFP XFP and OADM Hardware Components September 2012 103 Assurez vous que toutes les sources de lumi re ont t d sactiv es avant de proc der au contr le d un connecteur La source de lumiere utilis e dans les c bles de fibres optiques risque de provoquer des l sions oculaires Pour viter tout risque de projection vers les yeux portez des lunettes de protection lorsque vous utilisez la bombe d poussi rante a air comprim Pour viter tout risque d irritation oculaire portez des lunettes de protection lorsque vous utilisez de Ualcool a 90 WARNUNG Verletzungsrisiko der Augen Achten Sie bei der Kontrolle der Anschl sse darauf dass die Lichtquellen abgeschaltet sind Die fur die Glasfaserkabel verwendeten Lichtquellen konnen Augenschaden hervorrufen Zum Schutz vor Schmutzteilchen tragen Sie eine Schutzbrille wenn Sie mit einem Pressluft Spray arbeiten Zum Schutz vor Augenirritationen tragen Sie eine Schutzbrille wenn Sie mit Isopropanol arbeiten ADVERTENCIA Riesgo de lesiones Cuando inspeccione un conector controle que las fuentes de luz est n apagadas La fuente de luz que utilizan los cables de fibra ptica puede ocasionar da os en la vista Cuando trabaje con el pulverizador de aire envasado utilice gafas de seguridad para evitar el ingreso de residuos en los ojos Utilice gafas de seguridad cuando trabaje con alcohol isopropilo para evitar irritaci n en los ojos
12. gt or using e g Putty application When logged in as Administrator it is not possible to make any changes as you must switch user to root with this command su Now it is possible to run all of the configuration commands and it is possible to change the password of the user with the command passwd lt username gt If password is changed remember save to flash with the save_configuration command When finished type exit to return to the Administrator user To log out type exit again Some configuration commands Start SSH daemon etc init d sshd start Save configuration and SSH secret files to flash save_configuration 10 The sshd script automatically restores password and SSH key files from flash before the SSH daemon is started Procedure for changing SSH password on all CPE units If password for Administrator is to be changed for all CPE s do the following 1 Log into one CPE via ssh 2 change user to root with command su 3 cd etc 4 change password of the CPE 5 Now copy the shadow file to a tftp server typing tftp p 1 shadow r shadow lt TFTP Server IP Address gt This file has to be pushed to all CPE s 6 you can edit CPE s configuration files by inserting the following commands tftp g r shadow 1 tmp shadow lt TFTP Server IP Address gt This will get the shadow file for Administrator from TFTP server and temporarily store this in tmp directory chown root tmp shadow c
13. hange owner of shadow chmod 600 tmp shadow change rights of shadow mv tmp shadow etc move the shadow file to correct directory save configuration save configuration to flash memory now the password is saved locally on each CPE 11 configuration of snmp values SNMP feature will be supported in a future release The following SNMP values can be set by the configuration file SysContact the administrate contact for the network echo syscontact techsupport example com gt gt etc snmp snmpd local conf SysLocation for the location of the system echo syslocation somewhere gt gt etc snmp snmpd local conf SysName the name of the system e g the customer identification echo sysname customerXYZ gt gt etc snmp snmpd local conf Syslog feature will be supported in a future release Support for remote logging via syslog RFC 3164 To start syslog enter the following line in your configuration file syslogd 1 lt log level gt R lt Remote server IP gt The syslog daemon sends logging information in UDP packets port 514 If all IP addresses are handled by the DHCP server then there is also a way that the syslog daemon may be started by the DHCP client echo O logsrv gt tmp dhcp_requests txt etc init d udhcpc restart The daemon will be started by the DHCP client if the log server parameter DHCP option 7 is received in the DHCP response You may control which extra DHCP options that a
14. hcp request with dhcp option 60 set to DKT F2 firmware vXX XX where XX XX is the version number of the firmware When a new node is unpacked from the factory it doesn t contain any firmware and before it can be used in must be updated with the latest revision This mean that when the node is installed at the customer premise it will be reguired to remotely update with firmware before it will be working It is highly recommended to visit www dktcomega com gt support gt firmware for latest boot loader and firmware revision The managed node depends on DHCP negotiation Through this negotiation the firmware ID of the man aged node is exchanged for a configuration file The DHCP server hands out the configuration file depend ing on the firmware ID Uboot A device power up it will start the uboot process The purpose is to validate if the device has the correct firmware image if any and bring it onto the network using DHCP Linux Device OS system This is the main software with full network support and features to use the complete hardware platform The network is configured using DHCP and the system configuration is downloaded using TFTP The first bootp dhcp request from the device can be used to remote upgrade the firmware If a bootfile and a bootserver is given in the bootp response then the file is downloaded via tftp and executed by the device The device is configured to not pass any traffic per default so in order to p
