Table of Contents
Basic Configuration
Table of Contents
Table of Contents
Basic Configuration............................................................................................................................................................ 1
Table of Contents............................................................................................................................................................... 1
Chapter 1 System Management Configuration................................................................................................................... 1
1.1 File Management Configuration.......................................................................................................................... 1
1.1.1 Managing the file system......................................................................................................................... 1
1.1.2 Commands for the file system................................................................................................................. 1
1.1.3 Starting up from a file manually............................................................................................................... 1
1.1.4 Updating software................................................................................................................................... 2
1.1.5 Updating configuration............................................................................................................................ 3
1.1.6 Using ftp to perform the update of software and configuration................................................................3
1.2 Basic System Management Configuration........................................................................................................... 4
1.2.1 Configuring Ethernet IP Address............................................................................................................. 4
1.2.2 Setting the Default Route........................................................................................................................ 5
1.2.3 Using Ping to Test Network Connection State.........................................................................................5
Chapter 2 Terminal Configuration....................................................................................................................................... 6
2.1 VTY Configuration Overview............................................................................................................................... 6
2.2 Configuration Tasks............................................................................................................................................. 6
2.2.1 Relationship between Line and Interface................................................................................................. 6
2.3 Monitor and Maintenance.................................................................................................................................... 7
2.4 Browsing Logs..................................................................................................................................................... 7
2.5 VTY Configuration Example................................................................................................................................ 7
Chapter 3 SSH Configuration Commands.......................................................................................................................... 8
3.1 Ssh Overview...................................................................................................................................................... 8
3.1.1 SSH Server............................................................................................................................................. 8
3.1.2 SSH Client............................................................................................................................................... 8
3.1.3 Attribute Realization................................................................................................................................ 8
3.2 Configuration Tasks............................................................................................................................................. 8
3.2.1 Configuring the Authentication Method List.............................................................................................8
3.2.2 Configuring Access List........................................................................................................................... 8
3.2.3 Configuring the Authentication Timeout Time.......................................................................................... 9
3.2.4 Configuring the Authentication Retry Times............................................................................................. 9
3.2.5 Configuring the Login Silence Period...................................................................................................... 9
3.2.6 Enabling Encryption Key Saving Function............................................................................................... 9
3.2.7 Enabling SFTP Function........................................................................................................................ 10
3.2.8 Enabling SSH Server............................................................................................................................ 10
3.3 Configuration Example of SSH Server.............................................................................................................. 10
3.3.1 ACL....................................................................................................................................................... 10
3.3.2 Global Configuration.............................................................................................................................. 10
I
Basic Configuration
Chapter 1 System Management Configuration
1.1 File Management Configuration
1.1.1 Managing the file system
The filename in flash is no more than 20 characters and filenames are case
insensitive.
GP3616 OLT is mainly consisted of MSU. As MSU needs IOS, download BIN file to
MSU. Ensure the suffix of the BIN file is .bin. The BIN file name can be arbitrary.
In GP3616 file system, IOS file with the suffix .bin is used for MSU startup. The file
name is arbitrary. BOOTROM will select a bin startup automatically based on the
sequence. tiger.blob file is applied on the PON program of GP3616 board card.
startup-config is the system configuration file; config.db is the ONU configuration
database file; and if index-config is the port mapping configuration file.
1.1.2 Commands for the file system
The boldfaces in all commands are keywords. Others are parameters. The content in
the square brakcet “[ ]” is optional.
Command Purpose
format Formats the file system and delete all data.
dir [filename] Displays files and directory names. The file name in the symbol “[]” means to
display files starting with several letters. The file is displayed in the following
format:
Index number file name <FILE> length established time
delete filename Deletes a file. The system will prompt if the file does not exist.
md dirname Creates a directory.
rd dirname Deletes a directory. The system will prompt if the directory is not existed.
more filename Displays the content of a file. If the file content cannot be displayed by one
page, it will be displayed by pages.
cd Changes the path of the current file system.
pwd Displays the current path.
1.1.3 Starting up from a file manually
monitor#boot flash <local_filename>
1
Basic Configuration
The command is to start an OLT software in the flash, which may contain multiple OLT
softwares.
Description
Parameters Description
local_filename file name in the flash, the user must enter the file name
Example
monitor#boot flash switch.bin
1.1.4 Updating software
User can use this command to download OLT system software locally or remotely to
obtain version update or the custom-made function version.
There are two ways of software update in monitor mode.
1. Through TFTP protocol
monitor#copy tftp flash [ip_addr]
The command is to copy file from the tftp server to the flash in the system. After you
enter the command, the system will prompt you to enter the remote server name and
the remote filename.
Description
Parameters Description
ip_addr Means the IP address of the TFTP server. If this parameter is
not designated, you are prompted to enter the IP address after
the copy command is run.
Example
The following example shows a main.bin file is read from the server, written into the
OLT and changed into the name switch. Bin.
monitor#copy tftp flash
Prompt: Source file name[]?main.bin
Prompt: Remote-server ip address[]?192.168.20.1
Prompt: Destination file name[main.bin]?switch.bin
please wait ...
