Planet XGS3-24042 User Manual

Browse online or download User Manual for Routers Planet XGS3-24042. PLANET XGS3-24042 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 721
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
1
User's Manual
XGS3-24042
XGS3-24242
24-Port Gigabit
with 4 Optional 10G slots
Layer 3 Managed Stackable Switch
Page view 0
1 2 3 4 5 6 ... 720 721

Summary of Contents

Page 1 - 24-Port Gigabit

1 User's Manual XGS3-24042 XGS3-24242 24-Port Gigabit with 4 Optional 10G slots Layer 3 Managed Stackable Switch

Page 2

8 32.4 DHCPV6 OPTION37, 38 TROUBLESHOOTING ... 32-15 CHAPTER 33 DHCP SN

Page 3 - Content

10-3 Global configuration mode uldp aggressive-mode no uldp aggressive-mode Set the global working mode. 4. Configure aggressive mode on a port

Page 4

10-4 Command Explanation Admin mode show uldp [interface ethernet IFNAME] Display ULDP information. No parameter means to display global ULDP inform

Page 5

10-5 connected and works normally, but the data link layer is abnormal. ULDP can discover and disable this kind of error state of link. The final res

Page 6

10-6 the port is considered as “Down”.  In order to make sure that neighbors can be correctly created and unidirectional links can be correctly dis

Page 7

11-1 Chapter 11 LLDP Function Operation Configuration 11.1 Introduction to LLDP Function Link Layer Discovery Protocol (LLDP) is a new protocol defin

Page 8

11-2 11.2 LLDP Function Configuration Task Sequence 1. Globally enable LLDP function 2. Configure the port-based LLDP function switch 3. Configure

Page 9

11-3 Command Explanation Global Mode lldp msgTxHold <value> no lldp msgTxHold Configure the aging time multiplier of LLDP messages as the

Page 10

11-4 lldp neighbors max-num < value > no lldp neighbors max-num Configure the size of space to store Remote Table of the port as the sp

Page 11

11-5 11.3 LLDP Function Typical Example Figure 11-1 LLDP Function Typical Configuration Example In the network topology graph above, the port 1,3 o

Page 12

12-1 Chapter 12 Port Channel Configuration 12.1 Introduction to Port Channel To understand Port Channel, Port Group should be introduced first. Port

Page 13

9 37.3.1 Typical RIPng Examples ... 37-7 37.3.2 RIPn

Page 14

12-2 should also be the same. If Port Channel is configured manually or dynamically on switch, the system will automatically set the port with the

Page 15

12-3 1. The summary of the dynamic LACP aggregation Dynamic LACP aggregation is an aggregation created/deleted by the system automatically, it does n

Page 16

12-4 2. Add physical ports to the port group Command Explanation Port Mode port-group <port-group-number> mode {active | passive | on} no por

Page 17

12-5 12.4 Port Channel Examples Scenario 1: Configuring Port Channel in LACP. Figure 12-2 Configuring Port Channel in LACP The switches

Page 18

12-6 Scenario 2: Configuring Port Channel in ON mode. Figure 12-3 Configuring Port Channel in ON mode As shown in the figure, ports 1, 2

Page 19

12-7 Configuration result: Add ports 1, 2, 3, 4 of S1 to port-group1 in order, and we can see a group in “on” mode is completely joined forcedly, swi

Page 20

13-1 Chapter 13 Jumbo Configuration 13.1 Introduction to Jumbo So far the Jumbo (Jumbo Frame) has not reach a determined standard in the industry (in

Page 21

14-2 Chapter 14 EFM OAM Configuration 14.1 Introduction to EFM OAM Ethernet is designed for Local Area Network at the beginning, but link length and

Page 22 - Chapter 1 INTRODUTION

14-3 need to wait until it receives the connection request. After an Ethernet OAM connection is established, the Ethernet OAM entities on both sides

Page 23

14-4 4. Remote loopback testing Remote loopback testing is available only after an Ethernet OAM connection is established. With remote loopback ena

Page 24 - 1.3 Product Features

10 42.3 IPV6 BLACK HOLE ROUTING CONFIGURATION TASK ... 42-1 42.4 BLACK HOLE ROUT

Page 25

14-5 ethernet-oam mode {active | passive} Configure work mode of EFM OAM, default is active mode. ethernet-oam no ethernet-oam Enable EFM OAM of po

Page 26 - 1.4 Product Specification

14-6 no ethernet-oam remote-failure (failure means critical-event or link-fault event of the local), no command disables the function. (optional)

Page 27 - Port configuration

14-7 CEPE802.1ah OAMPDUEthernet 1/0/1Ethernet 1/0/1 Figure 14-3 Typical OAM application topology Configuration procedure: (Omitting SNMP and Log con

Page 28

14-8 exclusive.  When enabling OAM, the negotiation of the port will be disabled automatically. So the negotiation in the peer of the link must be

Page 29

15-1 Chapter 15 VLAN Configuration 15.1 VLAN Configuration 15.1.1 Introduction to VLAN VLAN (Virtual Local Area Network) is a technology that divides

Page 30 - Chapter 2 INSTALLATION

15-2 XGS3 Switch Ethernet Ports can works in three kinds of modes: Access, Hybrid and Trunk, each mode has a different processing method in forwardin

Page 31 - 2.1.2 LED Indications

15-3 3. Assigning Switch ports for VLAN Command Explanation VLAN Mode switchport interface <interface-list> no switchport interface <int

Page 32

15-4 8. Disable/Enable VLAN Ingress Rules Command Explanation Port Mode vlan ingress enable no vlan ingress enable Enable/Disable VLAN ingress rul

Page 33

15-5 Figure 15-2 Typical VLAN Application Topology The existing LAN is required to be partitioned to 3 VLANs due to security and application requir

Page 34 - 2.1.3 Switch Rear Panel

15-6 Switch(Config-Vlan200)#switchport interface ethernet 1/0/8-10 Switch(Config-Vlan200)#exit Switch(config)#interface ethernet 1/0/11 Switch(Config

Page 35 - 2.2.1 Desktop Installation

11 48.1 IPV4 MULTICAST PROTOCOL OVERVIEW ... 48-1 48.1.1 Intro

Page 36 - 2.2.2 Rack Mounting

15-7 PC1 connects to the interface Ethernet 1/0/7 of SwitchB, PC2 connects to the interface Ethernet 1/0/9 of SwitchB, Ethernet 1/0/10 of SwitchA con

Page 37

15-8 15.2 GVRP Configuration 15.2.1 Introduction to GVRP GVRP, i.e. GARP VLAN Registration Protocol, is an application of GARP (Generic Attribute

Page 38

15-9 Command Explanation Global Mode garp timer join <200-500> garp timer leave <500-1200> garp timer leaveall <5000-60000> no gar

Page 39

15-10 Figure 15-5 Typical GVRP Application Topology To enable dynamic VLAN information register and update among switches, GVRP protocol is to be co

Page 40 - Chapter 3 Switch Management

15-11 Switch(config)#interface ethernet 1/0/11 Switch(Config-If-Ethernet1/0/11)#switchport mode trunk Switch(Config-If-Ethernet1/0/11)# gvrp Switch(C

Page 41

15-12 transmitted in VLAN3 when traveling in the ISP internet network while carrying two VLAN tags (the inner tag is added when entering PE1, and the

Page 42

15-13 network. Configuration Item Configuration Explanation VLAN3 Port1 of PE1 and PE2. dot1q-tunnel Port1 of PE1 and PE2. tpid 9100 Configuration

Page 43 - 3.1.2 In-band Management

15-14 15.4 VLAN-translation Configuration 15.4.1 Introduction to VLAN-translation VLAN translation, as one can tell from the name, which translates t

Page 44

15-15 Command Explanation Admin mode show vlan-translation Show the related configuration of vlan-translation. 15.4.3 Typical application of VLAN-t

Page 45

15-16 15.4.4 VLAN-translation Troubleshooting Normally the VLAN-translation is applied on trunk ports. Priority of vlan translation and vlan ingress

Page 47

15-17 1. Configure the MAC-based VLAN function on the port Command Explanation Port Mode switchport mac-vlan enable no switchport mac-vlan enable E

Page 48

15-18 protocol-vlan mode {ethernetii etype <etype-id>|llc {dsap <dsap-id> ssap <ssap-id>}|snap etype <etype-id>} vlan <vla

Page 49 - 3.2.1 Configuration Modes

15-19 For example, M at E1/0/1 of SwitchA, then the configuration procedures are as follows: Switch A, Switch B, Switch C: SwitchA (Config)#mac-vlan

Page 50 - 3.2.1.2 Admin Mode

15-20 15.6 Voice VLAN Configuration 15.6.1 Introduction to Voice VLAN Voice VLAN is specially configured for the user voice data traffic. By setting

Page 51 - 3.2.1.3 Global Mode

15-21 <voice-name>] no voice-vlan {mac <mac-address> mask <mac-mask>|name <voice-name> |all} 3. Enable the Voice VLAN of the

Page 52 - 3.2.3 Shortcut Key Support

15-22 Switch(Config-If-Ethernet1/0/10)#exit Switch(Config)#interface ethernet 1/0/1 Switch(Config-If-Ethernet1/0/1)#switchport mode hybrid Switch(Con

Page 53 - 3.2.5 Input Verification

16-1 Chapter 16 MAC Table Configuration 16.1 Introduction to MAC Table MAC table is a table identifies the mapping relationship between destination M

Page 54 - 3.2.6 Fuzzy Match Support

16-2 The topology of the figure above: 4 PCs connected to switch, where PC1 and PC2 belongs to a same physical segment (same collision domain), the p

Page 55 - 4.1 Basic Configuration

16-3 Three types of frames can be forwarded by the switch:  Broadcast frame  Multicast frame  Unicast frame The following describes how the s

Page 56 - 4.2.1 Telnet

16-4 <interface-name>] | [source|destination|both] no mac-address-table {static | blackhole | dynamic} [address <mac-addr>] [vlan <vla

Page 57 - 4.2.2 SSH

13 49.6.2 MLD Configuration Task List ... 49-25 49.6.3 MLD T

Page 58

16-5 1. Set the MAC address 00-01-11-11-11-11 of PC1 as a filter address. Switch(config)#mac-address-table static 00-01-11-11-11-11 discard vlan 1

Page 59

16-6 4. mac-notification trap configuration 1. Enable MAC address binding function for the ports Command Explanation Port Mode switchport port-se

Page 60 - 4.4.1 Introduction to SNMP

16-7 switchport port-security violation {protect | shutdown} no switchport port-security violation Set the violation mode for the port; the “no switc

Page 61 - 4.4.2 Introduction to MIB

17-1 Chapter 17 MSTP Configuration 17.1 Introduction to MSTP The MSTP (Multiple STP) is a new spanning-tree protocol which is based on the STP and th

Page 62 - 4.4.4 SNMP Configuration

17-2 Figure 17-1 Example of CIST and MST Region In the above network, if the bridges are running the STP or the RSTP, one port between Bridge M and

Page 63

17-3 17.1.2 Port Roles The MSTP bridge assigns a port role to each port which runs MSTP.  CIST port roles: Root Port, Designated Port, Alternate Po

Page 64

17-4 2. Configure instance parameters Command Explanation Global Mode spanning-tree mst <instance-id> priority <bridge-priority> no spa

Page 65

17-5 name <name> no name Set MSTP region name. revision-level <level> no revision-level Set MSTP region revision level. abort Quit MSTP r

Page 66 - 4.4.6 SNMP Troubleshooting

17-6 Port Mode spanning-tree format standard spanning-tree format privacy spanning-tree format auto no spanning-tree format Configure the format of

Page 67 - 4.5.2 BootROM Upgrade

17-7 topology changes. Port Mode spanning-tree tcflush {enable| disable| protect} no spanning-tree tcflush Configure the port flush mode. The no com

Page 68

14 53.2 THE NUMBER LIMITATION FUNCTION OF PORT, MAC IN VLAN AND IP CONFIGURATION TASK SEQUENCE ...

Page 69

17-8 Port 4 200000 200000 Port 5 200000 200000 Port 6 200000 200000 Port 7 200000 200000 By default, the MSTP establishes a tree topology (i

Page 70 - 4.5.3 FTP/TFTP Upgrade

17-9 Switch3(Config-Vlan30)#exit Switch3(config)#vlan 40 Switch3(Config-Vlan40)#exit Switch3(config)#vlan 50 Switch3(Config-Vlan50)#exit Switch3(conf

Page 71

17-10 forwarding. Because the instance 3 and the instance 4 are only valid in the MSTP region, the following figure only shows the topology of the MS

Page 72

17-11 Figure 17-5 The Topology Of the Instance 4 after the MSTP Calculation 17.4 MSTP Troubleshooting  In order to run the MSTP on the switch po

Page 73

18-1 Chapter 18 QoS Configuration 18.1 Introduction to QoS QoS (Quality of Service) is a set of capabilities that allow you to create differentiated

Page 74

18-2 Drop Precedence: When processing the packets, firstly drop the packets with the bigger drop precedence, the ranging is 0-1. It’s shortening is D

Page 75

18-3 Figure 18-3 Basic QoS Model Classification: Classify traffic according to packet classification information and generate internal DSCP value

Page 76

18-4 StartDSCP-to-Int-Prio conversion according to DSCP value of the packetCOS -to-Int-Prio conversion according to L2 COS value of the packetYTrust

Page 77

18-5 Policing and remark: Each packet in classified ingress traffic is assigned an internal priority value, and can be policed and remarked. Polici

Page 78

18-6 Note 1: Int-Prio will be covered with the after setting, Set Int-Prio of the specific color action will cover Set Int-Prio of the unrelated acti

Page 79

15 CHAPTER 59 VLAN-ACL CONFIGURATION ...59-1 59.1 INTRODUCTION TO VLAN-ACL ...

Page 80

18-7 18.2 QoS Configuration Task List 1. Configure class map Set up a classification rule according to ACL, CoS, VLAN ID, IPv4 Precedent, DSCP, IPV6

Page 81 - 5.4 Troubleshooting

18-8 Global Mode policy-map <policy-map-name> no policy-map <policy-map-name> Create a policy map and enter policy map mode; the no comm

Page 82

18-9 drop no drop transmit no transmit Drop or transmit the traffic that match the class, the no command cancels the assigned action. 3. Apply QoS

Page 83

18-10 mls qos map (cos-dp <dp1…dp8> | dscp-dscp <in-dscp list> to <out-dscp> | dscp-intp <in-dscp list> to <intp> | dsc

Page 84

18-11 Switch(Config-If-Ethernet 1/0/1)#mls qos trust cos Switch(Config-If-Ethernet1/0/1)#mls qos cos 5 Configuration result: When QoS enabled in Glo

Page 85

18-12 Figure 18-7 Typical QoS topology As shown in the figure, inside the block is a QoS domain, Switch1 classifies different traffics and assigns

Page 86

18-13 18.4 QoS Troubleshooting  trust cos and EXP can be used with other trust or Policy Map.  trust dscp can be used with other trust or Policy

Page 87 - Chapter 7 Port Configuration

19-14 Chapter 19 Flow-based Redirection 19.1 Introduction to Flow-based Redirection Flow-based redirection function enables the switch to transmit th

Page 88

19-15 19.3 Flow-based Redirection Examples Example: User’s request of configuration is listed as follows: redirecting the frames whose source IP is 1

Page 89

20-16 Chapter 20 Egress QoS Configuration 20.1 Introduction to Egress QoS In traditional IP networks, all packets are treated in the same way. All ne

Page 90 - 7.4 Port Troubleshooting

16 65.1 INTRODUCTION TO VRRPV3 ... 65-1 65.1

Page 91

20-17 20.1.2 Basic Egress QoS Model Classification schedulingRemarkPolicingGenerate internal priorityIngressEgresscolorSort packet traffic according

Page 92

20-18 Description of action that modify QoS attribute according to egress remark table: cos-cos:for cos value of packets, modify cos value of packets

Page 93

20-19 access-group} 2. Configure a policy-map Command Explanation Global Mode policy-map <policy-map-name> no policy-map <policy-map-name

Page 94

20-20 class map mode, add statistic function to the flow of the policy class map. In single bucket mode, packets can only red or green when passing p

Page 95

20-21 Admin Mode clear mls qos statistics [interface <interface-name> | vlan <vlan-id>] Clear accounting data of the specified ports or

Page 96

20-22 switch(config)#class-map 1 switch(config-classmap-1)#match ipv6 dscp 7 switch(config-classmap-1)#exit Create a policy map: switch(config)#poli

Page 97

20-23 switch(config-if-port-range)#mls qos trust dscp Bind policy to egress of port1 switch(config-if-ethernet1/0/1)#service-policy output p1 20.4

Page 98

21-24 Chapter 21 Flexible QinQ Configuration 21.1 Introduction to Flexible QinQ 21.1.1 QinQ Technique Dot1q-tunnel is also called QinQ (802.1Q-in-802

Page 99

21-25 Command Explanation Global mode class-map <class-map-name> no class-map <class-map-name> Create a class-map and enter class-map mo

Page 100

21-26 vlan<vid> no service-policy input<policy-map-name> vlan <vid> command deletes the specified policy-map applied to the VLAN.

