Professional Documents
Culture Documents
GL5600-08P User Manual
GL5600-08P User Manual
XXXX
Tel: (86)
Fax: (86)
URL:
Email:
www.fineprint.cn
Page 1 of 19
www.fineprint.cn
Page 2 of 19
Document Title
Product Version
Documen
t Revision
Number
1.0
Evaluate this
Presentation:
document
Fair
Average
Poor
Accessibility:
(Contents, index, headings, numbering)
Good
Fair
Average
Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your suggestions
Fair
Average
Poor
to improve the
Improve introduction
document
Improve Contents
Improve arrangement
Include images
Improve index
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 19
Contents
Contents ............................................................................................................................... 4
Chapter 1 Logging in Ethernet Switch .............................................................................. 5
1.1 Set up Configuration Environment via Console Port ................................................ 5
1.2 Set up Configuration Environment through Telnet.................................................... 6
1.2.1 Connect PC to Ethernet Switch through Telnet .......................................... 6
1.2.2 Telnet Ethernet Switch through Ethernet Switch ......................................... 7
Chapter 2 Command Line Interface .................................................................................. 9
2.1 Introduction of Command Line Interface................................................................... 9
2.2 Command Line Configuration Mode .......................................................................... 9
2.3 Feature and Functions of Command Line ............................................................... 11
2.3.1 Help of Command Line .............................................................................. 11
2.3.2 Displaying Characteristics of Command Line.............................................. 12
2.3.3 Show history Command of Command Line ............................................... 13
2.3.4 Common Command Line Error Messages .................................................. 13
2.4 Symbols in Command ............................................................................................... 13
2.5 Parameter in command ............................................................................................ 14
Chapter 3 Manage Users ................................................................................................. 14
3.1 System Default User.................................................................................................. 15
3.2 Users Authentication ................................................................................................ 15
3.3 Local Authentication Configuration ........................................................................... 15
3.3.1 Add Users .................................................................................................. 15
3.3.2 Change Password ....................................................................................... 16
3.3.3 Modify User's Privilege Level ..................................................................... 16
3.3.4 Delete User ................................................................................................ 17
3.3.5 Show Users ................................................................................................ 17
3.4 Remote Authentication Configuration ....................................................................... 18
3.4.1 Configure RADIUS to Be Remote Authentication Server ........................... 18
3.4.2 Configure TACACS+ Remote Authentication ............................................... 19
www.fineprint.cn
Page 4 of 19
Console port
Console cable
Figure 1-1 Set up the local configuration environment via the Console port
Step 2: Run terminal emulator (such as Hyper Terminal on Windows 9X/2000/XP/Vista) on the
Computer. Set the terminal communication parameters as follows: Set the baud rate to 9600,
data bit to 8, parity check to none, stop bit to 1, flow control to none and select the terminal
type as auto-detection.
www.fineprint.cn
Page 5 of 19
Step 3: The Ethernet switch is powered on. Display self-test information of the Ethernet switch
and prompt you to press Enter to show the command line prompt such as < > after you have
entered the correct username and password. The initial username is admin and the matched
password is admin. It is suggested modifying the initial password after the first logging in. Please
remember the modified password. If the password is forgotten, please contact us as soon as
possible. Modify password refers to Change password.
Step 4: Input a command to configure the Ethernet switch or Configuration Mode the operation
state. Input a ? to get an immediate help. For details of specific commands, refer to the
following chapters.
www.fineprint.cn
Page 6 of 19
Step 1: Authenticate the Telnet user via the Console port before the user logs in by Telnet.
Step 2: To set up the configuration environment, connect the Ethernet port
of the PC to that of the Ethernet switch via the LAN.
Workstation
Ethernet port
Ethernet
Serv er
Step 3: Run Telnet on the PC and input the IP address of the VLAN connected to the PC port.
Step 4: The terminal displays Username (1-32 chars): and prompts the user
to input the login username and password. After you input the correct username and
corresponded password, it displays the command line prompt (such as < >). If the prompt Too
many users! appears, it indicates that too many users are connected to the Ethernet through the
Telnet at this moment. In this case, please reconnect later. At most 5 Telnet users are allowed to
log in to the series Ethernet Switches simultaneously. Default username is admin and the
password is admin. If the default password has been modified, it requires the modified password.
Step 5: Use the corresponding commands to configure the Ethernet switch orto monitor the
running state. Enter ? to get the immediate help. For details of specific commands, refer to the
following chapters.
& Note:
When configuring the Ethernet switch via Telnet, do not modify the IP address of it
unnecessary, for the modification might cut the Telnet connection.
www.fineprint.cn
Page 7 of 19
PC
Telnet Client
Telnet Server
Step 1: Configure IP address for the switch (that is Telnet Client in Figure 2-1). The way to
configure switch via console refers to Set up Configuration Environment via the Console Port; the
way to configure ip address of switch refers to 03 using ip address command in VLAN interface
mode).
Step 2: The user logs in the Telnet Client (Ethernet switch). For the login process, refer to the
section describing Telnet PC to Ethernet Switch.
Step 3: Perform the following operations on the Telnet Client:
#telnet A.B.C.D (A.B.C.D is the IP address of the Telnet Server.)
Step 4: Enter the preset login password and you will see the prompt such < >. If the prompt Too
many users! appears, it indicates that too many users are connected to the Ethernet through the
Telnet at this moment. In this case, please connect later.
Step 5: Use the corresponding commands to configure the Ethernet switch or Configuration
Mode it running state. Enter ? to get the immediate help. For details of specific commands,
refer to the following chapters.
www.fineprint.cn
Page 8 of 19
CLI mode
Symbols in command
Parameters in command
www.fineprint.cn
Page 9 of 19
Function
Prompt
Command to enter
Command to exit
Switch>
exit disconnects
to the switch
Switch#
exit returns to
user mode; quit
disconnects to
the switch
Mode
User Mode
Privileged mode
Global
Configuration
Mode
Configure
system
parameters
Switch(conf
ig)#
Interface
Configuration
Mode
Configure
Interface
parameters
Switch(conf
ig-if-ethern
et-0/0/1)
VLAN
Configure
Switch(conf
Key in configure
terminal in privileged
Mode
Key in interface
ethernet 0/0/1 in
global Configuration
Mode
Key in vlan 1 in system
www.fineprint.cn
Page 10 of 19
Function
Prompt
Command to enter
Command to exit
VLAN
parameters
ig-if-Vlan)#
Configuration Mode
Create domain
Switch(conf
ig-aaa)#
privileged mode;
quit disconnects
to the switch
Configure
RADIUS server
parameters
Switch(conf
ig-radius-d
efault)#
Configure
domain
parameters
Switch(conf
ig-aaa-test.
com)#
Switch(conf
ig-if-vlanInt
erface-22)#
Key in interface
vlan-interface 22 in
global configuration
mode
Mode
Configuration
Mode
AAA
Configuration
Mode
RADIUS
Configuration
Mode
Domain
Configuration
Mode
SuperVLAN
interface
Configuration
Mode
Configure IP
interface
parameters for
a VLAN or a
VLAN
aggregation
Configure
Supervlan
interface
parameters
PIM Configuration
Mode
Configure PIM
parameters
RIP Configuration
Mode
OSPF
Configuration
Mode
Configure RIP
parameters
Configure
OSPF
parameters
VLAN interface
Configuration
Mode
Switch(conf
ig-if-superV
LANInterfac
e-1)#
Switch(conf
ig-router-pi
m#
Switch(conf
ig-router-os
pf#
Key in interface
supervlan-interface 1
in global configuration
mode
Key in pim in global
configuration mode
exit returns to
privileged mode
and end returns
to AAA
configuration
mode; quit
disconnects to
the switch
end returns to
privileged mode
exit returns to
global
configuration
mode and quit
disconnects to
the switch
Switch>help
System mode commands:
cls
clear screen
www.fineprint.cn
Page 11 of 19
Abbreviated-comm
and-entry?
Switch(config)#interf?
interface
Switch>?
System mode commands:
cls
clear screen
command?
Switch(config)#spanning-tree ?
forward-time config switch delaytime
hello-time
max-age
agingtime
command
List
the
associated
keyword?
priority
<enter>
Switch(config)#spanning-tree
forward-time ?
INTEGER<4-30>
switch
delaytime:
<4-30>(second)
& Note:
To switch to the Chinese display for the above information, perform the terminal language
{chinese | english} command in privileged mode.
www.fineprint.cn
Page 12 of 19
Key or Command
Function
Key
Result
& Note:
Cursor keys can be used to retrieve the history commands in Windows 9X/2000/XP
Terminal and Telnet.
Causes
Cannot find the command.
Unrecognized command
Incomplete command
Ambiguous command
www.fineprint.cn
Page 13 of 19
Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an
optional element.
Interactive examples use these conventions:
Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
www.fineprint.cn
Page 14 of 19
Command
Description
enable
config terminal
username
username
privilege
www.fineprint.cn
Page 15 of 19
show username
exit
& Note:
Username: it means the name of the user to be added which must be 1 to 32
printable characters without '/',':','*','?','\\','<','>','|','"'.
Level: means the priority of the user to be added which is the number between 0
and 15. 0 and 1 mean the normal user and 2 to 15 mean the administrator.
encryption-type: it can be 0 or 7. 0 means clear text and 7 means encrypted text
(not supported now).
privilege it can be 0, 1 or 2 to 15. 0 and 1 mean normal users while 2 to 15 mean
administrators.
Password: the login password of new-added user which is 1 to 16 characters.
If the user's privilege level is not specified, it will default to be normal user. There is
up to 8 users in the system.
Caution: Case-sensitive is for password but not username.
Example:
!Create administrator "XXXX" with its password being 1234 and privilege level is 3
Switch(config)#username XXXX privilege 3 password 0 1234
Command
Description
username change-password
exit
3
copy running-config startup-config
Save the configuration
Example:
!Change the password of user "XXXX" to be 123456
Switch(config)#username change-password
please input you login password : ******
please input username :XXXX
Please input user new password :******
Please input user comfirm password :******
change user XXXX password success.
www.fineprint.cn
Page 16 of 19
Command
Description
show username
Check configuration.
exit
& Note:
Username: means the name of the existed user to be modified which must be 1 to
32 printable characters without '/',':','*','?','\\','<','>','|','"'. If the entered username
is not existed, add it to be the new one.
Level: means the priority of the existed user (except the Super-administrator) to be
modified which is the number between 0 and 15. 0 and 1 mean the normal user
and 2 to 15 mean the administrator.
Caution: Case-sensitive is for password but not username.
Example:
!Modify the privilege of the existed user "XXXX" to be 1 and its password to be 1234
Switch(config)#username XXXX privilege 0 password 0 1234
Command
Description
no username username
Delete user.
show username
Check configuration.
exit
& Note:
Username: means the name of the user to be deleted.
When deleting a user which is used, it will be disconnected before delete it.
Example:
!Delete user "XXXX"
Switch(config)#no username XXXX
www.fineprint.cn
Page 17 of 19
Step
Command
Description
show username
show users
Command
Description
configure terminal
Selected
If local is configured, it
means
local
authentication is used if
authentication
[local]
remote
authentication
failed.
By default, it is local
authentication
Enter AAA configuration
mode
aaa
and
{primary-acct-ip | primary-auth-ip }
authentication/accounting
A.B.C.D
RADIUS
RADIUS server
authentication port }
accounting
port
server.
Configure shared-key of
authentication/accounting
RADIUS server
Show configuration
Selected
{acct-secret-key|
auth-secret-key}
key
should
be
show muser
Shared-key
www.fineprint.cn
Page 18 of 19
Command
Description
Selected
If localis
configured, it
means local
Enable TACACS+
authorization/accounting
[local]|local}
authentication is
used if remote
authentication
failed.
By default, it is
local
authentication
Selected
Configure IP/shared-key/TCP
By default, TCP
port/timeout of TACACS+
port is 49 and
remote server
[timeout timevalue]
timeout is5
seconds.
show tacacs+
show muser
www.fineprint.cn
Page 19 of 19
Ethernet PortConfiguration
www.fineprint.cn
Page 1 of 19
Ethernet PortConfiguration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX
Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document.
Please address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 19
Ethernet PortConfiguration
Contents
Chapter 1 Ethernet Port Configuration .................................................................. 4
1.1 Ethernet Port Overview ................................................................................................. 4
1.1.1 Link Type of Ethernet Ports ................................................................................ 4
1.1.2 Configuring Default VLAN ID for an Ethernet Port ............................................. 4
1.1.3 Handling Packets ................................................................................................ 4
1.2 Configure Ethernet Port ................................................................................................ 5
1.2.1 Basic Ethernet Port Configuration ...................................................................... 5
1.2.2 Combo Port....................................................................................................... 11
1.2.3 Enable/Disable Ingress Filtering ....................................................................... 11
1.2.4 Acceptable-Frame Type for Ethernet Port ........................................................ 12
1.2.5 Enable/Disable Flow Control for Ethernet Port ................................................. 13
1.2.6 Display and Debug Ethernet Port ..................................................................... 14
www.fineprint.cn
Page 3 of 19
Ethernet PortConfiguration
Access: An access port only belongs to one VLAN, normally used to connect user
device.
Trunk: A trunk port can belong to more than one VLAN. It can receive/send packets
from/to multiple VLANs and is generally used to connect another switch. The packet sent
from this port can only be with tag label.
Hybrid: A hybrid port can belong to multiple VLANs, can receive, or send packets for
multiple VLANs, used to connect either user or network devices. It allows packets of
multiple VLANs to be sent with or without the tag label
Port
Ingress
type
Untagged
Egress
Tagged packet
www.fineprint.cn
Page 4 of 19
Ethernet PortConfiguration
packet
Access
Receive it
If VID of the
port
packet is equal
with VID
to the port
Hybrid
being equal
permitted VID,
port
to PVID.
receive it; if
VID is different,
discard it.
Trunk
port
Combo port
www.fineprint.cn
Page 5 of 19
Ethernet PortConfiguration
Step
Command
Description
configure terminal
1
mode.
interface ethernet
{ device-num/slot-num/port-num }
mode.
& Note:
The details of the parameters in Table 1-2 are in Interface list.
Command
Description
configure terminal
www.fineprint.cn
Page 6 of 19
Ethernet PortConfiguration
Example:
! Divide interfaces from Ethernet 0/0/1 to Ethernet 0/0/16 into an interface range.
Switch(config)#interface range ethernet 0/0/1 to ethernet 0/0/16
Switch(config-if-range)#
1.2.1.3 Configure Port Mode
Table 1-4 Configure port mode
Operation
Enter
global
configuration
mode
Command
Remarks
configure terminal
interface
ethernet
mode
device-num/slot-num/port-num
switchport
{access|hybrid|trunk}
show
mode
interface
ethernet
device-num/slot-num/port-num
Example:
! There is VLAN 1-20. Configure uplink port e 0/1/1 to be trunk, and it can transceive
packets of VLAN1-20
Switch(config)#vlan 1-20
Switch(config-if-vlan)#switchport ethernet 0/1/1
Add VLAN port successfully.
Switch(config-if-vlan)#interface ethernet 0/1/1
Switch(config-if-ethernet-0/1/1)#switchport mode trunk
Switch(config-if-ethernet-0/1/1)# show interface brief ethernet 0/1/1
Port
Desc
e0/1/1
trk 1-20
Total entries: 1 .
www.fineprint.cn
Page 7 of 19
Ethernet PortConfiguration
Operation
Enter global configuration
mode
Enter
interface
Command
Remarks
configure terminal
interface
configuration mode
device-num/slot-num/port-num
ethernet
Example:
! The first four ports (e 0/0/1 e0/0/4) connect to different server. These four servers
should be isolated. And the servers belong to VLAN 10,VLAN 20,VLAN 30 and VLAN 40
Switch(config)#vlan 10
Switch(config-if-vlan)#switchport ethernet 0/0/1
Add VLAN port successfully.
Switch(config-if-vlan)#vlan 20
Switch(config-if-vlan)#switchport ethernet 0/0/2
Add VLAN port successfully.
Switch(config-if-vlan)#vlan 30
Switch(config-if-vlan)#switchport ethernet 0/0/3
Add VLAN port successfully.
Switch(config-if-vlan)#vlan 40
Switch(config-if-vlan)#switchport ethernet 0/0/4
Add VLAN port successfully.
Switch(config-if-vlan)#interface ethernet 0/0/1
Switch(config-if-ethernet-0/0/1)#switchport default vlan 10
Switch(config-if-ethernet-0/0/1)#interface ethernet 0/0/2
Switch(config-if-ethernet-0/0/2)#switchport default vlan 20
Switch(config-if-ethernet-0/0/2)#interface ethernet 0/0/3
Switch(config-if-ethernet-0/0/3)#switchport default vlan 30
Switch(config-if-ethernet-0/0/3)#interface ethernet 0/0/4
www.fineprint.cn
Page 8 of 19
Ethernet PortConfiguration
Desc
UtVlan
e0/0/1
10
hyb
10
e0/0/2
20
hyb
20
e0/0/3
30
hyb
30
e0/0/4
40
hyb
40
Total entries: 4 .
1.2.1.5 Add a Port to a VLAN
User can add current ethernet port to a specific VLAN, thus, the ethernet port can forward
packet of the vlan.
Hybrid port and Trunk port can belong to multiple VLANs and Access port can only belong
to one VLAN, which is the default vlan. By default, all ports belong to VLAN 1.
In VLAN configuration mode, user can use switchport ethernet command to add a port to
vlan, please refer to VLAN configuration chapter.
There is another way to add port to a vlan, in interface configuration mode.
Table 1-6 Add a port to a VLAN
Operation
Command
configure terminal
Enter
interface
interface
configuration
Remarks
ethernet
mode
device-num/slot-num/port-num
switchport
vlan-list
vlan-list
hybrid
tagged
vlan
trunk
allowed
vlan
vlan-list
Delete Trunk port from specific
www.fineprint.cn
Page 9 of 19
Ethernet PortConfiguration
VLAN
vlan-list
There are two ways to add an Access port to VLAN: one is to configure port default VLAN;
the other is to add the port to another VLAN directly. Access port can only belong to one
VLAN, so this port will be auto-deleted from the original VLAN.
Example:
e 0/0/1 is Hybrid. Configure this port keeping tag of VLAN 10.
Switch(config)#vlan 10
Switch (config-if-vlan)#interface ethernet 0/0/1
Switch (config-if-ethernet-0/0/1)#switchport hybrid tagged vlan 10
Switch (config-if-ethernet--0/0/1)#show interface brief e 0/0/1
Port
Desc
e0/0/1
hyb 10
UtVlan
1
Total entries: 1 .
Operation
Command
Description
shutdown
Configure duplex of a
port
half
auto-negotiation;
supports
full
duplex
and
1000BASE-X
duplex
and
www.fineprint.cn
Page 10 of 19
Ethernet PortConfiguration
speed { speed-value |
10/100/1000BASE-T
port
auto }
no speed
1000BASE-X
supports
supports
only
priority priority-value
no priority
Configure
port
description
description
The
description
is
used
to
description-list
www.fineprint.cn
Page 11 of 19
Ethernet PortConfiguration
Command
ingress filtering
no ingress filtering
Note:
By default, ingress filtering is enabled.
Example:
! Disable VLAN ingress filtering
Switch(config)#no ingress filtering
Disable ingress filtering successfully!
! Enable VLAN ingress filtering
Switch(config)#ingress filtering
Enable ingress filtering successfully!
Command
Enable ingress
acceptable-frame
Disable ingress
no ingress acceptable-frame
acceptable-frame
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 12 of 19
Ethernet PortConfiguration
Note:
By default, ingress acceptable-frame is all.
Example:
! Configure Ethernet 0/0/5 only to receive tagged frame
Switch(config)#interface ethernet 0/0/5
Switch(config-if-ethernet-0/0/5)#ingress acceptable-frame tagged
Config acceptable-frame type successfully!
! Restore the default ingress acceptable-frame of Ethernet 0/0/5
Switch(config)#interface ethernet 0/0/5
Switch(config-if-ethernet-0/0/5)#no ingress acceptable-frame
Config acceptable-frame type successfully!
Option
Command
flow-control
control
Disable Ethernet port flow
no flow-control
control
www.fineprint.cn
Page 13 of 19
Ethernet PortConfiguration
Note:
By default, Ethernet port flow control is disabled.
Example:
! Enable flow-control on ethernet 0/0/5
Switch(config)#interface ethernet 0/0/5
Switch(config-if-ethernet-0/0/5)#flow-control
Setting successfully! flow-control is enable
! Disable flow-control on ethernet 0/0/5
Switch(config)#interface ethernet 0/0/5
Switch(config-if-ethernet-0/0/5)#no flow-control
Setting successfully! flow-control is disable
Command
Description
The information of the
interface includes:
clear interface
information of the
numbers of unicast,
[ interface-num | slot-num ]
multicast and broadcast
port.
message etc.
Display interface
www.fineprint.cn
Page 14 of 19
Ethernet PortConfiguration
description.
[ interface-list ]
Display port
show interface
configuration
[ interface-num ]
Display the
statistic
show statistics interface
information of
[ interface-num ]
specified port or all
ports.