15. juma torsete ii Series user Guide DKTCOMEGA DKTCOMEGA introduction This is the user guide for the DKTCOMEGA 7973x 794xx JUMA Forsete Il Series CPE The series include the following variants 79734 1x 10 100 1000Mbps RJ 45 79741 4x 10 100 1000Mbps RJ 45 SNMP 79742 4x 10 100 1000Mbps RJ 45 SNMP CATV The user guide includes explaination of features supported from firmware revision 05_02 Syntaxes for the individual features are listed in this document please notice if the functionality is not implemented in the revision of the firmware yet it is be marked as feature will be supported in a future release index The boot process of the CPE aa k i neu 3 DHCPS6ECINOS sai i sa i i a ia i i S es a ai 4 Custom CONTI UFAtION i ii ia 0000000 5 Deyice script Command i ii ij lijo ei Rd T REDOOC iki aki O is 8 Save Configuration to flashi naciona cada dnp R i Ranas 8 dhep OPTION BZ 8 SUPPONE a 10 configuration Of SAMP Values s SANA SRRA 12 SVSLOS 12 2 the boot process of the cpe node Boot start up procedure The first time that the device boots it issues a DHCP Discover with dhcp option 60 set to DKT_F2 firstboot The firmware can be downloaded to the unit Alternatively if firmware is present in the device the device issues a d
16. nfiguration is made via TELNET or SSH start switch configuration shell by typ ing conf or diag DKTCOMEGA reboot The device can be accessed via TELNET and is rebooted with the use of reboot command TELNET ac cess must however be configured in the configuration file The following command enables TELNET access from WAN telnetd 1 bin sh SAVE configuration to flash Per default device configuration is provisioned via DHCP at boot and it will be stored in device RAM memory which means that the device would need to have the configuration loaded at every boot Concept is if dhcp service is out the device will restore its latest saved the latest saved configuration is the incident where there is a difference between saved configuration and provisioned configuration Also the CPE will get an ad hoc link local IP address which is an auto configuration algorithm described in the IETF Draft Dynamic Configuration of IPv4link local addresses Procedure is to insert a syntax in the configuration file save_configuration Please note that the syntax save_configuration will be filtered by the device so if you do a cat tmp config sh or cat mnt flash config sh this command is not visible When dhcp service comes back then the device will lease an IP address again but not fetch any new configuration as it will keep its restored configuration until next boot process The following command allows th
17. ntag member 3 Example how to enable double tagging on WAN define SVID for each origin port conf svlan init conf svlan set service port 4 conf svlan create svlan table svid 500 conf svlan create svlan table svid 600 conf svlan create svlan table svid 700 conf svlan set svlan table svid 500 member 0 4 conf svlan set svlan table svid 600 member 1 4 conf svlan set svlan table svid 700 member 2 4 conf svlan set port 0 svid 500 conf svlan set port 1 svid 600 conf svlan set port 2 svid 700 conf svlan set svlan table svid 500 untag member 0 conf svlan set svlan table svid 600 untag member 1 conf svlan set svlan table svid 700 untag member 2 The following command enables TELNET access from WAN telnetd 1 bin sh End of DKT configuration FRRERERARE RRE HARARE RARA RARE RARE R RARE RRA RARE AR RA ARA REA RARE itid device script commands The following commands are supported in the script that will be downloaded to the CPE via TFTP during boot up process This command is used to configure the switch in the unit The command takes one or more of the following parameters with the syntax switch nn or conf diag xx The 79741 742 models have 4 LAN ports whereas 79734 model has 1 LAN port The port outline and port mapping is as follows shown from the front 4 port 79741 742 LAN1 LAN2 LAN3 LAN4 1 2 3 4 Please refer to syntax guide for Command Line Interface to configure VLAN QoS etc parameters Notice co