Page 101

17 70.3 TYPICAL EXAMPLES OF RSPAN ... 70-4 70.4 RS

Page 102 - 10.4 ULDP Troubleshooting

21-27 Switch(config-classmap-c1)#match vlan 1001 Switch(config-classmap-c1)#exit Switch(config)#class-map c2 Switch(config-classmap-c2)#match vlan 20

Page 103

21-28 21.4 Flexible QinQ Troubleshooting If flexible QinQ policy can not be bound to the port, please check whether the problem is caused by the foll

Page 104 - Configuration

22-29 Chapter 22 Layer 3 Forward Configuration Switch supports Layer 3 forwarding which forwards Layer 3 protocol packets (IP packets) across VLANs.

Page 105

22-30 1. Create Layer 3 Interface Command Explanation Global Mode interface vlan <vlan-id> no interface vlan <vlan-id> Creates a VLAN

Page 106

22-31 Global Mode ip vrf <vrf-name> no ip vrf <vrf-name> Create VRF instance; VRF instance is not created by default. VRF Mode rd &

Page 107

22-32 every connection status which increases network delay greatly and decreases network performance. Moreover, the translation of network data pack

Page 108

22-33 22.2.2 IP Configuration Layer 3 interface can be configured as IPv4 interface, IPv6 interface. 22.2.2.1 IPv4 Address Configuration IPv4 addre

Page 109

22-34 via DHCPv6 (15) Set the flag representing whether the address information will be obtained via DHCPv6 3. IPv6 Tunnel configuration (1) Create/

Page 110

22-35 makes duplicate address detection. The no command resumes default value (1). (2) Configure Send Neighbor solicitation Message Interval Com

Page 111

22-36 Interface Configuration Mode ipv6 nd prefix <ipv6-address/prefix-length> <valid-lifetime> <preferred-lifetime> [off-link] [n

Page 112

2 Trademarks Copyright © PLANET Technology Corp. 2012. Contents subject to which revision without prior notice. PLANET is a registered trademark of PL

Page 114

22-37 Interface Configuration Mode ipv6 nd retrans-timer <seconds> Set the retrans-timer of sending router advertisement. (14) Set the flag r

Page 115

22-38 Tunnel Configuration Mode tunnel destination {<ipv4-address> | <ipv6-address>} no tunnel destination Configure tunnel destinatio

Page 116 - 13.1 Introduction to Jumbo

22-39 address 192.168.2.1 255.255.255.0 in VLAN2. 3. Configure two VLANs on Switch2, respectively VLAN2 and VLAN3. 4. Configure IPv4 address 192.168

Page 117 - 14.1 Introduction to EFM OAM

22-40 Configuration Description: 1. Configure two VLANs on Switch1, namely, VLAN1 and VLAN2. 2. Configure IPv6 address 2001::1/64 in VLAN1 of Switch1

Page 118

22-41 no login ! end Switch2#show run interface Vlan2 ipv6 address 2002::2/64 ! interface Vlan3 ipv6 address 2003::1/64 ! interface Loopback m

Page 119 - 14.2 EFM OAM Configuration

22-42 3. Configure two VLANs on SwitchB, namely, VLAN3 and VLAN4, VLAN4 is IPv6 domain, and VLAN3 connects to IPv4 domain. 4. Configure IPv6 addres

Page 120

22-43 22.3 IP Forwarding 22.3.1 Introduction to IP Forwarding Gateway devices can forward IP packets from one subnet to another; such forwarding uses

Page 121 - 14.3 EFM OAM Example

22-44 Figure 22-4 URPF application situation In the above figure, Router A sends requests to the server Router B by faking messages whose source a

Page 122 - 14.4 EFM OAM Troubleshooting

22-45 In the network, topology shown in the graph above, IP URPF function is enabled on SW3. When there is someone in the network pretend

Page 123

22-46 3. Clear dynamic ARP 4. Clear the statistic information of ARP messages 1. Configure static ARP Command Explanation VLAN Interface Mode ar

Page 124 - 15.1.1 Introduction to VLAN

19 81.3.1 Create BGP MPLS VPN between PE-CE via EBGP ... 81-41 81.3.2 Create BGP MPLS VPN between

Page 125

22-47 22.5.3 ARP Troubleshooting If ping from the switch to directly connected network devices fails, the following can be used to check the possible

Page 126

23-48 Chapter 23 ARP Scanning Prevention Function Configuration 23.1 Introduction to ARP Scanning Prevention Function ARP scanning is a common method

Page 127

23-49 anti-arpscan enable no anti-arpscan enable Enable or disable the ARP Scanning Prevention function globally. 2. Configure the threshold of the

Page 128

23-50 anti-arpscan log enable no anti-arpscan log enable Enable or disable the log function of ARP scanning prevention. anti-arpscan trap enable

Page 129

23-51 SWITCHB configuration task sequence: Switch B(config)# anti-arpscan enable SwitchB(config)#interface ethernet1/0/1 SwitchB (Config-If-Ethernet

Page 130

24-52 Chapter 24 Prevent ARP, ND Spoofing Configuration 24.1 Overview 24.1.1 ARP (Address Resolution Protocol) Generally speaking, ARP (RFC-826) prot

Page 131 - 15.2.1 Introduction to GVRP

24-53 What the essential method on preventing attack and spoofing switches based on ARP in networks is to disable switch automatic update function; t

Page 132 - 15.2.3 Example of GVRP

24-54 24.3 Prevent ARP, ND Spoofing Example Equipment Explanation Equipment Configuration Quality switch IP:192.168.2.4; IP:192.168.1.4; mac:

Page 133

24-55 If the environment changing, it enable to forbid ARP refresh, once it learns ARP property, it wont be refreshed by new ARP reply packet, and pr

Page 134 - 15.2.4 GVRP Troubleshooting

25-56 Chapter 25 ARP GUARD Configuration 25.1 Introduction to ARP GUARD There is serious security vulnerability in the design of ARP protocol, which

Page 135

1-1 Chapter 1 INTRODUTION The PLANET XGS3-24042 / XGS3-24242 is 24-Port Gigabit with 4 Optional 10G slots Layer 3 Managed Stackable Switch. It boast

Page 136

25-57 Command Explanation Port configuration mode arp-guard ip <addr> no arp-guard ip <addr> Configure/delete ARP GUARD address

Page 137

26-58 Chapter 26 ARP Local Proxy Configuration 26.1 Introduction to ARP Local Proxy function In a real application environment, the switches in the a

Page 138

26-59 26.2 ARP Local Proxy Function Configuration Task List 1.Enable/disable ARP local proxy function Command Explanation Interface vlan mode ip lo

Page 139

26-60 26.4 ARP Local Proxy Function Troubleshooting ARP local proxy function is disabled by default. Users can view the current configuration with d

Page 140

27-61 Chapter 27 Gratuitous ARP Configuration 27.1 Introduction to Gratuitous ARP Gratuitous ARP is a kind of ARP request that is sent by the host wi

Page 141

27-62 27.3 Gratuitous ARP Configuration Example Figure 27-1 Gratuitous ARP Configuration Example For the network topology shown in the figure above

Page 142

28-63 Chapter 28 Keepalive Gateway Configuration 28.1 Introduction to Keepalive Gateway Ethernet port is used to process backup or load balance, for

Page 143

28-64 show keepalive gateway [interface-name] Show keepalive running status of the specified interface, if there is no interface is specified, show k

Page 144

28-65 Send ARP detection once 3 seconds to detect whether gateway A is reachable, after 3 times detection is failing, gateway A is considered to be u

Page 145

29-66 Chapter 29 DHCP Configuration 29.1 Introduction to DHCP DHCP [RFC2131] is the acronym for Dynamic Host Configuration Protocol. It is a protocol

Page 146 - 16.1.1 Obtaining MAC Table

1-2 Support 10Gb Ethernet 10Gb Ethernet which adopts full-duplex technology instead of low-speed, half-duplex CSMA/CD protocol, is a big leap in the

Page 147 - 16.1.2 Forward or Filter

29-67 allocation and manual IP address binding are: 1) IP address obtained dynamically can be different every time; manually bound IP address will be

Page 148

29-68 dns-server [<address1>[<address2>[…<address8>]]] no dns-server Configure DNS server for DHCP clients. The no command deletes

Page 149

29-69 host <address> [<mask> | <prefix-length> ] no host Specify/delete the IP address to be assigned to the specified client when

Page 150 - 16.5.1 MAC Address Binding

29-70 4. On receiving DHCPREQUEST, the DHCP server responds with a DHCPACK packet via DHCP relay to the DHCP client. DHCP Relay Configuration Task

Page 151

29-71 Switch(config)#service dhcp Switch(config)#interface vlan 1 Switch(Config-Vlan-1)#ip address 10.16.1.2 255.255.0.0 Switch(Config-Vlan-1)#exit

Page 152

29-72 Figure 29-3 DHCP Relay Configuration As shown in the above figure, route switch is configured as a DHCP relay. The DHCP server address is 10.

Page 153 - 17.1.1 MSTP Region

29-73 servers are not in the same physical network, verify the router responsible for DHCP packet forwarding has DHCP relay function. If DHCP relay i

Page 154

30-1 Chapter 30 DHCPv6 Configuration 30.1 Introduction to DHCPv6 DHCPv6 [RFC3315] is the IPv6 version for Dynamic Host Configuration Protocol (DHCP).

Page 155 - 17.1.3 MSTP Load Balance

30-2 4. The selected DHCPv6 server then confirms the client about the IPv6 address and any other configuration with the REPLY message. The above f

Page 156

30-3 (2)To configure parameter of DHCPv6 address pool Command Explanation DHCPv6 address pool Configuration Mode network-address <ipv6-pool-star

Page 157

1-3 1.3 Product Features  Physical Port XGS3-24042  24-Port 10/100/1000Base-T RJ-45 copper  4 100/1000Base-X mini-GBIC/SFP slots, shared wi

Page 158

30-4 Command Explanation Interface Configuration Mode ipv6 dhcp relay destination {[<ipv6-address>] [interface { <interface-name> | vlan

Page 159 - 17.3 MSTP Example

30-5 ipv6 dhcp pool <poolname> no ipv6 dhcp pool <poolname> To configure DHCPv6 address pool. (2)To configure prefix delegation pool use

Page 160

30-6 30.5 DHCPv6 Prefix Delegation Client Configuration DHCPv6 prefix delegation client configuration task list as below: 1. To enable/disable DHCPv

Page 161

30-7 Usage guide: Switch3 configuration: Switch3>enable Switch3#config Switch3(config)#service dhcpv6 Switch3(config)#ipv6 dhcp pool EastDormPo

Page 162

30-8 Switch2(config)#interface vlan 1 Switch2(Config-if-Vlan1)#ipv6 address 2001:da8:1:1::2/64 Switch2(Config-if-Vlan1)#exit Switch2(config)#interfac

Page 163 - 17.4 MSTP Troubleshooting

30-9 Usage guide: Switch2 configuration Switch2>enable Switch2#config Switch2(config)#interface vlan 2 Switch2(Config-if-Vlan2)#ipv6 address 2001

Page 164 - Chapter 18 QoS Configuration

30-10 Switch1(Config-if-Vlan3)#ipv6 dhcp server foo Switch1(Config-if-Vlan3)#ipv6 nd other-config-flag Switch1(Config-if-Vlan3)#no ipv6 nd suppre

Page 165 - 18.1.3 Basic QoS Model

31-1 Chapter 31 DHCP option 82 Configuration 31.1 Introduction to DHCP option 82 DHCP option 82 is the Relay Agent Information Option, its option cod

Page 166

31-2 31.1.2 option 82 Working Mechanism DHCP option 82 flow chart If the DHCP Relay Agent supports option 82, the DHCP client should go through the

Page 167 - Enter the policing flow

31-3 1. Enabling the DHCP option 82 of the Relay Agent. Command Explanation Global mode ip dhcp relay information option no ip dhcp relay informat

Page 168 - Drop the

1-4 − IEEE 802.1Q Tagged VLAN − Up to 4K VLANs groups, out of 4096 VLAN IDs − Provider Bridging (VLAN Q-in-Q) support (IEEE 802.1ad) − GVRP pro

Page 169

31-4 ip dhcp relay information option remote-id {standard | <remote-id>} no ip dhcp relay information option remote-id Set the suboption2 (remo

Page 170

31-5 ip dhcp relay information option self-defined remote-id format [ascii | hex] Set self-defined format of remote-id for relay option82. ip dhcp re

Page 171

31-6 In the above example, layer 2 switches Switch1 and Switch2 are both connected to layer 3 switch Switch3, Switch 3 will transmit the request mess

Page 172

31-7 max-lease-time 86400; #24 Hours allow members of "Switch3Vlan2Class2"; } } Now, the DHCP server will allocate addresses for the netwo

Page 173 - 18.3 QoS Example

32-8 Chapter 32 DHCPv6 option37, 38 32.1 Introduction to DHCPv6 option37, 38 DHCPv6 (Dynamic Host Configuration Protocol for IPv6) is designed for IP

Page 174

32-9 ipv6 dhcp snooping remote-id option no ipv6 dhcp snooping remote-id option This command enables DHCPv6 SNOOPING to support option 37 option, no

Page 175

32-10 ipv6 dhcp snooping subscriber-id select (sp | sv | pv | spv) delimiter WORD (delimiter WORD |) no ipv6 dhcp snooping subscriber-id select delim

Page 176 - 18.4 QoS Troubleshooting

32-11 ipv6 dhcp relay remote-id delimiter WORD no ipv6 dhcp relay remote-id delimiter Configures user configuration options to generate remote-id. Th

Page 177

32-12 ipv6 dhcp use class no ipv6 dhcp use class This command enables DHCPv6 server to support the using of DHCPv6 class during address assignment,

Page 178

32-13 32.3 DHCPv6 option37, 38 Examples 32.3.1 DHCPv6 Snooping option37, 38 Example Figure 32-1 DHCPv6 Snooping option schematic As is shown in the