Statistic information
Display the
statistic
refreshes automatically
information of all
interface
interfaces
The utilization
information of all ports
Display the
includes receiving and
utilization
show utilization interface
sending speed,
information of all
bandwidth utilization
ports
Note:
Using clear interface command in global mode, if the interface-num and
slot-num are not assigned, the information of all interfaces is cleared. If the
slot-num is assigned, the port information of the assigned slot is cleared. In
interface mode, only the information of the current port can be cleared.
www.fineprint.cn
Page 15 of 19
Ethernet PortConfiguration
If port type and port number are not specified, the above command displays
information about all ports. If both port type and port number are specified,
the command displays information about the specified port.
Example:
! Show description of all port
Switch(config-if-ethernet-0/0/1)#show description interface
Port
description
e0/0/1
test
e0/0/2
e0/0/3 XXXX
e0/0/4
e0/0/5
VLAN ID :
Untagged VLAN ID : 1
0 packets output
0 bytes, 0 unicasts, 0 multicasts, 0 broadcasts
0 packets input
0 bytes, 0 unicasts, 0 multicasts, 0 broadcasts
www.fineprint.cn
Page 16 of 19
Ethernet PortConfiguration
Tx Pkt
Tx Byte
Status Count
Count
Rx Pkt
Count
Rx Byte
Count
Rx
Rx
Bcast
Mcast
===================================================================
=========
e0/0/1 down 0
e0/0/2 down 0
www.fineprint.cn
Page 17 of 19
Ethernet PortConfiguration
e0/0/3 down 0
e0/0/4 down 0
e0/0/5 down 0
e0/0/6 down 0
e0/0/7 down 0
e0/0/8 down 0
e0/0/9 down 0
e0/0/10 down 0
e0/0/11 down 0
e0/0/12 down 0
e0/0/13 down 0
e0/0/14 down 0
e0/0/15 down 0
e0/0/16 down 0
e0/0/17 down 0
link
Receive
Transmit Peak Tx
down
e0/0/2
down
e0/0/3
down
e0/0/4
down
e0/0/5
down
e0/0/6
down
www.fineprint.cn
Page 18 of 19
Ethernet PortConfiguration
e0/0/7
down
e0/0/8
down
e0/0/9
down
e0/0/10 down
e0/0/11 down
e0/0/12 down
e0/0/13 down
e0/0/14 down
e0/0/15 down
e0/0/16 down
e0/0/17 down
www.fineprint.cn
Page 19 of 19
www.fineprint.cn
Page 1 of 8
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 8
Document
Title
Product
Docume
Version
nt
1.0
Revision
Number
Evaluate
Presentation:
this
document
appearance)
Good
Fair
Average
Poor
Accessibility:
(Contents, index, headings, numbering)
Good
Fair
Average
Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
Fair
Average
Poor
suggestion
Improve introduction
s to
Improve Contents
Improve arrangement
improve
the
document
Include images
Improve index
Compan
y
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 8
Contents
Chapter 1 Ethernet Port Mirroring Configuration ................................................... 5
1.1 Configure Ethernet Port Mirroring ................................................................................. 5
1.1.1 Overview ............................................................................................................. 5
1.1.2 Mirroring .............................................................................................................. 5
1.1.3 Configuring Port Mirroring .................................................................................. 6
1.1.4 Mirroring Configuration ....................................................................................... 6
www.fineprint.cn
Page 4 of 8
1.1.2 Mirroring
Switch support one-to-one and multiple-to-one mirroring.
Mirrored: mirror source can be port or packet sent or received by CPU
Mirror: For GPON series switch, mirror port can be only one. If multiple mirror port is
configured, the last will be effective.
Note:
Mirror port cannot be used as a normal port.
www.fineprint.cn
Page 5 of 8
Specifications
Related command
Link
Mirroring
Traffic
mirroring
mirrored-to
QoS
configuratio
n
Port mirroring
mirror destination-interface
no mirrored-to
mirror source-interface
Configuring
Port
Mirroring
Command
mirrored-to
Description
{
ip-group
{ acl-number | acl-name }
[
subitem
subitem
link-group
{ acl-number |
acl-name
subitem
subitem
interface
ethernet interface-num
Cancel traffic mirroring
no mirrored-to { ip-group
{ acl-number |
[
subitem
acl-name
acl-name }
subitem
link-group
{ acl-number |
}
subitem
subitem ] }
www.fineprint.cn
Page 6 of 8
Note:
ip-group { acl-number | acl-name } [ subitem subitem ]: Specifies a basic or
an advanced ACL. The acl-number argument ranges from 2000 to
3999;acl-name: Name of a string, start with letters without space and
quotation mark;subitem: option parameter for specifying the subitem in acl-list,
in the range of 0 to 127.
link-group { acl-number | acl-name } [ subitem subitem ]: Specifies a Layer
2 ACL. The acl-number argument ranges from 4000 to 4999; acl-name:
Name of a string, start with letters without space and quotation mark;subitem:
option parameter for specifying the subitem in acl-list, in the range of 0 to 127.
interface ethernet { interface-num }: Specifies destination port (also called
monitor port) of traffic.
iii.
Configuration example
! Mirror acl-list 2000 to Ethernet 0/0/1.
Switch(config)#access-list 2000 permit 1.1.1.1 0
Config ACL subitem successfully.
Switch(config)#mirrored-to ip-group 2000 interface ethernet 0/0/1
Config mirrored-to successfully .
Configuration prerequisites
The source port is specified and whether the packets to be mirrored are ingress or
egress is specified: ingress: only mirrors the packets received via the port; egress: only
mirrors the packets sent by the port; both: mirrors the packets received and sent by the
port at the same time.
Command
Description
mirror
destination-interface
interface-num
mirror source-interface
{ interface-list | cpu } { both |
egress | ingress }
show mirror
www.fineprint.cn
Page 7 of 8
Note:
A port cannot be monitor and mirrored port at the same time.
iii.
Configuration example
! Mirror egress of ethernet 0/0/1 to ethernet 0/0/12 to ethernet 0/1/1
Switch(config)#mirror destination-interface ethernet 0/1/1
Config monitor port successfully !
Switch(config)#mirror source-interface ethernet 0/0/1 to ethernet 0/0/12
egress
Config mirrored port successfully !
! Mirror cpu both to ethernet 0/1/2
Switch(config)#mirror destination-interface ethernet 0/1/2
Config monitor port successfully !
Switch(config)#mirror source-interface cpu both
Config mirrored port successfully !
www.fineprint.cn
Page 8 of 8
www.fineprint.cn
Page 1 of 6
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 6
Docume
Version
nt
1.0
Revision
Number
Evaluate
Presentation:
this
document
appearance)
Good
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestion
Improve introduction
s to
Improve Contents
improve
procedures/tutorials
the
document
Improve arrangement
Include images
Improve index
Compan
y
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 6
Contents
Chapter1 Configuring Port Utilization Alarm .............................................................................. 5
1.1
Brief Introduction to Device Utilization Alarm ......................................................... 5
1.2
Configuring Device Utilization Alarm ....................................................................... 5
1.2.1
Configuring Port Utilization Alarm ................................................................ 5
1.2.2
Configuring CPU Utilization Alarm ............................................................... 5
1.2.3
Displaying and Debugging Device Utilization Alarm ................................. 6
www.fineprint.cn
Page 4 of 6
www.fineprint.cn
Page 5 of 6
Operation
Enter global
configuration mode
Enable(disable) CPU
utilization alarm
Configure congestion
value
Remark
configure terminal
alarm cpu
Required
optional
Command
show alarm cpu
Remark
Perform
either of the
commands
Perform
either of the
port
utilization
and
commands
commands
Perform
either of the
www.fineprint.cn
Page 6 of 6
www.fineprint.cn
Page 1 of 15
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 15
Docume
Version
nt
1.0
Revision
Number
Evaluate
Presentation:
this
document
appearance)
Good
Fair
Average
Poor
Accessibility:
(Contents, index, headings, numbering)
Good
Fair
Average
Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
Fair
Average
Poor
suggestion
Improve introduction
s to
Improve Contents
Improve arrangement
improve
the
document
Include images
Improve index
Compan
y
Postcode
Address
Telephone
Contents
Chapter 1 Link Aggregation Configuration ............................................................ 5
www.fineprint.cn
Page 3 of 15
www.fineprint.cn
Page 4 of 15
Overview
For the member ports in an aggregation group, their basic configuration must be the same.
The basic configuration includes STP, QoS, VLAN, port attributes, and other associated
settings.
STP configuration, including STP status (enabled or disabled), link attribute
(point-to-point or not), STP priority, maximum transmission speed, loop prevention status.
QoS configuration, including traffic limiting, priority marking, default 802.1p priority,
traffic monitor, traffic redirection, traffic statistics, and so on.
VLAN configuration, including permitted VLANs, and default VLAN ID, tag vlan list for
hybrid port and allowed vlan list for trunk port.
Port attribute configuration, including port rate, duplex mode, and link type (Trunk,
Hybrid or Access). The ports for a static aggregation group must have the same rate and
link type, and the ports for a dynamic aggregation group must have the same rate, duplex
mode (full duplex) and link type.
www.fineprint.cn
Page 5 of 15
1.1.2
Introduction to LACP
The purpose of link aggregation control protocol (LACP) is to implement dynamic link
aggregation and disaggregation. This protocol is based on IEEE802.3ad and uses
LACPDUs (link aggregation control protocol data units) to interact with its peer.
After LACP is enabled on a port, LACP notifies the following information of the port to its
peer by sending LACPDUs: priority and MAC address of this system, priority, number and
operation key (it is so called O-Key) of the port. Upon receiving the information, the peer
compares the information with the information of other ports on the peer device to
determine the ports that can be aggregated with the receiving port. In this way, the two
parties can reach an agreement in adding/removing the port to/from a dynamic
aggregation group.
www.fineprint.cn
Page 6 of 15
www.fineprint.cn
Page 7 of 15
1.2
www.fineprint.cn
Page 8 of 15
1.3
Load-balancing Policy
Load-balancing policy is specific physical link selection strategy when sending packets,
which can be source MAC, destination MAC, source and destination MAC, source IP,
destination IP, and source and destination IP. The default strategy is source MAC.
1.4
Command
Description
Create a static
aggregation group
channel-group
channel-group-number
channel-group-number
ranges from 0 to 12
If the group has already
existed, turn to step 2.
Configure
load-balancing
policy
channel-group load-balance
{dst-ip|dst-mac|src-dst-ip|src-dst
-mac|src-ip|src-mac}
Enter interface
configuration
mode
Enter interface
range
configuration
mode
channel-group
channel-group-number mode on
channel-group-number
should be existed .
www.fineprint.cn
Page 9 of 15
no channel-group
channel-group-number
Back to global
configuration
mode
exit
Delete a static
aggregation group
no channel-group
channel-group-number
Operation
Command
Description
Create a
dynamic
aggregation
group
channel-group
channel-group-number
Configure
load-balancin
g policy
channel-group
load-balance
{dst-ip|dst-mac|src-dst-i
p|src-dst-mac|src-ip|srcmac}
Configure
system
priority
lacp system-priority
priority
4(1)
Enter
interface
configuration
interface ethernet
interface_num
www.fineprint.cn
Page 10 of 15
Enter
interface
range
configuration
mode
Add a port to
the
aggregation
group
channel-group
channel-group-number
channel-group-number should be
existed .
Configure
port priority
Delete a port
from an
aggregation
group
no channel-group
channel-group-number
Back to
global
configuration
mode
exit
Delete a
dynamic
aggregation
group
no channel-group
channel-group-number
Configuration
After the above configuration, execute the show command in any mode to display the
running status after the link aggregation configuration and verify your configuration.
Table 1-1 Display and maintain link aggregation configuration
Operation
Command
www.fineprint.cn
Description
System
LACP-ID
consists of 16-bit system
priority and 48-bit system
Page 11 of 15
1.5
I. Network requirements
As shown in Figure 1-1, the link between switch-A and switch-B should be more reliable.
switch-A and switch-B should realize load-balance.
II. Network diagram
www.fineprint.cn
Page 12 of 15
Logic-port
1
1
Actor-state
-
actor-state: activity/timeout/aggregation/synchronization
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 13 of 15
Logic-port Actor-state
1
10111100
1
10111100
actor-state: activity/timeout/aggregation/synchronization
collecting/distributing/defaulted/expired
#show lacp internal of switch-B
switch-B(config-if-range)#show lacp internal
Load balance: src-dst-mac
Channel: 1, dynamic channel
Port
State
A-Key O-Key Priority
e0/0/3 bndl
2
2
256
e0/0/4 bndl
2
2
256
Logic-port Actor-state
3
00111100
3
00111100
actor-state: activity/timeout/aggregation/synchronization
collecting/distributing/defaulted/expired
(2) Show LACP neighbor
#Show LACP neighbor of switch-A
switch-A(config-if-range)#show lacp neighbor
Channel: 1
Local
Port Key Pri
ID
Timeout
e0/0/1 3
2
256
000a5a020305 82(90)
e0/0/2 4
2
256
000a5a020305 80(90)
Nei-state
00111100
00111100
nei-state: activity/timeout/aggregation/synchronization
collecting/distributing/defaulted/expired
#Show LACP neighbor of switch-B
switch-B(config-if-range)#show lacp neighbor
Channel: 1
Local
Port Key Pri
ID
Timeout
e0/0/3 1
2
64
000a5a010203 71(90)
e0/0/4 2
2
64
000a5a010203 69(90)
XXXX Confidential & Proprietary Information
www.fineprint.cn
Nei-state
10111100
10111100
Page 14 of 15
nei-state: activity/timeout/aggregation/synchronization
collecting/distributing/defaulted/expired
(3) Show system ID
#Show switch-A system ID
switch-A(config-if-range)#show lacp sys-id
1024,000a5a010203
#Show switch-B system ID
switch-B(config-if-range)#show lacp sys-id
2048,000a5a020305
6. Delete port member from channel-group
#Configure switch-A
switch-A(config-if-range)#no channel-group 1
Remember to re-config mac-addresses associated with port e0/0/1
Remember to re-config mac-addresses associated with port e0/0/2
switch-A(config-if-range)#exit
#Configure switch-B
switch-B(config-if-range)#no channel-group 1
Remember to re-config mac-addresses associated with port e0/0/3
Remember to re-config mac-addresses associated with port e0/0/4
switch-B(config-if-range)#exit
7. Delete channel-group
#Configure switch-A
switch-A(config)#no channel-group 1
#Configure switch-B
switch-B(config)#no channel-group 1
www.fineprint.cn
Page 15 of 15
www.fineprint.cn
Page 1 of 6
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without being
obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
www.fineprint.cn
Page 2 of 6
Evaluate
this
document
Docume
nt
Revision
Number
1.0
Presentation:
(Introductions, procedures, illustrations, completeness, arrangement,
appearance)
Good
Fair
Average
Poor
Accessibility:
(Contents, index, headings, numbering)
Good
Fair
Average
Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestion
s to
improve
the
document
Fair
Average
Poor
Improve Contents
Improve arrangement
Include images
Improve index
Compan
y
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 6
Content
Chapter 1 Port Isolation Configuration ........................................................................................... 1
1.1 Introduction to Port Isolation .................................................................................................. 1
1.2 Port Isolation Configuration ................................................................................................... 1
1.2.1 Port Isolation Configuration ........................................................................................ 1
1.2.2 Port-isolation Monitor and Maintenance ..................................................................... 1
1.3 Port-isolation Configuration Example .................................................................................... 2
1.3.1 Port-isolation Configuration Example ......................................................................... 2
www.fineprint.cn
Page 4 of 6
Command
Remarks
configure terminal
isolate-port interface-number
Required
Command
On
show isolate-port
Remarks
any
configuration
mode
www.fineprint.cn
Page 1 of 6
www.fineprint.cn
Page 2 of 6
VLAN Configuration
VLAN Configuration
www.fineprint.cn
Page 1 of 11
VLAN Configuration
www.fineprint.cn
Page 2 of 11
VLAN Configuration
Title
Product
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 11
VLAN Configuration
Content
Chapter 1 VLAN Configuration ............................................................................................... 5
1.1 VLAN Overview ................................................................................................................... 5
1.2 VLAN Principles ................................................................................................................... 5
1.3 802.1Q VLAN ....................................................................................................................... 6
1.3.1 VLAN Link Type of Ethernet Ports ............................................................................ 6
1.3.2 Default VLAN ............................................................................................................ 7
1.3.3 Handling Packets ...................................................................................................... 7
Chapter 2 VLAN Configuration ............................................................................................... 8
2.1 Default VLAN Configuration ................................................................................................ 8
2.2 Create and Modify VLAN..................................................................................................... 8
2.2 Delete Port Members from a VLAN .................................................................................... 9
2.3 Delete VLAN ...................................................................................................................... 10
2.4 VLAN Configuration Example ............................................................................................ 10
www.fineprint.cn
Page 4 of 11
VLAN Configuration
A VLAN can span across multiple switches, or even routers. This enables hosts in a
VLAN to be dispersed in a looser way. That is, hosts in a VLAN can belong to different
physical network segment.
Compared with the traditional Ethernet, VLAN enjoys the following advantages.
1) Broadcasts are confined to VLANs. This decreases bandwidth utilization and
improves network performance.
2) Network security is improved. VLANs cannot communicate with each other
directly. That is, a host in a VLAN cannot access resources in another VLAN directly,
unless routers or Layer 3 switches are used.
3) Network configuration workload for the host is reduced. VLAN can be used to
group specific hosts. When the physical position of a host changes within the range
of the VLAN, you need not change its network configuration.
www.fineprint.cn
Page 5 of 11
VLAN Configuration
chapter) and it can identify the data link layer encapsulation of the packet only, so
you can add the VLAN tag field into only the data link layer encapsulation if
necessary.
In 1999, IEEE issues the IEEE 802.1Q protocol to standardize VLAN implementation,
defining the structure of VLAN-tagged packets.
IEEE 802.1Q protocol defines that a 4-byte VLAN tag is encapsulated after the
destination MAC address and source MAC address to show the information about
VLAN.
As shown in Figure 1-2, a VLAN tag contains four fields, including TPID (Tag Protocol
Identifier), priority, CFI (Canonical Format Indicator), and VID (VLAN ID).
default, it is 0x8100.
Priority is a 3-bit field, referring to 802.1p priority. Refer to section QoS &
the standard format in different transmission media. This field is not described in
detail in this chapter.
VID (VLAN ID) is a 12-bit field, indicating the ID of the VLAN to which this
packet belongs. It is in the range of 0 to 4,095. Generally, 0 and 4,095 is not used, so
the field is in the range of 1 to 4,094.
VLAN ID identifies the VLAN to which a packet belongs. When the switch receives an
un-VLAN-tagged packet, it will encapsulate a VLAN tag with the default VLAN ID of
the inbound port for the packet, and the packet will be assigned to the default VLAN
of the inbound port for transmission. For the details about setting the default VLAN
of a port, refer to section 02-Port Configuration
www.fineprint.cn
Page 6 of 11
VLAN Configuration
Access: An access port only belongs to one VLAN, normally used to connect user
device.
Trunk: A trunk port can belong to more than one VLAN. It can receive/send
packets from/to multiple VLANs and is generally used to connect another switch. The
packet sent from this port can only be with tag label.
Figure 1-1 Hybrid: A hybrid port can belong to multiple VLANs, can receive, or
send packets for multiple VLANs, used to connect either user or network devices. It
allows packets of multiple VLANs to be sent with or without the Tag label
1.3.2 Default VLAN
Details refer to 02-Port configuration.
1.3.3 Handling Packets
Different ports have different ways to handle the packet. Details are in Table 1-1
Table 1-1 Different port handles different packet
Port
Ingress
type
Untagged
Egress
Tagged packet
packet
Access
Receive it and
If VID of the
port
packet is equal
VID being
to the port
equal to PVID.
permitted VID,
is different,
discard it.
Hybrid
port
Trunk
port
www.fineprint.cn
Page 7 of 11
VLAN Configuration
Default
Description
The vlan-id argument ranges from
Existed VLAN
1 to 4,094.
VLAN 1
VLAN description
Command
global
configuration mode
Description
configure terminal
www.fineprint.cn
Page 8 of 11
VLAN Configuration
switchport ethenet
vlan
device-num/slot-num/portnum
Configure
vlan
description
description vlan-name
global
Command
configuration
Description
configure terminal
vlan vlan-list
no switchport { all |
VLAN
ethernet port_list }
mode
www.fineprint.cn
Page 9 of 11
VLAN Configuration
Note:
A port whose VLAN should not the default VLAN.
global
Command
configuration
mode
Delete VLAN
Description
configure terminal
no vlan {vlan-list |all}
Networking Requirements
Networking diagram
www.fineprint.cn
Page 10 of 11
VLAN Configuration
iii.
