Product Details:
|
Product Name: | 8 Ports EPON OLT | Power Supply: | AC110~220V |
---|---|---|---|
Pon Port: | 8 | Application: | FTTH FTTB FTTX Network |
Distance: | 20km | Material: | Metal |
High Light: | 8 Port EPON OLT,8 Gigabit Ethernet Ports EPON OLT,8 Port olt optical line terminal |
8 Ports Epon Olt 8 Gigabit Ethernet Ports + 4 10G Uplink Ports L3
Features
Technical specification
Parameter | Specification |
Switching Capacity | 128Gbps |
Forwarding Capacity(Ipv4/Ipv6) | 95.23Mpps |
Service Port | 4*PON port, 4*10GE/GE SFP+8GE |
Redundancy Design | Built-in double power supply, including AC, double DC, AC+DC, single AC, single DC |
Power Supply | AC: input100~240V 47/63Hz; DC: input36V~75V |
Power Consumption | ≤45W |
Dimensions | 440mm×44mm×311mm (Width x Depth x Height) |
Weight (Full-Loaded) | ≤3kg |
Service Features
Parameter | Specification | |
PON Features
|
IEEE 802.3ah EPON China Telecom/Unicom EPON Maximum 20 Km PON transmission distance Each PON port supports the max. 1:64 splitting ratio Uplink and downlink triple churning encrypted function with 128Bits Standard OAM and extended OAM ONU batch software upgrade, fixed time upgrade, real time upgrade PON transmit and inspect receiving optical power PON port optical power detection |
|
L2 Features | MAC Black Hole; Port MAC Limit; 16K MAC address | |
4K VLAN entries Port-based/MAC-based/protocol/IP subnet-based QinQ and flexible QinQ (StackedVLAN) VLAN Swap and VLAN Remark PVLAN to realize port isolation and saving public-vlan resources GVRP |
||
STP/RSTP/MSTP; Remote loop detecting | ||
Bi-directional bandwidth control Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring |
||
Security Features |
User’s Security |
Anti-ARP-spoofing ; Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binding to the port and MAC address filtering IEEE 802.1x and AAA/Radius authentication |
Device Security |
Anti-DOS attack(such as ARP, Synflood, Smurf, ICMP attack), ARP detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP login through Telnet Hierarchical management and password protection of users |
|
IP Routing | IPv4 |
ARP Proxy; DHCP Relay; DHCP Server Static Routing; RIPv1/v2; OSPFv2; BGPv4 Equivalent Routing; Routing Strategy |
IPv6 |
ICMPv6; ICMPv6 Redirection; DHCPv6; ACLv6 OSPFv3; RIPng; BGP4+; Configured Tunnels ISATAP; 6 to4 Tunnels; Dual stack of IPv6 and IPv4 |
|
Service Features
|
ACL |
Standard and extended ACL Time Range ACL Flow classification and flow definition based on source/destination MAC address, VLAN, 802.1p, ToS, DiffServ, source/destination IP(IPv4/IPv6) address, TCP/UDP port number, protocol type, etc packet filtration of L2~L7 deep to 80 bytes of IP packet head |
QoS |
Rate-limit to packet sending/receiving speed of port or self-defined flow and provide general flow monitor and two-speed tri-color monitor of self-defined flow Priority remark to port or self-defined flow and provide 802.1P, DSCP priority and Remark CAR(Committed Access Rate), Traffic Shaping and flow statistics Packet mirror and redirection of interface and self-defined flow Super queue scheduler based on port or self-defined flow. Each port/ flow supports 8 priority queues and scheduler of SP, WRR and SP+WRR. Congestion avoid mechanism, including Tail-Drop and WRED |
|
IGMPv1/v2/v3; IGMPv1/v2/v3 Snooping; IGMP Filter;IGMP Fast leave; IGMP Proxy; MVR and cross VLAN multicast copy PIM-SM/PIM-DM/PIM-SSM; PIM-SMv6, PIM-DMv6, PIM-SSMv6; MLDv2/MLDv2 Snooping |
||
Reliability |
EAPS and GERP (recover-time <50ms) Loop back-detection |
|
FlexLink (recover-time <50ms);RSTP/MSTP (recover-time <1s) LACP (recover-time <10ms);BFD |
||
VRRP host backup ;1+1 power hot backup | ||
Maintenance |
Port real-time, utilization and transmit/receive statistic based on Telnet LLDP; 802.3ah Ethernet OAM; |
|
CLI, Console port, Telnet and WEB SNMPv1/v2/v3; RMON (Remote Monitoring)1, 2, 3, 9 groups MIB; NTP |
Contact Person: Doris Yao
Tel: 18872915494