Planet GRT-101 [9/76] The leds on the front panel indicate the operational status of grt series
![Planet GRT-101 [9/76] The leds on the front panel indicate the operational status of grt series](/views2/1071572/page9/bg9.png)
PLANET Technology Corp. GRT-101/401/402 User’s Manual
Chapter 2 Installation
2.1 Front Panel LEDs
The LEDs on the front panel indicate the operational status of GRT series.
Figure 2-1 GRT-101 Front Panel
Figure 2-2 GRT-401 Front Panel
Figure 2-3 GRT-402 Front Panel
The following table describes the LEDs’ functions:
Table 2-1 GRT-101 LED Functions
LEDs Active Color Description
PWR On Green Power adaptor is connected to GRT-101/GRT-401
LNK On Green SHDSL line connection is established
WAN
ACT On Green Transmit or received data over SHDSL link
10/ACT On Green LAN Speed operates in 10M
LAN
100/ACT On Green LAN Speed operates in 100M
ALM On Red SHDSL connection disconnected
- -
4
Содержание
- G shdsl bridge router p.1
- User s manual p.1
- Grt 101 grt 401 grt 402 p.1
- Revision p.2
- Copyright p.2
- Trademarks p.2
- Planet technology corp grt 101 401 402 user s manual p.2
- Disclaimer p.2
- Ce mark warning p.2
- Table of contents p.3
- Software specifications p.6
- Software features p.6
- Chapter 1 overview p.6
- Atm protocol p.6
- Configuration p.7
- Bridging p.7
- Ppp support p.7
- Routing capability p.7
- Network management p.7
- Hardware specification p.8
- The leds on the front panel indicate the operational status of grt series p.9
- The following table describes the leds functions the following table describes the leds functions p.9
- Table 2 1 grt 101 led functions p.9
- Front panel leds p.9
- Figure 2 3 grt 402 front panel p.9
- Figure 2 2 grt 401 front panel figure 2 2 grt 401 front panel p.9
- Figure 2 1 grt 101 front panel p.9
- Chapter 2 installation p.9
- Rear panel ports p.10
- The connectors on the rear panel provide power lan console and line interfaces p.10
- Table 2 3 connector functions p.10
- Table 2 2 grt 401 grt 402 led functions p.10
- Rear panel connections p.10
- Figure 2 5 grt 401 grt 402 rear panel the following table describes the connectors functions p.10
- Figure 2 4 grt 101 rear panel p.10
- The figure shows the rear panel connections of grt series p.10
- Setting up the hardware environment p.12
- Serial console p.13
- Purpose p.13
- Logon procedure p.13
- Chapter 3 configuration p.13
- Web browser p.14
- Telnet p.14
- Web operation and quick installation guide p.15
- Web operation and quick installation p.15
- Bridge mode p.15
- Web ui configuration p.16
- Sharing p.17
- Routing mode for pppoa and pppoe with ip sharing p.17
- Routing mode for pppoa and pppoe with ip p.17
- Console configuration p.17
- Web ui configuration p.17
- Console configuration p.20
- Web ui configuration p.21
- Routing mode for ipoa or eoa p.21
- Console configuration p.23
- Web ui configuration p.24
- Lan to lan connection with bridge mode p.24
- Stu c cpe side p.26
- Console configuration p.26
- Advanced setup p.27
- Bridge p.29
- With dynamic routing you can enable grt series to automatically adjust to physical changes in the network s layout the cable dsl firewall router using the rip protocol determines the network packets route based on the fewest number of hops between the source and the destination the rip protocol regularly broadcasts routing information to other routers on the network click route to modify the routing information p.30
- To modify the rip routing information protocol parameters rip mode enable auto rip summary enable press modify p.30
- Nat dmz p.32
- Virtual server p.33
- Administration p.34
- Security p.34
- Snmp status enable access right deny for deny all access access right read for access read only access right write for access read and write community it serves as password for p.35
- Simple network management protocol snmp is the protocol not only governing network management but also the monitoring of network devices and their functions grt series can generate snmp traps to indicate alarm conditions and it relies on snmp community strings to implement snmp security this gateway support mib ii click snmp to configure the parameters in the table of current community pool you can setup the access authority p.35
- In the table of current trap host pool in the table of current trap host pool you can setup the trap host press modify to modify the community pool p.35
- Time sync p.36
- Config tool p.37
- Upgrade p.38
- Status p.38
- Restart p.38
- Command line interface p.39
- The following command select cli mode for user profile 1 p.40
- Press ctrl u again in the command line window to back to the menu driven p.40
- Multi level password protection p.40
- For the menu interface there is a method to enable cli mode temporarily for script input by pressing ctrl u simultaneously you can see the cli system prompt in the command line window p.40
- Follow the steps below to change the user interface to select menu driven interface for user profile 1 default user profile enter p.40
- Changes to nonvolatile ram nvram you must work in enable mode follow the steps below to invoke the enable mode p.40
- You are now in enable mode the system prompt appears p.40
- When you login via serial console or telnet grt series defaults to a program execution read only privileges to you to change the configuration and write p.40
- To save your changes enter p.40
- To enable your changes reboot the system p.40
- Interface p.41
- Menu driven command line interface p.41