Networking configuration
www.fineprint.cn
Page 11 of 11
GVRP Configuration
GVRP Configuration
www.fineprint.cn
Page 1 of 11
GVRP Configuration
www.fineprint.cn
Page 2 of 11
GVRP Configuration
Title
Product
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 11
GVRP Configuration
Content
Chapter 1 GVRP Configuration .......................................................................................................... 5
1.1 Brief Introduction to GVRP.................................................................................................. 5
1. GARP ................................................................................................................................. 5
1.2 Configuring GVRP ................................................................................................................ 6
1.2.1
Brief Introduction to GVRP Configuration ............................................................... 6
1.2.2
Startup GVRP ............................................................................................................ 6
1.2.3
Configuring VLAN Forwarded by GVRP.................................................................... 6
1.2.4
Displaying and Debugging ........................................................................................ 6
1.2.5
GVRP Configuration Examples ................................................................................. 7
www.fineprint.cn
Page 4 of 11
GVRP Configuration
www.fineprint.cn
Page 5 of 11
GVRP Configuration
Remark
Startup GVRP
Required
Configure VLAN under required
GVRP
optional
Detailed
configuration
1.2.2
1.2.3
1.2.4
mode
Remark
-
gvrp
required
interface ethernet
device/slot/port
gvrp
required
Remark
required
www.fineprint.cn
Page 6 of 11
GVRP Configuration
Remark
Perform in
any
configuratio
n mode
www.fineprint.cn
Page 7 of 11
GVRP Configuration
port
GVRP status
e0/0/1
enable
Total entries: 1.
Switch(config)#show garp permit vlan
VLAN 1 is Garp default permit VLAN
Other Garp permit VLAN : 2-4
***************************************************************
!Configure S2
***************************************************************
!Preparation before configure
Switch(config)#vlan 5,6
Switch(config-if-vlan)#switchport ethernet 0/0/2
Add VLAN port successfully.
Switch(config-if-vlan)#switchport ethernet 0/0/3
Add VLAN port successfully.
Switch(config-if-vlan)#exit
Switch(config)#interface range ethernet 0/0/2 to ethernet 0/0/3
Switch(config-if-range)# switchport mode trunk
Switch(config-if-range)#exit
!Configure GVRP
Switch(config)#gvrp
Turn on GVRP successfully
Switch(config)#interface range ethernet 0/0/2 to ethernet 0/0/3
Switch(config-if-range)#gvrp.
Switch(config)#garp permit vlan 5,6
!Verify GVRP configuration
Switch(config)#show gvrp
GVRP state : enable
Switch(config)#show gvrp interface ethernet 0/0/2 ethernet 0/0/3
port
GVRP status
e0/0/2
enable
e0/0/3
enable
Total entries: 2.
Switch(config)#show garp permit vlan
VLAN 1 is Garp default permit VLAN
Other Garp permit VLAN : 5-6
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 8 of 11
GVRP Configuration
***************************************************************
!Configure S3
***************************************************************
!Preparation before configure
Switch(config)#vlan 7,8
Switch(config-if-vlan)#switchport ethernet 0/0/4
Add VLAN port successfully.
Switch(config-if-vlan)#interface e 0/0/4
Switch(config-if-ethernet-0/0/4)#switchport mode trunk
!Configure GVRP
Switch(config)#gvrp
Turn on GVRP successfully.
Switch(config)#interface e 0/0/4
Switch(config-if-ethernet-0/0/4)#gvrp
Switch(config)#garp permit vlan 7,8
!Verify GVRP configuration
Switch(config)#show gvrp
GVRP state : enable
Switch(config)#show gvrp interface ethernet 0/0/4
port
GVRP status
e0/0/4
enable
Total entries: 1.
Switch(config)#show garp permit vlan
VLAN 1 is Garp default permit VLAN
Other Garp permit VLAN : 7-8
***************************************************************
After finishing the configuration, you can show VLAN to check the VLAN
register information learned by GVRP
!VLAN5,6,7,8 is learned by GVRP when showing S1 VLAN information
Switch(config)#show vlan
show VLAN information
VLAN ID
:1
VLAN status
: static
www.fineprint.cn
Page 9 of 11
GVRP Configuration
VLAN member
: e0/0/1-e0/2/2
: e0/0/1
: e0/0/2-e0/2/2
:2
VLAN status
: static
VLAN member
: e0/0/1.
: e0/0/1.
:3
VLAN status
: static
VLAN member
: e0/0/1.
: e0/0/1.
:4
VLAN status
: static
VLAN member
: e0/0/1.
: e0/0/1.
:5
VLAN status
: dynamic
VLAN member
: e0/0/1
: e0/0/1
www.fineprint.cn
Page 10 of 11
GVRP Configuration
:6
VLAN status
: dynamic
VLAN member
: e0/0/1
: e0/0/1
:7
VLAN status
: dynamic
VLAN member
: e0/0/1
: e0/0/1
:8
VLAN status
: dynamic
VLAN member
: e0/0/1
: e0/0/1
www.fineprint.cn
Page 11 of 11
ARP Configuration
ARP Configuration
www.fineprint.cn
Page 1 of 11
ARP Configuration
www.fineprint.cn
Page 2 of 11
ARP Configuration
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 11
ARP Configuration
Contents
Chapter 1 ARP Configuration ......................................................................................................... 5
1.1 ARP Overview ...................................................................................................................... 5
1.1.1 ARP Function ............................................................................................................ 5
1.1.2 ARP Message Format ............................................................................................... 6
1.2 Configuring ARP Attack Spoofing ........................................................................................ 7
1.2.1 Brief Introduction to ARP Spoofing .......................................................................... 7
1.2.2 ARP Anti-Spoofing Protection .................................................................................. 7
1.2.3 Configuring Anti-Spoofing ........................................................................................ 8
1.2.4 Configuring ARP Packet Source MAC Address Consistency Check ........................... 8
1.2.5 Configuring Default of Anti-Spoofing ....................................................................... 9
1.2.6 Displaying and Maintain Anti-spoofing .................................................................... 9
1.3 Configuring against ARP Flood ............................................................................................ 9
1.3.1 ARP Flood ................................................................................................................. 9
1.3.2 Configuring against ARP Flood ................................................................................. 9
1.3.3 Configuring against ARP Flood ............................................................................... 10
1.3.4 Displaying and Maintain against ARP Flood ........................................................... 11
www.fineprint.cn
Page 4 of 11
ARP Configuration
Chapter 1
ARP Configuration
www.fineprint.cn
Page 5 of 11
ARP Configuration
When Host A and Host B are not on the same subnet, Host A first sends an ARP
request to the gateway. The destination IP address in the ARP request is the IP
address of the gateway. After obtaining the MAC address of the gateway from an ARP
reply, Host A encapsulates the packet and sends it to the gateway. Subsequently, the
gateway broadcasts the ARP request, in which the destination IP address is the one of
Host B. After obtaining the MAC address of Host B from another ARP reply, the
gateway sends the packet to Host B.
1.1.2 ARP Message Format
www.fineprint.cn
Page 6 of 11
ARP Configuration
Sender hardware address: This field specifies the hardware address of the device
sending the message.
Sender protocol address: This field specifies the protocol address of the device
sending the message.
Target hardware address: This field specifies the hardware address of the device the
message is being sent to.
Target protocol address: This field specifies the protocol address of the device the
message is being sent to.
www.fineprint.cn
Page 7 of 11
ARP Configuration
After configuring the access switches properly, you do not need to deploy ARP attack
protection configuration on the gateway. This relieves the burden from the gateway.
If the access switches do not support ARP attack protection, or the hosts are
connected to a gateway directly, the gateway must be configured to
l
Create correct ARP entries and prevent them from being modified.
l Suppress the burst impact of ARP packets or the IP packets that will trigger
sending of ARP requests.
The merits of configuring ARP attack protection on the gateway are that this gateway
configuration hardly affects the switches and can properly support the existing
network, thus effectively protecting user investment
1.2.3 Configuring Anti-Spoofing
Table 1-2 Configure anti-spoofing
Command
Step
step1
Operation
configure terminal
Step2
arp anti-spoofing
Step3
arp anti-spoofing
{diacard | flood}
Step4
end
Step5
copy
running-config
startup-config
unknown
Table 1-4 Configure ARP Packet Source MAC Address Consistency Check
Command
Operation
step1
configure terminal
step2
step3
validation operation
step4
end
step5
copy
startup-config
running-config
www.fineprint.cn
Page 8 of 11
ARP Configuration
disable
enable
discard
www.fineprint.cn
Page 9 of 11
ARP Configuration
Enter global
configuration mode
configure terminal
arp anti-flood
Configure
safety
trigger threshold
Remark
required
optional
Configure
automatically banned
user recovery time
www.fineprint.cn
optional
Page 10 of 11
ARP Configuration
ARP
Command
anti-flood
www.fineprint.cn
Remark
Perform either of
the commands
Page 11 of 11
www.fineprint.cn
Page 1 of 16
www.fineprint.cn
Page 2 of 16
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 16
Contents
Chapter 1 IGMP Snooping................................................................................................................. 5
1.1 Brief Introduction to IGMP Snooping.................................................................................. 5
1.2 IGMP Snooping Configuration............................................................................................. 5
1.2.1 Brief Configuration to IGMP Snooping ..................................................................... 5
1.2.2 Enable IGMP Snooping............................................................................................. 6
1.2.3 Configuring IGMP Snooping Timer .......................................................................... 6
1.2.4 Configuring Port Fast-leave ...................................................................................... 6
1.2.5 Configuring Number of Multicast Group Allowed Learning ..................................... 7
1.2.6 Configuring IGMP Snooping Querier........................................................................ 7
1.2.7 Configuring IGMP Snooping Multicast Learning Strategy ........................................ 8
1.2.8 Configuring IGMP Snooping Router-Port ................................................................. 9
1.2.9 Configuring IGMP Snooping Port Multicast VLAN.................................................... 9
1.2.10 Configuring Host Port Record MAC Functions ....................................................... 9
1.2.11 Configuring Port of Dropped Query Packets or Not ............................................. 10
1.2.12 Configuring Port of Discarded Packets Report or Not .......................................... 10
1.2.13 Configuring Multicast Preview ............................................................................. 10
1.2.14 Configuring Profile of Black and White List .......................................................... 11
1.2.15 Displaying and Maintenance of IGMP Snooping .................................................. 12
1.3 IGMP Snooping Configuration Examples .......................................................................... 12
www.fineprint.cn
Page 4 of 16
Detailed
configuration
required
3.2.2
optional
3.2.3
Configure
IGMP
max-response-time
Snooping
optional
3.2.3
Configure
fast-leave
interface
optional
3.2.4
optional
3.2.5
optional
3.2.6
optional
3.2.7
Configure route-port
optional
3.2.8
optional
3.2.9
Configuration Task
IGMP
Snooping
basic
configuration
Modify and
optimize
IGMP
Snooping
configuration
IGMP
Snooping
www.fineprint.cn
Page 5 of 16
optional
3.2.10
optional
3.2.11
optional
3.2.12
optional
3.2.13
optional
3.2.14
optional
3.2.15
Operation
configure terminal
igmp-snooping
Remark
-
Operation
configure terminal
Remark
optional
Configure
IGMP
Snooping
multicast interface aging time
igmp-snooping
time
igmp-snooping
max-response-time time
optional
by default, maximum
leave time is 10S
www.fineprint.cn
Remark
Page 6 of 16
configure terminal
optional
igmp-snooping fast-leave
Operation
Remark
configure terminal
optional
igmp-snooping
number
group-limit
Operation
configure terminal
www.fineprint.cn
remark
optional
Page 7 of 16
Command
Remarks
Enter
global
configuration mode
configure terminal
igmp-snooping querier
Optional
Configured
to
send
general query message
interval
Optional
Configuration is generally
the maximum query
response
time
of
message
Optional
Configured
to
send
general inquiries packet
source IP address
Optional
www.fineprint.cn
Page 8 of 16
Command
Remarks
Enter
global
configuration mode
configure terminal
Optional
Configure
dynamic
routing port aging time
Optional
Optiona
Command
Remarks
Enter
global
configuration mode
configure terminal
Configure
IGMP
Snooping port multicast
VLAN
Optional
Command
configure terminal
www.fineprint.cn
Remarks
Page 9 of 16
igmp-snooping record-host
Optional
Command
Remarks
Enter
global
configuration mode
configure terminal
Discard
the
query
message
to
the
configuration port
Optional
Optional
Command
Remarks
Enter
global
configuration mode
configure terminal
Configure
the
port
discarded packets report
Optional
Optional
www.fineprint.cn
Page 10 of 16
Multicast IGMP Snooping provides preview feature, users can configure the
multicast channel preview, you can configure a single multicast length preview,
preview interval, duration, and reset to allow preview times.
Table 1-13 Configure multicast preview
Operation
Command
Remarks
Enter
global
configuration mode
configure terminal
Configuring
preview
igmp-snooping preview
Multicast
Configure
multicast
channel preview
Optional
Optional
Command
Remarks
Enter
global
configuration mode
configure terminal
Configuration
types
profile
www.fineprint.cn
Optional
Page 11 of 16
Optional
Range of configuration
profile mac
Optional
Reference configuration
profile
Optional
Command
router
port
configuration
Display Record in host MAC
Display information about multicast
preview
Display the current state of multicast
channel preview
Display
profile
information
Display multicast group
show igmp-snooping
show igmp-snooping router-dynamic
Remarks
configuration
Performs
either of the
commands
www.fineprint.cn
Page 12 of 16
Multicast
Source Router
Ethernet0/0/4
Host-A
Ethernet0/0/2
Ethernet0/0/1
S-switch-A
Host-B
Ethernet0/0/3
Host-C
Figure 1-1
1. Network requirements
As shown in the figure 1-1, Host-A, Host-B, Host-C hosts separately belong to VLAN2,
VLAN3, VLAN4.Three hosts separately receive the data of the multicast address
224.0.1.1-224.0.1.3 per configuring.
2. Configuration steps
Configuring S-switch-A
#Configure VLAN2 to 4, and add the ports separately into VlAN2,3,4 of Ethernet0/0/1,
Ethernet0/0/2 and Ethernet0/0/3.
S-switch-A(config)#vlan 2
S-switch-A(config-if-vlan)#switchport ethernet 0/0/1
S-switch-A(config-if-vlan)#exit
S-switch-A(config)#vlan 3
S-switch-A(config-if-vlan)#switchport ethernet 0/0/2
S-switch-A(config-if-vlan)#exit
S-switch-A(config)#vlan 4
S-switch-A(config-if-vlan)#switchport ethernet 0/0/3
S-switch-A(config-if-vlan)#exit
#Enable igmp snooping
S-switch-A(config)#igmp-snooping
When Host-A, Host-B, Host-C forward IGMP report to S-switch-A, S-switch-A will
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 13 of 16
learn corresponding multicast table entry port; When the Multicast Source Router
send igmp query time to the S-switch-A message, S-switch-A will learn the
appropriate router port entry.
Show the switch learned multicast group
S-switch-A(config)#show multicast
show multicast table information
MAC Address
: 01:00:5e:00:01:01
VLAN ID
:2
Static port list
:.
IGMP port list
: e0/0/1
Dynamic port list
:
MAC Address
VLAN ID
Static port list
IGMP port list
Dynamic port list
: 01:00:5e:00:01:02
:3
:.
: e0/0/2
:
MAC Address
VLAN ID
Static port list
IGMP port list
Dynamic port list
: 01:00:5e:00:01:03
:4
:
: e0/0/3.
:
Total entries: 3 .
S-switch-A(config)#show igmp-snooping router-dynamic
Port
VID
Age
Type
e0/0/4
2
284
{ STATIC }
e0/0/4
3
284
{ STATIC }
e0/0/4
4
284
{ STATIC }
Total Record: 3
When Multicast Source Router sends 224.0.1.1-224.0.1.3 multicast serve data flow,
S-switch-A will forward corresponding to Host-A, Host-B, Host-C.
Static multicast configuration examples:
Configuration steps:
Configuring S-switch-A
#configure VLAN 2 to 4, and add the ports into VLAN2, 3, 4 of Ethernet0/0/1,
Ethernet0/0/2 and Ethernet0/0/3.
S-switch-A(config)#vlan 2
S-switch-A(config-if-vlan)#switchport ethernet 0/0/1
S-switch-A(config-if-vlan)#exit
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 14 of 16
S-switch-A(config)#vlan 3
S-switch-A(config-if-vlan)#switchport ethernet 0/0/2
S-switch-A(config-if-vlan)#exit
S-switch-A(config)#vlan 4
S-switch-A(config-if-vlan)#switchport ethernet 0/0/3
S-switch-A(config-if-vlan)#exit
#Add the ports into the VLAN2 to VLAN4 of Ethernet0/0/4, configure Ethernet0/0/4 as
static router port.
S-switch-A(config)#vlan 2-4
S-switch-A(config-if-vlan)#switchport ethernet 0/0/4
S-switch-A(config-if-vlan)#exit
S-switch-A(config)#igmp-snooping route-port vlan 2 interface ethernet 0/0/4
S-switch-A(config)#igmp-snooping route-port vlan 3 interface ethernet 0/0/4
S-switch-A(config)#igmp-snooping route-port vlan 4 interface ethernet 0/0/4
#configure static multicast group
S-switch-A(config)#multicast mac-address 01:00:5e:00:01:01 vlan 2
S-switch-A(config)#multicast mac-address 01:00:5e:00:01:01 vlan 2 interface
ethernet 0/0/1
S-switch-A(config)#multicast mac-address 01:00:5e:00:01:02 vlan 3
S-switch-A(config)#multicast mac-address 01:00:5e:00:01:02 vlan 3 interface
ethernet 0/0/2
S-switch-A(config)#multicast mac-address 01:00:5e:00:01:03 vlan 4
S-switch-A(config)#multicast mac-address 01:00:5e:00:01:03 vlan 4 interface
ethernet 0/0/3
Show the switch learned multicast groups
S-switch-A(config)#show multicast
show multicast table information
MAC Address
: 01:00:5e:00:01:01
VLAN ID
:2
Static port list
:.e0/0/1
IGMP port list
:
Dynamic port list
:
MAC Address
VLAN ID
Static port list
IGMP port list
Dynamic port list
: 01:00:5e:00:01:02
:3
: e0/0/2
:
:
MAC Address
VLAN ID
: 01:00:5e:00:01:03
:4
www.fineprint.cn
Page 15 of 16
: e0/0/3
:
:
Total entries: 3 .
S-switch-A(config)#show igmp-snooping router-static
Port
VID
Age
Type
e0/0/4
2
no age
{ STATIC }
e0/0/4
3
no age
{ STATIC }
e0/0/4
4
no age
{ STATIC }
Total Record: 3
When Multicast Source Router sends 224.0.1.1-224.0.1.3 multicast serve data flow,
S-switch-A will forward corresponding to Host-A, Host-B, Host-C.
www.fineprint.cn
Page 16 of 16
GMRP Configuration
GMRP Configuration
www.fineprint.cn
Page 1 of 10
GMRP Configuration
www.fineprint.cn
Page 2 of 10
GMRP Configuration
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 10
GMRP Configuration
Content
Chapter 1 GMRP Configuration......................................................................................................... 5
1.1 Brief Introduction to GMRP ................................................................................................ 5
1.2 GMRP Configuration ........................................................................................................... 5
1.2.1 Enabling GMRP......................................................................................................... 5
1.2.2 Add Requisite Static Route Forwarded by GMRP ..................................................... 5
1.2.3 Displaying and Maintain GMRP................................................................................ 6
1.2.4 GMRP Configuring Examples.................................................................................... 6
www.fineprint.cn
Page 4 of 10
GMRP Configuration
Command
Remark
configure terminal
gmrp
required
interface ethernet
device/slot/port
gmrp
required
Command
configure terminal
www.fineprint.cn
Remark
required
Page 5 of 10
GMRP Configuration
vid
Command
show gmrp
show multicast
Remark
Configuration steps:
!Configuration on S1
*************************************************************
!Before configuration
Switch(config)#vlan 111,333
Switch(config-if-vlan)#switchport ethernet 0/0/1 to ethernet 0/0/10
Add VLAN port successfully.
Switch(config)#multicast mac-address 01:00:5e:01:01:01 vlan 111
adding multicast group successfully !
Switch(config)#multicast mac-address 01:00:5e:01:01:01 vlan 111 interface
ethernet 0/0/1 to ethernet 0/0/10
adding multicast group port successfully !
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 6 of 10
GMRP Configuration
Switch(config-if-vlan)#interface e 0/0/1
Switch(config-if-ethernet-0/0/1)#switchport mode trunk
Switch(config-if-ethernet-0/0/1)#exit
!Configure GMRP
Switch(config)#gvrp
Turn on GVRP successfully.
Switch(config)#gmrp
Turn on GMRP successfully.
Switch(config)#garp permit vlan 111,333
Switch(config)#garp permit multicast mac-address 01:00:5e:01:01:01 vlan
111
Switch(config)#interface e 0/0/1
Switch(config-if-ethernet-0/0/1)#gvrp
Switch(config-if-ethernet-0/0/1)#gmrp
Switch(config-if-ethernet-0/0/1)#exit
!GVRP configuration verification
Switch(config)#show gmrp
GMRP status : enable
Switch(config)#show gmrp interface ethernet 0/0/1
port
GMRP status
e0/0/1 enable
Total entries: 1.
