Hello, everyone!
Today, I will continue to explain a new topic – GPON OLT basic operations. In previous articles, I have outlined the in-bound and out-bound management configuration process. It will now first show the commands for displaying and verifying these configurations, and then start the new and final article from device management security. Let’s get started.
Querying related configurations
The next commands are commands for checking the IP address of the device:

The first command is a universal command for displaying all IP interfaces. We use this command when we want to check the IP configuration and interface statistics. With this command, we get a lot of information, such as the number of packets, bytes, and multicast and broadcast packets. The next two commands are commands for displaying the IP address of the device – meth 0 and vlanif 4000.
The next command is a command for checking the out-bound management address:

With this command, we can see detailed information about interface meth 0. We can check the status of meth0 and link layer protocol, description, maximum transmission unit, IP address, and many information about the IP packet.
The command for checking the in-bound management address:

This is the same command as the previous command. We can see detailed information about interface vlanif 4000. We see information such as the current status of vlanif4000 and the link-layer protocol, description, the maximum transmission unit, the IP address of the interface, and information about the IP packet.
Device management security
At the end of this article, I will start a new topic and that is device management security. There are several ways to prevent unauthorized access to the device, and these are:
enable and setting the firewall,
setting the ACL (Access Control List), and
setting access mode and network segment.
It is very important to use at least one of these methods of protection against unauthorized access. There are situations where two or even all three modes of protection are required. I will discuss more of these ways of protection in the following article.
This is the end of this article. I will explain this topic in the next article >> GPON OLT Basic Operations(10).
Thank you!