- Command line menu tree are shown in the following figures all of the configuration commands are placed in the subdirectories of enable protected by supervisor password on the other hand unauthorized user cannot change any configurations but viewing the status and configuration of grt series and using ping command to make sure machine network status p.41
- Command line interface menu tree p.41
- Before applying any changes into machine it is suggested to ensure the modifications and operations in grt series cli menu driven configurations following table is the main cli menu p.41
- To enable and press enter key grt series will prompt for password for enable mode insert p.45
- Message please input the following information supervisor password in this sub menu you can setup management parameters upgrade machine p.45
- Firmware backup and restore system configurations via utility menu p.45
- You can view the system information configuration and configuration in command script by show command p.46
- You can view running system status of shdsl wan route and interface via status command p.46
- To write and press enter p.46
- Status p.46
- You can use user command to clear modify and list the user profile you can setup at most five users to access grt series via console port or telent in user p.47
- User profile p.47
- To write and press enter p.47
- To ping and press enter p.47
- To admin and press enter p.47
- Reboot p.47
- Administration p.47
- You can delete the user by number using clear command if you do not make sure the number of user you can use list command to check it modify command is to modify an old user information or add a new user to user profile p.48
- To user and press enter key p.48
- To snmp and press enter p.48
- To security and press enter the default legal address is 0 it means that there is no restriction of ip to access grt series via telnet p.48
- The supervisor password and id are the last door for security but the most important users who access grt series via web browser console port or telnet have to use the id and password to configure grt series suggest to change the id and password p.48
- Supervisor password and id p.48
- Security p.48
- There are three utility tools upgrade backup and restore embedded in the firmware you can update the new firmware via tftp upgrade tools and backup the configuration via tftp backup tool and restore the configuration via tftp restore tool for upgrade tftp server with the new firmware will be supported by supplier but for backup and restore you must have your own tftp server to backup and restore the file p.49
- If you want to exit the system without saving use exit command to quit system p.49
- Utility p.49
- To sntp and press enter p.49
- To shdsl and press enter p.50
- To setup and press enter p.50
- To mode and press enter p.50
- There are two types of shdsl mode stu r and stu c stu r means the terminal of central office and stu c customer premises equipment grt 402 s link type will be 2 wire or 4 wire mode according to the product p.50
- Wire product can be worked under 2 wire mode you can setup the data rate by the multiple of 64kbps n is from 0 to 32 if you configure n is 0 the product will perform as adaptive mode there are two types of shdsl annex type annex a and annex b clear command can clear crc error count generally you cannot need to change snr margin which range is from 0 to 10 p.51
- To wan and press enter to setup wan1 type 1 p.51
- There are four types of protocols ipoa eoa pppoa and pppoe which is supported by your isp for pppoa and pppoe you do not need to setup ip address and subnet mask there is an unique vpi and vci value for internet connection supported by isp the range of vip is from 0 to 255 and vci from 0 to 65535 there are two types of encapsulation types vc mux and llc you can setup virtual circuit quality of service vc qos using qos command there are two qos class ubr and cbr the peak cell rate can be configured from 64kbps to 2400kbps isp command can configure account name password and idle time idle time are from 0 minute to 300 minutes you can review the wan interface configuration via list command p.51
- You can setup 20 sets of static route in static command p.52
- To route and press enter p.52
- Static static static bridging table p.52
- Ip share p.52
- Gateway default gateway p.52
- For more nat pat and dmz information review nat dmz section p.52
- Bridge p.52
- You can setup default gateway ip via gateway command you can setup default gateway ip via gateway command you can setup 20 sets of static bridge in static command p.52
- To hostname and press enter p.53
- To dns_proxy and press enter p.53
- To default and then press enter p.53
- Host name p.53
- Generic configure generic dhcp parameter p.53
- For more dhcp information review dhcp server section p.53
- Fixed fixed configure fixed host ip address list list show dhcp configuration p.53
- Dns proxy p.53
- Default p.53
- To save changes enter p.54
- To enable your changes reboot the system p.54
- Grt series supports two connection modes bridging and routing currently it comes pre configured with routing mode note that routing mode and bridging mode cannot be used simultaneously to let grt series operate in bridging mode type p.54
- Connection mode p.54
- Bridging mode p.54
- Bridge management p.54
- You can manage grt series using telnet either from lan interface or from wide area network wan interface the following procedure shows how to p.54