Page 179 - 20.1.1 Egress QOS Terms

1-5  WEB-based, Telnet, Console Command Line management  SSH( Secure Shell), SSL  Accesses through SNMPv1, v2c and v3 security set and get requ

Page 180 - Policing and

32-14 SwitchB(config)#service dhcpv6 SwitchB(config)#ipv6 dhcp server remote-id option SwitchB(config)#ipv6 dhcp server subscriber-id option Switch

Page 181

32-15 Network topology: In access layer, layer2 access device Switch1 connects users in dormitory; in first-level aggregation layer, aggregation devi

Page 182

32-16 execute adding, discarding or forwarding operation. Therefore, please check policy configuration of snooping option37,38 on second device when

Page 183 - Set Egress cos mapping, no

33-1 Chapter 33 DHCP Snooping Configuration 33.1 Introduction to DHCP Snooping DHCP Snooping means that the switch monitors the IP-getting process of

Page 184 - 20.3 Egress QoS Examples

33-2 33.2 DHCP Snooping Configuration Task Sequence 1. Enable DHCP Snooping 2. Enable DHCP Snooping binding function 3. Enable DHCP Snooping bindi

Page 185

33-3 Globe mode ip dhcp snooping information enable no ip dhcp snooping information enable Enable/disable DHCP Snooping option 82 function. 5. Set

Page 186 - 20.4 Egress QoS Examples

33-4 Command Explanation Port mode ip dhcp snooping binding user-control no ip dhcp snooping binding user-control Enable or disable the DHCP snoopi

Page 187 - 21.1.3 Flexible QinQ

33-5 Command Explanation Globe mode ip dhcp snooping information option subscriber-id format {hex | acsii | vs-hp} This command is used to set subsc

Page 188

33-6 option subscriber-id {standard | <circuit-id>} no ip dhcp snooping information option subscriber-id option 82 added by DHCP request packet

Page 189 - 21.3 Flexible QinQ Example

33-7 33.4 DHCP Snooping Troubleshooting Help 33.4.1 Monitor and Debug Information The “debug ip dhcp snooping” command can be used to monitor the deb

Page 190

1-6 Back pressure for Half-Duplex Jumbo Frame 9Kbytes LED System: Power, SYS diagnostic, Redundant Power, Alert Malfunction Ports: 10/100/1000 Link/A

Page 191

33-1 33.5 DHCPv6 Snooping Typical Application Figure 4-1 Sketch Map of preventing lawless DHCPv6 Server As showed in the above chart, MAC-AA and M

Page 192 - 22.1 Layer 3 Interface

33-2 The “debug ipv6 dhcp snooping” command can be used to monitor the debug information. 33.6.2 DHCPv6 Snooping Troubleshooting Help If there is any

Page 193

34-1 Chapter 34 Routing Protocol Overview To communicate with a remote host over the Internet, a host must choose a proper route via a set of routers

Page 194 - 22.2 IP Configuration

34-2  Destination address: used to identify the destination address or destination network of an IP packet.  Network mask: used together with d

Page 195

34-3 To achieve routing policy, first we have to define the characteristics of the routing messages to be applied with routing policies, namely defin

Page 196 - 22.2.2 IP Configuration

34-4 autonomic system path field. As for relevant as-path configurations, please refer to the ip as-path command in BGP configuration. 5. community-l

Page 197

34-5 match community <community-list-name | community-list-num > [exact-match] no match community [<community-list-name | community-list-num

Page 198

34-6 set aggregator as <as-number> <ip_addr> no set aggregator as [ <as-number> <ip_addr> ] Distribute an AS No. for BGP aggr

Page 199

34-7 set tag <tag_val> no set tag [ <tag_val> ] Set OSPF routing tag value; The no command deletes the configuration set vpnv4 next-hop &

Page 200

34-8 Figure 34-1 Policy routing Configuration Configuration procedure: (only SwitchA is listed, configurations for other switches are omitted.) Th

Page 201

1-7 MSTP, IEEE 802.1s (Multiple Spanning Tree Protocol, spanning tree by VLAN) Root Guard BPDU Guard Link Aggregation Static Trunk IEEE 802.3ad LAC

Page 202

35-1 Chapter 35 Static Route 35.1 Introduction to Static Route As mentioned earlier, the static route is the manually specified path to a network or

Page 203

35-2 2. VRF configuration Command Explanation Global mode ip route vrf <name> {<ip-prefix> <mask>|<ip-prefix/<prefix-length

Page 204 - -3 IPv6 tunnel

35-3 Switch(config)#ip route 10.1.1.0 255.255.255.0 10.1.2.1 Next hop use the partner IP address Switch(config)#ip route 10.1.4.0 255.255.255.0 10.1.

Page 205

36-1 Chapter 36 RIP 36.1 Introduction to RIP RIP is first introduced in ARPANET, this is a protocol dedicated to small, simple networks. RIP is a dis

Page 206 - 22.4.1 Introduction to URPF

36-2 (simple plaintext password and MD5 password authentication are supported), and support variable length subnet mask. RIP-II used some of the zero

Page 207 - 22.4.3 URPF Typical Example

36-3 4) Configure and apply route filter 5) Configure Split Horizon (3) Configure other RIP protocol parameters 1) Configure the managing distance of

Page 208 - 22.5.1 Introduction to ARP

36-4 Command Explanation Router Configuration Mode neighbor <A.B.C.D> no neighbor <A.B.C.D> Specify the IP address of the neighbor route

Page 209

36-5 ip rip authentication key-chain <name-of-chain> no ip rip authentication key-chain [<name-of-chain>] Sets the key chain used in auth

Page 210 - 22.5.3 ARP Troubleshooting

36-6 distribute-list {< access-list-number |access-list-name >|prefix<prefix-list-name>}{in|out} [<ifname>] no distribute-list {<

Page 211 - Function Configuration

36-7 version { 1 | 2 } no version Configure the versions of all the RIP data packets transmitted/received by the Layer 3 switch port sending/receivin

Page 212

1-8 LLDP MAU-MIB Management Function System Configuration Console, Telnet, SSH, Web Browser, SSL, SNMPv1, v2c and v3 Management Support the unite f

Page 213

36-8 Command Explanation Interface Configuration Mode ip rip aggregate-address A.B.C.D/M no ip rip aggregate-address A.B.C.D/M To configure or d

Page 214

36-9 exit-address-family This command exits the address family mode. 36.3 RIP Examples 36.3.1 Typical RIP Examples Figure 36-1 RIP example In the

Page 215

36-10 Configure that the interface vlan 2 do not transmit RIP messages to SwitchC SwitchA(config)#router rip SwitchA(config-router)#passive-interface

Page 216

36-11 Figure 36-2 Typical application of RIP aggregation As the above network topology, S2 is connected to S1 through interface vlan1, there are o

Page 217

36-12 sending route updating messages to all neighboring Layer 3 switches every 30 seconds. A Layer 3 switch is considered inaccessible if no route u

Page 218

37-1 Chapter 37 RIPng 37.1 Introduction to RIPng RIPng is first introduced in ARPANET, this is a protocol dedicated to small, simple networks. RIPng

Page 219

37-2 destination, and route table is built based on this database. When a RIPng layer3 switch sent route update packets to its neighbor devices, the

Page 220

37-3 3. Configure other RIPng parameters (1) Configure timer for RIPng update, timeout and hold-down 4. Delete the specified route in RIPng route

Page 221 - 192.168.1.200

37-4 1)Configure route introduction (default route metric, configure routes of the other protocols to be introduced in RIP) Command Explanation Rout

Page 222

37-5 4)Configure split horizon Command Explanation Interface configuration mode IPv6 rip split-horizon [poisoned] Configure that take the split-hor

Page 223

1 Content CHAPTER 1 INTRODUTION ... 1-1 1.1 PACKET CONTENTS .

Page 224

2-1 Chapter 2 INSTALLATION This section describes the hardware features and installation of the Managed Switch on the desktop or rack mount. For eas

Page 225

37-6 ipv6 rip aggregate-address X:X::X:X/M no ipv6 rip aggregate-address X:X::X:X/M To configure or delete IPv6 aggregation route on interface. (3

Page 226

37-7 37.3 RIPng Configuration Examples 37.3.1 Typical RIPng Examples Figure 37-1 RIPng Example As shown in the above figure, a network consists of

Page 227

37-8 SwitchA(config-router)#passive-interface Vlan1 SwitchA(config-router)#exit Layer 3 SwitchB Enable RIPng protocol SwitchB (config)#router IPv6 r

Page 228

37-9 Figure 37-2 Typical application of RIPng aggregation As the above network topology, S2 is connected to S1 through interface vlan1, there are o

Page 229 - 29.1 Introduction to DHCP

37-10 route updating messages every 30 seconds. A Layer 3 switch is considered inaccessible if no route updating messages from the switch are receive

Page 230

38-1 Chapter 38 OSPF 38.1 Introduction to OSPF OSPF is abbreviation for Open Shortest Path First. It is an interior dynamic routing protocol for auto

Page 231

38-2 One major advantage of link-state routing protocols is the fact that infinite counting is impossible, this is because of the way link-state rout

Page 232

38-3 In conclusion, LSA can only be transferred between neighboring Layer3 switches, OSPF protocol includes 5 types of LSA: router LSA, network LSA,

Page 233

38-4 38.2 OSPF Configuration Task List The OSPF configuration for XGS3 series switches may be different from the configuration procedure to switches

Page 234

38-5 [no] router ospf [process <id>] Enables OSPF protocol; the “no router ospf” command disables OSPF protocol. (required) OSPF Protocol Confi

Page 235 - 29.5 DHCP Troubleshooting

2-2 2.1.2 LED Indications The front panel LEDs indicates instant status of port links, data activity, system operation, Stack status and system pow

Page 236

38-6 Command Explanation Interface Configuration Mode ip ospf hello-interval <time> no ip ospf hello-interval Sets interval for sending HELLO

Page 237 - 30.1 Introduction to DHCPv6

38-7 Admin Mode or Configure Mode show ip ospf [<process-id>] redistribute Display the configuration information of the OSPF process import

Page 238

38-8 4)Configure the priority of the interface when electing designated layer3 switch (DR). Command Explanation Interface Configuration Mode ip os

Page 239

38-9 Figure 38-1 Network topology of OSPF autonomous system The configuration for layer3 Switch1 and Switch5 is shown below: Layer 3 Switch1 Co

Page 240

38-10 Switch2(config-if-vlan1)# ip address 10.1.1.2 255.255.255.0 Switch2(config-if-vlan1)#no shutdown Switch2(config-if-vlan1)#exit Switch2(config)#

Page 241

38-11 Switch4(config)#exit Switch4# Layer 3 Switch5: Configuration of the IP address for interface vlan2 Switch5#config Switch5(config)# interface

Page 242

38-12 Figure 38-2 Typical complex OSPF autonomous system This scenario is a typical complex OSPF autonomous system network topology. Area1 include

Page 243

38-13 SwitchB interface VLAN2 is 10.1.1.2, IP address of layer3 SwitchC interface VLAN2 is 10.1.1.3, IP address of layer3 SwitchD interface VLAN2 is

Page 244

38-14 SwitchB(config)# interface vlan 2 SwitchB(config-If-Vlan2)# ip address 10.1.1.2 255.255.255.0 SwitchB(config-If-Vlan2)#exit Enable OSPF protoc

Page 245

38-15 SwitchC(config-If-Vlan2)#exit Configure IP address and area number for interface vlan3 SwitchC(config)# interface vlan 3 SwitchC(config-If-Vla

Page 246 - 30.7 DHCPv6 Troubleshooting

2-3 10/100/1000Base-T and SFP interfaces LED Color Function LNK/ACT Red Lights to indicate the link through that port is successfully establ

Page 247

38-16 SwitchD(config-If-Vlan2)#ip ospf authentication-key DCS SwitchD(config-If-Vlan2)#exit Configure the IP address and the area number for the int

Page 248

38-17 Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 1.1.1.1 255.255.255.0 Switch(Config-if-Vlan1)#exit Switch(config)#interface

Page 249

38-18 Associate the vlan 1 and vlan 2 respectively with vpnb and vpnc while configuring IP address SwitchA(config)#in vlan1 SwitchA(config-if-Vlan1)#

Page 250

38-19 SwitchC(config-router)#exit 38.4 OSPF Troubleshooting The OSPF protocol may not be working properly due to errors such as physic connection, c

Page 251

39-1 Chapter 39 OSPFv3 39.1 Introduction to OSPFv3 OSPFv3(Open Shortest Path First) is the third version for Open Shortest Path First, and it is the

Page 252

39-2 be flooded throughout the network very soon. Those advantages release some layer3 switch resources, as the process ability and bandwidth used by

Page 253

39-3 In one word, LSA can only be transferred between neighboring Layer3 switches, and OSPFv3 protocol includes seven kinds of LSA: link LSA, inter

Page 254

39-4 39.2 OSPFv3 Configuration Task List OSPFv3 Configuration Task List: 1. Enable OSPFv3 (required) (1) Enable/disable OSPFv3(required) (2) Confi

Page 255

39-5 router-id <router_id> no router-id Configure router for OSPFv3 process. The no router-id command returns ID to 0.0.0.0 .(required) [no] p

Page 256

39-6 IPv6 ospf transit-delay <time> [instance-id <id>] no IPv6 ospf transit-delay [instance-id <id>] Sets the delay time before sen

Page 257

2-4 10/100/1000Base-T and SFP interfaces LED Color Function LNK/ACT Green Lights: To indicate the link through that port is successfully estab

Page 258

39-7 Command Explanation Admin Mode debug ipv6 ospf redistribute message send no debug ipv6 ospf redistribute message send debug ipv6 ospf redistrib

Page 259

39-8 no router IPv6 ospf ospf [<tag>] Disable OSPFv3 Routing Protocol. 39.3 OSPFv3 Examples Examples 1: OSPF autonomous system. This scenario t

Page 260

39-9 SwitchA(config-if-vlan2)# IPv6 router ospf area 0 SwitchA (config-if-vlan2)#exit SwitchA(config)#exit SwitchA# Layer 3 SwitchB: Enable OSPFv3 p

Page 261

39-10 Configure interface vlan3 IPv6 address and affiliated OSPFv3 area SwitchD#config SwitchD(config)# interface vlan 3 SwitchD(config-if-vlan3)# I

Page 262

39-11 switch is a part of this Layer 3 switch interface belongs to area 0, and another part of interface belongs to not area 0; for multi-access net

Page 263

40-1 Chapter 40 BGP 40.1 Introduction to BGP BGP stands for a Border Gateway Protocol.It’s a dynamic routing protocol inter-autonomous system. Its ba

Page 264

40-2 connection to exchange routing information. The operation of BGP protocol is driven by messages and the messages can be divided into four kinds:

Page 265

40-3 switches are in the same AS, they can be neighbors each other. Because BGP can’t detect route, the route tables of other inner route protocols (

Page 266

40-4 40.2 BGP Configuration Task List The BGP configuration tasks include basic and advanced tasks. Basic BGP configuration tasks include the followi

Page 267

40-5 no router bgp <as-id> <as-id>”command disenable BGP process. Router configuration mode bgp asnotation asdot no bgp asnotation asdot

Page 268

2-5 2.1.3 Switch Rear Panel The rear panel of the Managed Switch indicates an AC inlet power socket, which accept input power from 100 to 240V AC, 50

Page 269

40-6 BGP configuration mode neighbor { <ip-address> | <TAG> } soft-reconfiguration inbound no neighbor { <ip-address> | <TAG>

Page 270

40-7 Command Explanation Route mapped configuration command set ip next-hop <ip-address> no set ip next-hop Set the Next-Hop attribute of out