Switch(config)#show garp permit multicast
GARP permit multicast:
vlan 111, mac 01:00:5e:01:01:01
*************************************************************
!Configuration on S2
*************************************************************
!Before configuration
Switch(config)#interface range ethernet 0/0/2 to ethernet 0/0/3
Switch(config-if-range)#switchport mode trunk
Switch(config-if-range)#exit
!Configure GMRP
Switch(config)#gvrp
Turn on GVRP successfully
Switch(config)#gmrp
Turn on GMRP successfully.
Switch(config)#interface range ethernet 0/0/2 to ethernet 0/0/3
Switch(config-if-range)#gvrp
Switch(config-if-range)#gmrp
Switch(config-if-range)#exit
!GVRP configuration verification
Switch(config)#show gmrp
GMRP state : enable
Switch(config)#show gmrp interface ethernet 0/0/2 ethernet 0/0/3
port
GMRP status
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 7 of 10
GMRP Configuration
e0/0/2 enable
e0/0/3 enable
Total entries: 2.
*************************************************************
!Configuration on S3
*************************************************************
!Before configuration
Switch(config)#vlan 111,333
Switch(config-if-vlan)#switchport ethernet 0/0/1 to ethernet 0/0/10
Add VLAN port successfully.
Switch(config)#multicast mac-address 01:00:5e:03:03:03 vlan 333
adding multicast group successfully !
Switch(config)#multicast mac-address 01:00:5e:03:03:03 vlan 333 interface
ethernet 0/0/1 to ethernet 0/0/10
adding multicast group port successfully !
Switch(config-if-vlan)#interface e 0/0/4
Switch(config-if-ethernet-0/0/4)#switchport mode trunk
Switch(config-if-ethernet-0/0/4)#exit
!Configure GMRP
Switch(config)#gvrp
Turn on GVRP successfully.
Switch(config)#gmrp
Turn on GMRP successfully.
Switch(config)#garp permit vlan 111,333
Switch(config)#garp permit multicast mac-address 01:00:5e:03:03:03 vlan
333
Switch(config)#interface e 0/0/4
Switch(config-if-ethernet-0/0/4)#gvrp
Switch(config-if-ethernet-0/0/4)#gmrp
Switch(config-if-ethernet-0/0/4)#exit
!GVRP configuration verification
Switch(config)#show gmrp
GMRP status : enable
Switch(config)#show gmrp interface ethernet 0/0/4
port
GMRP status
e0/0/4 enable
Total entries: 1.
Switch(config)#show garp permit multicast
GARP permit multicast:
vlan 333, mac 01:00:5e:03:03:03
*************************************************************
After configuration is complete, you can show multicast command to view
the function of learning to GMRP multicast registration information.
!View the multicast information in S1 can be found, 01:00:5 e: 03:03:03 is
learned by GMRP multicast.
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 8 of 10
GMRP Configuration
Switch(config)#show multicast
show multicast table information
MAC Address
: 01:00:5e:01:01:01
VLAN ID
: 111
Static port list : e0/0/1-e0/0/10.
IGMP port list
:
Dynamic port list :
MAC Address
: 01:00:5e:03:03:03
VLAN ID
: 333
Static port list :
IGMP port list
:
Dynamic port list : e0/0/1.
Total entries: 2 .
! To view the multicast information on S3 can be found, 01:00:5 e: 01:01:01
and 01:00:5 e: 03:03:03 through learning to GMRP multicast.
Switch(config)#show multicast
show multicast table information
MAC Address
: 01:00:5e:01:01:01
VLAN ID
: 111
Static port list :
IGMP port list
:
Dynamic port list : e0/0/2.
MAC Address
: 01:00:5e:03:03:03
VLAN ID
: 333
Static port list :
IGMP port list
:
Dynamic port list : e0/0/3.
Total entries: 2 .
!View multicast information on S3 can be found, 01:00:5 e: 01:01:01 by
GMRP multicast learn.
Switch(config)#show multicast
show multicast table information
MAC Address
: 01:00:5e:01:01:01
VLAN ID
: 111
Static port list :
IGMP port list
:
Dynamic port list : e0/0/4.
MAC Address
VLAN ID
Static port list
: 01:00:5e:03:03:03
: 333
: e0/0/1-e0/0/10.
www.fineprint.cn
Page 9 of 10
GMRP Configuration
www.fineprint.cn
Page 10 of 10
DHCP Configuration
DHCP Configuration
www.fineprint.cn
Page 1 of 16
DHCP Configuration
www.fineprint.cn
Page 2 of 16
DHCP Configuration
Your opinion helps us improve the quality of our product documentation and offer better
services.
Document
Title
Product
Version
Evaluate this
document
Documen
t Revision
Number
1.0
Presentation:
(Introductions, procedures, illustrations, completeness, arrangement, appearance)
Good
Fair
Average
Poor
Accessibility:
(Contents, index, headings, numbering)
Good
Fair
Average
Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
to improve
the
document
Fair
Average
Poor
Improve arrangement
Include images
Improve index
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 16
DHCP Configuration
Content
Chapter 1
DHCP Configuration ........................................................................................................ 1
1.1 DHCP Overview ........................................................................................................................ 1
1.2 DHCP IP Address Assignment .................................................................................................... 1
1.2.1 IP Address Assignment Policy ......................................................................................... 1
1.2.2 Obtaining IP Addresses Dynamically ................................................................................ 2
1.2.3 DHCP Packet Format ...................................................................................................... 3
1.3 DHCP Relay .............................................................................................................................. 5
1.3.1 Usage of DHCP Relay...................................................................................................... 5
1.3.2 DHCP Relay Fundamentals ............................................................................................. 5
1.4 Configure DHCP Relay ............................................................................................................... 6
Chapter 2
DHCP Snooping .............................................................................................................. 7
2.1 Introduction to DHCP Snooping ................................................................................................. 7
2.2 DHCP Snooping Configuration ................................................................................................... 7
2.3 DHCP-Snooping Security Configuration ...................................................................................... 8
2.3.1 Configure Max Clients Number ....................................................................................... 8
2.3.2 Configure IP-Source-Guard ............................................................................................. 8
2.4 Displaying and Debugging DHCP-Snooping ................................................................................. 9
2.5 DHCP-Snooping Configuration Example...................................................................................... 9
Chapter 3
DHCP Option 82 ........................................................................................................... 11
3.1 Introduction to option 82 supporting ....................................................................................... 11
3.2 DHCP Option82 Configuration ................................................................................................. 11
3.2.1 Enable DHCP Option82 ................................................................................................. 11
3.2.2 Displaying and Debugging DHCP Option82..................................................................... 12
www.fineprint.cn
Page 4 of 16
DHCP Configuration
Picture 1-1.
www.fineprint.cn
Page 1 of 16
DHCP Configuration
Dynamic assignment. The DHCP server assigns IP addresses to DHCP clients for
predetermined period of time. In this case, a DHCP client must apply for an IP
address at the expiration of the period. This policy applies to most clients.
1.2.2 Obtaining IP Addresses Dynamically
Interaction between a DHCP client and a DHCP server is as shown in Picture 1-2.
Picture 1-2.
There are three different modes for DHCP client to obtain IP address in different
stage:
(1) Initial login for DHCP client
There are four stages for the initial login of DHCP client:
Discover. In this phase, the DHCP client tries to find a DHCP server by
broadcasting a DHCP-DISCOVER packet.
Offer. In this phase, the DHCP server offers an IP address. Each DHCP server that
receives the DHCP-DISCOVER packet chooses an unassigned IP address from the
address pool based on the IP address assignment policy and then broadcasts a
DHCP-OFFER packet to the DHCP client.
Select: In this phase, the DHCP client selects an IP address. If more than one
DHCP server sends DHCP-OFFER packets to the DHCP client, the DHCP client only
accepts the DHCP-OFFER packet that first arrives, and then broadcasts a
DHCP-REQUEST packet containing the assigned IP address carried in the
DHCP-OFFER packet.
Acknowledge: Upon receiving the DHCP-REQUEST packet, the DHCP server
returns a DHCP-ACK packet to the DHCP client to confirm the assignment of the IP
address to the client. When the client receives the DHCP-ACK packet, it broadcasts
an ARP packet with the assigned IP address as the destination address to detect the
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 2 of 16
DHCP Configuration
assigned IP address, and uses the IP address only if it does not receive any response
within a specified period.
The IP addresses offered by other DHCP servers (if any) are not used by the DHCP
client and are still available to other clients.
(2) The next login for DHCP client
When DHCP client relogin, there are two types of situation:
The last-assigned IP address is not occupied. Broadcast a DHCP-REQUEST packet
containing the assigned IP address, the DHCP server returns a DHCP-ACK packet to
the DHCP client to confirm the assignment of the IP address to the client.
The last-assigned IP address is occupied. Broadcast a DHCP-REQUEST packet
containing the assigned IP address, the DHCP server returns a DHCP-NAK packet to
refuse the assignment of the IP address to the client. The client will re-send
DHCP_Discover packet to request a new IP address.
(3) Updating IP Address Lease
After a DHCP server dynamically assigns an IP address to a DHCP client, the IP
address keeps valid only within a specified lease time and will be reclaimed by the
DHCP server when the lease expires. If the DHCP client wants to use the IP address
for a longer time, it must update the IP lease.
By default, a DHCP client updates its IP address lease automatically by unicasting a
DHCP-REQUEST packet to the DHCP server when half of the lease time elapses. The
DHCP server responds with a DHCP-ACK packet to notify the DHCP client of a new IP
lease if the server can assign the same IP address to the client. Otherwise, the DHCP
server responds with a DHCP-NAK packet to notify the DHCP client that the IP
address will be reclaimed when the lease time expires.
If the DHCP client fails to update its IP address lease when half of the lease time
elapses, it will update its IP address lease by broadcasting a DHCP-REQUEST packet
to the DHCP server again when seven-eighths of the lease time elapses. The DHCP
server performs the same operations as those described in the previous section.
1.2.3 DHCP Packet Format
DHCP has eight types of packets. They have the same format, but the values of some
fields in the packets are different. The DHCP packet format is based on that of the
BOOTP packets. The following table describes the packet format (the number in the
brackets indicates the field length, in bytes):
www.fineprint.cn
Page 3 of 16
DHCP Configuration
Picture 1-3.
www.fineprint.cn
Page 4 of 16
DHCP Configuration
Picture 1-4.
DHCP relays can transparently transmit broadcast packets on DHCP clients or servers
to the DHCP servers or clients in other network segments.
In the process of dynamic IP address assignment through the DHCP relay, the DHCP
client and DHCP server interoperate with each other in a similar way as they do
without the DHCP relay. The following sections only describe the forwarding process
of the DHCP relay. For the interaction process of the packets, see 1.2.2 Obtaining IP
Addresses Dynamically.
The DHCP client broadcasts the DHCP-DISCOVER packet.
After receiving the packets, the network device providing the DHCP relay function
unicasts the packet to the designated DHCP server based on the configuration.
The DHCP server assigns IP addresses, and then broadcasts the configuration
information to the client through the DHCP relay. The sending mode is determined
by the flag in the DHCP-DISCOVER packets from the client. For detailed information,
refer to section 1.3 DHCP Packet Format.
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 5 of 16
DHCP Configuration
Operation
Enter global configuration
mode
Enable DHCP Relay
Enter vlan configuration mode
Configure vlan ipaddres
Configure vlan DHCP server
Command
configure terminal
dhcp-relay
vlan <vid>
interface
ip
<ip>
<mask>
<gateway>
dhcpserver { ip | backupip } <ip>
www.fineprint.cn
Remarks
required
required
required
required
Page 6 of 16
DHCP Configuration
Operation
Enable DHCP-Snooping
Enter interface configuration
mode
Configure port connected to
DHCP server direction to be
Trust
Command
Description
dhcp-snooping
By default, DHCP-Snooping is
disabled.
interface Ethernet
(device/slot/port)
port_id
dhcp-snooping trust
www.fineprint.cn
Page 7 of 16
DHCP Configuration
Operation
Command
dhcp-snooping
<0-2048>
vlan vlan_list
dhcp-snooping
<0-2048>
Description
max-clients
max-clients
By
default,
the
max
DHCP-Client
number
connected to switch port is
2048.
By
default,
the
max
DHCP-Client
number
in
specified VLAN is 2048.
www.fineprint.cn
Page 8 of 16
DHCP Configuration
Operation
Configure
IP-source-guard bind
table
Enter
interface
configuration mode
Enable
IP-Source-Guard on
Trust port
By default, ip-source-guard
on port is disabled.
Caution:
IP source guard filters packets based on the following types of binding entries:
Source IP
Source IP + source MAC
Source IP + source MAC + source port
Operation
Display DHCP-Snooping
clients
Display DHCP-Snooping
status in interface
Display DHCP-Snooping
status in VLAN
Display IP-Source-Guard
status in interface
Display source IP binding
table of IP-Source-Guard
Command
show dhcp-snooping clients
show
dhcp-snooping
interface
device-num<0>/slot-num<0-2>/port-num<1-48>]
[ethernet
www.fineprint.cn
Page 9 of 16
DHCP Configuration
II. Network diagram
Picture 1-5.
www.fineprint.cn
Page 10 of 16
DHCP Configuration
www.fineprint.cn
Page 11 of 16
DHCP Configuration
Operation
Command
dhcp option82
dhcp
option82
{drop|keep|replace}
strategy
Description
By default, DHCP Option82
is disabled.
By default, the DHCP relay
replaces the option 82
carried by a DHCP request
packet with its own option
82.
Operation
Display DHCP option82
Command
show dhcp option82
www.fineprint.cn
Page 12 of 16
ACL Configuration
ACL Configuration
www.fineprint.cn
Page 1 of 13
ACL Configuration
www.fineprint.cn
Page 2 of 13
ACL Configuration
Your opinion helps us improve the quality of our product documentation and offer better
services.
Document
Title
Product
Version
Evaluate this
document
Documen
t Revision
Number
1.0
Presentation:
(Introductions, procedures, illustrations, completeness, arrangement, appearance)
Good
Fair Average Poor
Accessibility:
(Contents, index, headings, numbering)
Good
Fair Average Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Fair Average Poor
Your
suggestions
to improve
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 13
ACL Configuration
Contents
Chapter 1 ACL Configuring ..................................................................................................................... 5
1.1 Brief Introduction to ACL .......................................................................................................... 5
1.1.1 Configuring Match Order................................................................................................ 5
1.1.2 Switch Support ACL ........................................................................................................ 6
1.2 Configuring Time Range ............................................................................................................ 6
1.2.1 Configuration Procedure ................................................................................................ 6
1.2.2 Configuration Examples ................................................................................................. 7
1.3 Configuring a Basic ACL ............................................................................................................. 7
1.3.1 Configuration Procedure ................................................................................................ 8
1.3.2 Configuration Examples ................................................................................................. 8
1.4 Define Extended ACL ................................................................................................................ 8
1.4.1 Configuration Procedure ................................................................................................ 8
1.4.2 Configuration Procedure .............................................................................................. 10
1.5 Define Layer 2 ACL ................................................................................................................. 10
1.5.1 Configuring Layer 2 ACL ............................................................................................... 10
1.5.2 Configuration Examples ............................................................................................... 11
1.6 Activate ACL .......................................................................................................................... 11
1.6.1 Configuration Examples ............................................................................................... 12
1.6.2 Activate ACL successfully .Active ACL Binding................................................................. 12
1.7 Displaying and Debugging ACL ................................................................................................. 12
www.fineprint.cn
Page 4 of 13
ACL Configuration
deny
any
www.fineprint.cn
Page 5 of 13
ACL Configuration
remark
configure terminal
time-range name
require
d
Note that:
Periodic time range created using the time-range time-name start-time to end-time
days command. A time range thus created recurs periodically on the day or days of
the week.
Absolute time range created using the time-range time-name {from time1 date1 [ to
time2 date2 ] | to time2 date2 } command. Unlike a periodic time range, a time
range thus created does not recur. For example, to create an absolute time range
that is active between January 1, 2004 00:00 and December 31, 2004 23:59, you may
use the time-range test from 00:00 01/01/2004 to 23:59 12/31/2004 command.
Compound time range created using the time-range time-name start-time to
end-time days { from time1 date1 [ to time2 date2 ] | to time2 date2 } command. A
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 6 of 13
ACL Configuration
time range thus created recurs on the day or days of the week only within the
specified period. For example, to create a time range that is active from 12:00 to
14:00 on Wednesdays between January 1, 2004 00:00 and December 31, 2004 23:59,
you may use the time-range test 12:00 to 14:00 Wednesday from 00:00 01/01/2004
to 23:59 12/31/2004 command.
You may create individual time ranges identified with the same name. They are
regarded as one time range whose active period is the result of ORing periodic ones,
ORing absolute ones, and ANDing periodic and absolute ones.
With no start time specified, the time range is from the earliest time that the system
can express (that is, 00:00 01/01/1970) to the end time. With no end time specified,
the time range is from the time the configuration takes effect to the latest time that
the system can express (that is, 24:00 12/31/2100).
Up to 256 time ranges can be defined.
1.2.2 Configuration Examples
1. Create an absolute time range from 16:00, Jan 3, 2009 to 16:00, Jan 5, 2009
Switch#configure terminal
Switch(config)#time-range b
Config time range successfully.
Switch(config-timerange-b)#absolute start 16:00:00 2009/1/3 end 16:00:00
2009/1/5
Config absolute range successfully .
Switch(config-timerange-b)#show time-range name b
Current time is: 02:46:43 2009/01/31
Saturday
time-range: b ( Inactive )
absolute: start 16:00:00 2009/01/03 end 16:00:00 2009/01/05
2. Create a periodic time range that is active from 8:00 to 18:00 every working day.
Switch#configure terminal
Switch(config)#time-range b
Config time range successfully.
Switch(config-timerange-b)#periodic weekdays 8:00:00 to 18:00:00
Config periodic range successfully .
Switch(config-timerange-b)#show time-range name b
Current time is: 02:47:56 2009/01/31 Saturday
time-range: b ( Inactive )
periodic: weekdays 08:00
to
18:00
www.fineprint.cn
Page 7 of 13
ACL Configuration
configure terminal
remark
optional
by
default ,sys
tem
is
config
required
remark
optional
name
match-order
by
default ,system
is config
access-list standard
{ config | auto }
required
required
www.fineprint.cn
Page 8 of 13
ACL Configuration
Command
Enter global configuration
mode
Operation
Remark
configure terminal
optional
by
default ,syst
em is config
required
required
www.fineprint.cn
Page 9 of 13
ACL Configuration
{ dest-addr
The purpose of ACL rules specified
address information
dest-wildcard| any}
address.
port
precedence precedence
tos tos
dscp dscp
time-range name
dest-addr dest-wildcard
used to determine the
packet destination
address, in dotted
decimal notation;
dest-wildcard is 0, the
host address
Any is any destination
DSCP priority
Level ranges from 0 to 63
fragment fragmentation information
Create a time range
IP precedence values
range from 0 to 7
ToS priority ranges from
0 to 15
Rule applies only to
non-first fragment
packet effective
www.fineprint.cn
Remark
Page 10 of 13
ACL Configuration
Enter global
configuration mode
configure terminal
optional
by
default ,system
is config
required
required
configure terminal
www.fineprint.cn
Remark
Page 11 of 13
ACL Configuration
mode
Active ACL
required
www.fineprint.cn
Remark
perform either of
Page 12 of 13
ACL Configuration
www.fineprint.cn
the commands
Page 13 of 13
Storm-control Configuration
www.fineprint.cn
Page 0 of 5
www.fineprint.cn
Page 1 of 5
Content
Chapter 1
Storm-control Configuration ........................................................................................... 3
1.1 Storm-control Overview............................................................................................................ 3
1.2 Storm-Control Configuration ..................................................................................................... 3
1.2.1 Configure Storm-Control ................................................................................................ 3
1.2.2 Storm-control Monitor and Maintenance ........................................................................ 4
www.fineprint.cn
Page 2 of 5
Operation
Command
configure terminal
Storm-control type {broadcast
|multicast |dlf}
Remarks
Required
The
threshol
d can be
1/2,1/4,1/
8,1/16
Enter
interface
configuration
www.fineprint.cn
Page 3 of 5
mode
Enable storm-control
storm-control
Required
Command
Remarks
On
Show interface
any
configuration
mode
& Note:
If there is no configuration for storm-control, there will be no info show for that.
www.fineprint.cn
Page 4 of 5
QoS Configuration
QoS Configuration
www.fineprint.cn
Page 1 of 15
QoS Configuration
www.fineprint.cn
Page 2 of 15
QoS Configuration
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 15
QoS Configuration
Contents
Chapter 1 QoS Configuration ......................................................................................................... 5
1.1 Brief Introduction to QoS .................................................................................................... 5
1.1.1 Traffic........................................................................................................................ 5
1.1.2 Traffic Classification .................................................................................................. 5
1.1.3 Priority...................................................................................................................... 6
1.1.4 Access Control List.................................................................................................... 8
1.1.5 Packet Filtration ....................................................................................................... 8
1.1.6 Flow Monitor............................................................................................................ 8
1.1.7 Interface Speed Limitation ....................................................................................... 8
1.1.8 Redirection ............................................................................................................... 8
1.1.9 Priority Mark ............................................................................................................ 8
1.1.10 Choose Interface Outputting Queue for Packet ..................................................... 8
1.1.11 Queue Scheduler.................................................................................................... 9
1.1.12 Cos-map Relationship of Hardware Priority Queue and Priority of IEEE802.1p
Protocol ............................................................................................................................. 9
1.1.13 Flow Mirror .......................................................................................................... 10
1.1.14 Statistics Based on Flow ....................................................................................... 10
1.1.15 Copy Packet to CPU .............................................................................................. 10
1.2 QOS Configuration ............................................................................................................ 10
1.2.1 Configuring Flow Monitor ...................................................................................... 10
1.2.2 Configure Two Rate Three Color Marker................................................................ 10
1.2.3 Configuring Interface Line Rate.............................................................................. 11
1.2.4 Configuring Packet Redirection .............................................................................. 11
1.2.5 Configuring Traffic Copy to CPU ............................................................................. 11
1.2.6 Configuring Traffic Priority ..................................................................................... 12
1.2.7 Configuring Queue-Scheduler ................................................................................ 12
1.2.8 Configuring Cos-map Relationship of Hardware Priority Queue and Priority of
IEEE802.1p Protocol ........................................................................................................ 12
1.2.9 Configuring Mapping Relationship between DSCP and 8 Priority in IEEE 802.1p .. 13
1.2.10 Configuring Flow Statistic..................................................................................... 14
1.2.11 Configuring Flow Mirror ....................................................................................... 14
1.2.12 Displaying and Maintain QoS ............................................................................... 14
www.fineprint.cn
Page 4 of 15
QoS Configuration
Chapter 1
QoS Configuration
www.fineprint.cn
Page 5 of 15
QoS Configuration
1.1.3 Priority
(1) 802.1p priority lies in Layer 2 packet headers and is applicable to occasions where
the Layer 3 packet header does not need analysis but QoS must be assured at Layer 2.