- When grt series operates in bridging mode it behaves like a wire connecting a local pc directly to a service provider s network bridge data is encapsulated using the rfc1483 protocol to enable data transport grt series currently supports ieee 802 d transparent learning bridge p.54
- To set grt series operating in routing mode enter p.54
- To save your changes enter p.54
- To list the content of the table use the list command p.55
- To enable your changes reboot the system p.55
- This grt series supports a transparent learning bridge which will establish the bridge table automatically from the incoming data therefore it is unnecessary to setup the static bridge table manually in case you need to arrange the static bridge table see the description below the following commands show how to setup the static bridge table by add command p.55
- The ip address should be an ip address on the same network as that of the far end station the gateway ip address should be the ip address of the far end station that is used to route the lan packets to save your changes enter p.55
- Static bridge table p.55
- Set up grt series for bridging management with ip 192 68 subnet mask 255 55 55 and gateway ip 192 68 54 p.55
- To save your changes enter p.56
- To modify the first entry in the table use the modify command p.56
- To delete the first entry of the table use the delete command p.56
- Routing mode p.56
- Routing is often confused with bridging which performs a similar function the principal difference is that bridging occurs at a lower level mac layer whereas routing occurs at a higher level e g ip layer and because routing occurs at a higher level it can perform more complex analysis to determine the optimal path for the packet grt series supports ip routing which can be static and or ripv1 v2 updating also several applications such as nat pat dhcp server and dns proxy etc are included for lan management and control p.56
- Lan setting p.56
- To setup grt series lan interface with ip address of 192 68 and subnet mask of 255 55 55 use the following command p.56
- To show the configuration use the list command p.57
- To set a default route with gateway of 140 82 54 use the below command p.57
- To save your changes enter p.57
- To enable rip updating with auto summary for routing table type p.57
- Static routing table p.57
- In order to pass data through a network and onto the internet or wan you might need to add the ip addresses of gateways to the static routing table follow the instructions below to build a static routing table manually by adding or deleting entries in the table for example to add a route to network address 140 82 with subnet mask of 255 55 55 via gateway at 140 82 54 p.57
- In general it is not recommended to add multiple entries with the format of default route network address 0 with subnet mask of 0 if there are multiple entries with the format of default route in the static routing table the system will automatically select only one entry to be the default route among these entries with resolvable gateway p.57
- For detailed configuration about ripv1 ripv2 please refer to the on line help message by the following commands p.57
- Nat pat p.58
- To show the configuration use the list command p.59
- To save your changes enter p.59
- Possible when the number of hosts having concurrent requests to the external network is equal to or less than the number of external ip addresses on grt series to setup grt series working for the above situation where wan 1 is used to connect to the corresponding isp use the below commands p.59
- In the above example it might happen that packets from some hosts will be dropped when the number of hosts having concurrent requests to the external network is greater than the number of external ip addresses if it is necessary to guarantee that some hosts e g 192 68 1 192 68 3 can access internet at any time you can use the fixed ip address mapping pool with extra external ip addresses 69 10 69 10 0 also given from isp via wan 1 p.59
- To save your changes enter p.60
- Another function provided by this grt series nat pat is the virtual server mapping specific ports on the wan interface e g wan 1 are re mapped to services inside the lan as only 69 10 e g assigned to wan 1 from isp is visible to the internet but does not actually have any services other than nat off course running on grt series it is said to be a virtual server for example requests with tcp made to 69 10 80 are remapped to the server 1 on 192 68 80 other requests with udp made to 69 10 25 are remapped to server 2 on 192 68 25 to set grt series for the above nat function use p.60
- To show the configuration use the list command p.60
- To save your changes type p.61
- The dhcp server application automatically assigns ip addresses to dhcp clients follow the steps below to enable the dhcp applications the example sets a dhcp server which could service 50 dhcp clients the available ip addresses for dhcp clients are located from 192 68 to 192 68 1 in this example the lan environment is configured with gateway of 192 68 and subnet mask of 255 55 55 the ip address of 168 5 is set as a dns server p.61
- In most applications the value of gateway ip address is the same as the lan ip address of grt series the value of name server ip address should point towards a valid host that provides dns lookup service these parameters should be configured correctly or computers on the lan may not access internet p.61
- Dns proxy p.61