Page 271

40-8 BGP configuration mode neighbor { <ip-address> | <TAG> } route-map <map-name > {in | out} no neighbor { <ip-address> |

Page 272 - 34.1 Routing Table

40-9 [<as-id>..]command deletes the AS from the AS confederation. 5.Configure a Route Reflector (1) The following commands can be used to con

Page 273 - 34.2 IP Routing Policy

40-10 (2) Add neighbors to peers groups Command Explanation BGP configuration mode neighbor <ip-address> peer-group <TAG> no neighbor

Page 274

40-11 advertisement-interval <TAG>} advertisement-interval command recovers the default value. neighbor {<ip-address> | <TAG>} e

Page 275

40-12 route reflector. neighbor { <ip-address> | <TAG> } soft-reconfiguration inbound no neighbor { <ip-address> | <TAG> } so

Page 276

40-13 10. Configure the Local Preference Value Command Explanation BGP configuration mode bgp default local-preference <value> no bgp defaul

Page 277

40-14 14. Configure Route Dampening Command Explanation BGP configuration mode bgp dampening [<1-45>] [<1-20000> <1-20000> <1

Page 278

40-15 route-server-client no neighbor {<ip-address>|<TAG>} route-server-client under EBGP environment to reduce the number of peers that

Page 279 - 34.2.4 Troubleshooting

2-6 2.2 Install the Switch This section describes how to install your Managed Switch and make connections to the Managed Switch. Please read the foll

Page 280 - Chapter 35 Static Route

40-16 no debug bgp redistribute message send debug bgp redistribute route receive no debug bgp redistribute route receive sent by BGP for redistribut

Page 281

40-17 The configurations of SwitchC are as following: SwitchC(config)#router bgp 200 SwitchC(config-router-bgp)#network 12.0.0.0 SwitchC(config-route

Page 282

40-18 40.3.3 Examples 3: configure BGP community attributes In the following sample, “route map set-community” is used for the outgoing update to nei

Page 283 - Chapter 36 RIP

40-19 Switch(config)#ip community-list com2 permit 90 Switch(config)#exit Switch#clear ip bgp 16.1.1.6 soft out 40.3.4 Examples 4: configure BGP con

Page 284

40-20 SwitchB(config)#router bgp 10 SwitchB(config-router-bgp)#bgp confederation identifier 200 SwitchB(config-router-bgp)#bgp confederation peers 20

Page 285

40-21 Figure 40-3 the Topological Map of Route Reflector The configurations are as following: The configurations of SwitchC: SwitchC(config)#router

Page 286

40-22 SwitchD(config-router-bgp)#neighbor 6.6.6.6 remote-as 100 SwitchD(config-router-bgp)#neighbor 6.6.6.6 route-reflector-client SwitchD(config-rou

Page 287 - -list <access-list-number

40-23 SwitchA(config)#router bgp 100 SwitchA(config-router-bgp)#neighbor 2.2.2.1 remote-as 300 SwitchA(config-router-bgp)#neighbor 3.3.3.2 remote-as

Page 288

40-24 40.3.7 Examples 7: example of BGP VPN For the configuration of MPLS VPN, BGP is part of the core routing system and it is also an important uti

Page 289

40-25 CE-A1(config)#interface vlan 2 CE-A1(config-if-Vlan2)#ip address 192.168.101.2 255.255.255.0 CE-A1(config-if-Vlan2)#exit CE-A1(config)#in

Page 290

2-7 Connection to the Managed Switch requires UTP Category 5 network cabling with RJ-45 tips. For more information, please see the Cabling Specifi

Page 291 - 36.3.1 Typical RIP Examples

40-26 CE-B2(config-router)#neighbor 192.168.202.1 remote-as 100 CE-B2(config-router)#exit Configurations on PE1: PE1#config PE1(config)#ip vrf

Page 292

40-27 PE2(config)#ip vrf VRF-A PE2(config-vrf)#rd 100:10 PE2(config-vrf)#route-target both 100:10 PE2(config-vrf)#exit PE2(config)#ip vrf VRF

Page 293 - 36.4 RIP Troubleshooting

40-28 40.4 BGP Troubleshooting In the process of configuring and implementing BGP protocol, physical connection, configuration false probably leads t

Page 294

41-1 Chapter 41 MBGP4+ 41.1 Introduction to MBGP4+ MBGP4+ is multi-protocol BGP (Multi-protocol Border Gateway Protocol) extension to IPv6, referring

Page 295 - Chapter 37 RIPng

41-2 3. Configure redistribution of OSPFv3 routing to MBGP4+ (1) Enable redistribution of OSPFv3 routing to MBGP4+ Command Explanation Router IPv6

Page 296

41-3 Accordingly SwitchA configuration as follows: SwitchA(config)#router bgp 100 SwitchA(config-router)#bgp router-id 1.1.1.1 SwitchA(config-router)

Page 297

41-4 SwitchD(config-router-af)#exit-address-family SwitchD(config-router)#exit Here the connection between SwitchB and SwitchA is EBGP, and the conn

Page 298

42-1 Chapter 42 Black Hole Routing Manual 42.1 Introduction to Black Hole Routing Black Hole Routing is a special kind of static routing which drops

Page 299

42-2 42.4 Black Hole Routing Configuration Exmaples Example 1: IPv4 Black Hole Routing function. Figure 42-1 IPv4 Black Hole Routing Configuratio

Page 300

42-3 Example 2: IPv6 Black Hole Routing function. Figure 41-2 IPv6 Black Hole Routing Configuration Example As it is shown in the figure, in Switch

Page 301

2-8 Figure 2-2-3 Mounting XGS3-24042 in a Rack Step6: Proceeds with the steps 4 and steps 5 of session 2.2.1 Desktop Installation to connect the ne

Page 302

42-4 For problems that cannot be fixed through above methods, please issue the command show ip route distance and show ip route fib, and show l3. And

Page 303 - 37.4 RIPng Troubleshooting

43-5 Chapter 43 GRE Tunnel Configuration 43.1 Introduction to GRE Tunnel GRE (General Routing-protocol Encapsulation) was referred to IETF by Cisco a

Page 304

43-6 Command Explanation Tunnel interface configuration mode tunnel mode gre ip no tunnel mode Configure the tunnel mode as GREv4 tunnel. After the

Page 305 - Chapter 38 OSPF

43-7 ip route <ipv4-address/mask> tunnel <ID> no ip route <ipv4-address/mask> tunnel <ID> Configure the egress interface of t

Page 306

43-8 Configuration steps Instruction: the topology environment of this chapter may be different to the actual environment. To ensure the effect of th

Page 307

43-9 SwitchA(config)#interface vlan 10 SwitchA(config-if-vlan10)# ip address 10.1.1.2 255.255.255.0 SwitchA(config-if-vlan10)#exit  Configure OS

Page 308

43-10 Tunnel1 gre ipv6 2005:1000:3000::1 2000:1000:3000::1 The configuration of GRE tunnel is successful.  Configure the IPv4 a

Page 309

43-11  Create the interface VLAN 12 and its address SwitchA(config)#vlan 12 SwitchA(config-vlan12)#switchport interface ethernet 1/0/12 SwitchA(c

Page 310

43-12 Figure 43-2 GRE tunnel quotes loopback group topology Introduction to loopback group topology IPv6 network between SwitchA and SwitchB, PC1 a

Page 311

43-13 (1) The configuration of device A 1. The configuration step  Enable IPv6 function. SwitchA(config)#ipv6 enable  Create the interface VLAN

Page 312 - 38.3 OSPF Examples

2-9  Approved PLANET SFP Transceivers PLANET Managed Switch supports both Single mode and Multi-mode SFP transceiver. The following list of approve

Page 313

43-14 SwitchA (config-if-tunnel1)# loopback-group 1  Configure OSPF routing protocol. SwitchA(config)#router ospf SwitchA(config-router)#router-id

Page 314

43-15  Configure the IPv4 address of the tunnel interface. To run OSPF routing protocol, the interface address must be configured. SwitchA (config-

Page 315

43-16 SwitchA(config-vlan12)#exit SwitchA(config)#interface vlan 12 SwitchA(config-if-vlan12)#ipv6 address 2005:3000:1000::2/64 SwitchA(config-if-vla

Page 316

44-1 Chapter 44 ECMP Configuration 44.1 Introduction to ECMP ECMP (Equal-cost Multi-path Routing) works in the network environment where there are ma

Page 317

44-2 Command Explanation Global mode load-balance {dst-src-mac | dst-src-ip | dst-src-mac-ip } Set load-balance for switch, it takes effect for

Page 318

44-3 S 5.5.5.5/32 [1/0] via 100.1.1.2, Vlan100 tag:0 [1/0] via 100.1.2.2, Vlan200 tag:0 C 100.1.1.0/24 is directly

Page 319

44-4 R3(config-router)# network 100.1.2.0/24 area 0 R3(config-router)# network 100.2.2.0/24 area 0 R4 configuration: R4(config)#interface Vlan100 R4

Page 320

45-5 Chapter 45 BFD 45.1 Introduction to BFD BFD (Bidirectional Forwarding Detection) provides a detection mechanism to quickly detect and monitor th

Page 321

45-6 bfd interval <value1> min_rx <value2> multiplier <value3> no bfd interval Configure the minimum transmission interval and the

Page 322

45-7 ipv6 route {vrf <name> <ipv6-address> | <ipv6-address>} prefix <nexthop> bfd no ipv6 route {vrf <name> <ipv6-ad

Page 323 - 38.4 OSPF Troubleshooting

2-10 management interface of the switch/converter (if available) to disable the port in advance. 2. Remove the Fiber Optic Cable gently. 3. Turn th

Page 324 - Chapter 39 OSPFv3

45-8 Switch(config)#interface vlan 14 Switch(config-if-vlan15)#ip address 14.1.1.1 255.255.255.0 Switch(config)#ip route 15.1.1.0 255.255.255.0 12.1.

Page 325

45-9 Switch (config-router)#network vlan 300 Switch(config)#interface vlan 100 Switch(config-if-vlan100) #rip bfd enable When the link between Switch

Page 326

45-10 Switch(config-router)#enable Switch(config-router)#bfd enable # Configure Switch B Switch#config Switch(config)#bfd mode passive Switch(config

Page 327

46-11 Chapter 46 BGP GR 46.1 Introduction to GR Along with network development, it requires the higher availability, so HA (High Availability) is set

Page 328

46-12 information and enable selection deferral timer. 5. R1 delays the count process of the local BGP route until it receives all End-of-RIB from

Page 329

46-13 BGP protocol unicast address family mode and VRF address family mode neighbor (A.B.C.D | X:X::X:X | WORD) capability graceful-restart no neigh

Page 330

46-14 bgp graceful-restart stale-path-time <1-3600> no bgp graceful-restart stale-path-time <1-3600> Stalepath-time uses the default va

Page 331 - 39.3 OSPFv3 Examples

46-15 R2 configuresint vlan 12,ip address 12.1.1.2 R1 configuration: R1#config R1(config)#vlan 12 R1(config-vlan12)#int vlan 12 R1(config-if-vlan12)#

Page 332

47-16 Chapter 47 OSPF GR 47.1 Introduction to OSPF GR OSPF Graceful-Restart(short for OSPF GR), is used to maintain data forwarding correctly and flo

Page 333 - 39.4 OSPFv3 Troubleshooting

47-17 protocol while GR helper is layer 3 switch to help GR restarter. In the above example, S1 is GR restarter and S2 is GR helper The advantages of

Page 334

2 4.4.4 SNMP Configuration ... 4-8 4.4.5 T

Page 335 - Chapter 40 BGP

3-11 Chapter 3 Switch Management 3.1 Management Options After purchasing the switch, the user needs to configure the switch for network management. S

Page 336

47-18 47.3 OSPF GR Example Example: There are for switches from S1 to S4 (They are two master control board and supports OSPF GR), they enable OSPF

Page 337

47-19 specific GR is not disabled.  Whether network topology is changed during OSPF GR process. When it is changed, switch may quit GR and restart

Page 338

48-1 Chapter 48 IPv4 Multicast Protocol 48.1 IPv4 Multicast Protocol Overview This chapter will give an introduction to the configuration of IPv4 Mul

Page 339

48-2 Multicast group are dynamic, the hosts can join and leave the Multicast group at any time. Multicast group can be permanent or tem

Page 340

48-3 48.1.3 IP Multicast Packet Transmission In Multicast mode, the source host sends packets to the host group indicated by the Multicast group addr

Page 341

48-4 The working process of PIM-DM can be summarized as: Neighbor Discovery, Flooding & Prune, and Graft. 1. Neigh hour Discovery After PIM-DM ro

Page 342

48-5 48.2.2 PIM-DM Configuration Task List 1. Enable PIM-DM (Required) 2. Configure static multicast routing entries(Optional) 3. Configure additi

Page 343

48-6 ip pim hello-interval < interval> no ip pim hello-interval To configure the interval for PIM-DM hello messages. The no form of this comman

Page 344

48-7 48.2.3 PIM-DM Configuration Examples As shown in the following figure, add the Ethernet interfaces of Switch A and Switch B to corresponding vla

Page 345

48-8 48.2.4 PIM-DM Troubleshooting In configuring and using PIM-DM Protocol, PIM-DM Protocol might not operate normally caused by physical connection

Page 346

3-12 Figure 3-2 Opening Hyper Terminal 2) Type a name for opening HyperTerminal, such as “Switch”. Figure 3-3 Opening HyperTerminal 3) In the “

Page 347

48-9 and reach the host. In this way the RPT with RP as root is generated. (2) Multicast Source Registration When a Multicast Source S sends a M

Page 348

48-10 1. Enable PIM-SM Protocol The PIM-SM protocol can be enabled on XGS3 series Layer 3 switches by enabling PIM in global configuration mode and

Page 349

48-11 ip pim hello-holdtime <value> no ip pim hello-holdtime To configure the value of the holdtime field in the PIM-SM hello messages. The no

Page 350

48-12 Command Explanation Global Configuration Mode ip pim bsr-candidate {vlan <vlan-id>| <ifname>}[ <mask-length>][ <priority&

Page 351

48-13 Command Explanation Interface Configuration Mode no ip pim sparse-mode | no ip pim multicast-routing(Global configuration mode) To disable the

Page 352

48-14 Switch(config)#interface vlan 2 Switch(Config-if-Vlan2)# ip address 24.1.1.2 255.255.255.0 Switch(Config-if-Vlan2)# ip pim sparse-mode Switch(C

Page 353

48-15 In configuring and using PIM-SM Protocol, PIM-SM Protocol might not operate normally caused by physical connection or incorrect configuration.

Page 354

48-16 48.4.2 Brief Introduction to MSDP Configuration Tasks 1. Configuration of MSDP Basic Function 1) Enabling MSDP (Required) 2) Configuring MSD

Page 355

48-17 48.4.3.2 Enabling MSDP MSDP should be enabled before various MSDP functions can be configured. 1. Enable the MSDP function 2. Configure MSDP

Page 356

48-18 48.4.4.2 Configuration of MSDP parameters Commands Explanation MSDP Peer Configuration Mode connect-source <interface-type> <interfac

Page 357

3-13 Figure 3-4 Opening HyperTerminal 4) COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for “Parity checksum”,

Page 358

48-19 no sa-request-filter [list <access-list-number | access-list-name>] command will remove the configured filter rules for SA request packet

Page 359

48-20 Figure 48-3 Network Topology for MSDP Entry Configuration tasks are listed as below: Prerequisites: Enable the single cast routing protocol a

Page 360

48-21 Switch(router-msdp)#peer 20.1.1.1 Router B in Domain B: Switch#config Switch(config)#interface vlan 2 Switch(Config-if-Vlan2)#ip address 20.1.

