Description
8 PON PORT GPON OLT with 1:128 MAX Splitting Ratio 8 PON PORT GPON OLT FOR FTTH
8 GPON OLT provides 8 downstream GPON ports, 8 uplink GE optical port and 8 GE electrical ports, with an expansion slot, which can access 2 10GE SFP+ ports. The 1U height can be easy installed and maintained to save space.
The G8 adopts the industrial advanced technology, with powerful Ethernet services and QoS feature, supporting SLA and DBA. The splitting ratio up to 1:128, supporting different types of ONU in different networks, minimizing operators' investments.
8 GPON G=8*PON port 8*GE FX+8*GE TX 2*10GE SFP+1NMS+1CONSOLE
PON features
| GPON | Satisfy ITU -T standard TR-101 compliant solution for FTTx OLT applications High splitter rate, each PON port supports 32*ONU ,96*T-CONT Maximum transmission distance of 20KM Support uplink FEC, downlink FEC(Forward Error Correction) ONU identifier authentication :SN /SN+PASSWD Bandwidth allocation mechanism 5 types of T-CONT bandwidth Static Bandwidth Allocation Dynamic Bandwidth Allocation GPON feature parameter 4096 port-IDs per GPON MAC (Downstream and Upstream) 1024 Alloc -IDs per GPON MAC (Upstream ) |
L2 features | MAC | MAC Black Hole Port MAC Limit |
| VLAN | 4K VLAN entries Port-based/MAC-based/IP subnet-based VLAN Port-based QinQ and Selective QinQ (StackVLAN) VLAN Swap and VLAN Remark and VLAN Translate GVRP Based on ONU service flow VLAN add, delete, replace |
| Spanning tree protocol | IEEE 802.1D Spanning Tree Protocol (STP) IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) IEEE 802.1s Multiple Spanning Tree Protocol instances (MSTP) |
| Port | Bi-directional bandwidth control Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring and traffic mirroring |
Security features | User security | Anti-ARP-spoofing Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binds to port and port MAC address filtration IEEE 802.1x and AAA/Radius authentication TACACS+ authentification dhcp anti-attack flood attack automatic suppression ONU isolation control |
| Device security | Anti-DOS attack(such as ARP,Synflood, Smurf, ICMP attack), ARP detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP login through Telnet Hierarchical management and password protection of users |
| Network security | User-based MAC and ARP traffic examination Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding Supports IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port URPF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user's physical location Plaintext authentication of OSPF,RIPv2 and MD5 cryptograph authentication |