- Dns is the naming system for ip based networks and the naming service that is used to locate computers on the internet a dns proxy receives dns request from computers on the lan translates them into the encoding on dns protocol and forwards to the real dns server to enable the dns proxy please correctly set up the dns proxy so that it can point towards real dns servers on the internet the following example shows you how to setup the ip p.61
- Dhcp server p.61
- Wan and atm virtual connection p.62
- Shdsl operation p.62
- Atm virtual connection p.63
- Where the selectable parameters corresponding to the above atm protocols are ethernet ipoa pppoa and pppoe to disable the pre configured atm vc wan 1 enter p.64
- To review the new configuration you have changed for wan 3 type p.64
- To change the encapsulation from default llc to vc mux for atm vc wan 3 p.64
- The valid ranges for the vpi is from 0 to 255 for the vci it is between 0 and 65535 the following example set the vpi vci 0 135 for atm vc wan 3 p.64
- Llc header of the packet the vc based multiplexing method carries each protocol on a separate atm virtual circuit this method is sometimes used in private networks in which pvc creation is very economical p.64
- For bridging mode operation you should select ethernet over atm rfc 1483 bridged ethernet as the atm protocol for routing mode operation grt series supports ethernet over atm rfc 1483 bridged ethernet ip over atm rfc 1483 routed ip rfc 1577 ppp over atm rfc 2364 and ppp over ethernet rfc 2516 the following example enables the atm vc wan 3 with protocol of ethernet over atm p.64
- To save the new wan port configuration enter p.65
- To review the new configuration you have changed for wan 3 type p.65
- The objectives of atm traffic management are to deliver quality of service qos guarantees for the multimedia applications and provide overall optimization of network resources currently grt series supports two kinds of atm qos service constant bit rate cbr and unspecified bit rate ubr the cbr connection involves a static amount of bandwidth allocated for those applications of video voice and circuit emulation the bandwidth is characterized by the peak cell rate pcr in the configuration the ubr connection allows you to define the pcr too however it has the lowest priority and is with no qos guarantees the range of the pcr is from 64 to 2400kbps to set the class of the atm traffic shaping for wan 3 to cbr with pcr of 512kbps enter p.65
- Atm traffic shaping p.65
- Wan ip address p.66
- To set the wan 3 with ip address of 192 68 and subnet mask of 255 55 55 follow the following example p.66
- To save the new wan port configuration enter p.66
- To review the new configuration you have configured type p.66
- Isp profile for ppp p.66
- To review the new configuration you have configured type p.67
- The pppoa and pppoe protocols are designed based on the concept of p.67
- If your local isp uses protocols of pppoa or pppoe over the atm vc you may need to setup the username and password information provided from your local isp the maximum length of username and password for isp setting is limited to 51 the following command configures the isp profile for wan 3 with username pppoa3 isp com password fuyg47ds and idle timeout of 10 minutes p.67
- Dial on demand each time a request is made from a host on the lan grt series checks the link status of the wan ports and transfers the packets if the link status is active when the link status is not active it performs login procedure with the account information of isp profiles and then transfers the packets if login successfully once the link has been established successfully grt series continuously monitors the traffic over wan links the pppoa or pppoe section will be cut off if there are no packets over the links during the period of idle timeout the valid value for idle timeout is from 0 to 300 minutes the idle timeout of 0 means that the session connects always even there is no traffic over the wan link to save the new wan port configuration enter p.67
- To display specific information for example for the shdsl interface status and performance enter p.68
- These statistics are crc error count the cyclic redundancy check error count attenuation the difference in decibels db between the power level received at the near end versus the power level transmitted from the far end signal to noise snr margin the snr margin represents the amount of increased received signal in decibels relative to the noise power level that the unit is designed to tolerate without disconnecting from the network to display status of wan ports enter p.68
- System status and performance p.68
- Use the status command to display grt series activities to see a list of applications and interfaces that provide status enter p.68
- User profile p.69
- To list active route status currently type p.69
- The following commands add a new user profile 2 test with password 83fdi7s and set the user interface to menu mode p.69
- Grt series comes pre configured with user profile 1 already established that is user admin with password of admin and menu driven user interface the maximum number of user profiles is limited to 5 you can add delete modify or list the user profiles with the commands in the following examples to change anyone of the user name and password you must provide both items together for example to change the password only to 76gu94t for user profile 1 default user name admin enter p.69
- For user profile 1 with password 76gu94t to change the username to titan p.69