Page 361

48-22 Figure 48-4 Flooding of SA messages Figure 48-5 Flooding of SA messages with mesh group configuration Configuration steps are listed as bel

Page 362 - 40.4 BGP Troubleshooting

48-23 Switch(Config-if-Vlan3)#ip address 30.1.1.1 255.255.255.0 Switch(Config-if-Vlan3)#exit Switch(config)#router msdp Switch(router-msdp)#peer 10.

Page 363 - Chapter 41 MBGP4+

48-24 Switch(Config-if-Vlan6)#ip address 60.1.1.4 255.255.255.0 Switch(Config-if-Vlan6)#exit Switch(config)#router msdp Switch(router-msdp)#peer 20.

Page 364 - 41.3 MBGP4+ Examples

48-25 If the MSDP problems cannot be solved through all the methods provided above, please issue the command debug msdp to get the debugging messages

Page 365

48-26 2. Configure ANYCAST RP v4 (1) Configure the RP candidate Command Explanation Global Configuration Mode ip pim rp-candidate {vlan<vlan-i

Page 366 - 41.4 MBGP4+ Troubleshooting

48-27 done with the absence of the interface. The self-rp-address should be unique. No operation will cancel the self-rp-address which is used to com

Page 367

48-28 from a DR is received, it should be forwarded to all of these other RP one by one. No operation will cancel an other-rp-address communicating

Page 368

3-14 Testing RAM... 0x077C0000 RAM OK Loading MiniBootROM... Attaching to file system ... Loading nos.img ... done. Booting... Starting at 0

Page 369

48-29 Switch(config)#ip pim rp-candidate loopback1 Switch(config)#ip pim bsr-candidate vlan 1 Switch(config)#ip pim multicast-routing Switch(config)#

Page 370

48-30 Source Specific Multicast (PIM-SSM) is a new kind of multicast service protocol. With PIM-SSM, a multicast session is distinguished by the mult

Page 371

48-31 Switch(config)#ip pim multicast-routing Switch(config)#interface vlan 1 Switch(Config-If-Vlan1)# ip pim sparse-mode Switch(Config-If-Vlan

Page 372

48-32 Switch(Config-If-Vlan2)# ip pim sparse-mode Switch(Config-If-Vlan2)#exit Switch(config)#interface vlan 3 Switch(Config-If-Vlan3)# ip pim

Page 373 - 43.3 Example of GRE Tunnel

48-33 The check which determines if the packet gets to the correct interface is called RPF check. When some Multicast data packets get to some inter

Page 374

48-34 48.7.2 DVMRP Configuration Task List 1. Globally enable and disable DVMRP (Required) 2. Configure Enable and Disable DVMRP Protocol at the inte

Page 375

48-35 ip dvmrp output-report-delay <delay_val> [<burst_size>] no ip dvmrp output-report-delay Configure the delay of transmitting DVMRP

Page 376

48-36 Switch (config)#interface vlan 1 Switch(Config-if-Vlan1)# ip address 10.1.1.1 255.255.255.0 Switch(Config-if-Vlan1)# ip dvmrp enable (2) Confi

Page 377

48-37 The Multicast Packet Source Controllable technology of Security Controllable Multicast technology is mainly processed in the following manners:

Page 378

48-38 The next is to configure the rule of source control. It is configured in the same manner as for ACL, and uses ACL number of 5000-5099, every ru

Page 379

3-15 The following describes the steps for a Telnet client to connect to the switch’s VLAN1 interface by Telnet(IPV4 address example): Figure 3-6 Ma

Page 380

48-39 [no] multicast destination-control (required) Globally enable IPv4 and IPv6 destination control. The no operation of this command w

Page 381

48-40 to set priority for the specified multicast. The commands are as follows: Command Explanation Global Configuration Mode [no] ip multicast p

Page 382

48-41 Server 210.1.1.1 is distributing important multicast data on group 239.1.2.3, we can configure on its join-in switch as follows: Switch(config

Page 383 - 44.1 Introduction to ECMP

48-42 Under this kind of situation, since all switches which runs IGMP under this network segment can get membership report message from the host, th

Page 384 - 44.3 ECMP Typical Example

48-43 membership trace. 11. In querying messages, the new router side restraint process (S sign) modified the existing strength of IGMPv2. 48.9.2

Page 385 - 44.3.2 OSPF Implements ECMP

48-44 Command Explanation Interface Configuration Mode ip igmp access-group {<acl_num | acl_name>} no ip igmp access-group Configure the filte

Page 386 - 44.4 ECMP Troubleshooting

48-45 no ip dvmrp | no ip pim dense-mode | no ip pim sparse-mode | no ip dvmrp multicast-routing | no ip pim multicast-routing Disable IGMP Protoco

Page 387 - Chapter 45 BFD

48-46  Firstly to assure that physical connection is correct;  Next, to assure the Protocol of Interface and Link protocol is UP (use show interf

Page 388

48-47 ip igmp snooping vlan <vlan-id> no ip igmp snooping vlan <vlan-id> Enables IGMP Snooping for specified VLAN. The no operation disab

Page 389 - 45.3 Examples of BFD

48-48 query-mrsp <value> no ip igmp snooping vlan <vlan-id> query-mrsp period. The “no ip igmp snooping vlan <vlan-id> query-mr

Page 390

3-16 Figure 3-7 Run telnet client program included in Windows Step 3: Login to the switch. Login to the Telnet configuration interface. Valid login

Page 391

48-49 Figure 48-10 Enabling IGMP Snooping function Example: As shown in the above figure, a VLAN 100 is configured in the switch and includes ports

Page 392 - 45.4 BFD Troubleshooting

48-50 Figure 48-11 The switches as IGMP Queries The configuration of Switch2 is the same as the switch in scenario 1, SwitchA takes the place of Mul

Page 393 - Chapter 46 BGP GR

48-51 router) Configurations are listed as below: switch#config switch(config)#ip pim multicast-routing switch(config)#interface vlan 100 swit

Page 394

48-52 the join and leave messages received from downstream ports and forward them to the multicast router through upstream ports. The IGMP proxy conf

Page 395

48-53 no ip igmp proxy unsolicited-report robustness this command will restore the default value. ip igmp proxy aggregate no ip igmp proxy aggregat

Page 396 - 46.3 Typical Example of GR

48-54 The configuration steps are listed below: Switch#config Switch(config)#ip igmp proxy Switch(Config)#interface vlan 1 Switch(Config-if-Vlan1)#ip

Page 397

48-55 Switch#config Switch(config)#ip igmp proxy Switch(Config)#interface vlan 1 Switch(Config-if-Vlan1)#ip igmp proxy upstream Switch(Config)#interf

Page 398 - Chapter 47 OSPF GR

49-1 Chapter 49 IPv6 Multicast Protocol 49.1 PIM-DM6 49.1.1 Introduction to PIM-DM6 PIM-DM6(Protocol Independent Multicast, Dense Mode)is the IPv6 ve

Page 399 - 47.2 OSPF GR Configuration

49-2 the multicast packet will be discarded as redundant message. The unicast routing message used as path judgment can root in any Unicast Routing P

Page 400 - 47.4 OSPF GR Troubleshooting

49-3 ipv6 pim dense-mode To enable PIM-DM for the specified interface (required). 2.Configure static multicast routing entries Command Explanation

Page 401

3-17 3.1.2.2 Management via HTTP To manage the switch via HTTP, the following conditions should be met: 1) Switch has an IPv4/IPv6 address configu

Page 402 - 48.1.2 Multicast Address

49-4 Command Explanation Interface Configuration Mode ipv6 pim scope-border <500-599>|<acl_name> no ipv6 pim scope-border To configure

Page 403

49-5 Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ipv6 address 2000:10:1:1::1/64 Switch(Config-if-Vlan1)#ipv6 pim dense-mode Switch(Config

Page 404 - 48.2 PIM-DM

49-6 PIM-SM routers and establish, using Join/Prune message of routers, RPT (RP-rooted shared tree) based on RP. Consequently the network bandwidth o

Page 405

49-7 Notice: Multicast Routing Protocol is not supported by 5950-28T-L and 5950-52T-L in this chapter. 49.2.2 PIM-SM6 Configuration Task List 1. Ena

Page 406

49-8 ipv6 mroute <X:X::X:X> <X:X::X:X> <ifname> <.ifname> no ipv6 mroute <X:X::X:X> <X:X::X:X> [<ifnam

Page 407

49-9 5) Configure the interface as the management boundary of the PIM-SM6 protocol Command Explanation Interface Configuration Mode ipv6 pim scope

Page 408

49-10 Global Configuration Mode ipv6 pim rp-address <rp-address> [<group-range>] no ipv6 pim rp-address <rp-address> {all|<g

Page 409 - 48.3 PIM-SM

49-11 The configuration procedure for SwitchA, SwitchB, SwitchC and SwitchD is as below: (1) Configure SwitchA: Switch(config)#ipv6 pim multicast-r

Page 410

49-12 Switch(Config-if-Vlan1)#ipv6 address 2000:34:1:1::4/64 Switch(Config-if-Vlan1)#ipv6 pim sparse-mode Switch(Config-if-Vlan1)#exit Switch(config)

Page 411

49-13 Anycast RP defines that the nearest RP to the multicast source should forward the source register messages to all the other RP to guarantee tha

Page 412

3-18 Telnet is enabled for configuring and managing the switch, username and password for authorized Telnet users must be configured with the followi

Page 413

49-14 no ipv6 pim anycast-rp self-rp-address identify this router when communicating with other RP.(necessary) the effect of self-rp-address refers t

Page 414

49-15 absence of the interface in accordance with the anycast-rp-addr. Configure on this router (as a RP) the other-rp-addresses of other RP comm

Page 415

49-16 RP1 Configuration: Switch#config Switch(config)#interface loopback 1 Switch(Config-if-Loopback1)#ipv6 address 2006::1/128 Switch(Config-if-Loop

Page 416 - 48.4.1 Introduction to MSDP

49-17 49.4 PIM-SSM6 49.4.1 Introduction to PIM-SSM6 Source Specific Multicast (PIM-SSM6) is a new kind of multicast service protocol. With PIM-SSM6,

Page 417

49-18 Figure 49-4 PIM-SSM typical environment Configurations of switchA , switchB, switchC and switchD are listed as below: (1) Configuration of s

Page 418 - 48.4.3.2 Enabling MSDP

49-19 Switch(config)# ipv6 pim rp-candidate vlan2 Switch(config)#ipv6 access-list 500 permit ff1e::1/64 Switch(config)#ip pim ssm range 500 (3

Page 419

49-20  Make sure the physical links are connected correctly.  Make sure the state of the data link layer has become UP. (Use show interface comma

Page 420

49-21 the command of globally enabling the source control: Command Explanation Global Configuration Mode ipv6 multicast source-control(necessary) n

Page 421

49-22 First, globally enable the destination control, since destination control needs to avoid the unauthorized users from receiving multicast data,

Page 422

49-23 3. The configuration of multicast policy The multicast policy adopts the method of specifying a priority for the specified multicast data to

Page 423

3-19 Figure 3-11 Main Web Configuration Interface When configure the switch, the name of the switch is composed with English letters. 3.1.2.3 Man

Page 424

49-24 Switch(config)#ipv6 multicast destination-control fe80::203:fff:fe01:228a/64 access-group 9000 Thus, the users of this segment can only join g

Page 425 - 48.4.8 MSDP Troubleshooting

49-25 MLD protocol version2 use FF02::16 as destination address of membership report, and 143 as data type. The other logic of MLD Protocol version2

Page 426

49-26 1)Configure interval time for MLD to send query messages 2)Configure the maximum response time of MLD query 3)Configure the overtime of MLD que

Page 427

49-27 (1) Configure SwitchA: Switch (config) #ipv6 pim multicast-routing Switch (config) #ipv6 pim rp-address 3FFE::1 Switch (config) #interface vlan

Page 428

49-28 (namely ff02::1). Once there is a listener who wishes to join the multicast address, it will send a MLD Multicast listener Report back through

Page 429

49-29 mrouter-port interface <interface –name> ipv6 mld snooping vlan <vlan-id> mrouter-port learnpim6 no ipv6 mld snooping vlan <

Page 430 - 48.6 PIM-SSM

49-30 Scenario 1: MLD Snooping Function Figure 49-6 Open the switch MLD Snooping Function figure As shown above, the vlan 100 configured on the swi

Page 431

49-31 Figure 49-7 Switch as MLD Querier Function figure Configuration of switch B is the same as the switches in case 1, and

Page 432

49-32 Scenario 3: To run in cooperation with layer 3 multicast protocols SWITCH which is used in Scenario 1 is replaced with ROUTER with specific con

Page 433 - 48.7.1 Introduction to DVMRP

50-1 Chapter 50 Multicast VLAN 50.1 Introductions to Multicast VLAN Based on current multicast order method, when orders from users in different VLA

Page 434

3-20 3.2 CLI Interface The switch provides thress management interface for users: CLI (Command Line Interface) interface, Web interface, Snmp netword

Page 435

50-2 3. Configure the MLD Snooping Command Explanation Global Mode ipv6 mld snooping vlan <vlan-id> no ipv6 mld snooping vlan <vlan

Page 436

50-3 SwitchA(config)#interface vlan 10 Switch(Config-if-Vlan10)#ip pim dense-mode Switch(Config-if-Vlan10)#exit SwitchA(config)#vlan 20 SwitchA(c

Page 437 - 48.8.1 Introduction to DCSCM

51-1 Chapter 51 ACL Configuration 51.1 Introduction to ACL ACL (Access Control List) is an IP packet filtering mechanism employed in switches, provi

Page 438

51-2 51.2 ACL Configuration Task List ACL Configuration Task Sequence: 1. Configuring access-list (1) Configuring a numbered standard IP access-list

Page 439

51-3 5. Clear the filtering information of the specified port 1. Configuring access-list (1) Configuring a numbered standard IP access-list (2)

Page 440

51-4 5. Clear the filtering information of the specified port 1. Configuring access-list (1) Configuring a numbered standard IP access-list Comm

Page 441

51-5 access-list <num> {deny | permit} udp {{<sIpAddr> <sMask>} | any-source | {host-source <sIpAddr>}} [s-port {<sPort&g

Page 442 - 48.9.1 Introduction to IGMP

51-6 Command Explanation Standard IP ACL Mode exit Exits name-based standard IP ACL configuration mode. (4) Configuring an name-based extended IP

Page 443

51-7 <tos>][time-range<time-range-name>] [no] {deny | permit} udp {{<sIpAddr> <sMask>} | any-source | {host-source <sIpAd

Page 444

51-8 {host-source-mac<host_smac>}|{<smac><smac-mask>}}{any-destination-mac|{host-destination-mac<host_dmac>}|{<dmac>&l

Page 445

3 10.3 ULDP FUNCTION TYPICAL EXAMPLES ... 10-4 10.4 ULDP TR

Page 446 - 48.9.4 IGMP Troubleshooting

3-21 3.2.1.1 User Mode On entering the CLI interface, entering user entry system first. If as common user, it is defaulted to User Mode. The prompt s

Page 447 - 48.10 IGMP Snooping

51-9 [no]{deny|permit} {any-source-mac|{host-source-mac<host_smac>}|{<smac><smac-mask>}} {any-destination-mac |{host-destination-m

Page 448

51-10 (8) Configuring a numbered extended MAC-IP access-list Command Explanation Global mode access-list<num>{deny|permit} {any-source-mac|

Page 449

51-11 access-list<num>{deny|permit}{any-source-mac| {host-source-mac<host_smac>}|{<smac><smac-mask>}}{any-destination-mac|{h