######################################################################
2
Basic Configuration
######################################################################
######################################################################
######################################################################
######################################################################
#############################################
TFTP:successfully receive 3377 blocks ,1728902 bytes
monitor#
1.1.5 Updating configuration
The OLT configuration is saved as a file, the filename is startup-config. You can use
commands similar to software update to update the configuration.
1. Through TFTP protocol
monitor#copy tftp flash startup-config
1.1.6 Using ftp to perform the update of software and configuration
switch #copy ftp flash [ip_addr]
Use ftp to perform the update of software and configuration in formal program
management. Use the copy command to download a file from ftp server to OLT, also to
upload a file from file system of the OLT to ftp server. After you enter the command, the
system will prompt you to enter the remote server name and remote filename.
copy{ftp:[[[//login-name:[login-password]@]location]/directory]/filename}|
flash:filename>}{flash<:filename>|ftp:[[[//login-name:[login-password]@]location]/
directory]/filename}<blksize><mode><type>
Description
Parameters Description
login-nam Username of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy
command is run.
login-password Password of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy
command is run.
ip_addr IP address of the ftp server If this parameter is not designated,
you are prompted to enter the IP address after the copy
command is run.
active Means to connect the ftp server in active mode.
passive Means to connect the ftp server in passive mode.
3
Basic Configuration
type Set the data transmission mode (ascii or binary)
Example
The following example shows a main.bin file is read from the server, written into the
OLT and changed into the name switch.bin.
switch#copy ftp flash
Prompt:ftp user name[anonymous]? login-nam
Prompt:ftp user password[anonymous]? login-password
Prompt:Source file name[]?main.bin
Prompt:Remote-server ip address[]?192.168.20.1
Prompt:Destination file name[main.bin]?switch.bin
Or
switch#copy ftp://login-nam:[email protected]/main.bin flash:switch.bin
######################################################################
######################################################################
FTP:successfully receive 3377 blocks ,1728902 bytes
switch#
Note:
1) When the ftp server is out of service, the wait time is long. If this problem is
caused by the tcp timeout time (the default value is 75s), you can configure the
global command ip tcp synwait-time to modify the tcp connection time. However,
it is not recommended to use it.
2) When you use ftp in some networking conditions, the rate of data transmission
might be relatively slow. You can properly adjust the size of the transmission
block to obtain the best effect. The default size is 512 characters, which
guarantee a relatively high operation rate in most of the networks.
1.2 Basic System Management Configuration
1.2.1 Configuring Ethernet IP Address
monitor#ip address <ip_addr> <net_mask>
This command is to configure the IPaddress of the Ethernet.,The default IP address is
192.168.0. 1,and the network mask is255.255.255.0.
Description
Parameters Description
4
Basic Configuration
ip_addr IP address of the Ethernet
net_mask Mask of the Ethernet
Example
monitor#ip address 192.168.1.1 255.255.255.0
1.2.2 Setting the Default Route
monitor#ip route default <ip_addr>
This command is used to configure the default route. You can configure only one
default route.
Description
Parameters Description
ip_addr IP address of the gateway
Example
monitor#ip route default 192.168.1.1
1.2.3 Using Ping to Test Network Connection State
monitor#ping <ip_address>
This command is to test network connection state.
Description
Parameters Description
ip_address Stands for the destination IP address
Example
monitor#ping 192.168.20.100
PING 192.168.20.100: 56 data bytes
64 bytes from 192.168.20.100: icmp_seq=0. time=0. ms
64 bytes from 192.168.20.100: icmp_seq=1. time=0. ms
64 bytes from 192.168.20.100: icmp_seq=2. time=0. ms
64 bytes from 192.168.20.100: icmp_seq=3. time=0. ms
----192.168.20.100 PING Statistics----
4 packets transmitted, 4 packets received, 0% packet loss
round-trip (ms) min/avg/max = 0/0/0
5
Basic Configuration
Chapter 2 Terminal Configuration
1.3 VTY Configuration Overview
The system uses the line command to configure terminal parameters. Through the
command, you can configure the width and height that the terminal displays.
1.4 Configuration Tasks
The system has four types of lines: console, aid, asynchronous and virtual terminal.
Different systems have different numbers of lines of these types. Refer to the following
software and hardware configuration guide for the proper configuration.
Line Type Interface Description Numbering
CON(CTY) To log in to the system for
Console 0
configuration.
To connect Telnet, X.25 PAD,
Virtual and
HTTP and Rlogin of synchronous
VTY asynchrono 32 numbers starting from 1
ports (such as Ethernet and serial
us
port) on the system
1.4.1 Relationship between Line and Interface
1. Relationship between Synchronous Interface and VTY Line
The virtual terminal line provides a synchronous interface to access to the system.
When you connect to the system through VTY line, you actually connects to a virtual
port on an interface. For each synchronous interface, there can be many virtual ports.
For example, if several Telnets are connecting to an interface (Ethernet or serial
interface).
