PON Features |
IEEE 802.3ah EPON |
China Telecom/Unicom EPON |
Maximum 20 Km PON transmission distance |
Each PON port supports the max. 1:64 splitting ratio |
Uplink and downlink triple churning encrypted function with 128Bits |
Standard OAM and extended OAM |
ONU batch software upgrade, fixed time upgrade, real time upgrade |
PON transmit and inspect receiving optical power |
PON port optical power detection |
L2 Features |
MAC |
MAC Black Hole |
Port MAC Limit |
16K MAC address |
VLAN |
4K VLAN entries |
Port-based/MAC-based/protocol/IP subnet-based |
QinQ and flexible QinQ (StackedVLAN) |
VLAN Swap and VLAN Remark |
PVLAN to realize port isolation and saving public-vlan resources |
GVRP |
Spanning Tree |
STP/RSTP/MSTP |
Remote loop detecting |
Port |
Bi-directional bandwidth control |
Static link aggregation and LACP(Link Aggregation Control Protocol) |
Port mirroring |
Security Features |
User’s Security |
Anti-ARP-spoofing |
Anti-ARP-flooding |
IP Source Guard create IP+VLAN+MAC+Port binding |
Port Isolation |
MAC address binding to the port and MAC address filtering |
IEEE 802.1x and AAA/Radius authentication |
Device Security |
Anti-DOS attack(such as ARP, Synflood, Smurf, ICMP attack), ARP |
detection, worm and Msblaster worm attack |
SSHv2 Secure Shell |
SNMP v3 encrypted management |
Security IP login through Telnet |
Hierarchical management and password protection of users |
Network Security |
User-based MAC and ARP traffic examination |
Restrict ARP traffic of each user and force-out user with abnormal ARP traffic |
Dynamic ARP table-based binding |
IP+VLAN+MAC+Port binding |
L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet |
Port-based broadcast/multicast suppression and auto-shutdown risk port |
URPF to prevent IP address counterfeit and attack |
DHCP Option82 and PPPoE+ upload user’s physical location Plaintext authentication of OSPF, RIPv2 and BGPv4 packets and MD5 |
cryptograph authentication |
IP Routing |
IPv4 |
ARP Proxy |
DHCP Relay |
DHCP Server |
Static Routing |
RIPv1/v2 |
OSPFv2 |
Equivalent Routing |
Routing Strategy |
|
IPv6 |
ICMPv6 |
ICMPv6 Redirection |
DHCPv6 |
ACLv6 |
OSPFv3 |
RIPng |
Configured Tunnels |
ISATAP |
6to4 Tunnels |
Dual stack of IPv6 and IPv4 |
Service Features |
ACL |
Standard and extended ACL |
Time Range ACL |
Flow classification and flow definition based on source/destination MAC address, VLAN, 802.1p, ToS, DiffServ, source/destination IP(IPv4/IPv6) address, TCP/UDP port number, protocol type, etc |
packet filtration of L2~L7 deep to 80 bytes of IP packet head |
QoS |
Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color monitor of self-defined flow |
Priority remark to port or self-defined flow and provide 802.1P, DSCP |
priority and Remark |
CAR(Committed Access Rate), Traffic Shaping and flow statistics |
Packet mirror and redirection of interface and self-defined flow |
Super queue scheduler based on port or self-defined flow. Each port/ |
flow supports 8 priority queues and scheduler of SP, WRR and |
SP+WRR. |
Congestion avoid mechanism, including Tail-Drop and WRED |
Multicast |
IGMPv1/v2/v3 |
IGMPv1/v2/v3 Snooping |
IGMP Filter |
MVR and cross VLAN multicast copy |
IGMP Fast leave |
IGMP Proxy |
PIM-SM/PIM-DM/PIM-SSM |
PIM-SMv6, PIM-DMv6, PIM-SSMv6 |
MLDv2/MLDv2 Snooping |
Reliability |
Loop Protection |
EAPS and GERP (recover-time <50ms) |
Loopback-detection |
Link Protection |
FlexLink (recover-time <50ms) |
RSTP/MSTP (recover-time <1s) |
LACP (recover-time <10ms) |
BFD |
Device Protection |
VRRP host backup |
1+1 power hot backup |
Maintenance |
Network Maintenance |
Port real-time, utilization and transmit/receive statistic based on Telnet |
RFC3176 sFlow analysis |
LLDP |
802.3ah Ethernet OAM |
RFC 3164 BSD syslog Protocol |
Ping and Traceroute |
Device Management |
CLI, Console port, Telnet |
SNMPv1/v2/v3 |
RMON (Remote Monitoring)1, 2, 3, 9 groups MIB |
NTP |
NGBNView network management |