Page 450

51-12 Command Explanation Extended name-based MAC-IP access Mode [no]{deny|permit} {any-source-mac|{host-source-mac <host_smac>}|{<smac&g

Page 451

51-13 c<host_smac>}|{<smac><smac-mask>}} {any-destination-mac|{host-destination-mac <host_dmac>}|{<dmac><dmac-mask&

Page 452

51-14 deletes a numbered standard IPv6 access-list. (11) Configuring a numbered extensive IPV6 access-list Command Explanation Global Mode ipv

Page 453

51-15 a. Create a standard IPV6 access-list based on nomenclature Command Explanation Global Mode ipv6 access-list standard <name> no ipv6 a

Page 454 - 48.11.3 IGMP Proxy Examples

51-16 Command Explanation Extended IPV6 ACL Mode [no] {deny | permit} icmp {{<sIPv6Prefix/sPrefixlen>} | any-source | {host-source <sIPv6

Page 455

51-17 Command Explanation Extended IPV6 ACL Mode exit Exits extended name-based IPV6 ACL configuration mode. 2. Configuring packet filtering fun

Page 456

51-18 [no] periodic {{Monday+Tuesday+Wednesday+Thursday+ Friday+Saturday+Sunday} | daily | weekdays | weekend} <start_time> to <end_time>

Page 457 - 49.1 PIM-DM6

3-22 3.2.1.3 Global Mode Type the config command under Admin Mode will enter the Global Mode prompt “Switch(config)#”. Use the exit command under oth

Page 458

51-19 3. Bind the ACL to the port The configuration steps are listed below: Switch(config)#access-list 110 deny tcp 10.0.0.0 0.0.0.255 any-dest

Page 459

51-20 Configuration result: Switch#show firewall Firewall Status: Enable. Switch #show access-lists access-list 1100(used 1 time(s)) acce

Page 460

51-21 access-list 3110(used 1 time(s)) access-list 3110 deny 00-12-11-23-00-00 00-00-00-00-ff-ff any-destination-mac tcp 10.0.0.0 0.0.0.255 an

Page 461 - 49.2 PIM-SM6

51-22 IPv6 Ingress access-list used is 600, traffic-statistics Disable. Scenario 5: The configuration requirement is stated as below: The interfa

Page 462

51-23  If an access-list contains same filtering information but conflicting action rules, binding to the port will fail with an error message. Fo

Page 463

52-1 Chapter 52 802.1x Configuration 52.1 Introduction to 802.1x The 802.1x protocol originates from 802.11 protocol, the wireless LAN protocol of I

Page 464

52-2 system should support EAPOL (Extensible Authentication Protocol over LAN).  The authenticator system is another entity on one end of the LAN

Page 465

52-3 52.1.2 The Work Mechanism of 802.1x IEEE 802.1x authentication system uses EAP (Extensible Authentication Protocol) to implement exchange of au

Page 466

52-4 PAE Ethernet Type: Represents the type of the protocol whose value is 0x888E. Protocol Version: Represents the version of the protocol supporte

Page 467

52-5 Identifier: to assist matching the Request and Response messages. Length: the length of the EAP packet, covering the domains of Code, Identifie

Page 468

3-23  ACL Mode ACL type Entry Operates Exit Standard IP ACL Mode Type ip access-list standard command under Global Mode. Configure parameters fo

Page 469

52-6 the remote RADIUS server. The following is the description of the process of these two authentication methods, both started by the supplicant

Page 470

52-7 the same. 1. EAP-MD5 Authentication Method EAP-MD5 is an IETF open standard which providing the least security, since MD5 Hash function is vul

Page 471

52-8 The following figure illustrates the basic operation flow of the EAP-TLS authentication method. Figure 52-10 the Authentication Flow of 802.1x

Page 472

52-9 authentication. The following figure illustrates the basic operation flow of PEAP authentication method. Figure 52-11 the Authentication Flow

Page 473 - 49.4 PIM-SSM6

52-10 Figure 52-12 the Authentication Flow of 802.1x EAP Termination Mode 52.1.6 The Extension and Optimization of 802.1x Besides supporting the p

Page 474

52-11 resources, which means all users of this port can access limited resources before being authenticated. The user-based advanced control will r

Page 475

52-12 the port into Guest VLAN if there is no supplicant getting authenticated successfully in a certain stretch of time because of lacking exclusiv

Page 476 - 49.5 IPv6 DCSCM

52-13 Command Explanation Port Mode dot1x port-control {auto|force-authorized|force-unauthorized } no dot1x port-control Sets the 802.1x authentic

Page 477

52-14 dot1x eapor enable no dot1x eapor enable Enables the EAP relay authentication function in the switch; the no command sets EAP local end authen

Page 478

52-15 Figure 52-13 The Network Topology of Guest VLAN Notes: in the figures in this session, E2 means Ethernet 1/0/2, E3 means Ethernet 1/0/3 and

Page 479

3-24 Ctrl +n The same as Down key “↓”. Ctrl +b The same as Left key “←”. Ctrl +f The same as Right key “→”. Ctrl +z Return to the Admin Mode di

Page 480 - 49.6.1 Introduction to MLD

52-16 is set as the port’s Guest VLAN. Before the user gets authenticated or when the user fails to do so, port Ethernet1/0/2 is added into VLAN10,

Page 481

52-17 # Set the access control mode on the port as portbased. Switch(Config-If-Ethernet1/0/2)#dot1x port-method portbased # Set the access control

Page 482

52-18 Switch(config)#interface vlan 1 Switch(Config-if-vlan1)#ip address 10.1.1.2 255.255.255.0 Switch(Config-if-vlan1)#exit Switch(config)#radius-s

Page 483 - 49.7 MLD Snooping

52-19 Switch(config)#radius-server authentication host 2004:1:2:3::3 Switch(config)#radius-server accounting host 2004:1:2:3::3 Switch(config)#r

Page 484

53-1 Chapter 53 The Number Limitation Function of Port, MAC in VLAN and IP Configuration 53.1 Introduction to the Number Limitation Function o

Page 485 - 49.7.3 MLD Snooping Examples

53-2 through configuration commands. Limiting the number of dynamic MAC and IP of ports: 1. Limiting the number of dynamic MAC. If the number

Page 486

53-3 2. Enable the number limitation function of MAC、IP in VLAN Command Explanation VLAN configuration mode vlan mac-address dynamic maximu

Page 487

53-4 show nd-dynamic count {vlan <vlan-id> | interface ethernet <portName> } Display the number of dynamic NEIGHBOUR in corre

Page 488

53-5 SWTICH B can get the MAC, ARP, ND list entries of all the PC, so limiting the MAC, ARP list entry can avoid DOS attack to a certain exten

Page 489 - Chapter 50 Multicast VLAN

54-1 Chapter 54 Operational Configuration of AM Function 54.1 Introduction to AM Function AM (Access Management) means that when a switch receiv

Page 490 - 50.3 Multicast VLAN Examples

3-25 Please configure precursor command "*" at first! The command is recognized, but the prerequisite command has not been configured. sy

Page 491

54-2 am port no am port Enable/disable AM function on the port. When the AM function is enabled on the port, no IP or ARP message will be forwar

Page 492 - Chapter 51 ACL Configuration

54-3 54.3 AM Function Example Figure 54-1 a typical configuration example of AM function In the topology above, 30 PCs, after converged by HUB

Page 493

55-1 Chapter 55 TACACS+ Configuration 55.1 Introduction to TACACS+ TACACS+ terminal access controller access control protocol is a pro

Page 494

55-2 3. Configure the TACACS+ authentication timeout time Command Explanation Global Mode tacacs-server timeout <seconds> no t

Page 495

55-3 Switch(config)#authentication line vty login tacacs 55.4 TACACS+ Troubleshooting In configuring and using TACACS+, the TACACS+ ma

Page 496

56-1 Chapter 56 RADIUS Configuration 56.1 Introduction to RADIUS 56.1.1 AAA and RADIUS Introduction AAA is short for Authentication, Authorization a

Page 497

56-2 Identifier field (1 octet): Identifier for the request and answer packets. Length field (2 octets): The length of the overall RADIUS packet, inc

Page 498

56-3 56.2 RADIUS Configuration Task List 1. Enable the authentication and accounting function. 2. Configure the RADIUS authentication key. 3. Configu

Page 499

56-4 radius-server accounting host {<ipv4-address> | <ipv6-address>} [port <port-number>] [key <string>] [primary] no radiu

Page 500

56-5 Figure 56-2 The Topology of IEEE802.1x configuration A computer connects to a switch, of which the IP address is 10.1.1.2 and connected with a

Page 501

4-1 Chapter 4 Basic Switch Configuration 4.1 Basic Configuration Basic switch configuration includes commands for entering and exiting the admin m

Page 502

56-6 Figure 56-3 The Topology of IPv6 Radius configuration A computer connects to a switch, of which the IP address is 2004:1:2:3::2 and connected w

Page 503

57-7 Chapter 57 SSL Configuration 57.1 Introduction to SSL As the computer networking technology spreads, the security of the network has been taking

Page 504

57-8 Firstly, SSL should be enabled on the switch. When the client tries to access the switch through https method, a SSL session will be set up betw

Page 505

57-9 2. Configure/delete port number by SSL used Command Explanation Global Mode ip http secure-port <port-number> no ip http secure-port Con

Page 506

57-10 Configuration on the switch: Switch(config)# ip http secure-server Switch(config)# ip http secure-port 1025 Switch(config)# ip http secure-ci

Page 507

58-1 Chapter 58 IPv6 Security RA Configuration 58.1 Introduction to IPv6 Security RA In IPv6 networks, the network topology is generally compromised

Page 508

58-2 debug ipv6 security-ra no debug ipv6 security-ra Enable the debug information of IPv6 security RA module, the no operation of this command will

Page 509 - 51.3 ACL Example

59-1 Chapter 59 VLAN-ACL Configuration 59.1 Introduction to VLAN-ACL The user can configure ACL policy to VLAN to implement the accessing control of

Page 510

59-2 2. Configure VLAN-ACL of MAC type Command Explanation Global mode vacl mac access-group {<700-1199> | WORD} {in | out} [traffic-statisti

Page 511

59-3 59.3 VLAN-ACL Configuration Example A company’s network configuration is as follows, all departments are divided by different VLANs, technique d

Page 512

4-2 4.2 Telnet Management 4.2.1 Telnet 4.2.1.1 Introduction to Telnet Telnet is a simple remote terminal protocol for remote login. Using Telnet,

Page 513 - 51.4 ACL Troubleshooting

59-4 Switch(config-ip-ext-nacl-vacl_a)# deny ip any-source any-destination time-range t1 3) Configure the extended acl_b of IP, at any time it only

Page 514

60-5 Chapter 60 MAB Configuration 60.1 Introduction to MAB In actual network existing the device which can not install the authentication client, suc

Page 515 - 52.1 Introduction to 802.1x

60-6 mac-authentication-bypass enable no mac-authentication-bypass enable Enable the port MAB authentication function. 2. Configure MAB authenticati

Page 516

60-7 mac-authentication-bypass timeout linkup-period <0-30> no mac-authentication-bypass timeout linkup-period To obtain IP again, set the inte

Page 517

60-8 Figure 60-1 MAB application Switch1 is a layer 2 accessing switch, Switch2 is a layer 3 aggregation switch. Ethernet 1/0/1 is an access port of

Page 518

60-9 Switch(config)#interface ethernet 1/0/2 Switch(config-if-ethernet1/0/2)# switchport mode hybrid Switch(config-if-ethernet1/0/2)# switchport hybr

Page 519

61-10 Chapter 61 PPPoE Intermediate Agent Configuration 61.1 Introduction to PPPoE Intermediate Agent 61.1.1 Brief Introduction to PPPoE PPPoE (Point

Page 520 - 52.1.5.1 EAP Relay Mode

61-11 PADO packet match with the servce information needed by client). MAC address of the other end used for session will be known after server is se

Page 521

61-12 PPPoE data Version Type Code Session ID Length Field TLV1 …… TLV N TLV frame Type Length Data Each field meanings in the following: Type fie

Page 522

61-13 61.1.2.3 PPPoE Intermediate Agent vendor tag Frame The following is the format of tag added by PPPoE IA, adding tag is the Uppermost function o

Page 523

4-3 {<num-std>|<name>} no authentication ip access-class Telnet/SSH/Web; the no form command will cancel the binding ACL. authentica

Page 524

61-14 client as untrust port, trust port can receive all packets, untrust port can receive only PADI, PADR and PADT packets which are sent to server.

Page 525

61-15 61.3 PPPoE Intermediate Agent Typical Application PPPoE Intermediate Agent typical application is as follows: Figure 61-4 PPPoE IA typical ap

Page 526

61-16 Typical configuration (2) in the following: Step1: Switch enables global PPPoE IA function, MAC as 0a0b0c0d0e0f. Switch(config)#pppoe intermed

Page 527

62-17 Chapter 62 SAVI Configuration 62.1 Introduction to SAVI SAVI (Source Address Validation Improvement) is a security authentication method that p

Page 528

62-18 Command Explanation Global Mode savi enable no savi enable Enable the global SAVI function, no command disables the function. 2. Enable or di

Page 529

62-19 6. Configure the global max-slaac-life for SAVI Command Explanation Global Mode savi max-slaac-life <max-slaac-life> no savi max-slaac-

Page 530

62-20 11. Configure the check mode for SAVI conflict binding Command Explanation Global Mode savi check binding <simple | probe> mode no savi

Page 531

62-21 savi ipv6 binding num <limit-num> no savi ipv6 binding num Configure the binding number of a port, no command restores the default valu

Page 532 - 52-17 IPv6 Radius

62-22 Ethernet1/0/12 of Switch1 and port Ethernet1/0/13 of Switch2, and enable the source address check function of SAVI. Ethernet1/0/1 and Ethernet1

Page 533 - 52.4 802.1x Troubleshooting

63-23 Chapter 63 Web Portal Configuration 63.1 Introduction to Web Portal Authentication 802.1x authentication uses the special client to authenticat

Page 534 - MAC in VLAN and IP

4-4 Global Mode ssh-server enable no ssh-server enable Enable SSH function on the switch; the “no ssh-server enable” command disables SSH functio

Page 535

63-24 2. Enable/disable web portal authentication of the port Command Explanation Port Mode webportal enable no webportal enable Enable/disable web

Page 536

63-25 clear webportal binding {mac WORD | interface <ethernet IFNAME | IFNAME> |} Delete the binding information of web portal authentication.