Steps for configuring VTY:
(1) Log in to the line configuration mode.
(2) Configure the terminal parameters.
Note: The serial port terminal and telnet terminal may log out the system if they log on
to OLT without any operation within a certain time. The timeout can be configured.
For VTY configuration, refer to the section “VTY configuration example”.
6
Basic Configuration
1.5 Monitor and Maintenance
Runshow line to checkthe VTYconfiguration.
1.6 Browsing Logs
By default, the system will export the logs to the console port.
After the terminal monitor command is set on the telnet line, the logs will be exported
to this line.
By default the logs will not be exported to the cache and cannot be browsed after you
run show log. After you run logging buffer size to set the log cache, you can run show
log to browse the log information.
1.7 VTY Configuration Example
It shows how to cancel the limit of the line number per screen for all VTYs without
more prompt:
config#line vty 0 32
config_line#length 0
32 vty configuration timeout time
Switch_config#line vty 0 31
Switch_config_line#exec-timeout 10
Switch_config_line#exit
Switch_config#
7
Basic Configuration
Chapter 3 SSH Configuration Commands
3.1 Ssh Overview
3.1.1 SSH Server
SSH client can provide a secure and encrypted communication link through SSH
server and other devices. This connection has the same functions as those of Telnet.
SSH server supports the following encryption algorithms: des, 3des and blowfish.
3.1.2 SSH Client
SSH client runs on the basis of the SSH protocol, providing authentication and
encryption. Due to the application of authentication and encryption, SSH client ssh
client allows to establish secure communication in unsecure network environment
between our’s communication devices or between other devices that support ssh
server. SSH client supports the following encryption algorithms: des, 3des and
blowfish.
3.1.3 Attribute Realization
SSH server and SSH client support SSH 1.5. Both of them supports the shell
application.
3.2 Configuration Tasks
3.2.1 Configuring the Authentication Method List
SSH server adopts the login authentication mode. SSH server uses the default
authentication method list by default.
In global configuration mode, the following command can be used to configure the
authentication method list.
Command Purpose
ip sshd auth-method STRING Configure the authentication method list.
The length of the authentication method's
name is no more than 20 characters.
3.2.2 Configuring Access List
In order to control SSH server to access other devices, you can configure ACL for SSH
server.
8
Basic Configuration
In global configuration mode, the following command can be used to configure the
timeout time.
Command Purpose
ip sshd access-class STRING Configures ACL. The length of the access list's
name is no more than 19 characters.
3.2.3 Configuring the Authentication Timeout Time
After SSH client connects SSH server successfully, the SSH server will close the
connection if the authentication cannot be passed during the configured time.
In global configuration mode, the following command can be used to configure the
authentication timeout.
Command Purpose
ip sshd timeout <60-65535> Configure the authentication timeout time.
3.2.4 Configuring the Authentication Retry Times
If the times for failed authentications exceed the maximum times, SSH server will not
allow you to retry authentication and the system enters the silent period. The maximum
times for retrying authentication is 6 by default.
In global configuration mode, the following command can be used to configure the
authentication retry times.
Command Purpose
ip sshd auth-retries <0-65535> Configures the authentication retry times.
3.2.5 Configuring the Login Silence Period
The system enters in the silent period when the authentication retry times exceed the
threshold. The silence period is 60s by default.
In global configuration mode, the following command can be used to configure the
silence period.
Command Purpose
ip sshd silence-period <0-3600> Configures the login silence period
3.2.6 Enabling Encryption Key Saving Function
Enable ssh server and the initial encryption key needs to be calculated. The process
may take one to two minutes. When enabling the encryption key saving function, the
initial encryption key is saved in the flash. When enabling ssh server in a second time,
the encryption key will be read first.
9
Basic Configuration
sftp function is disabled by default. Use the following command to enable sftp function
in global configuration mode:
Command Purpose
ip sshd save Enable encryption key saving function.
3.2.7 Enabling SFTP Function
The SFTP function refers to the secure file transmission system based on SSH, of
which the authentication procedure and data transmission are encrypted. Though it
has low transmission efficiency, network security is highly improved.
SFTP function is disabled by default. Run following command to enable SFTP function
in global configuration mode.
Command Purpose
ip sshd sftp Enable sftp function.
3.2.8 Enabling SSH Server
Ssh server is disabled by default. WHEN SSH server is enabled, a RSA key pair will be
generated and then listens the connection request from SSH client. The whole process
probably requires one or two minutes.
The following command can be used in global configuration mode to enable SSH
server:
Command Purpose
ip sshd enable Enable SSH server. The digit of the password
is 1024.
3.3 Configuration Example of SSH Server
The following configuration allows the host whose IP is 192.168.20.40 to access SSH
server, while the local user database will be used to authenticate the user.
3.3.1 ACL
ip access-list standard ssh-acl
permit 192.168.20.40
3.3.2 Global Configuration
aaa authentication login ssh-auth local
ip sshd auth-method ssh-auth
ip sshd access-class ssh-acl
ip sshd enable
10
Basic Configuration
11