FTTH VLAN OLT GPON 10GE 16 PON Ports GPON OLT with OP3616
Product Overview
OP3616 provides 16 downlink GPON port, 8 *GE combo port or 2* 10G SFP+ port. Single PON port can manage 128 ONUs, one pcs OP3616 max to 2048 ONUs. The height is only 1U for easy installation and space saving. OP3616 is suitable for Broadcast three in one, video surveillance network, enterprise LAN, Internet of Things, etc.FTTH network.
Product Features:
Item |
| |
pon features
| ITU-TG.984.x standard Maximum 20 Km PON transmission distance Each PON port access 128 ONU and 1K T-CONT Uplink and downlink triple churning encrypted function with 128Bits Support of five types T-CONT bandwidth profile ONU terminal legitimacy certification, report illegal ONU registration Support of multiple ONU authentication mechanism: SN, Password, SN plus Password, Loid, LoidPassword. Support of ranging and logical distance configuration Support of upstream and downstream FEC enabling/disabling DBA algorithm, the particle is 1Kbit/s Standard OMCI management function ONU batch software upgrade, fixed time upgrade, real time upgrade PON port optical power detection | |
L2 Features | MAC | MAC Black Hole Port MAC Limit 64K MAC (packet exchange chip cache 2MB, external cache 720 MB ) |
VLAN |
Port-based/MAC-based/protocol/IP subnet-based Support of QinQ based on port or service flow Support of VLAN add, remove, translate and transparent per ONU service PVLAN to realize port isolation and saving public-vlan resources GVRP | |
Spanning Tree |
Remote loop detecting | |
Port |
Static link aggregation and LACP(Link Aggregation Control Protocol) Port mirroring and traffic mirroring | |
Security Features | User’s Security |
Anti-ARP-flooding IP Source Guard create IP+VLAN+MAC+Port binding Port Isolation MAC address binding to the port and MAC address filtering IEEE 802.1x and AAA/Radius authentication |
Device Security |
detection, worm and Msblaster worm attack SSHv2 Secure Shell SNMP v3 encrypted management Security IP login through Telnet Hierarchical management and password protection of users | |
Network Security |
Restrict ARP traffic of each user and force-out user with abnormal ARP traffic Dynamic ARP table-based binding IP+VLAN+MAC+Port binding L2 to L7 ACL flow filtration mechanism on the 80 bytes of the head of user-defined packet Port-based broadcast/multicast suppression and auto-shutdown risk port URPF to prevent IP address counterfeit and attack DHCP Option82 and PPPoE+ upload user’s physical location Plaintext authentication of OSPF, RIPv2 and BGPv4 packets and MD5 cryptograph authentication |
FAQ
Q1. ZISA product the quality of products.
A: As the top class total solution provider and productive service provider, we provide high quality of service to Tier1 Telco customer and Vendors. With the genius design and software customization expertise, we can leverage the best service to our customers. ZISA Product quality is same as Huawei and ZTE, and ZISA has complete product line.
Flexible , Smart and selective producing system, the top manufacture in vertical career choose our team, with decade of global market and professional experience.
Q2. ZISA after-sales service.
A:ZISA has complete software and hardware research and development. Provide reqiurment development, bug modify and 24h on-line support. For significant customers, ZISA can send technician to support.
Q3. Ways of cooperation with ZISA.
A :ZISA welcome integrator or agent to agent ZISA product. If agent has enough advantages in the market, ZISA appoint you ZISA sole agent.
Q4. About factory visit.
A :ZISA welcome significant customers to visit ZISA factory. Please make an appointment in two weeks.
Q5. About product pricing.
A :ZISA only publish sample price. The price of different agent and OEM customer is secret. ZISA gives specific price for significant projects and customers. Besides, ZISA only provide goods to agent in agent area.