As shown in the chapter of VLAN configuration. Each host supported 802.1Q protocol
forwards packets which are from Ethernet frame source address add a 4-byte tag
header. Figure as 1-1.
As shown in the figure above, PRI segment is 802.1p priority. It consists of 3bits
whose range from 0~7. The three bits point the frame priority. The tag including 8
formats gives the precedence to forward the packets.
cos (decimal)
0
1
2
3
4
5
6
7
www.fineprint.cn
Page 6 of 15
QoS Configuration
7
111
network
According to RFC 2474, the ToS field is redefined as the differentiated services (DS)
field, where a DSCP value is represented by the first six bits (0 to 5) and ranges from 0
to 63. The remaining two bits (6 and 7) are reserved.
In a network in the Diff-Serve model, traffic is grouped into the following classes, and
packets are processed according to their DSCP values
l Expedited forwarding (EF) class: In this class, packets are forwarded regardless of
link share of other traffic. The class is suitable for preferential services requiring low
delay, low packet loss, low jitter, and high bandwidth.
l Assured forwarding (AF) class: This class is divided into four subclasses (AF 1 to
AF 4), each containing three drop priorities for more granular classification. The QoS
level of the AF class is lower than that of the EF class.
l Class selector (CS) class: This class is derived from the IP ToS field and includes
eight subclasses.
l Best effort (BE) class: This class is a special CS class that does not provide any
assurance. AF traffic exceeding the limit is degraded to the BE class. All IP network
traffic belongs to this class by default.
DSCP (decimal)
0
46
10
18
26
34
8
16
24
32
40
48
56
www.fineprint.cn
cs6
cs7
Page 7 of 15
QoS Configuration
www.fineprint.cn
Page 8 of 15
QoS Configuration
www.fineprint.cn
Page 9 of 15
QoS Configuration
remark
configure terminal
optional, perform
either of the
globally and port
mode
optional
Operation
Enter
globally
configuration mode
Enter
port
configuration mode
www.fineprint.cn
remark
optional
optional,
perform
either of the
globally and
Page 10 of 15
QoS Configuration
port mode
rate-limit { input | output } { [ ip-group
{ num | name } [ subitem subitem ] ]
[ link-group { num | name } [ subitem
subitem ] ] } two-rate-policer policer-id
optional
remark
configure terminal
bandwidth-control
target-rate
egress
optional
bandwidth-control
target-rate
ingress
optional
Operation
Enter globally configuration mode
configure terminal
optional
configure terminal
traffic-copy-to-cpu { [ ip-group
{ num | name } [ subitem
subitem ] ] [ link-group { num |
name } [ subitem subitem ] ] }
optional
remark
www.fineprint.cn
Page 11 of 15
QoS Configuration
Operation
remark
configure terminal
optional
Operation
remark
configure terminal
Configure SP
queue-scheduler strict-priority
optional
Configure WRR
queue-scheduler
wrr
queue1-weight queue2-weight
queue3-weight queue4-weight
optional
Configure SR+WRR
queue-scheduler
sp-wrr
queue1-weight queue2-weight
queue3-weight
optional
www.fineprint.cn
Page 12 of 15
QoS Configuration
1
Administrators also change the cos-map relationship of hardware priority queue and
priority of IEEE802.1p protocol according to the actual network.
Table 1-12 Modifying 802.1p and he cos-map relationship of hardware priority queue
Operation
Command
remark
Enter globally configuration mode
configure terminal
Modify
802.1p and he cos-map
relationship of hardware priority queue
queue-scheduler
queue-number
packed-priority
cos-map
optional
SCP
16
32
48
17
33
49
18
34
50
19
35
51
20
36
52
21
37
53
22
38
54
23
39
55
24
40
56
25
41
57
10
26
42
58
11
27
43
59
12
28
44
60
13
29
45
61
14
30
46
62
15
31
47
63
www.fineprint.cn
Page 13 of 15
QoS Configuration
Administrators also change the mapping relationship between DSCP and 8 priority in
IEEE 802.1p according to the actual network.
Table 1-14 Configuring the relation between DSCP and 8 priority in IEEE 802.1p
Operation
Command
remark
Enter
mode
globally
configuration
configure terminal
queue-scheduler dscp-map
required
by default, it is disable.
Modify the relation between
DSCP and 8 priority in IEEE
802.1p
queue-scheduler dscp-map
dscp-value 802.1p-priority
optional
Enter
globally
configuration mode
Configure flow staticstic
reset to Zero
configure terminal
traffic-statistic { [ ip-group
{ num | name } [ subitem
subitem ] ] [ link-group { num
| name } [ subitem
subitem ] ] }
clear traffic-statistic { [ all |
[ ip-group { num | name }
[ subitem subitem ] ]
[ link-group { num | name }
[ subitem subitem ] ] ] }
remark
-
optional
optional
www.fineprint.cn
Page 14 of 15
QoS Configuration
Table 1-17
Operation
Display quue-scheduler
parameters
mode
and
show queue-scheduler
show qos-interface
rate-limit
Display
QoS
parameters
interface
statistic
[interface-num
remark
www.fineprint.cn
perform
either of
the
comman
ds
Page 15 of 15
RSTP Configuration
STP Configuration
www.fineprint.cn
Page 1 of 27
RSTP Configuration
www.fineprint.cn
Page 2 of 27
RSTP Configuration
Content
Chapter 1
STP Configuration .......................................................................................................... 1
1.1 STP Overview .......................................................................................................................... 1
1.1.1 Function of STP ............................................................................................................. 1
1.1.2 Protocol Packets of STP ................................................................................................. 1
1.1.3 Basic Concepts in STP .................................................................................................... 1
1.1.4 Spanning-Tree Interface States....................................................................................... 2
1.2 How STP Works ....................................................................................................................... 3
1.3 Implement RSTP on Ethernet Switch ....................................................................................... 12
1.4 Configure RSTP ...................................................................................................................... 13
1.4.1 RSTP Configuration Task List ........................................................................................ 13
1.4.2 Enable RSTP ................................................................................................................ 14
1.4.3 Configure STP Bridge Priority ....................................................................................... 14
1.4.4 Configure Time Parameter ........................................................................................... 14
1.4.5 Configure STP Path Cost............................................................................................... 15
1.4.6 Configure STP Port Priority ........................................................................................... 16
1.4.7 Configure STP mcheck ................................................................................................. 16
1.4.8 Configure STP Point-to-Point Mode .............................................................................. 17
1.4.9 Configure STP Portfast ................................................................................................. 17
1.4.10 Configure STP Transit Limit ........................................................................................ 17
1.4.11 RSTP Monitor and Maintenance ................................................................................. 18
1.5 STP Configuration Example ..................................................................................................... 18
www.fineprint.cn
Page 3 of 27
RSTP Configuration
Page 1 of 27
www.fineprint.cn
RSTP Configuration
On a non-root bridge device, the root port is the port nearest to the root bridge. The
root port is responsible for communication with the root bridge. A non-root-bridge
device has one and only one root port. The root bridge has no root port.
3. Designated Bridge
For a device, Designated Bridge is the device directly connected with this device and
responsible for forwarding BPDUs; For a LAN, Designated Bridge is the device
responsible for forwarding BPDUs to this LAN segment.
4. Designated Port
For a device, Designated Port is the port through which the designated bridge forwards
BPDUs to this device; For a LAN, Designated Port is the port through which the
designated bridge forwards BPDUs to this LAN segment.
5. Path cost
Path cost is a reference value used for link selection in STP. By calculating the path cost,
STP selects relatively robust links and blocks redundant links, and finally prunes the
network into loop-free tree structure.
1.1.4 Spanning-Tree Interface States
Each Layer 2 interface on a switch using spanning tree exists in one of these states:
l Disabled
The interface is not participating in spanning tree because of a shutdown port, no link on
the port, or no spanning-tree instance running on the port.
l Blocking
The interface does not participate in frame forwarding.
l Listening
The first transitional state after the blocking state when the spanning tree determines
that the interface should participate in frame forwarding.
l Learning
The interface prepares to participate in frame forwarding.
l Forwarding
The interface forwards frames.
An interface moves through these states:
From initialization to blocking
From blocking to listening or to disabled
From listening to learning or to disabled
From learning to forwarding or to disabled
From forwarding to disabled
Figure 1-1 Spanning-Tree Interface States
Page 2 of 27
www.fineprint.cn
RSTP Configuration
When you power up the switch, spanning tree is enabled by default, and every interface in
the switch, VLAN, or network goes through the blocking state and the transitory states of
listening and learning. Spanning tree stabilizes each interface at the forwarding or blocking
state.
When the spanning-tree algorithm places a Layer 2 interface in the forwarding state, this
process occurs:
1. The interface is in the listening state while spanning tree waits for protocol
information to transition the interface to the blocking state.
2. While spanning tree waits the forward-delay timer to expire, it moves the
interface to the learning state and resets the forward-delay timer.
3. In the learning state, the interface continues to block frame forwarding as
the switch learns end-station location information for the forwarding
database.
4. When the forward-delay timer expires, spanning tree moves the interface to
the forwarding state, where both learning and frame forwarding are
enabled.
Root bridge ID: consisting of root bridge priority and MAC address.
Root path cost: the cost of the shortest path to the root bridge.
Message age: age of the configuration BPDU while it propagates in the network.
Max age: maximum age of the configuration BPDU maintained in the device.
Page 3 of 27
www.fineprint.cn
RSTP Configuration
Initial state
Upon initialization of a device, each port generates a BPDU with itself as the root bridge, in
which the root path cost is 0, designated bridge ID is the device ID, and the designated port
is the local port.
l
Each device sends out its configuration BPDU and receives configuration BPDUs from other
devices.
The process of selecting the optimum configuration BPDU is as follows:
Figure 1-2 Selection of the optimum configuration BPDU
Step
1
Description
Upon receiving a configuration BPDU on a port, the device performs the following
processing:
l
If the received configuration BPDU has a lower priority than that of the
configuration BPDU generated by the port, the device will discard the received
configuration BPDU without doing any processing on the configuration BPDU of
this port.
If the received configuration BPDU has a higher priority than that of the
configuration BPDU generated by the port, the device will replace the content of
the configuration BPDU generated by the port with the content of the received
configuration BPDU.
The device compares the configuration BPDUs of all the ports and chooses the
Page 4 of 27
www.fineprint.cn
RSTP Configuration
The configuration BPDU that has the lowest root bridge ID has the highest
priority.
If all configuration BPDUs have the same root bridge ID, they will be
compared for their root path costs. If the root path cost in a configuration
BPDU plus the path cost corresponding to this port is S, the configuration
BPDU with the smallest S value has the highest priority.
If all configuration BPDUs have the same root path cost, they will be
compared for their designated bridge IDs, then their designated port IDs,
and then the IDs of the ports on which they are received. The smaller the
ID, the higher message priority.
At network initialization, each STP-compliant device on the network assumes itself to be the
root bridge, with the root bridge ID being its own device ID. By exchanging configuration
BPDUs, the devices compare one anothers root bridge ID. The device with the smallest root
bridge ID is elected as the root bridge.
l
The process of selecting the root port and designated ports is as follows:
Table 1-1 Selection of the root port and designated ports
Step
Description
Based on the configuration BPDU and the path cost of the root port, the device
calculates a designated port configuration BPDU for each of the rest ports.
l
The root bridge ID is replaced with that of the configuration BPDU of the root
port.
The root path cost is replaced with that of the configuration BPDU of the root
port plus the path cost corresponding to the root port.
Page 5 of 27
www.fineprint.cn
RSTP Configuration
The device compares the calculated configuration BPDU with the configuration BPDU
on the port of which the port role is to be defined, and does different things
according to the comparison result:
l
If the calculated configuration BPDU is superior, the device will consider this port
as the designated port, and the configuration BPDU on the port will be replaced
with the calculated configuration BPDU, which will be sent out periodically.
If the configuration BPDU on the port is superior, the device will block this port
without updating its configuration BPDU, so that the port will only receive
BPDUs, but not send any, and will not forward data.
& Note:
When the network topology is stable, only the root port and designated ports
forward traffic, while other ports are all in the blocked state- they only
receive STP packets but do not forward user traffic.
Once the root bridge, the root port on each non-root bridge and designated ports have been
unsuccessfully elected, the entire tree-shaped topology has been constructed.
The following is an example of how the STP algorithm works. The specific network diagram is
shown in Figure 1-3. In the feature, the priority of Device A is 0, the priority of Device B is 1,
the priority of Device C is 2, and the path costs of these links are 5, 10 and 4 respectively.
Page 6 of 27
www.fineprint.cn
RSTP Configuration
Port name
BPDU of port
Device A
AP1
{0, 0, 0, AP1}
AP2
{0, 0, 0, AP2}
BP1
{1, 0, 1, BP1}
BP2
{1, 0, 1, BP2}
CP1
{2, 0, 2, CP1}
CP2
{2, 0, 2, CP2}
Device B
Device C
The following table shows the comparison process and result on each device.
Table 1-3 Comparison process and result on each device
Device
Comparison process
Page 7 of 27
www.fineprint.cn
RSTP Configuration
Device A
Device B
Page 8 of 27
www.fineprint.cn
RSTP Configuration
Device C
{0, 5, 1, BP2}
Page 9 of 27
www.fineprint.cn
RSTP Configuration
By comparison:
l
By comparison:
l
Page 10 of 27
www.fineprint.cn
RSTP Configuration
After the comparison processes described in the table above, a spanning tree with Device A
as the root bridge is stabilized, as shown in Figure 1-4.
Figure 1-4
& Note:
To facilitate description, the spanning tree calculation process in this example is
simplified, while the actual process is more complicated.
Upon network initiation, every switch regards itself as the root bridge, generates
configuration BPDUs with itself as the root, and sends the configuration BPDUs at a
regular interval of hello time.
If it is the root port that received the configuration BPDU and the received configuration
BPDU is superior to the configuration BPDU of the port, the device will increase
message age carried in the configuration BPDU by a certain rule and start a timer to
time the configuration BPDU while it sends out this configuration BPDU through the
designated port.
If the configuration BPDU received on the designated port has a lower priority than the
configuration BPDU of the local port, the port will immediately send out its better
configuration BPDU in response.
If a path becomes faulty, the root port on this path will no longer receive new
configuration BPDUs and the old configuration BPDUs will be discarded due to timeout.
In this case, the device will generate a configuration BPDU with itself as the root and
sends out the BPDU. This triggers a new spanning tree calculation process so that a new
path is established to restore the network connectivity.
However, the newly calculated configuration BPDU will not be propagated throughout the
network immediately, so the old root ports and designated ports that have not detected the
topology change continue forwarding data along the old path. If the new root port and
Page 11 of 27
www.fineprint.cn
RSTP Configuration
designated port begin to forward data as soon as they are elected, a temporary loop may
occur.
3) STP timers
STP calculations need three important timing parameters: forward delay, hello time, and
max age.
l Forward delay is the delay time for device state transition. A path failure will cause
re-calculation of the spanning tree, and the spanning tree structure will change
accordingly. However, the new configuration BPDU as the calculation result cannot be
propagated throughout the network immediately. If the newly elected root port and
designated ports start to forward data right away, a temporary loop is likely to occur. For
this reason, as a mechanism for state transition in STP, a newly elected root port or
designated port requires twice the forward delay time before transitioning to the
forwarding state, when the new configuration BPDU has been propagated throughout
the network.
l Hello time is the time interval at which a device sends hello packets to the
surrounding devices to ensure that the paths are fault-free.
l Max age is a parameter used to determine whether a configuration BPDU held by
the device has expired. A configuration BPDU beyond the max age will be discarded.
The port is an Edge port that does not connect with any switch directly or
indirectly. If the designated port is an edge port, it can switch to forwarding
state directly without immediately forwarding data.
The port is connected with the point-to-point link, that is, it is the master
port in aggregation ports or full duplex port. It is feasible to configure a
point-to-point connection. However, errors may occur and therefore this
configuration is not recommended. If the designated port is connected with
the point-to-point link, it can enter the forwarding state right after
handshaking with the downstream switch and receiving the response.
The switch that uses RSTP is compatible with the one using STP. Both protocol packets can
be identified by the switch running RSTP and used in spanning tree calculation.
XXXX Confidential & Proprietary Information
Page 12 of 27
www.fineprint.cn
RSTP Configuration
& Note:
RSTP is the protocol of single spanning tree. A switching network only has one
spanning tree. To guarantee the normal communication inside a VLAN, the
devices of a VLAN shall have routes to one another on the Spanning Tree,
otherwise, the communication inside the VLAN will be affected if some links
inside a VLAN are blocked.
For some VLAN that cannot be arranged along the spanning tree paths for some
special requirements, you have to disable RSTP on the switch port
corresponding to the VLAN.
Remarks
Enable STP
Required
1.4.2
Required
1.4.2
Optional
1.4.3
Optional
1.4.4
Optional
1.4.4
Optional
1.4.4
Optional
1.4.5
Optional
1.4.6
Optional
1.4.7
Optional
1.4.8
Optional
1.4.9
Optional
1.4.10
Configure
Hello-packet
sending interval
Configure RSTP
Page 13 of 27
www.fineprint.cn
RSTP Configuration
Show RSTP
Optional
1.4.11
Operation
Enter global configuration
mode
Enable STP globally
Select STP mode
Enter interface
configuration mode
Enable/disable STP on
port
Remarks
configure terminal
spanning-tree
spanning-tree mode stp
interface ethernet
device/slot/port
Required
Optional
(no)spanning-tree
Optional
& Note:
When enable STP globally, the system is working under RSTP mode.
Remarks
bridge
Optional
Page 14 of 27
www.fineprint.cn
RSTP Configuration
Remarks
Optional
Optional
Optional
& Note:
l Too long Hello Time may cause link failure thought by network bridge for
losing packets of the link to restart accounting STP; too smaller Hello Time may
cause network bridge frequently to send configuration packet to strengthen the
load of network and CPU. Hello Time ranges from 1 to 10 seconds. It is
suggested to use the default time of 2 seconds. Hello Time Forward Delay-2.
l If Forward Delay is configured too small, temporary redundancy will be
caused; if Forward Delay is configured too large, network will not be restored
linking for a long time. Forward Delay ranges from 4 to 30 seconds. The default
forward delay time, 15 seconds is suggested to use. Forward DelayHello Time +
2.
l Max Age is used to configure the longest aging interval of STP. Lose packet
when over-timing. The STP will be frequently accounts and take crowded
network to be link fault, if the value is too small. If the value is too large, the link
fault cannot be known timely. Max Age is determined by diameter of network,
and the default time of 20 seconds is suggested. 2*(Hello Time + 1) Max Age
2*(ForwardDelay 1) When enable STP globally, the system is working under
RSTP mode.
Page 15 of 27
www.fineprint.cn
RSTP Configuration
current port cost by itself. By default, the path cost is determined by the current port
speed.
When the port is 10M, the default cost is 200,000; when the port is 100M, the default
cost is 20,000; 1000M, 2,000.