Page 537 - IP Typical Examples

63-26 The configuration of the common web portal authentication is as follows: Switch(config)#interface vlan 1 Switch(config-if-vlan1)#ip address 192

Page 538 - IP Troubleshooting Help

64-27 Chapter 64 VRRP Configuration 64.1 Introduction to VRRP VRRP (Virtual Router Redundancy Protocol) is a fault tolerant protocol designed to enha

Page 539 - Function

64-28 (1) Configure the preemptive mode for VRRP (2) Configure VRRP priority (3) Configure VRRP Timer intervals (4) Configure VRRP interface moni

Page 540

64-29 Command Explanation VRRP protocol configuration mode advertisement-interval <time> Configures VRRP timer value (in seconds). (4) Config

Page 541 - 54.3 AM Function Example

64-30 SwitchB (Config-Router-Vrrp)# virtual-ip 10.1.1.5 SwitchB(Config-Router-Vrrp)# interface vlan 1 SwitchB(Config-Router-Vrrp)# enable 64.4 VRRP

Page 542 - 55.1 Introduction to TACACS+

65-1 Chapter 65 IPv6 VRRPv3 Configuration 65.1 Introduction to VRRPv3 VRRPv3 is a virtual router redundancy protocol for IPv6. It is designed based o

Page 543 - 55-1 TACACS Configuration

65-2 protocols. Compared with NDP, VRRP provides a fast default gateway switch. In VRRP, backup routers can take up the unavailable master router in

Page 544 - 55.4 TACACS+ Troubleshooting

65-3 65.1.2 VRRPv3 Working Mechanism The working mechanism of VRRPv3 is the same with that of VRRPv2, which is mainly implemented via the interaction

Page 545 - 56.1 Introduction to RADIUS

4-5 4.3 Configurate Switch IP Addresses All Ethernet ports of switch are default to Data Link layer ports and perform layer 2 forwarding. VLAN int

Page 546

65-4 65.2 VRRPv3 Configuration 65.2.1 Configuration Task Sequence 1. Create/delete the virtual router (necessary) 2. Configure the virtual IPv6 add

Page 547

65-5 ( 2 ) Configure VRRPv3 priority Command Explanation VRRPv3 Protocol Mode priority < priority > Configure VRRPv3 priority. ( 3 ) Con

Page 548 - 56.3.1 IPv4 Radius Example

65-6 IPv6_A and IPv6_B are in the same segment), the virtual IPv6 address of backup group 1 and backup group are “V_IPv6_C” and “V_IPV6_D” respec

Page 549 - 56.3.2 IPv6 RadiusExample

66-1 Chapter 66 MRPP Configuration 66.1 Introduction to MRPP MRPP (Multi-layer Ring Protection Protocol), is a link layer protocol applied on Etherne

Page 550 - 56.4 RADIUS Troubleshooting

66-2 Each switch is named after a node on Ethernet. The node has some types: Primary node: each ring has a primary node, it is main node to detect an

Page 551 - Chapter 57 SSL Configuration

66-3 66.1.3 MRPP Protocol Operation System 1. Link Down Alarm System When transfer node finds themselves belonging to MRPP ring port Down, it sends l

Page 552

66-4 2) Configure MRPP ring Command Explanation Global Mode mrpp ring <ring-id> no mrpp ring <ring-id> Create MRPP ring. The “no” co

Page 553 - 57.3 SSL Typical Example

66-5 clear mrpp statistics {<ring-id>} Clear receiving data packet statistic information of MRPP ring. 66.3 MRPP Typical Scenario Figure 66-2

Page 554 - 57.4 SSL Troubleshooting

66-6 Switch(Config)# SWITCH B configuration Task Sequence: Switch(Config)#mrpp enable Switch(Config)#mrpp ring 4000 Switch(mrpp-ring-4000)#control

Page 555

66-7 66.4 MRPP Troubleshooting The normal operation of MRPP protocol depends on normal configuration of each switch on MRPP ring, otherwise it is ve

Page 556

4 15.3.1 Introduction to Dot1q-tunnel ... 15-11 15.3.2 Dot1

Page 557

4-6 3. BOOTP configuration Command Explanation VLAN Port Mode ip bootp-client enable no ip bootp-client enable Enable the switch to be a Boo

Page 558

67-1 Chapter 67 ULPP Configuration 67.1 Introduction to ULPP Each ULPP group has two uplink ports, they are master port and slave port. The port may

Page 559

67-2 method of MSTP instances, and ULPP does not provide the protection to other VLANs. When the uplink switch is happennig, the primary forwarding

Page 560

67-3 1. Create ULPP group globally Command Expalnation Global mode ulpp group <integer> no ulpp group <integer> Configure and delete UL

Page 561 - Chapter 60 MAB Configuration

67-4 ulpp group <integer> master no ulpp group <integer> master Configure or delete the master port of ULPP group. ulpp group <integer

Page 562

67-5 Figure 67-3 ULPP typical example1 The above topology is the typical application environment of ULPP protocol. SwitchA has two uplinks, they are

Page 563 - 60.3 MAB Example

67-6 Switch(config-If-Ethernet1/0/2)#exit SwitchB configuration task list: Switch(Config)#vlan 10 Switch(Config-vlan10)#switchport interface etherne

Page 564

67-7 mutually backup, respectively forward the packets of different VLAN ranges. When port E1/0/1 has the problem, the traffic of VLAN 1-200 are fo

Page 565 - 60.4 MAB Troubleshooting

67-8 67.4 ULPP Troubleshooting  At present, configuration of more than 2 multi-uplinks is allowed, but it may cause loopback, so is not recommended

Page 566

68-1 Chapter 68 ULSM Configuration 68.1 Introduction to ULSM ULSM (Uplink State Monitor) is used to process the port state synchronization. Each ULSM

Page 567 - 61.1.2.2 PPPoE Packet Format

68-2 68.2 ULSM Configuration Task List 1. Create ULSM group globally 2. Configure ULSM group 3. Show and debug the relating information of ULSM 1

Page 568

4-7  Get-Bulk-Request  Set-Request  Trap  Inform-Request NMS sends queries to the Agent with Get-Request, Get-Next-Request, Get-Bulk-Requ

Page 569

68-3 68.3 ULSM Typical Example Figure 68-2 ULSM typical example The above topology is the typical application environment which is used by ULSM and

Page 570

68-4 Switch(config-If-Ethernet1/0/1)#ulsm group 1 downlink Switch(config-If-Ethernet1/0/1)#exit Switch(Config)#interface ethernet 1/0/3 Switch(config

Page 571

69-5 Chapter 69 Mirror Configuration 69.1 Introduction to Mirror Mirror functions include port mirror function, CPU mirror function, flow mirror func

Page 572

69-6 3. Specify flow mirror source Command Explanation Global mode monitor session <session> source {interface <interface-list>} acces

Page 573 - 62.2 SAVI Configuration

69-7 Switch(config)#monitor session 4 source interface ethernet 1/0/15 access-list 120 rx 69.4 Device Mirror Troubleshooting If problems occur on con

Page 574

70-1 Chapter 70 RSPAN Configuration 70.1 Introduction to RSPAN Port mirroring refers to the duplication of data frames sent/received on a port to ano

Page 575

70-2 For chassis switches, at most 4 mirror destination ports are supported, and source or destination port of one mirror session can be configured o

Page 576

70-3 1. Configure RSPAN VLAN Command Explanation VLAN Configuration Mode remote-span no remote-span To configure the specified VLAN as RSPAN VL

Page 577

70-4 70.3 Typical Examples of RSPAN Before RSPAN is invented, network administrators had to connect their PCs directly to the switches, in order to c

Page 578 - 62.4 SAVI Troubleshooting

70-5 Intermediate switch: Interface ethernet1/0/6 is the source port which is connected to the source switch. Interface ethernet1/0/7 is the destinat

Page 579

4-8 In this figure, the OID of the object A is 1.2.1.1. NMS can locate this object through this unique OID and gets the standard variables of the

Page 580

70-6 Switch(config)#interface ethernet 1/0/2 Switch(Config-If-Ethernet1/0/2)#switchport mode trunk Switch(Config-If-Ethernet1/0/2)#exit Switch(config

Page 581

70-7 70.4 RSPAN Troubleshooting Due to the following reasons, RSPAN may not function:  Whether the destination mirror port is a member of the Por

Page 582

Chapter 62 ULSM Configuration 71-1 Chapter 71 sFlow Configuration 71.1 Introduction to sFlow The sFlow (RFC 3176) is a protocol based on standard netw

Page 583 - 64.1 Introduction to VRRP

Chapter 62 ULSM Configuration 71-2 2. Configure the sFlow proxy address Command Explanation Global Mode sflow agent-address <collector-address&

Page 584

Chapter 62 ULSM Configuration 71-3 Port Mode sflow counter-interval <interval-vlaue> no sflow counter-interval Configure the max interval whe

Page 585 - 64.3 VRRP Typical Examples

Chapter 62 ULSM Configuration 71-4 71.4 sFlow Troubleshooting In configuring and using sFlow, the sFlow server may fail to run properly due to physica

Page 586 - 64.4 VRRP Troubleshooting

72-1 Chapter 72 SNTP Configuration 72.1 Introduction to SNTP The Network Time Protocol (NTP) is widely used for clock synchronization for global comp

Page 587 - 65.1 Introduction to VRRPv3

72-2 72.2 Typical Examples of SNTP Configuration Figure 72-2 Typical SNTP Configuration All switches in the autonomous zone are required to perform

Page 588 - 65-1 VRRPv3 message

73-1 Chapter 73 NTP Function Configuration 73.1 Introduction to NTP Function The NTP (Network Time Protocol) synchronizes timekeeping spans WAN and L

Page 589

73-2 ntp server {<ip-address> | <ipv6-address>} [version <version_no>] [key <key-id>] no ntp server {<ip-address> | <

Page 590 - 65.2 VRRPv3 Configuration

4-9 3. Configure IP address of SNMP management base 4. Configure engine ID 5. Configure user 6. Configure group 7. Configure view 8. Configu

Page 591 - 65.3 VRRPv3 Typical Examples

73-3 7. To specified some interface as NTP broadcast/multicast client interface Command Explication Interface Configuration Mode ntp broadcast cli

Page 592 - 65.4 VRRPv3 Troubleshooting

73-4 debug ntp sync no debug ntp sync To enable debug switch of time synchronize information. debug ntp events no debug ntp events To enable debug sw

Page 593 - 66.1 Introduction to MRPP

74-1 Chapter 74 DNSv4/v6 Configuration 74.1 Introduction to DNS DNS (Domain Name System) is a distributed database used by TCP/IP applications to tr

Page 594

74-2 74.2 DNSv4/v6 Configuration Task List 1. To enable/disable DNS function 2. To configure/delete DNS server 3. To configure/delete domain nam

Page 595

74-3 5. To enable DNS dynamic domain name resolution Command Explanation Global Mode dns lookup {ipv4 | ipv6} <hostname> To enable DNS dynami

Page 596

74-4 debug dns {all | packet [send | recv] | events | relay} no debug dns {all | packet [send | recv] | events | relay} To enable/disable DEBUG of DN

Page 597 - 66.3 MRPP Typical Scenario

74-5 request; otherwise, the switch will relay the request to the real DNS server, pass the reply from the DNS Server to the client and record the d

Page 598

75-6 Chapter 75 Summer Time Configuration 75.1 Introduction to Summer Time Summer time is also called daylight saving time, it is a time system for s

Page 599 - 66.4 MRPP Troubleshooting

75-7 Configuration procedure is as follows: Switch(config)# clock summer-time 2012 absolute 23:00 2012.4.1 00:00 2012.10.1 Example2: The configurati

Page 600 - 67.1 Introduction to ULPP

76-1 Chapter 76 Monitor and Debug When the users configures the switch, they will need to verify whether the configurations are correct and the switc

Page 601

4-10 Command Explanation Global Mode snmp-server engineid <engine-string> no snmp-server engineid Configure the local engine ID on the sw

Page 602

76-2 and packet sent time) whose HOPLIMIT is set to 1. When first route on the path receives this datagram, it minus the HOPLIMIT by 1 and the HOPLIM

Page 603 - 67.3.1 ULPP Typical Example1

76-3 show tech-support Display the operation information and the state of each task running on the switch. It is used by the technicians to diagnose

Page 604

76-4 SDRAM (Synchronous Dynamic Random Access Memory) and NVRAM (Non Vulnerable Random Access Memory) is provided inside the switch as two part of th

Page 605 - 67.3.2 ULPP Typical Example2

76-5  Outputted information from the CLI command is classified informational  Information from the debugging of CLI command is classified debuggi

Page 606

76-6 Command Description Global Mode logging executed-commands {enable | disable} Enable or disable the logging executed-commands 4. Display the

Page 607 - 67.4 ULPP Troubleshooting

77-1 Chapter 77 Reload Switch after Specified Time 77.1 Introduce to Reload Switch after Specifid Time Reload switch after specified time is to reboo

Page 608 - 68.1 Introduction to ULSM

78-1 Chapter 78 Debugging and Diagnosis for Packets Received and Sent by CPU 78.1 Introduction to Debugging and Diagnosis for Packets Received and Se

Page 609

79-1 Chapter 79 MPLS Overview 79.1 MPLS Overview MPLS (Multiprotocol Label Switching), originating from IPv4, was first designed for improving the

Page 610 - 68.3 ULSM Typical Example

79-2 Figure 79-1 The Encapsulation Structure of a Label There are 4 fields in a label:  Label:The label value, whose length is 20 bits, a pointer

Page 611 - 68.4 ULSM Troubleshooting

79-3 LSP are separately called the upstream and downstream LSR, along the direction of data transmission. In the next figure, R2 is the downstream LS

Page 612 - 69.1 Introduction to Mirror

4-11 Command Explanation Global Mode snmp-server enable traps no snmp-server enable traps Enable the switch to send Trap message. This command is

Page 613 - 69.3 Mirror Examples

79-4 With the LSR mapping multiple incoming labels to the same FEC, all these incoming labels will correspond with the same outgoing label and egress

Page 614

79-5 Figure 79-3 The MPLS Network Structure The basic working process of MPLS based on the above figure : First, LDP, together with traditional rou

Page 615 - 70.1 Introduction to RSPAN

79-6 However, combining the powerful L3 switching function of IP networks and efficient forwarding mechanism of traditional L2 networks, MPLS uses co

Page 616

79-7 pre-configured service policy to different services, ensuring the service quality. The service quality class mechanism and the label mechanism o

Page 617

80-8 Chapter 80 LDP 80.1 LDP Introduction LDP protocol is used for label distribution in the MPLS label switching environment, and only applies to

Page 618

80-9 80.1.1 Basic Concept of LDP LDP Peer When distributing labels to FEC, LDP needs to advertise this label and its meaning in the MPLS network to c

Page 619

80-10 TLV Encoding LDP encapsulates parameters in LDP messages via TLV (Type-Length-Value). The LDP TLV format is as follows: Figure 80-2 The TVL F

Page 620

80-11 Common Session Parameters 0x0500 ATM Session Parameters 0x0501 Frame Relay Session Parameters 0x0502 Label Request Message ID 0x0600 Vendor-Pri

Page 621 - 70.4 RSPAN Troubleshooting

80-12 Figure 80-3 The Process of Label Advertisement For example, as for LSP1 in the above figure, LSR B is the upstream LSR of LSR C, while LSR C

Page 622 - 71.1 Introduction to sFlow

80-13  Ordered Mode: For a FEC label mapping of a LSR, the LSR only advertise the mapping to its upstream when it already has the label mapping o

Page 623

4-12 Scenario 3: NMS uses SNMP v3 to obtain information from the switch. The configuration on the switch is listed below: Switch(config)#snmp-s

Page 624 - 71.3 sFlow Examples

80-14 incoming labels.  LSR will map the labels of received packets to NHLFE;  LSR will find the corresponding NHLFE in the LIB based on the labe

Page 625 - 71.4 sFlow Troubleshooting

80-15 downstream LSR, and specifies for which FEC this label request is. (2) The downstream receiving the label request message will save this messa

Page 626 - 72.1 Introduction to SNTP

80-16  The hop count of the path exceeds the configured maximum value. If no record of its LSR ID is found, a new one will be added. The maximum va

Page 627

80-17 2. Enable LDP It is easy to implement basic configurations of LDP in DCNOS. Usually users only have to enable the LDP switch, and enable it on

Page 628

80-18 advertisement-mode {downstream-on-demand|downstream-unsolicited} Optional Configure the global label advertisement mode: downstream-on-demand

Page 629

80-19 [no] loop-detection-count <count> optional Configure the maximum hop count of LDP loop detection, whose default value is 255, the no oper