18. on 82 enabled DHCP Option 82 to client sourced server allocates address packets and stores the Option 82 Information A 4 Layer 2 Relay Agent strips Server sends offer with Option 82 from the offer packet Option 82 echoed and forwards to client to the layer 2 relay agent DKTCOMEGA support tor ssh Please note that support for SSH is available for all DKTCOMEGA CPE platforms except HW revision FE1 0 or earlier HW revision can found via SNMP OID 1 3 6 1 4 1 27304 10 1 0 Alternatively with DKT GENERIC MIB hwVersion 0 HW with values of ERROR or FE1 0 do not support SSH In order to have SSH support please insert the following command in the configuration script SSH daemon is started with the following command etc init d sshd start The CPE is preconfigured with a login for SSH please consult DKTCOMEGA for user name and password The first time the SSH daemon is started two secret key files are generated Please note that it takes a while to generate the secret key files The secret key files are not automati cally stored to flash Save the SSH secret key files to flash using save_configuration in the configuration file Save configuration to flash memory same SSH key is used at every boot save_configuration Now it is possible to log into the CPE as the user Administrator case sensitive through SSH ssh Administrator lt IP address gt or ssh 1 Administrator lt IP address
19. re requested in DHCP option 55 It is done by creating a file tmp dhcp reguests txt containing just one line with a list of request commands to the DHCP client The format of the line is O lt option name gt O lt option name gt The following values for lt option name gt are currently supported Name DHCP Option Description dns 6 Domain name server IP logsrv 7 Log server IP address hostname 12 Hostname of the box domain 15 Domain name serverid 54 DHCP server identifier 12 DKTCOMEGA Laser eye safety warning statement Warning Risk of eye injury by laser Fiber optic eguipment can emit laser or infrared light that can injure your eyes Never look into an optical fiber or connector port Always assume that fiber optic cables are connected to a light source AVERTISSEMENT Risques de blessure oculaire par lumi re laser L quipement de fibres optiques peut mettre une lumiere laser ou infrarouge nuisible a vos yeux Ne regardez jamais en direction de fibres optiques ou d un port connecteur Supposez toujours que les c bles de fibres optigues sont connect s a une source de lumiere WARNUNG Risiko einer Augenverletzung durch Laser Risiko einer Augenverletzung durch Laser Glasfasergerate k nnen Laserstrahlen oder ultraviolettes Licht aussenden das Ihre Augen verletzen kann Schauen Sie nie direkt in Laser eye safety warning statement Installation SFP SFP XFP and OADM Hardware Components September 201
20. sioned automatically Firmware is provisioned by request either at first boot or when applicable Ensures correct device settings and automatically firmware upgrade without user interaction Firmware and configuration are provisioned by the operator DKTCOMEGA dhep settings The CPE requires a dhcp server connected to the fiber WAN port before power on Please refer to Appendix 3 DHCP Settings for example of DHCP settings 1 The device requests in its Uboot DHCP discoverer Option 1 3 wireshark forsete2 linux dhep pcap pcapng Wireshark 1 122 v1 12 2 0 g master 1 File Edit View Go Capture Analyze Statistics Telephony Tools Internals Help cozusmunxoedn s y yliimiaaan mm emn Filter y Expression Clear Apply Save No Time Source Destination Protocol Length Info 1 0 00000000 0 0 0 0 255 255 255 255 343 DHCP Discover Transaction ID 0x9f33a3d2 4 1 00114700192 168 10 9 192 168 10 97 DHCP 342 DHCP Offer Transaction ID 0x9f33a3d2 5 1 00149100 192 168 10 97 255 255 255 255 DHCP 352 DHCP Request Transaction ID 0x9f33a3d2 6 1 05924900 192 168 10 9 192 168 10 97 DHCP 342 DHCP ACK Transaction ID 0x9f33a3d2 7 1 08169300 192 168 10 97 192 168 10 9 DHCP 352 DHCP Release Transaction ID 0x9f33a3d2 19 95 2659870 0 0 0 0 255 255 255 255 590 DHCP Discover Transaction ID 0x1990fcdb 22 96 2680340 192 168 10 9 255 255 255 255 DHCP 406 DHCP offer Transaction ID 0x1990fcdb 23 9
21. tmp config sh TFTP_SERVER save_configuration source tmp config sh Alternatively if DHCP offer in the response instead just end with instead of specific file name then the device will try to make TFTP Reguest for lt CFG DIR gt dkt config lt MAC gt sh lt CFG DIR gt dkt config lt Hostname gt sh lt CFG_DIR gt dkt_config_ lt Model gt sh lt CFG_DIR gt dkt_config sh DKTCOMEGA An example of a configuration file could be the following HRRRRRRRRRRRRRRRRRRRRRRRRRRR RARER RRR RRR DKT configuration Firmware version XX_XX switch enable lan enable LAN ports Example how to create 4 VLANs egress tagged on WAN and untagged on all LANs conf vlan init conf vlan create vlan table vid 100 conf vlan create vlan table vid 200 conf vlan create vlan table vid 300 conf vlan create vlan table vid 400 conf vlan set vlan table vid 100 member 0 4 conf vlan set vlan table vid 200 member 1 4 conf vlan set vlan table vid 300 member 2 4 conf vlan set vlan table vid 400 member 3 4 conf vlan set pvid port 0 100 conf vlan set pvid port 1 200 conf vlan set pvid port 2 300 conf vlan set pvid port 3 400 conf vlan set vlan table vid 100 untag member 0 conf vlan set vlan table vid 200 untag member 1 conf vlan set vlan table vid 300 untag member 2 conf vlan set vlan table vid 400 u

Download Pdf Manuals

image

Related Search

Related Contents

Samsung CTI613GIN Käyttöopas  Samsung UD22B (販売終了) ユーザーマニュアル  Istruzioni per l`uso GB F E I  Samsung AN035FSKLBN1 User Manual      

Copyright © All rights reserved.
Failed to retrieve file