Table 1-8 Configure STP path cost
Operation
Command
Enter global configuration
mode
Enter interface configuration
mode
Configure STP path cost
configure terminal
interface
ethernet
interface-num
spanning-tree cost path-cost
Remarks
Optional
Optional
Remarks
Optional
Enter
Remarks
-
Page 16 of 27
www.fineprint.cn
RSTP Configuration
mode
Enter interface configuration
mode
Configure STP mcheck
interface
ethernet
interface-num
spanning-tree mcheck
Optional
Remarks
configure terminal
spanning-tree
auto
spanning-tree
forcetrue
spanning-tree
forcefalse
point-to-point
Optional
point-to-point
Optional
point-to-point
Optional
Remarks
configure terminal
interface
ethernet
interface-num
spanning-tree portfast
Optional
Page 17 of 27
www.fineprint.cn
RSTP Configuration
Remarks
Optional
Command
Remarks
On
any
configurati
on mode
As shown in following figure, S-switch-A is core switch as the root. S-switch-B is the
bridge. The link between S-switch-A and S-switch-B is backup link. When there is failure
between S-switch-B and S-switch-C, the link between S-switch-A and S-switch-B can
work normally.
II. Network diagram
The default STP mode is RSTP. Enable global RSTP and use its default time parameter.
Configure Switch A
XXXX Confidential & Proprietary Information
Page 18 of 27
www.fineprint.cn
RSTP Configuration
Page 19 of 27
www.fineprint.cn
RSTP Configuration
S-switch-C(config-if-range)#exit
#Configure cost of Ethernet0/0/1 and Ethernet0/0/2 to be 10 to make sure link between
S-switch-B and S-switch-C to be main link
S-switch-C(config)#interface range ethernet 0/0/1 ethernet 0/0/2
S-switch-C(config-if-range)#spanning-tree cost 10
S-switch-C(config-if-range)#exit
# Enable global RSTP
S-switch-C(config)#spanning-tree
Check the configuration
# S-switch-A
S-switch-A(config)#show spanning-tree interface ethernet 0/0/1 ethernet 0/0/2
The bridge is executing the IEEE Rapid Spanning Tree protocol
The bridge has priority 0, MAC address: 000a.5a13.b13d
Configured Hello Time 2 second(s), Max Age 20 second(s),
Forward Delay 15 second(s)
Root Bridge has priority 0, MAC address 000a.5a13.b13d
Path cost to root bridge is 0
Stp top change 3 times
Port e0/0/1 of bridge is Forwarding
Spanning tree protocol is enabled
remote loop detect is disabled
The port is a DesignatedPort
Port path cost 200000
Port priority 128
root guard enabled and port is not in root-inconsistent state
Designated bridge has priority 0, MAC address 000a.5a13.b13d
The Port is a non-edge port
Connected to a point-to-point LAN segment
XXXX Confidential & Proprietary Information
Page 20 of 27
www.fineprint.cn
RSTP Configuration
54
16
Page 21 of 27
www.fineprint.cn
RSTP Configuration
21
Page 22 of 27
www.fineprint.cn
RSTP Configuration
191
Page 23 of 27
www.fineprint.cn
RSTP Configuration
sent BPDU:
Page 24 of 27
www.fineprint.cn
802.1x Configuration
802.1x Configuration
www.fineprint.cn
Page 1 of 13
802.1x Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 13
802.1x Configuration
Documen
Version
t Revision
1.0
Number
Evaluate this
Presentation:
document
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestions
Improve introduction
to improve
Include images
the
document
Company
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 13
802.1x Configuration
Contents
Chapter1 Configuring 802.1X ........................................................................................................ 5
1.1 Brief Introduction to 802.1X Configuration......................................................................... 5
1.1.1 Architecture of 802.1X ............................................................................................. 5
1.1.2 Rule of 802.1x .......................................................................................................... 7
1.1.3 Configuring AAA ............................................................................................................... 8
1.1.4 Configuring RADIUS Server ...................................................................................... 8
1.1.5 Configuring Local User ............................................................................................. 8
1.1.6 Configuring Domain ................................................................................................. 9
1.1.7 Configuring RADIUS Features ................................................................................... 9
1.1 Configuring 802.1X ............................................................................................................ 11
1.1.8 Configuring EAP...................................................................................................... 11
1.1.9 Enable 802.1x ......................................................................................................... 11
1.1.10 Configuring 802.1x Parameters for a Port ............................................................ 11
1.1.11 Configuring Re-Authentication............................................................................. 12
1.1.12 Configuring Watch Feature .................................................................................. 12
1.1.13 Configuring User Features .................................................................................... 12
www.fineprint.cn
Page 4 of 13
802.1x Configuration
www.fineprint.cn
Page 5 of 13
802.1x Configuration
The above systems involve three basic concepts: PAE, controlled port, control
direction.
1. PAE
Port access entity (PAE) refers to the entity that performs the 802.1x algorithm and
protocol operations.
l The authenticator PAE uses the authentication server to authenticate a supplicant
trying to access the LAN and controls the status of the controlled port according to the
authentication result, putting the controlled port in the authorized or unauthorized
state. In authorized state, the port allows user data to pass, enabling the supplicant(s)
to access the network resources; while in unauthorized state, the port denies all data
of the supplicant(s).
l The supplicant PAE responds to the authentication request of the authenticator
PAE and provides authentication information. The supplicant PAE can also send
authentication requests and logoff requests to the authenticator.
2. Controlled port and uncontrolled port
An authenticator provides ports for supplicants to access the LAN. Each of the ports
can be regarded as two logical ports: a controlled port and an uncontrolled port.
l The uncontrolled port is always open in both the inbound and outbound
directions to allow EAPOL protocol frames to pass, guaranteeing that the supplicant
can always send and receive authentication frames.
l The controlled port is open to allow normal traffic to pass only when it is in the
authorized state.
l The controlled port and uncontrolled port are two parts of the same port. Any
frames arriving at the port are visible to both of them.
3. Control direction
In the unauthorized state, the controlled port can be set to deny traffic to and from
the supplicant or just the traffic from the supplicant.
www.fineprint.cn
Page 6 of 13
802.1x Configuration
www.fineprint.cn
Page 7 of 13
802.1x Configuration
concludes that the supplicant has gone offline and performs the necessary
operations, guaranteeing that the authenticator always knows when a
supplicant goes offline.
11. The supplicant can also send an EAPOL-Logoff frame to the authenticator to
go offline unsolicitedly. In this case, the authenticator changes the status of
the port from authorized to unauthorized and sends an EAP-Failure frame to
the supplicant.
1.1.3
Configuring AAA
Remark
configure terminal
aaa
required
required
required
optional
auth-secret-key keystring
required
optional
nas-ipaddress ipaddr
optional
username-format { with-domain |
without-domain }
optional
Configure accounting
realtime-account
optional
realtime-account time
optional
Remark
configure terminal
aaa
required
required
www.fineprint.cn
Page 8 of 13
802.1x Configuration
Remark
configure terminal
aaa
required
required
setup Domain
domain name
required
required
optional
optional
state
required
{ active | block }
Remark
configure terminal
aaa
required
accounting-on { enable
sen-num | disable }
optional
h3c-cams { enable |
disable }
optional
accounting function
radius accounting
optional
radius server-disconnect
drop 1x
optional
port priority
optional
www.fineprint.cn
Page 9 of 13
802.1x Configuration
optional
radius
mac-address-number
enable
optional
radius bandwidth-limit
enable
optional
www.fineprint.cn
Page 10 of 13
802.1x Configuration
Operation
Enter global configuration mode
configure terminal
Remark
optional
Remark
configure terminal
Enable 802.1x
Operation
required
configure terminal
www.fineprint.cn
Remark
required
Page 11 of 13
802.1x Configuration
[ interface-list ]
Remarks
Enter global
configuration mode
configure terminal
Immediately
re-certification
Optional
Periodic
re-authentication
enabled on a port
Optional
Periodic
re-authentication time
configuration port
Optional
Command
Remarks
Enter global
configuration mode
configure terminal
Optional
Configuration time
between sending packets
Watch
Optional
Command
Enter global
configuration mode
configure terminal
www.fineprint.cn
Remarks
Optional
Page 12 of 13
802.1x Configuration
maximum number of
users through the
authentication
Deletes the specified
users online
Optional
Open heartbeat
detection
Optional
Optional
www.fineprint.cn
Page 13 of 13
OSPF Configuration
OSPF Configuration
www.fineprint.cn
Page 1 of 13
OSPF Configuration
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 13
OSPF Configuration
Contents
Contents ..................................................................................................................................... 3
Chapter 1 OSPF Configuration ................................................................................................. 4
1.1 OSPF Description ................................................................................................................. 4
www.fineprint.cn
Page 3 of 13
OSPF Configuration
www.fineprint.cn
Page 4 of 13
OSPF Configuration
Description
Details
Enables/Disables OSPF.
Mandatory
1.2.1
Mandatory
1.2.2
Mandatory
1.2.2
Mandatory
1.2.2
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Optional
1.2.4
Optional
1.2.4
Optional
1.2.4
Optional
1.2.4
Optional
1.2.4
Optional
1.2.4
Optional
1.2.4
n.
Imports routes of other protocols int
o OSPF.
Imports the default route into OSPF.
Configures the parameters for receivi
ng external routes.
www.fineprint.cn
Page 5 of 13
OSPF Configuration
Command
Remarks
router rip
no router rip
Command
Remarks
router id router-id
no router id
de.
ea-id
de.
a area-id
a.
digest ]
www.fineprint.cn
Page 6 of 13
OSPF Configuration
ultipoint network.
Point-to-Point networks: When PPP, LAPB, or POS is used as the link layer proto
col, OSPF considers that the network type is Point-to-Point by default.
The ATM network is a typical NBMA network. A polling interval can be configur
ed to specify the interval of sending Hello packets before a router establishes a
neighbor relationship with its neighboring router.
On a broadcast network incapable of multi-address access, you can configure th
e interface type to nonbroadcast.
If some routers are not directly reachable on an NBMA network, you can config
ure the interface type to point-to-multipoint.
If a router has only one peer router on an NBMA network, you can set the int
erface type to point-to-point.
The differences between an NBMA network and a point-to-multipoint network ar
e as follows:
In OSPF, an NBMA network refers to a non-broadcast multi-access network that
is fully meshed. A point-to-multipoint network may not be fully meshed.
A DR and a BDR must be elected on an NBMA network but are not involved o
n a point-to-multipoint network.
NBMA is a default network type. For example, if the link layer protocol is ATM,
OSPF considers that the network type is NBMA by default no matter whether
the network is fully meshed. Point-to-multipoint is not a default network type.
No link layer protocol is viewed as a point-to-multipoint protocol. You can use t
his network type through a forcible change. An NBMA network that is not fully
meshed is often changed to a point-to-multipoint network.
On an NBMA network, packets are transmitted in unicast mode, which requires
you to configure neighbor relationship manually. On a point-to-multipoint networ
k, packets are transmitted in multicast mode.
An Ethernet switch uses Ethernet as the link layer protocol, so OSPF regards th
at the network type is broadcast. Do not change the network type of an Ethern
et switch at discretion.
Table 1-4 OSPF interface configuration
Operation
Command
Remarks
point }
Restores the network type of an interface to
the default value.
Sets the cost of sending packets through a V
LAN interface.
Restores the packet sending cost of a VLAN
no ip ospf network
www.fineprint.cn
Page 7 of 13
OSPF Configuration
Operation
Command
Remarks
on.
Restores the default priority of an interface.
Sets the interval of sending Hello packets for
an interface.
Restores the interval of sending Hello packets
for an interface to the default value.
Sets the timeout time of the neighboring ro
uter.
Restores the timeout time of the neighboring
router to the default value.
Sets the interval of LSA retransmission betwe
en two adjacent routers.
no ip ospf priority
ip ospf hello-interval seconds
no ip ospf hello-interval
ip ospf dead-interval seconds
no ip ospf dead-interval
ip ospf retransmit-interval seconds
no ip ospf retransmit-interval
value.
Sets the time for sending a link state update
packet.
Restores the time for sending a link state up
date packet to the default value.
no ip ospf authentication-key
A backbone area cannot be a stub area and a virtual connection is not allowed in a st
ub area.
All the routers in a stub area must be configured to indicate that they are located in
a stub area.
No ASBR is allowed in a stub area, that is, routes from outside the AS where the stub
area resides cannot be advertised within the stub area.
www.fineprint.cn
Page 8 of 13
OSPF Configuration
Command
Remarks
ea.
vertise | notadvertise ]
no redistribute protocol
default-information originate [ always
no default-information originate
default redistribute metric metric
no default redistribute metric
es to be received.
www.fineprint.cn
Page 9 of 13
OSPF Configuration
Operation
Command
Remarks
By default, the
metric value i
s 1 and type i
s 2 for the ex
ternal routes t
o be received
by an OSPF ro
uter.
list-name in
no ip ospf distribute-list prefix-list in
ip ospf distribute-list prefix-list prefixlist-name out
ip ospf bfd
Disables BFD.
no ip ospf bfd
www.fineprint.cn
Page 10 of 13
OSPF Configuration
! To configure that an ASE LSA is generated for a default route if any, run the following co
mmand:
Switch(config-router-ospf)#default-information originate
! To configure that an ASE LSA is generated for the default route and advertised to OSPF r
outing domains even if no default route exists, run the following command:
Switch(config-router-ospf)#default-information originate always
! To set the default routing metric value of an imported external route to 10, run the follo
wing command:
Switch(config-router-ospf)#default redistribute metric 10
! To configure that OSPF imports type 1 external routes by default, run the following comm
and:
Switch(config-router-ospf)#default redistribute type 1
! To set the password for plaintext authentication on VLAN interface 3 to abc123, run the f
ollowing command:
Switch(config-if-vlanInterface-3)#ip ospf authentication-key abc123
! To set the cost of running OSPF on VLAN interface 3 to 10, run the following command:
Switch(config-if-vlanInterface-3)#ip ospf cost 10
! To set the timeout time of the neighboring router on VLAN interface 3 to 60s, run the fo
llowing command:
Switch(config-if-vlanInterface-3)#ip ospf dead-interval 60
! To set the interval of transmitting OSPF Hello packets for VLAN interface 3 to 15s, run th
e following command:
Switch(config-if-vlanInterface-3)#ip ospf hello-interval 15
! To set the password for MD5 authentication on VLAN interface 3 to abc123, run the follo
wing command:
Switch(config-if-vlanInterface-3)#ip ospf message-digest-key 12 md5 abc123
! To configure VLAN interface 2 as a non-broadcast interface, run the following command:
Switch(config-if-vlanInterface-2)#ip ospf network non-broadcast
! To set the priority of VLAN interface 3 to 100, run the following command:
Switch(config-if-vlanInterface-3)#ip ospf priority 100
! To set the interval of retransmitting LSAs between VLAN interface 3 and its adjacent route
rs to 8s, run the following command:
Switch(config-if-vlanInterface-3)#ip ospf retransmit-interval 8
! To set the LSA transmission delay of VLAN interface 3 to 3s, run the following command:
Switch(config-if-vlanInterface-3)#ip ospf transmit-delay 3
! To run OSPF on the interfaces whose primary IP address is 192.168.0.100 and inverse mas
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 11 of 13
OSPF Configuration
k is 0.0.0.255 and set the ID of the area where these interfaces reside to 1.1.1.1, run the f
ollowing command:
Switch(config-router-ospf)#network 192.168.0.100 0.0.0.255 area 1.1.1.1
! To import RIP routes into OSPF, run the following command:
Switch(config-router-ospf)#redistribute rip
! To use address prefix lists to match the routes learned by VLAN interface 2, run the follo
wing command:
Switch(config-if-vlanInterface-2)#ip ospf distribute-list prefix-list check in
! To enable OSPF BFD on VLAN interface 2, run the following command:
Switch(config-if-vlanInterface-2)#ip ospf bfd
! To set the router ID of a switch to 192.168.0.100, run the following command:
Switch(config)#router id 192.168.0.100
! To enable OSPF on a switch, run the following command:
Switch(config)#router ospf
! To disable OSPF on a switch, run the following command:
Switch(config)#no router ospf
! To display OSPF information, run the following command:
Switch(config)#show ip ospf
! To display the information of OSPF border routers, run the following command:
Switch(config)#show ip ospf border-routers
Switch(config-if-vlanInterface-2)#show ip ospf cumulative
! To display the information of OSPF LSDBs, run the following command:
Switch(config)#show ip ospf database
! To display the information of OSPF errors, run the following command:
Switch(config-if-vlanInterface-2)#show ip ospf error
! To display the information of OSPF interfaces, run the following command:
Switch(config)#show ip ospf interface
! To display the information of all the OSPF neighbors, run the following command:
Switch(config)#show ip ospf neighbor
! To display the information of an OSPF request list, run the following command:
Switch(config)#show ip ospf request-list
! To display the information of an OSPF retransmission list, run the following command:
Switch(config)#show ip ospf retrans-list
! To display the information of an OSPF virtual connection, run the following command:
Switch(config)#show ip ospf virtual-link
! To display the router ID, run the following command:
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 12 of 13
OSPF Configuration
Switch(config)#show router id
! To display the configured prefix lists, run the following command:
Switch(config)#show ip ospf distribute-link
d:
Switch(config)#show ip route rip
! To display the information of all the OSPF routing tables, run the following command:
Switch(config)#show ip route ospf
www.fineprint.cn
Page 13 of 13
BFD Configuration
BFD Configuration
www.fineprint.cn
Page 1 of 7
BFD Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 7
BFD Configuration
Contents
Contents ...................................................................... 3
Chapter 1 BFD Configuration ..................................................... 4
1.1 BFD Description ......................................................... 4
1.2 BFD Configuration ....................................................... 4
1.2.1 Configuring BFD ................................................... 4
1.2.2 Basic BFD Configuration ............................................. 4
1.2.3 Configuring BFD Parameters and Mode ................................ 5
1.2.4 Displaying and Maintaining BFD Configurations .......................... 5
1.2.5 Configuration Examples ............................................. 6
www.fineprint.cn
Page 3 of 7
BFD Configuration
BFD Description
Bidirectional Forwarding Detection (BFD) periodically checks the status of the peers
of a session and notifies a routing protocol of a fault if any immediately. Then the
routing protocol responds with a fast reroute action. Generally, the BFD interval is
shorter than 1s and therefore the convergence time of routing protocols is reduced.
For this reason, BFD can help routing protocols such as OSPF, RIP, and BGP to detect
the reachability of neighbors or link failures, which realizes fast reroute and ensures
link reliability.
1.2
BFD Configuration
Description
VLAN
Mandatory
1.2.2
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Mandatory
1.2.4
Mandatory
1.2.4
interface mode.
Configures the desired minimum transmission
interval of BFD.
Configures the minimum request receiving
interval of BFD.
Configuring
BFD
parameters
and mode
Details
Command
ip ospf bfd
no ip ospf bfd
www.fineprint.cn
Remarks
Page 4 of 7
BFD Configuration
Operation
Command
Remarks
default.
Currently,
only
the
desired
Command
minimum
bfd min-transmit-interval
Remarks
XX
no bfd min-transmit-interval
bfd min-receive-interval XX
no bfd min-receive-interval
bfd detect-multiplier XX
no bfd detect-multiplier
bfd demand { on | off }
no bfd demand
default value.
active}
Notes:
value: desired minimum packet transmission interval of an interface. It ranges from 200 to 1000
ms and is 400 ms by default.
Packet transmission interval = max(Desired minimum transmission interval, Minimum receiving
interval) x a percentage (from 70% to 90%)
Command
www.fineprint.cn
Remarks
Page 5 of 7
BFD Configuration
Views the information of all the BFD
sessions.
Views the BFD configuration of each
interface.
www.fineprint.cn
Page 6 of 7
BFD Configuration
Switch(config)#show bfd session verbose
! To display the BFD parameters of each interface, run the following command:
show bfd interface
! To display the BFD parameter details of each interface, run the following command:
show bfd interface verbose
www.fineprint.cn
Page 7 of 7
PIM Configuration
PIM Configuration
www.fineprint.cn
Page 1 of 10
PIM Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 10
PIM Configuration
Contents
Contents ...................................................................... 3
Chapter 1 PIM Configuration ..................................................... 4
1.1 PIM Description ......................................................... 4
1.1.1 Principles of PIM-DM ............................................... 4
1.1.2 Principles of PIM-SM ............................................... 5
1.1.3 Principles of PIM-SSM .............................................. 6
1.2 PIM Configuration ....................................................... 6
1.2.1 Configuring PIM ................................................... 6
1.2.2 Basic PIM Configuration ............................................. 7
1.2.3 Advanced PIM Configuration ......................................... 7
1.2.4 Configuration Examples ............................................. 9
www.fineprint.cn
Page 3 of 10
PIM Configuration
PIM Description
www.fineprint.cn
PIM Configuration
protocol.
(3) Assert
As shown in the following figure, multicast routers A and B are on the same LAN segment
and they have their respective paths to multicast source S. After receiving a multicast packet
from S, both of them will forward the packet on the LAN. As a result, the downstream
multicast router C will receive two identical multicast packets.
An upstream router uses the Assert mechanism to select the only forwarder. The upstream
router sends Assert messages to select the best route. If two or more paths have the same
priority and metric value, the router with the largest IP address is selected as the upstream
neighbor of the (S,G) entry and is responsible for forwarding the (S,G) multicast packet.