Page 630

80-20 [no] hold-time <hold-time > Optional Configure the LDP multicast peer hold time, whose default value is 15 seconds; the no operation

Page 631

80-21 [no] ldp targeted-peer-hold-time <hold-time> optional Configure the LDP targeted peer hold time on a specified interface; the no operati

Page 632 - 74.1 Introduction to DNS

80-22 [no] request-retry optional Configure the LDP to retry 5 times when the label request is rejected, the no operation will disable the retry. [no

Page 633

80-23 Figure 80-4 MPLS VPN Typical Instance The above figure demonstrates a typical MPLS VPN instance, in which, PE1, P and PE2 form the public ne

Page 634

4-13  The switch enabled SNMP Agent server function (use “snmp-server” command)  Secure IP for NMS (use “snmp-server securityip” command) and

Page 635 - 74.3 Typical Examples of DNS

80-24 The LDP configuration of P is as follows: P#config P(config)#mpls enable P(config)# router ldp P(config-router)#exit P(config)#interface vlan 1

Page 636 - 74.4 DNS Troubleshooting

80-25  Second, use the “show ldp interface” command to check whether the LDP has been enabled correctly on the interface after the connection suc

Page 637 - 75.3 Examples of Summer Time

81-26 Chapter 81 MPLS VPN 81.1 BGP/MPLS VPN Introduction 81.1.1 BGP/MPLS VPN Network Structure BGP/MPLS VPN is a PE-based L3VPN technology in the V

Page 638

81-27 the local VPN route to PE, and learn the remote VPN route from PE. CE and PE use BGP/IGP to exchange route information or static routes. PE w

Page 639 - Chapter 76 Monitor and Debug

81-28 route table and IFIL (Label Forwarding Information Base). To be specific, the information in VPN instances include: LFIB, IP route table, inte

Page 640 - 76.5 Show

81-29  Import Target Attribute: when receiving the VPN-IPv4 route advertised by other PE routers, PE will check their Export Target Attribute, and

Page 641 - 76.7 System log

81-30 Figure 81-3 Forwarding VPN Packets 1. Site1 sends an IP packet with a destination address of 1.1.1.2, which is sent by CE1 to PE1. 2. PE1

Page 642

81-31 Figure 81-4 Basic VPN Networking Resolution In the above figure, the VPN Target distributed by PE for VPN1 is 100:1; and that for VPN2 is 200

Page 643

81-32 Figure 81-5 Hub&Spoke Networking Resolution In the above figure, Spoke sites communicate with each other via Hub sites (the arrow in the

Page 644

81-33 If a VPN user wants to provide some site resource of this VPN to outside users, the Extranet Networking resolution can solve the problem. In t

Page 645

4-14 Figure 4-2 Typical topology for switch upgrade in BootROM mode The upgrade procedures are listed below: Step 1: As shown in the figure,

Page 646 - Received and Sent by CPU

81-34 In real networking applications, multiple sites of a user VPN may connect to SP with different ASN, or to different AS of the same SP. Such app

Page 647 - Chapter 79 MPLS Overview

81-35 1. Enable globally MPLS (necessary) 2. Configure VPN instances (necessary) (1) Create VPN instances, and enter the VPN instance view. (2) R

Page 648

81-36 mpls enable no mpls enable Necessary Enable MPLS; the no operation will disable MPLS. 2. Configure VPN instances (necessary) (1) Create VPN in

Page 649

81-37 Command Explanation BGP Protocol Configuration Mode neighbor <ip-address> remote-as <as-num> necessary Configure the remote PE

Page 650

81-38 3) Enable OSPF in the segment between PE-CE 4) Configure to re-advertise BGP routes 5) Enter the BGP-VPN instance view 6) Configure to re-adver

Page 651

81-39 BGP-VPN instance view [no] redistribute {connected | ospf | rip | static} optional Configure to re-advertise the directly connected routes a

Page 652

81-40 [no] redistribute { kernel | connected | static | ospf | isis | bgp} [metric <value>] [route-map<word>] optional Configure to re-ad

Page 653 - 79.1.5 MPLS PHP

81-41 Global Configuration Mode [no] ip route vrf <vrf-name> {<ip- prefix> <mask>|<ip-prefix/<prefix- length>} {<gatew

Page 654 - Chapter 80 LDP

81-42 Figure 81-8 Create BGP MPLS VPN between PE-CE via EBGP The configuration of CE1 is as follows : (the configurations of CE2~CE4 are similar) CE

Page 655 - 80.1.1 Basic Concept of LDP

81-43 PE1(config-if-Vlan1)# ip vrf forwarding vpna PE1(config-if-Vlan1)#ip address 10.1.1.2 255.255.255.0 PE1(config-if-Vlan1)#exit PE1(config)# inte

Page 656

4-15 file. [Boot]: load nos.img Loading... Loading file ok! Step 5: Execute write nos.img in BootROM mode. The following saves the syst

Page 657 - 80.1.3 LDP Label Management

81-44 PE1(config-router-af)#neighbor 10.2.1.1 remote-as 65002 PE1(config-router-af)#redistribute connected PE1(config-router-af)#exit PE1(config-rout

Page 658

81-45 (2) Configure to bind the interface with the VPN instances PE2(config)# interface vlan 3 PE2(config-if-Vlan3)# ip vrf forwarding vpna PE2(conf

Page 659

81-46 PE2(config-router-af)#exit PE2(config-router)# address-family ipv4 vrf vpnb PE2(config-router-af)#neighbor 10.4.1.1 remote-as 65004 PE2(config-

Page 660 - 80.1.4 LDP Session

81-47 PE1#config PE1(config)#ip vrf vpna PE1(config-vrf)#rd 100:1 PE1(config-vrf)#route-target both 100:1 PE1(config)#ip vrf vpnb PE1(config-vrf)#rd

Page 661 - 80.1.5 LDP Loop Detection

81-48 PE1(config)#router ospf 1 vpna PE1(config-router)# network 0.0.0.0/0 area 0 PE1(config-router)#redistribute connected PE1(config-router)#redist

Page 662 - 80.2 LDP Configuration

81-49 P(config-if-Vlan100)#exit P(config)#interface vlan200 P(config-if-Vlan200)#ip address 200.1.1.2 255.255.255.0 P(config-if-Vlan200)#label-switch

Page 663

81-50 CE1(config-router)#redistribute connect CE1(config-router)#exit The confiugraiton of MPLS BGP on switch PE1 is as follows : (the configuration

Page 664

81-51 PE1(config-router)# ospf router-id 172.1.1.1 PE1(config-router)# network 0.0.0.0/0 area 0 PE1(config-router)# redistribute connected PE1(config

Page 665

81-52 P(config)# interface loopback 1 P(config-if-Loopback1)# ip address 172.3.3.3 255.255.255.255 P(config-if-Loopback1)# exit P(config)#interface v

Page 666

81-53 The configuration of CE1 is as follows: (the configurations of CE2~CE4 are similar) CE1#config CE1(config)# interface vlan 1 CE1(config-if-Vla

Page 667

5 18.1.2 QoS Implementation ... 18-2 18.1.3 Ba

Page 668 - 80.3 LDP Typical Instances

4-16 Step 9: Execute write flash:/config.rom in BootROM mode. The following saves the update file. [Boot]: write flash:/config.rom [Boot]: write

Page 669

81-54 PE1(config-if-Vlan100)#ip address 100.1.1.1 255.255.255.0 PE1(config-if-Vlan100) #ldp enable PE1(config-if-Vlan100)#exit (5) Enable OSPF to a

Page 670 - 80.4 LDP Troubleshooting

81-55 P(config-router)#exit P(config)# interface loopback 1 P(config-if-Loopback1)# ip address 172.3.3.3 255.255.255.255 P(config-if-Loopback1)# exit

Page 671

81-56  Besides, if no remote CE device can be checked on CE after saving the correction configuration and rebooting the device, please be patience,

Page 672 - Chapter 81 MPLS VPN

82-57 Chapter 82 Public Network Access of MPLS VPN 82.1 Public Network Access Introduction Public network access of VPN means the ability of VPN si

Page 673

82-58 82.1.2 VRF Internet Access Mode 3 In VRF Internet Access Mode 3, as demonstrated in the next figure, VPN site access the Internet via private n

Page 674

82-59 (4) Configure proper filter policy on the public network interface, to filter the packets whose source and destination addresses are private n

Page 675

82-60 Figure 82-3 Non-VRF Internet Access Mode The configuration of CE1 is as follows: CE1#config CE1(config)#access-list 1 deny 100.100.1.0 0.0.0.

Page 676

82-61 CE1(config-router)#network 10.1.2.0/24 CE1(config-router)#redistribute connected CE1(config-router)#neighbor 100.100.1.1 remote-as 100 CE1(co

Page 677

82-62 PE1(config)#router bgp 100 PE1(config-router)#neighbor 100.200.1.2 remote-as 60102 PE1(config-router)#neighbor 200.200.1.1 remote-as 100 PE1(co

Page 678

82-63 PE2(config-vrf)#exit PE2(config)#interface Vlan1 PE2(config-if-Vlan1)#ip vrf forwarding VRF-A PE2(config-if-Vlan1)#ip address 192.168.101.1 2

Page 679

4-17 There are two types of data connections: active connection and passive connection. In active connection, the client transmits its address a

Page 680

82-64 IGW(config-if-Vlan1)#ip address 202.200.3.2 255.255.255.0 IGW(config-if-Vlan1)#exit IGW(config)#interface Vlan2 IGW(config-if-Vlan2#ip address

Page 681

83-65 Chapter 83 SWITCH OPERATION 83.1 Address Table The Switch is implemented with an address table. This address table composed of many entries.

Page 682

83-66 The Switch performs "Store and forward" therefore, no error packets occur. More reliably, it reduces the re-transmission rate. No

Page 683

84-1 Chapter 84 TROUBLE SHOOTING This chapter contains information to help you solve problems. If the Ethernet Switch is not functioning properly,

Page 684

85-1 Chapter 85 APPENDEX A 85.1 A.1 Switch's RJ-45 Pin Assignments 1000Mbps, 1000Base T Contact MDI MDI-X 1 BI_DA+ BI_DB+ 2 BI_DA- BI_DB- 3 BI_D

Page 685

85-2 The standard RJ-45 receptacle/connector There are 8 wires on a standard UTP/STP cable and each wire is color-coded. The following shows the pi

Page 686

86-1 Chapter 86 GLOSSARY Bandwidth Utilization The percentage of packets received over time as compared to overall bandwidth. BOOTP Boot protocol us

Page 687

86-2 Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet fr

Page 688 - (1) Configure VPN instances

86-3 Multicast Switching A process whereby the switch filters incoming multicast frames for services no attached host has registered for, or forwards

Page 689

86-4 Telnet Defines a remote communication facility for interfacing to a terminal device over TCP/IP. Trivial File Transfer Protocol (TFTP) A TCP/IP

Page 690

4-18 To prevent illicit file upload and easier configuration, switch mandates the name of start up configuration file to be startup-config.  R

Page 691

EC Declaration of Conformity For the following equipment: *Type of Product: 24-Port 100/1000X SFP with 4 Optional 10G slots Layer 3 Managed Stac

Page 692

EC Declaration of Conformity For the following equipment: *Type of Product: 24-Port Gigabit with 4 Optional 10G slots Layer 3 Managed Stackable

Page 693

4-19 copy <source-url> <destination-url> [ascii | binary] FTP/TFTP client upload/download file. (2)For FTP client, server file list c

Page 694 - (7) Configure BGP

4-20 tftp-server enable no tftp-server enable Start TFTP server, the no command shuts down TFTP server and prevents TFTP user from logging in.

Page 695 - (2) Configure OSPF

4-21 Place the “12_30_nos.img” file to the appropriate FTP server directory on the computer. The configuration procedures of the switch are list

Page 696

4-22 The configuration procedures of the switch are listed below: Switch(config)#interface vlan 1 Switch(Config-if-Vlan1)#ip address 10.1.1.2 2

Page 697

4-23 4.5.3.4 FTP/TFTP Troubleshooting 4.5.3.4.1 FTP Troubleshooting When upload/download system file with FTP protocol, the connectivity of the li

Page 698

4-24 When upload/download system file with TFTP protocol, the connectivity of the link must be ensured, i.e., use the “Ping” command to verify the

Page 699

5-1 Chapter 5 File System Operations 5.1 Introduction to File Storage Devices File storage devices used in switches mainly include FLASH card

Page 700

6 22.4 URPF ...

Page 701

5-2 directory on a certain device. 4. Changing the current working directory of the storage device Command Explanation Admin Configuration

Page 702

5-3 5.3 Typical Applications Copy an IMG file flash:/nos.img stored in the FLASH on the boardcard, to cf:/nos-6.1.11.0.img. The configuration

Page 703

6-1 Chapter 6 Cluster Configuration 6.1 Introduction to cluster network management Cluster network manag

Page 704 - Internet

6-2 5) Clear the list of candidate switches maintained by the switch 4. Configure attributes of the c

Page 705

6-3 cluster keepalive loss-count <int> no cluster keepalive loss-count Set the max number of lost

Page 706

6-4 ip http server Enable http function in commander switch and member switch. Notice: must insure the h

Page 707

6-5 Configuration of SW1: Switch(config)#cluster run Switch(config)#cluster ip-pool 10.2.3.4 Switch(conf

Page 708

7-1 Chapter 7 Port Configuration 7.1 Introduction to Port XGS3-24042 switches contain Cable ports and Combo ports. The Comb

Page 709

7-2 Command Explanation Port Mode combo-forced-mode {copper-forced | copper-preferred-auto | sfp-forced | sfp-preferred-a

Page 710

7-3 rate-violation <200-2000000> [recovery <0-86400>|] no rate-violation Set the max packet reception rate of a

Page 711 - Chapter 83 SWITCH OPERATION

7 27.3 GRATUITOUS ARP CONFIGURATION EXAMPLE ... 27-62 27.4 GRATUITOUS ARP

Page 712 - 83.5 Auto-Negotiation

7-4 The configurations are listed below: Switch1: Switch1(config)#interface ethernet 1/0/7 Switch1(Config-If-Ethernet1/0/

Page 713

8-1 Chapter 8 Port Isolation Function Configuration 8.1 Introduction to Port Isolation Function Port isolation is an independent port-based function

Page 714 - Chapter 85 APPENDEX A

8-2 3. Specify the flow to be isolated Command Explanation Global Mode isolate-port apply [<l2|l3|all>] Apply the port isolation configura

Page 715 - 1 2 3 4 5 6 7 8

8-3 between any downlink port and a specified uplink port is normal. The uplink port can communicate with any port normally. The configuration of S1:

Page 716 - Chapter 86 GLOSSARY

9-4 Chapter 9 Port Loopback Detection Function Configuration 9.1 Introduction to Port Loopback Detection Function With the development of switches, m

Page 717

9-5 1.Configure the time interval of loopback detection Command Explanation Global Mode loopback-detection interval-time <loopback> <no-

Page 718

9-6 5. Configure the loopback-detection control mode (automatic recovery enabled or not) Command Explanation Global Mode loopback-detection contr

Page 719

9-7 If adopting the control method of block, MSTP should be globally enabled. And the corresponding relation between the spanning tree instance and

Page 720 - EC Declaration of Conformity

10-1 Chapter 10 ULDP Function Configuration 10.1 Introduction to ULDP Function Unidirectional link is a common error state of link in networks, espec

Page 721

10-2 mentioned above. In a switch connected via fibers or copper Ethernet line (like ultra five-kind twisted pair), ULDP can monitor the link state o

Comments to this Manuals

No comments