- Certainly you can change both user name and password in one command line the maximum length of user name and password is limited to 19 to set the user interface for an existing user profile e g user profile 1 use modify and attrib commands p.69
- You can specify the tcp port number of the telnet server other than the default tcp port number 23 so that telnet access to default port number cannot reach grt series the example below shows you how to setup the telnet tcp port number from default 23 to 47 p.70
- To show all user profiles with attributes type p.70
- To save your changes enter p.70
- The valid range of the telnet port number is between 1 and 65534 to show which tcp port number is set to allow access to grt series type p.70
- Telnet port number p.70
- Since you can manage grt series using telnet and web browser over the network either from lan interface or from wan interface the management security is important that it prevents invalid access to grt series from internet there are extra two levels of protection for grt series telnet and web servers except login password control p.70
- Management security p.70
- Legal client ip p.71
- An empty table means there is not any constraint on the telnet client and web browser ip addresses the example below deletes the first ip entry from the legal ip address pool p.71
- You could assign the legal client ip addresses such that only telnet clients and web browsers at the legal client ip addresses can access grt series the following example specifies a legal ip address 192 68 in the pool p.71
- To save your changes enter p.71
- The maximum number in the legal ip pool is limited to 10 to show how many legal client ip addresses are configured to allow access to grt series enter p.71
- To show the setting of snmp communities with access right type p.72
- To save your changes enter p.72
- To disable the snmp community 1 enter the following command p.72
- The below example adds grt series into a snmp community private with read write access right for snmp managers in the same community p.72
- Snmp support p.72
- Snmp community p.72
- In addition to managing grt series by means of the command line applications and web browsers you can manage the unit by using a simple network management protocol snmp management station grt series can generate snmp traps to indicate alarm conditions and it relies on snmp community strings to implement snmp security currently snmp rfc 1157 and snmpv2c rfc 1901 agents are implemented also the management information bases mibs supported by grt series include mib ii right now p.72
- To disable the snmp trap 1 enter the following command p.73
- Snmp trap p.73
- Remember to backup a copy of your configuration file after you have completed configuration of grt series so you can easily recover it when necessary p.73
- Grt series can generate alarm conditions to snmp manager via snmp traps the following example configures trap 1 with snmpv2c encapsulation the snmp manager is located at 192 68 54 with community private p.73
- Backup configuration p.73
- Backup and restore configuration p.73
- Use show script command to dump the system current configuration in script commands the following is an example p.73
- To show the setting of snmp communities with access right type p.73
- To save your changes enter p.73
- To restore the configuration copy the content of the whole configuration file which was saved according to section 3 7 backup configuration and paste them into the console cli via your telnet program or terminal access program p.74
- Restore configuration p.74
- Before you restore the old configuration back to grt series make sure to clear the whole setting back to the factory defaults first with the following command p.74
- After dumping the configuration use the copy and paste function provided by your terminal access program or telnet program to save it to a text file don t miss any script command line or you would loss part of the configuration p.74
- And reboot the system p.75
- You check the software version of grt series by the command p.75
- Watch the system messages to ensure every command was accepted by the system successfully p.75
- To save your restored configuration and let it take effect enter p.75
- Software upgrade p.75
- If grt series is out of date get the latest version from your service provider by the trivial file transfer protocol tftp the tftp allows you to transfer new software images to upgrade grt series refer to section 3 7 backup configuration to backup a copy of your configuration file before upgrading it so you can easily recover the configuration when necessary the following example shows you how to get a kernel software image from a tftp server 192 68 00 where the image file name is kernel bin p.75
- Be sure to write the new image to nvram and immediately reboot the device to activate it when you log back onto grt series after the reboot then you can use the show system command to verify the version of the new firmware that is active and restore your configuration p.76
Похожие устройства
-
Planet UMG-2000Инструкция по эксплуатации -
Planet ISW-801TИнструкция по эксплуатации -
Planet ISW-800Инструкция по эксплуатации -
Planet ISW-621S15Инструкция по эксплуатации -
Planet ISW-621Инструкция по эксплуатации -
Planet ISW-511S15Инструкция по эксплуатации -
Planet ISW-501TИнструкция по эксплуатации -
Planet ISW-500Инструкция по эксплуатации -
Planet IGS-801TИнструкция по эксплуатации -
Planet IGS-801Инструкция по эксплуатации -
Planet ISW-802MИнструкция по эксплуатации -
Planet ISW-800MИнструкция по эксплуатации




















