User's Guide
Table Of Contents
- 7368 ISAM ONT G-240W-F Product Guide
- 1 Preface
- Table of contents
- List of figures
- List of tables
- 2 ETSI ONT safety guidelines
- 3 ETSI environmental and CRoHS guidelines
- 4 ANSI ONT safety guidelines
- 5 G-240W-F unit data sheet
- 5.1 G-240W-F part numbers and identification
- 5.2 G-240W-F general description
- 5.3 G-240W-F software and installation feature support
- 5.4 G-240W-F interfaces and interface capacity
- 5.5 G-240W-F LEDs
- 5.6 G-240W-F detailed specifications
- 5.7 G-240W-F GEM ports and T-CONTs
- 5.8 G-240W-F performance monitoring statistics
- 5.9 G-240W-F functional blocks
- 5.10 G-240W-F standards compliance
- 5.11 G-240W-F special considerations
- 6 Install a G-240W-F indoor ONT
- 7 Replace a G-240W-F indoor ONT
- 8 Configure a G-240W-F indoor ONT
- 9 ONT configuration file over OMCI
- Customer document and product support
7368 ISAM ONT G-240W-F Product Guide G-240W-F unit data sheet
Issue: 01 Edition 01 51
5.2.6.1 GRE
Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a
wide variety of network layer protocols inside virtual point-to-point links over an
Internet Protocol network. GRE provides a secure path for transporting packets
through a public network. In essence, GRE creates a private P2P connection, similar
to a VPN, between clients and servers. GRE is the preferred transport mechanism
between the Carrier Wi-Fi access network and the WLAN GW.
GRE works by encapsulating a payload (an inner packet that needs to be delivered
to a destination network) inside an outer IP packet. GRE tunnel endpoints send
payloads through GRE tunnels by routing encapsulated packets through intervening
IP networks. The inner packets are not parsed along the way; only the outer IP
packets are parsed as they are forwarded towards the GRE tunnel endpoint, where
the GRE encapsulation is removed, and the payload is forwarded to its final
destination.
5.2.6.2 Soft GRE
In soft GRE, only one side of the tunnel needs to be configured; the other end learns
the remote IP addresses of all remote tunnel endpoints by examining the incoming
GRE packets.
GRE tunnels can be automatically created when devices attach to the AP,
eliminating the need for each AP to be explicitly provisioned on the WLAN Gateway.
Because this soft GRE is stateless and the tunnel contexts are created based on
need, the WLAN Gateway does not need to maintain states for unused tunnels,
which improves scalability.
The operator can restrict the traffic going through the GRE tunnel based on the
SSIDs or LAN ports.
Figure 14 illustrates the soft GRE architecture.
DRAFT