Receiver
Assert mechanism
(4) Graft
When the pruned downstream node needs to enter the forwarding state again, it sends a
Graft message to the upstream node. Before configuring the features of IGMP, you must
enable the multicast routing function.
(5) SRM
To avoid repeated flooding&prune actions, the SRM is added to new protocol standards. The
router in direct connection with the multicast source sends state update packets periodically.
After receiving a state update packet, the PIM-capable router refreshes the prune state.
www.fineprint.cn
Page 5 of 10
PIM Configuration
Join message to an upper-level node of the RP for participating in the multicast group. Every
router between the leaf router and the RP will generate a (*,G) entry in its forwarding table
and therefore they will forward any packets destined for G regardless of where the packets
come from. When the RP receives a packet bound for G, the packet will later be sent to the
leaf router along the established path and then reach the host. Finally an RPT with the RP as
the root is created.
(7) Multicast source registration
When multicast source S is sending a multicast packet to multicast group G, the PIM-SM
router which is directly connected with S encapsulates the multicast packet into a
registration packet and then sends it to an RP in unicast mode. If multiple PIM-SM routers
exist on a network segment, the designated router (DR) sends the multicast packet.
1.2
PIM Configuration
www.fineprint.cn
Description
Details
Page 6 of 10
PIM Configuration
Configuration Task
Basic PIM configuration
Description
Details
Enables EFM.
Mandatory
1.2.2
Mandatory
1.2.2
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
Optional
1.2.3
filtering.
configuration
Command
Remarks
ip pim dense-mode
no ip pim dense-mode
ip pim sparse-mode
no ip pim sparse-mode
Command
Remarks
i no ip pim query-interval
ip pim bsr-border
packets.
www.fineprint.cn
Page 7 of 10
PIM Configuration
Operation
Command
no ip pim bsr-border
pim
exit
source-policy acl-number
no source-policy
no ip pim neighbor-policy
Remarks
no ip pim neighbor-limit
static-rp address
no static-rp
bsr-candidate interface-type
Configures a C-BSR.
interface-number hash-mask-length
priority
Deletes a C-BSR.
no bsr-candidate
rp-candidate interface-type
Configures a C-RP.
Deletes a C-RP.
no spt-threshold
dynamic ]
show ip pim bs
Note: Be sure to enable PIM on an interface before configuring the PIM attributes of the
interface. This point must be noted when you use the commands for configuring interface
attributes and will not be given again.
Ensure that all the devices in the domain are configured with the same range of SSM multicast
group addresses. Otherwise, multicast information cannot be transmitted using the SSM
model.
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 8 of 10
PIM Configuration
If members of an SSM multicast group send Join messages over IGMPv1 or IGMPv2, (*,G) Join
messages will not be triggered.
www.fineprint.cn
Page 9 of 10
PIM Configuration
237.0.0.0
8
1
Totle ssm group range entries:1.
The following shows the default SSM group address range.
Switch# show ip pim ssm range
Group Address
Mask Length Desc
232.0.0.0
8
default
The following displays the information when no SSM group address range is configured.
Switch # show ip pim ssm range
No configged ssm group range.
www.fineprint.cn
Page 10 of 10
VRRP Configuration
VRRP Configuration
www.fineprint.cn
Page 1 of 7
VRRP Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 7
VRRP Configuration
Contents
Contents ...................................................................... 3
Chapter 1 VRRP Configuration .................................................... 4
1.1 VRRP Description........................................................ 4
1.2 VRRP Configuration ...................................................... 4
1.2.1 Configuring VRRP .................................................. 4
1.2.2 Basic VRRP Configuration............................................ 5
1.2.3 Configuring VRRP Parameters ........................................ 5
1.2.4 Displays and Maintaining VRRP Configurations ........................... 7
1.2.5 Configuration Examples ............................................. 7
www.fineprint.cn
Page 3 of 7
VRRP Configuration
VRRP Description
On a TCP/IP network, routes must be configured between two devices without a physical
connection to ensure their communication. Currently, routes can be specified through dynamic
learning by means of a routing protocol (such as RIP and OSPF) or static configuration. It is
impractical to run a dynamic routing protocol on every terminal. Most client operating systems
do not support the dynamic routing and they are still under the restraint of management
overhead, convergence degree, and security even if they can be configured with a routing
protocol. Usually, static routes are configured for IP terminals by specifying one or more default
gateways. Static routing simplifies network management and reduces the communication
overhead of terminals. However, if a switch functioning as a default gateway is damaged, the
communication in which the switch is used as the next-hop host will inevitably be interrupted. A
terminal will not be switched to a new gateway even if there are multiple default gateways until it
is restarted. Virtual Router Redundancy Protocol (VRRP) can rectify the defect of static routing.
VRRP introduces two pairs of concepts: VRRP switch and virtual switch, master switch and backup
switch. A VRRP switch is a real switch where VRRP runs, while a virtual switch is a logical switch
created by VRRP. A group of VRRP switches form a virtual switch, which is also called a backup
group. The virtual switch is represented as a logical switch with a unique IP address and MAC
address. Switches in a VRRP group are classified into master switches and backup switches. A
VRRP group has only one master switch and one or more backup switches. VRRP selects a master
switch from the switch group. The master switch responds to ARP requests and forwards IP
packets, and the other switches are standby as a backup. If the master switch is faulty due to
some reason, a backup switch will become the master one within several seconds. Such a
switchover is completed very quickly without requiring you to change the IP address or MAC
address, and therefore it is transparent to terminal users.
1.2
VRRP Configuration
Mandatory
1.2.2
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
Mandatory
1.2.3
backup groups.
Sets the timer of a backup group.
Enables the function of pinging a virtual IP
address.
Details
Description
www.fineprint.cn
Page 4 of 7
VRRP Configuration
Configuration Task
Description
Details
Mandatory
1.2.3
Mandatory
1.2.4
Command
Remarks
Description:
The backup group number ranges from 1 to 255. A virtual address can be an unassigned IP
address on the network segment where the backup group resides or the IP address of an
interface belonging to the backup group. A maximum of 255 backup groups can be configured.
The IP address of the switch itself can be configured. In this case, the switch is known as an IP
address owner. When the first IP address is assigned to a backup group, VRRP creates the
backup group. Other virtual IP addresses configured for the backup group will only be added to
the virtual IP address list of the backup group. A backup group can be configured with eight IP
addresses at most. A backup group will be deleted together with the last virtual IP address.
That is, this backup group does not exist on the interface and all configurations of the backup
group will no longer take effect.
[Example]:
! To configure a backup group whose virtual IP address is 192.168.1.1 on VLAN interface 1, run
the following command:
Switch(config-if-vlanInterface-1)#ip vrrp 1 192.168.1.1
www.fineprint.cn
Page 5 of 7
VRRP Configuration
master switch. However, if a network has unstable performance, a backup switch may not receive
a packet due to network congestion but the master switch is still working properly. In this
situation, the backup switch will receive a packet from the master switch after waiting a short
time. As a result, frequent switchovers can be avoided. The delay ranges from 0 to 255 seconds.
The master switch sends VRRP packets within the VRRP backup group at an interval specified by
adver_interval to indicate that it is working properly. If the backup switch does not receive a
VRRP packet from the master switch within a period of time specified by master_down_interval,
it regards that the master switch is faulty and changes its state to Master.
You can modify the value of adver_interval by running a timer setting command. The value of
master_down_interval is three times that of adver_interval. An abnormal switchover may occur
in the event of extremely large traffic or variance in timer settings between switches. To solve this
problem, you can set adver_interval to a greater value or modify the preemption delay. The
value of adver_interval is in the unit of second.
Table 1-3 Configuring VRRP parameters
Operation
Command
configuration mode.
priority
configuration mode.
[ delay delay ]
configuration mode.
adver-interval
configuration mode.
Remarks
vrrp ping-enable
no vrrp ping-enable
vrrp track
no vrrp track
configuration mode
Note: The priority of the IP address owner cannot be changed and is always 255.
[Parameter description]
vrid: virtual group ID, in the range of 1 to 255;
vlan-id: ID of the VLAN to which a VLAN interface belongs;
supervlan-id: ID of the super VLAN to which a superVLAN interface belongs;
pri-value: priority to be reduced if the interface under monitoring is down.
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 6 of 7
VRRP Configuration
Command
Remarks
www.fineprint.cn
Page 7 of 7
www.fineprint.cn
Page 1 of 8
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 8
Contents
Contents ...................................................................... 3
Chapter 1 VLAN Extended Attribute Configuration .................................... 4
1.1 Introduction to VLAN Extended Attributes .................................... 4
1.2 VLAN Extended Attribute Configuration ...................................... 4
1.2.1 VLAN Extended Attribute Configuration List ............................. 4
1.2.2 MAC Address-Based VLAN Configuration ............................... 4
1.2.3 Protocol-Based VLAN Configuration ................................... 4
1.2.4 Configuring the VLAN Conversion Function .............................. 5
1.2.5 Configuring the N:1 VLAN Conversion Function .......................... 6
1.2.6 Configuring the vlan-trunking Function ................................. 7
1.2.7 Configuring the vlan-swap Function ................................... 7
1.3 Configuration Instance ................................................... 8
www.fineprint.cn
Page 3 of 8
After a packet enters the switch, the PVID of the specified port of the switch is used as the VLAN
ID of the packet. In addition, the VLAN ID can be specified based on other schemes, including:
l
MAC address-based VLAN
l
Protocol-based VLAN
l
VLAN ID conversion based on the VLAN conversion table
1.2
Description
Detailed Configuration
Mandatory
1.2.2
Mandatory
1.2.3
Mandatory
1.2.4
Mandatory
1.2.5
Command
Remarks
configure terminal
N/A
Optional
no vlan-mac-table [ mac-address ]
Optional
www.fineprint.cn
Page 4 of 8
Command
Remarks
configure terminal
N/A
OptionalA total
of 12 entries
can be
configured.
Optional
N/A
Optional
Optional
vlan-protocol
Optional
no vlan-protocol
Optional
www.fineprint.cn
Page 5 of 8
Command
Remarks
configure terminal
N/A
Optional
Optional
N/A
Optional
Optional
Command
configure terminal
N/A
dhcp-snooping nto1-vlan
Remarks
www.fineprint.cn
Page 6 of 8
no dhcp-snooping nto1-vlan
Optional
Command
Remarks
configure terminal
N/A
Optional
no vlan-trunking
Optional
show vlan-trunking
This command
can be run in all
modes.
Command
Remarks
configure terminal
N/A
N/A
Optional
www.fineprint.cn
Page 7 of 8
Optional
show vlan-swap
This command
can be run in all
modes.
1.3
1)
2)
3)
4)
5)
Configuration Instance
To configure a MAC address-based VLAN entry and add a tag with the VLAN ID being 5 and
802.1q priority being 4 for the untagged packet whose source MAC address is
00:01:7f:00:01:02, run the following command:
Switch (config)#vlan-mac-table 00:01:7f:00:01:02 5 4
To configure a protocol-based VLAN entry and add a tag with the VLAN ID being 5 for the
untagged packet with the frame type being Ethernet II, Ethernet type being 0x900, and
ingress port number being 4, run the following commands:
Switch (config)# vlan-protocol table index 0 ethertype 900 protocol ethernetv2
Switch (config)#interface ethernet 0/0/4
Switch (config-if-ethernet-0/0/4)#vlan-protocol table index 0 vlan 5
Switch (config-if-ethernet-0/0/4)#vlan-protocol
To change the VLAN ID of the packet entering the switch from port 4 from 5 to 8, run the
following commands:
Switch (config)#vlan-translate ingress table 5 5 8
Switch (config)#interface ethernet 0/0/4
Switch (config-if-ethernet-0/0/4)#vlan-translate ingress
To configure port 1 and port 4 as the vlan-trunking port group of the device, run the
following commands:
Switch(config)#vlan-trunking ethernet 0/0/1 ethernet 0/0/4
Switch(config)#sho vlan-trunking
vlan trunking : ethernet 0/0/1 ethernet 0/0/4
To change the VLAN ID of the packets with the VLAN ID ranging from 2 to 6 and the ingress
port number being 4 to 8, run the following commands:
Switch(config-if-ethernet-0/0/4)#vlan-swap 2 6 8
Switch(config)#show vlan-swap
port ID original start vlan
original end vlan
swap vlan
0/0/4
2
6
8
Total entries: 1 .
www.fineprint.cn
Page 8 of 8
L3 Function Configuration
L3 Function Configuration
www.fineprint.cn
Page 1 of 12
L3 Function Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 12
L3 Function Configuration
Contents
Contents ...................................................................... 3
Chapter 1 L3 Function Configuration ............................................... 4
1.1 Introduction to L3 Functions ............................................... 4
1.2 L3 Function Configuration ................................................. 4
1.2.1 L3 Function Configuration List ........................................ 4
1.2.2 Planning VLANs and Creating L3 Interfaces .............................. 4
1.2.3 Configuring the Forwarding Mode ..................................... 5
1.2.4 Creating VLAN Interfaces for Common VLANs............................ 5
1.2.5 Creating SuperVLAN Interfaces and Adding VLANs to the SuperVLAN ......... 6
1.2.6 Configuring IP Addresses for VLAN or SuperVLAN Interfaces ................ 6
1.2.7 Configuring an IP Address Range for VLAN or SuperVLAN Interfaces .......... 7
1.2.8 Configuring the ARP Proxy ........................................... 8
1.2.9 Displaying VLAN and SuperVLAN Interface Information .................... 8
1.2.10 Configuring URPF ................................................. 9
1.2.11 Disabling the Function of Sending ICMP Packets with an Unreachable
Destination Host on Interfaces ............................................ 9
1.3 Configuration Instance .................................................. 10
www.fineprint.cn
Page 3 of 12
L3 Function Configuration
Introduction to L3 Functions
GPON is a 10-Gigabit intelligent routing switch based on the application specific integrated circuit
(ASIC) technology and supports layer 2 (L2) and layer 3 (L3) forwarding. It performs L2 forwarding
when hosts in the same virtual local area network (VLAN) access each other and L3 forwarding
when hosts in different VLANs access each other.
1.2
L3 Function Configuration
Description
Detailed
Configuration
Mandatory
1.2.2
Mandatory
1.2.3
Mandatory
1.2.4
Mandatory
1.2.5
Mandatory
1.2.6
Mandatory
1.2.7
Mandatory
1.2.8
Mandatory
1.2.9
Mandatory
1.2.10
Mandatory
1.2.11
www.fineprint.cn
L3 Function Configuration
system supports a maximum of 256 L3 interfaces, including a maximum of 128 superVLAN
interfaces.
There are a maximum of 256 VLANs contained in all L3 interfaces and each VLAN can exist only in
one L3 interface. In a superVLAN, an interface can be untagged only in one sub VLAN and must
be tagged in other sub VLANs.
For details about the commands for creating L3 interfaces, see section 1.2.4.
Command
Remarks
configure terminal
N/A
ip def cpu
Optional
no ip def cpu
Optional
Command
Remarks
configure terminal
N/A
Optional
exit
N/A
www.fineprint.cn
Page 5 of 12
L3 Function Configuration
Delete the VLAN interface with the
VLAN ID being vid.
Optional
SuperVLAN
SuperVLAN interfaces are used for communication between hosts in different VLANs in the same
network segment. SuperVLAN interfaces are implemented through the ARP proxy.
Table 1-5 Creating superVLAN interfaces and adding VLANs to the superVLAN
Operation
Command
Remarks
configure terminal
N/A
interface supervlan-interface
<vid>
Optional
exit
N/A
no interface
supervlan-interface <vid>
Optional
subvlan <vid>
Optional
no subvlan <vid>
Optional
Command
Remarks
configure terminal
N/A
N/A
www.fineprint.cn
Page 6 of 12
L3 Function Configuration
interface configuration mode.
Optional
no ip address
Optional
Optional
Optional
Interfaces
Each VLAN or superVLAN interface can be configured with a maximum of eight IP address ranges.
After an IP address range is configured, only the ARP entries within this range can be learnt so as
to restrict user access. When a VLAN or superVLAN interface is deleted, relevant configurations
are automatically deleted.
For superVLAN interfaces, sub VLANs can be specified at the same time so that the set address
range is applicable only to these sub VLANs.
Table 1-7 Configuring the IP address range for VLAN or superVLAN interfaces
Operation
Command
configure terminal
Remarks
N/A
N/A
Optional
no ip address range
Optional
Optional
Optional
Optional
www.fineprint.cn
Page 7 of 12
L3 Function Configuration
Command
Remarks
vlan <vlanid>
N/A
arp-proxy
Optional
no arp-proxy
Optional
arp-proxy broadcast
Optional
no arp-proxy broadcast
Optional
show arp-proxy
This command
can be run in all
modes.
This command
can be run in all
modes.
Command
show ip interface [[vlan-interface <vlanid> ] |
[supervlan-interface <supervlanid> ]]
www.fineprint.cn
Remarks
This command
can be run in all
modes.
Page 8 of 12
L3 Function Configuration
Command
configure terminal
Remarks
N/A
interface supervlan-interface
<vid>
N/A
Optional
no urpf
Optional
show urpf
Command
configure terminal
N/A
Remarks
www.fineprint.cn
N/A
Page 9 of 12
L3 Function Configuration
Enable the function of this interface for
sending ICMP packets with an
unreachable destination
ip icmp unreachable
Optional
no ip icmp unreachable
Optional
This command
can be run in all
modes.
1.3
1)
2)
Configuration Instance
To globally disable the stream forwarding mode, run the following commands::
Switch (config)#no ip def cpu
Switch(config)#sho ip def cpu
Routing def routes and def hosts to CPU:FALSE
If you need to:
Create a VLAN interface (VLAN interface 2) and a superVLAN interface (superVLAN interface
2).
Configure IP address 10.11.0.1/16 for VLAN interface 2 and IP address 10.12.0.1/16 for
superVLAN interface 2. SuperVLAN interface 2 contains sub VLANs 3 and 4.
Set the allowed IP address range to 10.11.0.2 - 10.11.0.200 for VLAN interface 2 and
10.12.0.2 - 10.12.0.200 for superVLAN interface 2.
Enable the ARP proxy function for VLAN interface 2 and superVLAN interface 2 and disable
the function of forwarding the ARP proxy packets on superVLAN interface 2 to other VLANs.
Set strict URPF for VLAN interface 2 and loose URPF for superVLAN interface 2.
Disable the function of sending ICMP packets with an unreachable destination host on
superVLAN interface 2.
Run the following commands:
Switch(config)#vlan 2
Switch(config-if-vlan)#exit
Switch(config)#interface vlan-interface 2
Create vlan-interface successfully!
Switch(config-if-vlanInterface-2)#exit
Switch(config)#interface supervlan-interface 2
Create success!
Switch(config-if-superVLANInterface-2)#exit
Switch(config)#interface vlan-interface 2
Switch(config-if-vlanInterface-2)#ip address 10.11.0.1 255.255.0.0
This ipaddress will be the primary ipaddress of this interface.
www.fineprint.cn
Page 10 of 12
L3 Function Configuration
Config ipaddress successfully!
Switch(config-if-vlanInterface-2)#exit
Switch(config)#interface supervlan-interface 2
Switch(config-if-superVLANInterface-2)#ip address 10.12.0.1 255.255.0.0
This ipaddress will be the primary ipaddress of this interface.
Config ipaddress successfully!
Switch(config-if-superVLANInterface-2)#exit
Switch(config)#vlan 3-4
Switch(config-if-vlan)#exit
Switch(config)#interface supervlan-interface 2
Switch(config-if-superVLANInterface-2)#subvlan 3-4
Switch(config-if-superVLANInterface-2)#exit
Switch(config)#interface vlan-interface 2
Switch(config-if-vlanInterface-2)#ip address range 10.11.0.2 10.11.0.200
Switch(config-if-vlanInterface-2)#exit
Switch(config)#interface supervlan-interface 2
Switch(config-if-superVLANInterface-2)#ip address range 10.12.0.2 10.12.0.200
Switch(config-if-superVLANInterface-2)#exit
Switch(config)#vlan 2
Switch(config-if-vlan)#arp-proxy
Config arp-proxy enable successfully.
Switch(config-if-vlan)#vlan 3-4
Switch(config-if-vlan)#no arp-proxy broadcast
Config arp-proxy broadcast disable successfully.
Switch(config-if-vlan)#exit
Switch(config)#interface vlan-interface 2
Switch(config-if-vlanInterface-2)#urpf strict
Configure URPF strict mode successfully.
Switch(config-if-vlanInterface-2)#exit
Switch(config)#interface supervlan-interface 2
Switch(config-if-superVLANInterface-2)#urpf loose
Configure URPF loose mode successfully.
Switch(config-if-superVLANInterface-2)#no ip icmp unreachable
Disable sending ICMP-unreachable on this interface successfully.
Switch(config-if-superVLANInterface-2)#exit
Switch(config)#sho ip interface
Show informations of interface
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 11 of 12
L3 Function Configuration
The mac-address of interface is 00:00:00:02:02:02
Interface name
: VLAN-IF2
Primary ipaddress : 10.11.0.1/255.255.0.0
Secondary ipaddress : None
VLAN
:2
Address-range
: 10.11.0.2-10.11.0.200,
Interface status
: Down
Interface name
: superVLAN-IF2
Primary ipaddress : 10.12.0.1/255.255.0.0
Secondary ipaddress : None
VLAN
: 3-4
Address-range
: 10.12.0.2-10.12.0.200,
Interface status
: Down
Total entries: 3 interface.
Switch(config)#sho arp-proxy
The arp-proxy in below vlan-list is open:
VLAN 2
Switch(config)#sho arp-proxy broadcast
The arp-proxy broadcast in below vlan-list is disabled:
VLAN 3 : VLAN 4
Switch(config)#show urpf
Interface
URPF Status
VLAN-IF2
Strict Mode
superVLAN-IF2
Loose Mode
Switch(config)#sho ip icmp unreachable
Interface: VLAN-IF2
Send ICMP-Unreachable: enable
Interface: superVLAN-IF2
Send ICMP-Unreachable: disable
www.fineprint.cn
Page 12 of 12
www.fineprint.cn
Page 1 of 13
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 13
Contents
Contents ...................................................................... 3
Chapter 1 Syslog Function Configuration............................................ 4
1.1 Syslog Introduction ...................................................... 4
1.1 Syslog Function Configuration.............................................. 4
1.1.1 Syslog Function Configuration List ..................................... 4
1.1.2 Enabling/Disabling the Syslog Function for the Equipment.................. 5
1.1.3 Configuring the Function of Displaying the Sequence Number in Syslog Outputs 5
1.1.4 Configuring the Time Stamp Type in Syslog Outputs ....................... 6
1.1.5 Configuring the Function of Outputting Syslog Information to Terminals ...... 6
1.1.6 Configuring the Function of Outputting Syslog Information to the History Buffer 7
1.1.7 Configuring the Function of Outputting Syslog Information to the Flash Storage 8
1.1.8 Configuring the Function of Outputting Syslog Information to the Log Host .... 9
1.1.9 Configuring the Function of Outputting Syslog Information to the SNMP Agent 10
1.1.10 Configuring the Module Debugging Function .......................... 11
1.2 Configuration Instance .................................................. 11
www.fineprint.cn
Page 3 of 13
1.1
Configuration Task
Description
Detailed
Configuration
Mandatory
1.2.2
Mandatory
1.2.3
Mandatory
1.2.4
Mandatory
1.2.5
Mandatory
1.2.6
Mandatory
1.2.7
Mandatory
1.2.8
www.fineprint.cn
Page 4 of 13
Mandatory
1.2.9
Mandatory
1.2.10
Operation
Command
Remarks
configure terminal
N/A
logging
Optional
no logging
Optional
show logging
Syslog Outputs
In global configuration mode, set to or not to display the global sequence number in Syslog
outputs.
Table 1-3 Configuring the function of displaying the sequence number in Syslog outputs
Operation
Enter the global
configuration mode.
Command
Remarks
configure terminal
N/A
logging
sequence-numbers
no logging
sequence-numbers
Optional
www.fineprint.cn
Page 5 of 13
Operation
Command
Remarks
configure terminal
N/A
Optional
no logging timestamps
Optional
Terminals
In global configuration mode, configure the information output function, information display
function, and filtering rules for outputting Syslog information to terminals. By default, Syslog
information is outputted only to the buffer and not outputted to the console or terminal.
Table 1-5 Configuring the function of outputting Syslog information to terminals
Operation
Command
Remarks
configure terminal
Optional
Optional
exit
terminal monitor
Optional (enabled by
default)The setting
www.fineprint.cn
Page 6 of 13
Command
information.
Remarks
affects only the
current login of the
current terminal and is
invalid for other
terminals or the next
login of the current
terminal.
no terminal monitor
OptionalThe setting
affects only the
current login of the
current terminal and is
invalid for other
terminals or the next
login of the current
terminal.
Optional
Optional
Note: In module { xxx | }, xxx indicates the module name and indicates that other module
names are omitted.
History Buffer
In global configuration mode, configure the information output function and filtering rules for
outputting Syslog information to the history buffer. By default, the function is enabled.
Table 1-6 Configuring the function of outputting Syslog information to the history buffer
Operation
Enter the global configuration mode.
Enable the function of outputting logs
to the buffer.
Command
configure terminal
N/A
logging buffered
Optional
(enabled by
default)
Remarks
www.fineprint.cn
Page 7 of 13
no logging buffered
Optional
Optional
Optional
Note: In module { xxx | }, xxx indicates the module name and indicates that other module
names are omitted.
Flash Storage
In global configuration mode, configure the information output function and filtering rules for
outputting Syslog information to the flash storage. By default, Syslog information is not saved to
the flash storage. In addition, the interval of saving Syslog information to the flash storage cannot
be configured and the system saves Syslog information once every 30 minutes by default.
Table 1-7 Configuring the function of outputting Syslog information to the flash storage
Operation
Command
Remarks
configure terminal
N/A
logging flash
Optional
no logging flash
Optional
(disabled by
default)
Optional
Optional
Note: In module { xxx | }, xxx indicates the module name and indicates that other module
XXXX Confidential & Proprietary Information
Page 8 of 13
www.fineprint.cn
Log Host
In global configuration mode, configure the server address, information output function, filtering
rules, logging tool, and fixed source address for outputting Syslog information to the log host.
Table 1-8 Configuring the function of outputting Syslog information to the log host
Operation
Enter the global configuration
mode.
Command
Remarks
configure terminal
N/A
logging ip-address
OptionalA maximum
of 15 server IP
addresses can be
configured.
no logging ip-address
Optional
Optional
Optional
Optional
Optional
Optional
no logging facility
Optional
www.fineprint.cn
Page 9 of 13
Command
Remarks
Optional
Optional
no logging source
Note: In module { xxx | }, xxx indicates the module name and indicates that other module
names are omitted.
In facility { xxx | }, xxx indicates the name of the logging tool and indicates that other tool
names are omitted.
SNMP Agent
In global configuration mode, configure the information output function and filtering rules for
outputting Syslog information to the SNMP agent.
To send Syslog information to the SNMP workstation as Trap packets, you must configure the Trap
host address. For details, see SNMP configuration.
By default, the function is disabled.
Table 1-9 Configuring the function of outputting Syslog information to the SNMP agent
Operation
Command
Remarks
configure terminal
N/A
logging snmp-agent
Optional
no logging snmp-agent
Optional
Optional
www.fineprint.cn
Page 10 of 13
Optional
Note: In module { xxx | }, xxx indicates the module name and indicates that other module
names are omitted.
Operation
Command
Remarks
configure terminal
N/A
Optional
Optional
show debug
This command
can be run in all
modes.
Note: xxx indicates the module name and indicates that other module names are omitted.
1.2
Configuration Instance
www.fineprint.cn
Page 11 of 13
www.fineprint.cn
Page 12 of 13
www.fineprint.cn
Page 13 of 13
www.fineprint.cn
Page 1 of 6
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical,
chemical, manual or otherwise without the prior written consent of XXXX Communication Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically disclaims
any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX reserves the right to
revise this document and to make changes from time to time in its content without being obligated to notify any
person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please address
comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of
their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 6
Contents
Contents ...................................................................... 3
Chapter 1 Monitor Link Function Configuration ...................................... 4
1.1 Introduction to the Monitor Link Function .................................... 4
1.2 Monitor Link Function Configuration ........................................ 4
1.2.1 Monitor Link Function Configuration List ............................... 4
1.2.2 Enabling or Disabling the Monitor Link Function of the Port (or the Aggregation
Group) ............................................................... 4
1.2.3 Displaying Information About the Monitor Link Group ..................... 5
1.3 Configuration Instance ................................................... 6
www.fineprint.cn
Page 3 of 6
The Monitor Link function enables the switch to perceive the status change (up/down) of the
ports on the indirectly-connected link so as to link a group of ports. The Monitor Link function is
used to cooperate with the networking applications of the layer 2 topology protocol to monitor
the uplink of the device and trigger the status change (up/down) of the downlink based on the
status change (up/down) of the uplink, thereby triggering the switching to the backup link
controlled by the topology protocol on the downstream device.
Monitor Link group:
The Monitor Link group consists of the uplink and downlink and the members and roles are
configured by users. The uplink and downlink can have multiple member ports but each member
port must belong to only one Monitor Link group. Member ports can be Ethernet ports or
aggregation ports.
Uplink:
The uplink is the monitored link in the Monitor Link group. The Monitor Link group is down when
it does not contain uplink members or all uplink member ports are down. The Monitor Link group
is up as long as any of the uplink members is up.
Downlink:
The downlink is the linked link in the Monitor Link group. When the status (up/down) of the
Monitor Link group changes, the Monitor Link function changes the status of the downlink
member port accordingly based on the status of the Monitor Link group.
1.2
Description
Detailed
Configuration
Mandatory
1.2.2
Mandatory
1.2.3
1.2.2 Enabling or Disabling the Monitor Link Function of the Port (or
www.fineprint.cn
Page 4 of 6
Command
Remarks
configure terminal
N/A
interface ethernet
interface-num
N/A
Optional(group-ID: ID of
the Monitor Link group
switchport monitor-link-group
group-ID {uplink |downlink}
no switchport
monitor-link-group group-ID
Optional(group-ID:
Monitor Link group)
exit
N/A
channel-group
channel-group-number
monitor-link-group group-ID
{uplink |downlink}
no channel-group
channel-group-number
monitor-link-group group-ID
Optional(channel-group
-number: number of the
aggregation group
(group-ID: Monitor Link
group)
Optional(channel-group
-number: number of the
aggregation group
(group-ID: Monitor Link
group)
Command
www.fineprint.cn
Remarks
Page 5 of 6
1.3
show monitor-link-group
Configuration Instance
To configure port 0/2/1 as the uplink port and aggregation group 1 as the downlink port in the
Monitor Link group with aggregation group 1 containing ports 4 to 8, run the following
commands:
Switch(config)#
Switch(config)#channel-group 1
Switch(config)#interface range ethernet 0/0/4 to ethernet 0/0/8
Switch(config-if-range)#channel-group 1 mode on
Remember to re-config mac-addresses associated with port e0/0/4
Remember to re-config mac-addresses associated with port e0/0/5
Remember to re-config mac-addresses associated with port e0/0/6
Remember to re-config mac-addresses associated with port e0/0/7
Remember to re-config mac-addresses associated with port e0/0/8
Switch(config-if-range)#exit
Switch(config)#channel-group 1 monitor-link-group 1 downlink
Switch(config)#interface ethernet 0/2/1
Switch(config-if-ethernet-0/2/1)#switchport monitor-link-group 1 uplink
Switch(config-if-ethernet-0/2/1)#exit
Switch(config)#show monitor-link-group
Monitor-link Group
-------------------------------------------------Group 1:
UplinkID
UplinkStatus
e0/2/1
DOWN
DownlinkID
DownlinkStatus
ch-1
DOWN
Switch(config)#
www.fineprint.cn
Page 6 of 6
www.fineprint.cn
Page 1 of 6
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 6
Docume
Version
nt
1.0
Revision
Number
Evaluate
Presentation:
this
document
appearance)
Good
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestion
Improve introduction
s to
Improve Contents
improve
procedures/tutorials
the
document
Improve arrangement
Include images
Improve index
Compan
y
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 6
Contents
Contents ............................................................................................................................... 4
Chapter 1 OLT Slot Management ........................................................................................ 5
1.1 OLT slot introduction ............................................................................................... 5
1.2 Configure OLT slot Management............................................................................ 5
1.2.1 OLT slot configuration tasks......................................................................... 5
1.2.2 Configure slot linecard type .......................................................................... 5
1.2.3 Show slot linecard type ................................................................................ 6
1.2.4 Show ONT under OLT.................................................................................. 6
1.2.5 Configuration Examples ............................................................................... 6
www.fineprint.cn
Page 4 of 6
tasks
Description
Details
Mandatory
1.2.2
Optional
1.2.3
Optional
1.2.4
OLT
slot
basic
configuration
the
Command
global
configure terminal
Remarks
-
configuration mode.
Optional:
Configure slot linecard type
gpon-16 by
default
www.fineprint.cn
Page 5 of 6
Command
Remarks
Optional:
In global configuration
mode
Note: only when specified slot type is the same as the real linecard type, the slot
can work.
Command
Remarks
configure terminal
Optional
Optional
mode.
1.2.5 Configuration
Examples
config type
SC-0
SC
SC
ONLINE
SC-1
NULL
NULL
DOWN
DOWN
www.fineprint.cn
Page 6 of 6
PON Configuration
PON Configuration
www.fineprint.cn
Page 1 of 9
PON Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 9
PON Configuration
Docume
Version
nt
1.0
Revision
Number
Evaluate
Presentation:
this
document
appearance)
Good
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestion
Improve introduction
s to
Improve Contents
improve
procedures/tutorials
the
document
Improve arrangement
Include images
Improve index
Compan
y
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 9
PON Configuration
Contents
Chapter 1 PON Configuration ...................................................................................................... 5
1 PON Introduction ................................................................................................................ 5
2 Configure PON ............................................................................................................... 5
2.1
PON Configuration Task ................................................................................... 5
2.2 ONT Registration Authentication Configuration .................................................. 5
2.4
Uplink bandwidth DBA Configuration .............................................................. 7
2.5
Related Configuration ........................................................................................ 8
2.6
Example for uplink DBA template configuration ............................................ 9
2.7
Example PON MAC table.................................................................................. 9
2.8
Example for configuring packet head of downlink traffic .............................. 9
www.fineprint.cn
Page 4 of 9
PON Configuration
2 Configure PON
2.1 PON Configuration Task
Table 1-1 PON Configuration Task
ONT registration
authentication
MAC table on PON port
Related configuration
Mandatory
1.2.2
Optional
1.2.3
Optional
1.2.3
Mandatory
1.2.4
Optional
1.2.4
Optional
1.2.5
Optional
REMAP
Modify traffic head of uplink/downlink packet
Optional
1.2.5
1.2.5
www.fineprint.cn
Page 5 of 9
PON Configuration
Table 1-2 ONT Registration Authentication Configuration
Configuration
Enable auto-find
Disable auto-find
no ont-auto-find
Enable auto-authentication
ont-auto-auth
Disable auto-authentication
no ont-auto-auth
Optional
Mandatory
Optional
no ont-auto-find
ont-auto-auth
no ont-auto-auth
SN online
specific_vendor_id
online
Mandatory
configure terminal
Task
Mandatory
Optional
Mandatory
Optional
Optional
configure terminal
Optional
Optional
By default,
age_time
age-time300s
{ learning-mode-normal |
learning-mode-move
learning-mode-move }
Description
www.fineprint.cn
Page 6 of 9
PON Configuration
vlan-tag MAC
address which is not
mac-address-table gpon dlf { drop |
assign-def-gempid <gempid> |
will be forwarding
according to vid
vlan-tag }
corresponded
gempid
mac-address-table gpon add
Optional
gempid gempid
Optional
Optional
Optional
configure terminal
mode.
Show MAC table under PON port
Optional
Optional
Command
Remark
configure terminal
dba-profile profile-name type { 1 fixed
fixed-bandwidth | 2 assured assured-bandwidth
|3
kbits/s
|4
max max-bandwidth | 5 fixed fixed-bandwidth
assured assured-bandwidth max
max-bandwidth }
www.fineprint.cn
Optional
Optical
Page 7 of 9
PON Configuration
Command
configure terminal
priorityport priority
bpitstraffic cos
value
Optional
Optional
Optional
Remark
priorityport priority
bpitstraffic cos
value
show us cos-remap
Optional
show ds cos-remap
Optional
add-outer-vlan-wit-cfi-0 |
add-inner-vlan |
retag-outer-vlan |
Optional
By default
transparent
remark-outer-vlan }
Configure the
modification
mode of downlink traffic
{ transparent | remove
| modify } [ inner {transparent |
remove | modify} ]
Configure gempid
ds gempid-remap init_gempid
www.fineprint.cn
Optional
Optional
By default
transparent
Optional
Page 8 of 9
PON Configuration
mapping
on downlink traffic
final_gempid
show us action
Optional
show ds action
Optional
www.fineprint.cn
Page 9 of 9
www.fineprint.cn
Page 1 of 13
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language or computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual or otherwise without the prior written consent of XXXX Communication
Technology Co., Ltd.
XXXX makes no representations or warranties with respect to this document contents and specifically
disclaims any implied warranties of merchantability or fitness for any specific purpose. Further, XXXX
reserves the right to revise this document and to make changes from time to time in its content without
being obligated to notify any person of such revisions or changes.
XXXX values and appreciates comments you may have concerning our products or this document. Please
address comments to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service
marks of their respective manufacturers, companies, or organizations.
www.fineprint.cn
Page 2 of 13
Docume
Version
nt
1.0
Revision
Number
Evaluate
Presentation:
this
document
appearance)
Good
Accessibility:
(Contents, index, headings, numbering)
Good
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Your
suggestion
Improve introduction
s to
Improve Contents
improve
procedures/tutorials
the
document
Improve arrangement
Include images
Improve index
Compan
y
Postcode
Address
Telephone
www.fineprint.cn
Page 3 of 13
Contents
www.fineprint.cn
Page 4 of 13
Chapter
ONT
Management
Configuration
1.1 ONT Management Introduction
ONT Management is divided into embeded OAM, PLOAM and OMCI. Embeded
OAM(broadband authority, security key interaction and DBA ) and physical OAMPLOAM
PON management function such as test distinction, ONT active, OMCC build and alarm
transition related commands can execute.
ONT OMCI manages service configuration issued, configuring VLAN management of ONT,
controllable multicast service management, ONT upgrade Management.
Details
Need
1.2.2
Optical
1.2.3
Need
1.2.4
Configure tcont
Need
1.2.5
Configure gemportid
Need
1.2.6
Configure service-port
Need
1.2.7
Need
1.2.8
Configure VLAN
Need
1.2.9
Reboot ONT
Optical
1.2.10
ONT upgrade
Optical
1.2.11
Show ONT
Optical
1.2.12
Optical
1.2.13
Configuration Task
Pre-configure ONT
Active/Re-active ONT
Configure ONT
ONT
upgrade
configuration
ONT Configure Show
www.fineprint.cn
Page 5 of 13
Command
Remark
configure terminal
ont ont-id
ont-preconfig sn vendor_id specific_vendor_id
Pre-configure ONT SN
Optical
berinterval-time_omci port_id ]
Delete ONT SN
Pre-configuration
no ont-preconfig
Optical
Command
Remark
configure terminal
ont ont-id
Active ONT
ont-state active
Optical
De-active ONT
ont-state deactive
Optical
Command
configure terminal
ont ont-id
Remark
www.fineprint.cn
Page 6 of 13
Unbind DBA
no ont-tcont tcontid
Optical
show ont-tcont
Optical
Need
Command
Remark
configure terminal
ont ont-id
TCONT
tcont tcont-id
TCONT
no tcont tcont-id
Need
Optical
Command
Remark
configure terminal
ont ont-id
Need
Configure gemportid
gemportid gemport-id
Need
Delete gemportid
no gemportid gemport-id
configuration mode
www.fineprint.cn
Optical
Page 7 of 13
Command
Remark
configure terminal
ont ont-id
Choose service-port
service-port serviceport-id
Delete service-port
no service-port serviceport-id
Need
Optical
Command
Remark
configure terminal
ont ont-id
service-port serviceport-id
configuration mode
Specific pri mapping
gemportid
Need
Need
Need
Need
www.fineprint.cn
Page 8 of 13
Configure VLAN
Operation
Enter into global configuration
mode
Enter into ONT configuration
mode
Enter into ONT service-port
configuration mode
Command
Remark
configure terminal
ont ont-id
service-port serviceport-id
vlan vlanlist
Optical
no vlan vlanlist
Optical
configure terminal
ont ont-id
Configure
vlan transparent
mode
default
transprae
nt mode
Configure
Optical
no vlan mode
Optical
Optical
Optical
www.fineprint.cn
Page 9 of 13
Optical
Optical
Command
Remark
configure terminal
ont ont-id
ont-reboot
Optical
Command
Remark
configure terminal
tftpserver-ipv4
Download ONT image
TFTP IP address
filename
filenamewill
upload file
tftpserver-ipv4
TFTP IP address
filenamewill
upload file
ont ont-id
ont-update
www.fineprint.cn
Optical
Page 10 of 13
Command
Remark
configure terminal
ont ont-id
mode
Show ONT
show ont-status
Optical
Command
Remark
configure terminal
ont ont-id
show tcont tcontid
Optical
1Network requirement
In chassis OLT slot 5 pon 5/6 registered ONT5/6/1 data services. Configuration
requirementRequires ONT can forward with vlan tag equal to 200, Requires untag
packets came up from the ONT, add a default packet vlan tag equal to 100, downlink with
vlan100 strips vlan, untag forwards and configure to above requirements.
2Configuration steps
XXXX Confidential & Proprietary Information
www.fineprint.cn
Page 11 of 13
www.fineprint.cn
Page 12 of 13
www.fineprint.cn
Page 13 of 13